Thursday, December 26, 2019

Sample Persuasive Message - Free Essay Example

Sample details Pages: 4 Words: 1274 Downloads: 6 Date added: 2017/09/15 Category Advertising Essay Type Persuasive essay Did you like this example? Sample persuasive message COMM/470 Communicating In The Virtual Workplace Electronic commerce has become a part of everyday lives. Many retail choices available through the Internet, which can save time, effort, and provide a greater selection. Electronic retailers (e tailers) realize this has become an increasingly competitive environment. These retailers must not only find new customers but also retain the existing customers. As with any retail-company, business research is vital for their existence. E-tailers must understand customer behaviors to serve their customers and help understand the decision process customers go through prior to making a purchase. The purpose of this paper is to identify three behaviors inherent in electronic retailing (e-tailing). A discussion related to the communications medium in which each behavior occurs, along with explanations regarding how each medium enables e-commerce. Analysis of each behavior using communication processes, including purpose, sender, receiver, message, environment, noise, technology, and feedback. Don’t waste time! Our writers will create an original "Sample Persuasive Message" essay for you Create order In addition, the development and review of a sample persuasive message aimed at a virtual audience. E-tailing behaviors When a consumer begins to search for a product or service on the Internet, consumers consider many factors. Most consumers will gravitate to trusted brand names as a starting point in a product search because they have established a bond of trust with a name through traditional brick and mortar retailers and successful history. The behavioral e-tailing consumer model can be broken down into three areas, the product, the process, and the partnership. The intent of electronic retailers is to intervene at every level to influence the buyer’s decision and gain trust and loyalty to ensure a repeat visit to their site or subsequent sale. The first behavior in the consumer model is the product or service search. Independent and uncontrollable variables influenced the product search (Turban, King, McKay, Marshall, Lee, Viehland, 2008). These are personal and environmental characteristics like age, gender, culture, and lifestyle. The intervening or moderating variables are within the control of the vendor. The factors like price, variety of products, and services is how e- tailers can intervene and influence the initial search. The communications mediums used by e-tailers are pricing and advertisement via the Internet on their own and advertising websites along with e-mail. The use of their brand name and promotional Internet banners will also drive a consumer toward a specific product or service for further research and eventually a purchase. Using the communication model, the sender (consumer) begins to search the Internet looking for a product (purpose). The Internet (technology) returns the information with advertisements and pricing (receiver), and the feedback given directs the sender to the specific area. This medium enables e-commerce by linking prospective consumers to specific websites to find more information about the products and services. The second behavior in the consumer model is the purchase phase. The purchase phase, largely influenced by the e-tailer through offering free shipping, convenience of secure online payments and price comparisons. The e-tailer strategies are prevalent in this phase. Some e-tailers may offer sample or trial services for a short period. Others interact with the consumer to make recommendations on a specific product. They may offer a live chat to help the consumer feel comfortable with the purchase. The communication medium used at this phase may vary. It can be a â€Å"live chat† or it may be a secure website used for the financial transaction. The e-tailer can offer the consumer a variety of options at this point, which include warranty purchases or express shipping. In the communication process, the e-tailer (sender) provides the consumer (receiver) with purchasing options and many customer service advantages (purpose). The noise during the transaction will normally be minimal because the sender (vendor) wants to ensure the purchasing phase is pleasant and enjoyable. This medium enables e-commerce because a good online purchase experience will ensure a return customer and purchase. The final phase in the behavioral process involves the â€Å"partnership† or the post-purchase phase. This is when the e-tailer continues to provide information to the consumer in the effort to build a relationship to facilitate further purchases and services. The e-tailer may send the consumer a feedback survey. They may offer a discount coupon for use on future purposes. The intent is to build customer loyalty. Using browser-tracking cookies, the e-tailer personalizes the website to make the consumer feel comfortable during the next visit to the site. The e-tailer will capture information like preferred name, credit card data for future purchases and buying preferences. They will also send e-mail promotions on related products. The medium used in this phase can be e-mail and the website. This medium enables e-commerce because the e-mails normally provide links to the e-commerce site for easy access of purchases. Using the communication model, the vendor (sender) would transmit the message to the consumer (receiver) to incite a repeat purchase (purpose). The technology is the e-mail with the link to their site. The noise is minimal, and the feedback will be when the consumer opens the link. The behaviors inherent to e-tailing enable the e-commerce world and allow consumers to become more comfortable with using these new shopping mediums. Sample Persuasive Messages Persuasive writing requires writers to persuade others to see the benefit in a suggestion or course of action. In order for a persuasive message to be effective, the sender must have a degree of credibility. The sender should have an expertise in the area, be trustworthy, and appear excited about the proposal. An effective, persuasive message should contain a few key components. It should grab the attention of the recipient. It should maintain interest by stating a benefit or filling a known need. It should generate a desire in the recipient by using emotional or logical appeal. The final component is to end with an action statement. The writer must be clear about what they specifically want the recipient to do. Example of a persuasive message aimed at a virtual audience â€Å"Are you tired of writing checks to pay bills, and dealing with the hassle of postage stamps? You can save approximately $100 a year and pay bills on line from the convenience of your home or office, by using our free online â€Å"Bill Pay† service. You will not have to worry about due dates and other fraud issues associated with mailing bills. We can provide safe and secure payment delivery guaranteed. Just follow the link below, and in three easy steps, will be on your way to worry-free bill payment. Sign up today and start saving now! † The above message included the all the necessary components for a persuasive message. This message enabled e-commerce by providing a link to generate the online bill payment. This is an example of how e-tailers can generate business through persuasive e-mails using a logical approach. Conclusion Electronic retailers have implemented strategic measures into their websites and other communication mediums to generate customer loyalty and locate new customers. This paper reviewed three behaviors inherent in e-tailing. Also discussed, were the communication mediums used when each behavior occurred and developed the connection regarding how each enabled e-commerce. The communication model aided in analyzing the behavior and how it fits into the model. Also described, were the components of a persuasive message. A persuasive message, developed with these components, demonstrated how it would enable e-commerce. By using the combinations of e-mail and other virtual mediums, e tailing can become a boundless source for retailers in the future. References Roebuck, D. B. Mckenney, M. A. (2006) Improving Business Communication Skills. 4th Ed. Person Education. Turban, E. , King, D. , McKay, J. , Marshall, P. , Lee, J. , Viehland, D. (2008). Electronic Commerce 2008: A managerial perspective (5th Ed. ) Upper Saddle River, NJ: Pearson Prentice Hall

Wednesday, December 18, 2019

eleanor roosevelt Essay - 576 Words

Anna Eleanor Roosevelt Eleanor Roosevelt was born in New York City on October 11, 1884, daughter of lovely Anna Hall and Elliott Roosevelt, younger brother of Theodore. When her mother died in 1892, the children went to live with Grandmother Hall; her adored father died only two years later. Attending a distinguished school in England gave her, at 15, her first chance to develop self-confidence among other girls. Eleanor married her fifth cousin, Franklin Delano Roosevelt. Tthey became the parents of six children. In World War 1, she became active in the American Red Cross and in volunteer work in Navy hospitals. Franklin Roosevelt was stricken with polio in 1921. Mrs. Roosevelt became active in politics both to help him maintain his†¦show more content†¦Roosevelt was in the United States Delegation to the United Nations General Assembly, a position she held until 1953. She was chairman of the Human Rights Commission during the drafting of the Universal Declaration of Human Rights. Eleanor Roosevelt was a popular speaker and lecturer in person and on radio and television. She was a writer with many articles and books. What was most interesting about Eleanor Roosevelt was that she could do all those things in one day. The next day she would go and do those things all over again. What amazes me is how she could do all of those things in one day because that is something I could not do. When Anna was a baby her mother called her ugly and her father called her a gift from heaven. When Eleanor was older, her mother and father would go out to parties. One day her father took her to a party where she saw all the boys wearing ragged and ripped clothing, while she had nice clothes to wear. When Eleanor became First Lady she remembered this and did what she could to help poor people. In her later years, Mrs. Roosevelt lived in Hyde Park New York. She had an apartment in New York City where she died on November 7, 1962. She is buried alongside her husband in the rose garden in Hyde Park, now a national site. Eleanor Roosevelt was an interesting person because she was able to do so many things so well. She wrote books, gave talks, traveled, helped the poor, and took care of her husband. TheShow MoreRelatedEleanor Roosevelt Essay928 Words   |  4 PagesJr. †¢Ã‚   Susan B. Anthony †¢Ã‚   Eleanor Roosevelt †¢Ã‚   Andrew Jackson Eleanor Roosevelt Born into a select group of families known as New York Society, Eleanor Roosevelt would become known for her compassion for all human kind, regardless of race, religion, sex or economic status. She would dedicate her life to fighting for the rights of women and children, blacks and Jews, Americans and people from other countries, and senior citizens and the common worker. Eleanor would change the way the countryRead More Eleanor Roosevelt Essay1601 Words   |  7 Pages Although Eleanor Roosevelt served as first lady from 1932 to 1945, her influence lasted much longer than expected. Eleanor became her husband’s ears and eyes during her husband’s presidency and aided human rights during her entire life. She did what no other First Lady, or woman had dared to do before; she challenged society’s wrong doings. Many respected her; President Truman had called her â€Å"the First Lady of the World (Freedman, 168).† Eleanor Roosevelt was an amazing first lady who helped herRead MoreEleanor Roosevelt as a Leader845 Words   |  4 Pages One very successful leader, who was also a hero in the popular press, was Eleanor Roosevelt. Eleanor Roosevelt made enduring changes in the role of the First Lady of the United States, and championed change in human rights around the world. The First Lady became a career position, a political platform, a media persona, and a worldwide influence at a time when most women did not pursue careers. Eleanor Roosevelt stood up for women when women did not have any rights. She then stood up for African-AmericanRead MoreEssay Eleanor Roosevelt5218 Words   |  21 PagesELEANOR ROOSEVELT: A LIFE OF LEADERSHIP Introduction The legacy of Eleanor Roosevelt is essentially contested. To many, her role as First Lady, delegate to the UN, Democratic Party member, humanitarian and social activist immortalized her as the conscience of the nation. However critics - deriding her as a gadfly and an unfit woman - cite many flaws in her leadership capacity. Roosevelt was never elected to office. She was reluctant to assume the responsibilities of being the FirstRead More Eleanor Roosevelt Essay4235 Words   |  17 PagesEleanor Roosevelt Eleanor Roosevelt’s work has made a significant impact on the interpersonal domain. Her work touched the lives of millions of Americans and influenced many aspects of American politics. She was a master of her domain, interacting with millions and breaking down many barriers. Her work can be considered creative because it was so unconventional. She took on roles that were considered untraditional for women, and with an innovative approach. I admire her work as aRead More Eleanor Roosevelt Essay2451 Words   |  10 Pagesrespect as the first lady Eleanor Roosevelt gained a lot of her international esteem as a civil rights activist long before that. Eleanor’s interest in politics did not begin when her husband began his career in politics. Once he was named to the Democratic ticket, as Vice President Eleanor became interested in politics. While Franklin was becoming governor of New York she was campaigning for him unknowing that she was advancing her politica l career as well. Once Eleanor became first lady it was alreadyRead MoreEleanor Roosevelt2144 Words   |  9 PagesHernandez 1 Hernandez 1 On October 11, 1884, a remarkable individual whom would later be considered one of the world’s most influential women was born. Eleanor Roosevelt was born in New York to her parents Anna Hall Roosevelt and Elliot Roosevelt. With her blue eyes and light brown hair, she would warm the heart of every individual she came across. She grew to be five feet and eleven inches, which to this day makes her the tallest first lady. With regardsRead More Eleanor Roosevelt Essay1518 Words   |  7 Pages Eleanor Roosevelt was a honest person who had responsibility and compassion towards her husband , family and her fellow man, whatever their social status. She used great citizenship and initiative actions in dealing with anyone who was fortunate enough to make her acquaintance. Eleanor Roosevelt is an outspoken advocate of social justice. During the years she has taken over a lot of responsibility. For someone who spent thefirst third of her life as shy and timid, she showed great courageRead MoreEleanor Roosevelt And The New Deal2452 Words   |  10 Pageswere soon transformed when Franklin D. Roosevelt began his presidency. While in office, Franklin D. Roosevelt created a package of social programs known as the New Deal. The New Deal was developed to help raise the spirits of Americans, find a solution for unemployment, and assist those that were in need. Throughout Roosevelt’s presidency, his wife Eleanor Roosevelt played the role of being both his eyes and ears. This paper will focus on Eleanor Roosevelt and the role that she played with the NewRead MoreEleanor Roosevelt And His Life1948 Words   |  8 Pages Eleanor Roosevelt was born October 11, 1884 in New York City to father Elliot Roosevelt and mother Anna Rebecca Hall. Eleanor’s mother was a debutante who was disappointed in Eleanor’s looks. It is even reported that â€Å"she called her ‘granny’†(Ward,1). Her mothe r died when she was 8 leaving her to be raised by her father. Elliot Roosevelt suffered from alcoholism and a narcotic addiction. He was often not allowed to see her due to this condition and was committed to an asylum in France in 1890( biography

Tuesday, December 10, 2019

Case Study Business Law and Ethics

Question: Discuss about theCase Study for Business Law and Ethics. Answer: Introduction The digital era has led to everything being posted over the social media accounts and shared with the world openly. In the corporate world, the use of social media is becoming a common phenomenon. Each and every company is using the social media as a platform to advertise themselves, and the social media is being used as a medium of attaining the various goals, like the attainment and detainment of customers, clients and the employees. Moreover, to promote the companies and the activities they are indulged in, social media is being used as the top medium (Neti, 2011). The increase in the use of social media in the workplace has led a number of companies in formulation of social media policies, to control what is being posted by their employees and to keep such posts regulated. Though, this highlights the need to look at the other aspect of this. In other words, the posts over the internet by the employer also have to be regulated (Wu, 2017). And being an employer, a mere compliance of the social media policy is not sufficient (Law360, 2017). So, the laws, as well as, the ethical principles have to be followed by the employer, while being present on the social media. Posting on social media, has at times led to a violation of privacy law, in addition to cases being raised for libel, defamation, harassment and breach of contract (PT, 2010). So, each and everything which is posted over the internet, can give rise to a legal claim. However, there are various defenses which can be opted for in such cases, for instance, posting the photos of a public event do not violate the privacy norms, unless specifically prohibited (Boris, 2017). So, the circumstances of each case decide the validity of the claims being raised and the possible legal actions. In the following parts, the possible actions which can be initiated against Chris and Mohammad (CB) by Jenny or the other parties, due to their post on social media, have been highlighted. The key legal issues in this case relate to whether or not a claim can be raised for Jenny or any other party against CB for posting their picture over the social media, under the applicable laws. The Federal Court of Australia in the legal matter of Commonwealth Bank of Australia v Barker [2013] FCAFC 83 stated that in the employment contracts in Australia, there is an implied term of mutual trust and confidence (Macpherson, 2017). This judgment was in line with the presence of this very implied condition in the employment contracts in the United Kingdom, as was highlighted in the landmark case of Malik and Mahmud v Bank of Credit and Commerce International SA [1997] UKHL 23 (Swarb, 2015). This judgment by the Federal Court confirmed that the employers had to act in a reasonable and fair manner, in their dealings with their employees (Pearson and Allen, 2008). After a comprehensive review of the Australian and English law, the Supreme Court of South Australia concluded in the case of Mcdonald v State of South Australia [2008] SASC 134 that mutual trust, as well as, confidence was a part of the employment contracts drawn under the Australian law and these aspects have to be implied in all the cases (Mondaq, 2008). However, when an appeal was made to the High Court in Commonwealth Bank of Australia v Barker, the court did not agree with the existence of this implied duty. The judgment given in this case is quite crucial and of great worth to the employers as the claims which are undefined and uncertain and brought forward by the employees citing the conduct of the employer as seriously destroying or damaging the employer-employee relationship, could be given away with. And so, the employment relationships were limited to the defined terms of contract law, the applicable legislations and the express terms of the contract (Pearson and Allen, 2008). In the given case study, CB were the employer of Jenny. As per the case of Mcdonald v State of South Australia and the earlier judgment given in the case of Commonwealth Bank of Australia v Barker, provided that it was an implied duty of the employer and as per this implied duty, mutual trust and confidence had to be ensured. As per this, the photograph of Jenny should not have been put over the internet without her express permission. But, the later ruling in Commonwealth Bank of Australia v Barker, clarified the limits of such a duty. None of these limitations applied in this case. So, Jenny cannot claim against CB on the basis of breach of implied duty. The Privacy Act, 1988 is the key piece of legislation governing the privacy norms in Australia. This act regulates the manner in which the personal information of the individuals is handled (Office of the Australian Information Commissioner, 2017a). But the laws regarding the protection of a right to the personal privacy of the individuals is complicated. And the protection is entirely dependent on the particular circumstances under which the private information of the individual was revealed. As per the privacy laws, there is no general right of privacy, and as a result of this, the consent of the individual is not required for taking or recoding the image. In case a photo of a person is taken at a public place and is posted online, no legal action can be taken. An action, in such case, can only be taken, if there was a prohibition of taking the pictures at such a public place, and that too can only be initiated by the authorities, owners or representatives of such public place. Even when the photo is taken when the individual was at a private party, but from a person at public location, the privacy law offers no protection (Law Stuff, 2015a). There are circumstances where the image of the individual could be treated as personal information, and the publication of the same would result in the breach of this act (Australian Law Reform Commission, 2017). So, if the identity of the individual is clear in the photograph, or if it can be reasonably worked out from the image, then the image can be treated as personal information. Moreover, if such information contains sensitive information, for instance the race or ethnicity of the individual, then too it is deemed as personal information (Office of the Australian Information Commissioner, 2017b). In order for a claim to be raised for a violation of the Privacy Act, the social networking site has to be covered under this act. Only the organizations having a link in Australia, through business presence or carrying business in the country, could be covered under this act. So, if any social networking site is based in some other nation, and fails to have Australian presence, then the act would not provide any rights. Also, the individuals acting in personal capacity are not covered under this act (Office of the Australian Information Commissioner, 2017b). Facebook and Twitter, along with the majority of the other social networking sites are based in the United States, and a required business presence lacks in these sites, as a result of which, these social networking sites are not generally subjected to the Australian privacy law (Stewart, 2016). Applying the privacy law in the given case study, Jenny could not initiate actions against CB when they acted in their personal capacity. CB were not asked to post anything by anyone, and to promote their own company, they posted a number of photos for their company Ecohouse and for University of Canberra. Moreover, the post was not such which could necessitate its applicability over these two. Since they acted in their personal capacity, the act is not applicable on them. So, an action against CB by Jenny, for the breach of privacy act, would not be successful. Since these photos were posted on the Facebook page of Ecohouse and University of Canberra, Jenny could initiate claims against these two. But, the privacy act only covers the organizations having a business presence in Australia. And as Facebook is an America based nation, it is not covered under the act. Due to this reason, the actions, if brought against Ecohouse and University of Canberra by Jenny, would fail due to the lack of applicability of the Privacy Act on Facebook. Presently, there is no common law tort for the invasion of privacy in Australia. This is even when the possibility of development of such a law was help openly in the case of Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] 208 CLR 199 (High Court of Australia, 2017). Though, in the case of Dye v Commonwealth Securities Ltd [2010] FCA 720, Katzmann highlighted that due to this, a person cannot be denied from initiating a claim of breach of privacy against another, just because of the present state of the common law (Jade, 2010). Even though these is no general right for the privacy, a protection is offered with regards to the equitable action for a breach of confidence. When a trust of a person is broke, by undertaking actions, which violate the trust and confidence of the other person, and which results in emotional distress, an action can be brought against the breaching party, for such breach of confidence resulting in mental agony (Australian Law Reform Commi ssion, 2017). In Giller v Procopets [2008] 24 VR 1, the plaintiff was awarded damages for the distress, due to the beach of confidence as a result of misuse of private information (Australasian Legal Information Institute, 2008). However, in Maynes v Casey [2011] NSWCA 156, the trial judge viewed that the conduct of defendant was not undue or a serious invasion to a right of privacy held by the plaintiff, or to be very offensive for a prudent person with common sensibility. Basten J, referred to the cases of Giller v Procopets and Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd, and stated that such cases would sow the seeds for the development of liability for the personal privacys unjustifiable intrusion, whether or not the breach of confidence was involved, even when they have the judgment against the plaintiff (Simpsons, 2013). Hall J, in the legal matter, put before the Supreme Court of New South Wales, of Saad v Chubb Security Australia Pty Ltd [2012] NSWSC 1183, provided his decision in a case which was brought forward against the employer, in addition to the security firm, which was engaged in the monitoring of the workplace, by the plaintiff, being an employee. The CCTV images of the employee by some employee or former employee of the security firm at the Facebook page. The judge in this case out rightly refused to close or strike out the case made for the breach of confidence. This was because in the view of the judge, at the stage of proceedings, it could not be proved that cause of action made for the breach of confidence on the basis of the invasion of privacy of the privacy, was bad law or futile (Australian Law Reform Commission, 2017). In this very case, Kelly J stated that the ratio decidendi given in the case of Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd, dictates the necessity of further development of the law, in order to recognize the presence of tort of privacy in the nation. In one of the recent cases of Doe v Yahoo! 7 Pty Ltd [2013] QDC 181, Smith DCJ opined that an arguable case of the invasion of privacy was present in this case. As a result of which he was hesitant in striking out the case of action, as the law was unclear and still developing (Supreme Court Library, 2013). In the case of Jenny, her photograph was taken and posted over Facebook. For this, Jenny can initiate claims of breach of confidence due to invasion of privacy. Her photographs were taken and posted over the social networking site without her permission. Even though there is no explicit law at the present time, to provide protection to Jenny in this case, but the cited case laws highlight that breach of confidence due to privacy violation can be claimed upon. And the aggrieved party in such cases can apply to the court for damages. Moreover, as was established by the judge in the case of Saad v Chubb Security Australia Pty Ltd, Facebook photo was a breach of confidence. And so, with a specific emphasis to this case, a case can be made by Jenny. These claims are to be brought against CB, and even against Ecohouse and University of Canberra, as all these parties violated the privacy of Jenny by allowing the photo to be posted online. And by acting as a medium for such post, as the photo was uploaded by CB for both Ecohouse and University of Canberra. And so, the absence of explicit legations in this regard acts as an advantage for Jenny. Another claim which can arise due to a post over the social networking site relates to defamation (Find Law, 2017). Defamation takes place when something untrue about the other person or something which can unfairly tarnish the reputation of such other person, is said or written. So, if a person posts something over the social networking sites, which is materially untrue and which has a result of tarnishing of the reputation of such person, then the person posting such content, can be sued for defamation (Law Stuff, 2015b). In Australia, the Uniform Defamation Laws Reform 2006 is the applicable law for cases to be initiated for defamation (Huan, 2006). So, in case a communication occurs from one person to another, which has the ability of harming or tarnishing the reputation of a third person, then defamation claim can be initiated by the person whose image was tarnished. In order for a claim for defamation to be successful, the plaintiff has to establish three things, i.e., the communication was published to a third party, that in such a communication, the plaintiff can be easily identified, and that such a communication was defamatory. In general, a company cannot sue any party for defamation. Though, if such a company is a not-for-profit organization or employs fewer than ten individuals, and is not a public body or related to another company, then the company can sue for defamation (Doctor, 2007). There is a cap over the damages that can be claimed for a non-economic loss, to the amount of $250,000. However, if the court is of the view that the circumstances of the case, in which the matter was published, demand damages to be paid in excess of the capped limit, then the plaintiff can be awarded aggravated damages. Such aggravated damages are not awarded with an intention of punishing the publisher, but act as an extra compensation for the plaintiff due to the injury to the reputation of the plaintiff, especially where the conduct of the publisher was reprehensible (Pearson, 2007). In the given case, Jenny cannot initiate an action for defamation against CB. This is because defamation can only be claimed for a written communication and not a photograph. Even though she is angry and humiliated, a claim for defamation would not stand here, due to the lack of applicability of the Uniform Defamation Laws Reform in her case. Moreover, the post was not derogatory or something which could tarnish her image, and hence, a defamation case against CB by Jenny would not stand. On the other hand, a defamation case can be raised in this case, not by Jenny, but by CB, against ANU due to their post on twitter. In that tweet, ANU vented out their displeasure by using abusive words for Chris. And in another tweet, ANU questioned the ability of the company of CB, Ecohouse, along with naming both CB, regarding the construction of a teaching facility. This tweet was not only derogatory in nature for the company, but for both CB, as it was a direct question and insult over their reputation. So, here three cases can be initiated, one by Chris, for the first tweet, which showed an abuse by ANU over a public forum. For such an insult, which defamed Chris, he can initiate actions and claim for damages. The second case has to be initiated by CB as a result of the second tweet which harmed their reputation. ANU had no base for making such a statement and this baseless allegation opens the channel gates for a claim against them. The third and last claim has to be made by Ecohouse. Even though the companies are prohibited from making a deflation claim, but as the number of employees in Echohouse is just two, i.e., CB, the Uniform Defamation Laws Reform is applicable over them. And as a result of this, they can initiate actions against ANU and claim for damages. Furthermore, these tweets were repetitive and their nature necessitates the requirement of a claim for aggravated damages to be made. This can also be done by combining the three cases, to show the negated impact of such a tweet over Chris, Mohammad and Echohouse. On the basis of above analysis, it is advised to CB that in case Jenny initiates a case against them on the basis of implied term of mutual trust and confidence in the employment contract would not be successful. In case such a case is made, CB can cite the late ruling given in Commonwealth Bank of Australia v Barker, which invalidated this implied term. In case Jenny initiates a claim against them for breach of privacy law, they can establish that they are not covered under the act and that the circumstances did not necessitate their inclusion in the act. And even her claims against Ecohouse and University of Canberra would not stand, due to lack of business presence. In case a case is initiated by Jenny, they both can take help of the above quoted rule to safeguard them. However, if a claim is initiated by Jenny for breach of confidence due to invasion of privacy, CB would be held liable due to the cited cases. And they would have to pay the damages claimed by Jenny for such a breach. Lastly, it is advised to CB to initiate defamatory case against ANU and claim damages for the injury to their reputation. References Stewart, T. (2016) Do privacy laws protect social media users?. [Online] Upstart. Available from: https://www.upstart.net.au/do-australias-privacy-laws-adequately-protect-social-media-users/ [Accessed at: 16/02/17] Australasian Legal Information Institute. (2008) Giller v Procopets [2008] VSCA 236 (10 December 2008). [Online] Australasian Legal Information Institute. Available from: https://www.austlii.edu.au/cgi-bin/sinodisp/au/cases/vic/VSCA/2008/236.html [Accessed at: 16/02/17] Australian Law Reform Commission. (2017) 3. Overview of Current Law. [Online] Australian Government. Available from: https://www.alrc.gov.au/publications/3-overview-current-law/common-law-action-breach-privacy-australia [Accessed at: 16/02/17] Australian Law Reform Commission. (2017) 3. Overview of Current Law. [Online] Australian Government. Available from: https://www.alrc.gov.au/publications/3-overview-current-law/common-law-action-breach-privacy-australia-0 [Accessed at: 16/02/17] Australian Law Reform Commission. (2017) 6. The Privacy Act: Some Important Definitions. [Online] Australian Government. Available from: https://www.alrc.gov.au/publications/6.%20The%20Privacy%20Act%3A%20Some%20Important%20Definitions/what-%E2%80%98personal-information%E2%80%99 [Accessed at: 16/02/17] Borris, C. (2015) The Liability of Posting Photos on Facebook Without Permission. [Online] Chron. Available from: https://smallbusiness.chron.com/liability-posting-photos-facebook-permission-60022.html [Accessed at: 16/02/17] Doctor, D. (2007) The new uniform defamation laws. [Online] Arts Law Centre of Australia. Available from: https://www.artslaw.com.au/articles/entry/the-new-uniform-defamation-laws/ [Accessed at: 16/02/17] Find Law. (2017) Defamation and Social Media: What You Need To Know. [Online] Find Law. Available from: https://injury.findlaw.com/torts-and-personal-injuries/defamation-and-social-media--what-you-need-to-know.html [Accessed at: 16/02/17] High Court of Australia. (2017) Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd [2001] HCA 63. [Online] High Court of Australia. Available from: https://eresources.hcourt.gov.au/downloadPdf/2001/HCA/63 [Accessed at: 16/02/17] Huan , L. (2006) The Uniform Defamation Laws Reform 2006. [Online] Stephens Lawyers Consultants. Available from: https://www.lawstuff.org.au/nsw_law/topics/defamation [Accessed at: 16/02/17] Jade. (2010) Dye v Commonwealth Securities Limited [2010] FCA 720. [Online] High Court of Australia. Available from: https://jade.io/j/?a=outlineid=201944 [Accessed at: 16/02/17] Law Stuff. (2015a) Privacy (Online). [Online] Law Stuff. Available from: https://www.lawstuff.org.au/wa_law/topics/privacy [Accessed at: 16/02/17] Law Stuff. (2015b) Defamation. [Online] Law Stuff. Available from: https://www.lawstuff.org.au/nsw_law/topics/defamation [Accessed at: 16/02/17] Law360. (2017) 5 Ways Social Media Can Land Employers In Court. [Online] Law360. Available from: https://www.law360.com/articles/761008/5-ways-social-media-can-land-employers-in-court [Accessed at: 16/02/17] Macpherson, A. (2017) An Implied Duty of Mutual Trust and Confidence in Australian Employment Law Does Not Exist According to the High Court. [Online] Corney Lind Lawyers. Available from: https://www.corneyandlind.com.au/an-implied-duty-of-mutual-trust-and-confidence-in-australian-employment-law-does-not-exist-according-to-the-high-court/#_ftn1 [Accessed at: 16/02/17] Mondaq. (2008) Australia: Case Round-Up - A Summary Of Some Of The Recent Cases Of Interest. [Online] Mondaq. Available from: https://www.mondaq.com/australia/x/68074/employee+rights+labour+relations/Case+RoundUp+A+Summary+Of+Some+Of+The+Recent+Cases+Of+Interest [Accessed at: 16/02/17] Neti, S. (2011) Social Media And Its Role In Marketing. [Online] International Journal of Enterprise Computing and B International Journal of Enterprise Computing and Business Systems. Available from: https://www.ijecbs.com/July2011/13.pdf [Accessed at: 16/02/17] Office of the Australian Information Commissioner. (2017a) Privacy law. [Online] Australian Government. Available from: https://www.oaic.gov.au/privacy-law/ [Accessed at: 16/02/17] Office of the Australian Information Commissioner. (2017b) Social media. [Online] Australian Government. Available from: https://www.oaic.gov.au/individuals/faqs-for-individuals/social-media-ict-identity-security/social-media [Accessed at: 16/02/17] Pearson, D., and Allen, R. (2008) Employment Law in Australia: Recent Cases. [Online] Whos Who Legal. Available from: https://whoswholegal.com/news/features/article/12396/employment-law-australia-recent-cases/# [Accessed at: 16/02/17] Pearson, M. (2007) A review of Australia 's defamation reforms after a year of operation. [Online] Bond University. Available from: https://epublications.bond.edu.au/cgi/viewcontent.cgi?article=1253context=hss_pubs [Accessed at: 16/02/17] (2010) 5 Easy Ways to Get Sued on Facebook. [Online] PT. Available from: https://www.plagiarismtoday.com/2010/08/25/5-easy-ways-to-get-sued-on-facebook/ [Accessed at: 16/02/17] Simpsons. (2013) No Privacy Tort For Australia Yet. [Online] Simpsons. Available from: https://simpsons.com.au/no-privacy-tort-for-australia-yet/ [Accessed at: 16/02/17] Supreme Court Library. (2013) Doe v Yahoo! 7 Pty Ltd Anor; Wright v Pagett and Ors [2013] QDC 181 (13/0002) Smith DCJ 9 August 2013. [Online] Supreme Court Library. Available from: https://www.sclqld.org.au/caselaw/QDC/2013/181 [Accessed at: 16/02/17] Swarb. (2015) Malik v Bank of Credit and Commerce International (BCCI); Mahmud v Bank of Credit and Commerce International: HL 12 Jun 1997. [Online] Swarb. Available from: https://swarb.co.uk/malik-v-bank-of-credit-and-commerce-international-bcci-mahmud-v-bank-of-credit-and-commerce-international-hl-12-jun-1997/ [Accessed at: 16/02/17] Wu, J. (2017) Do You Have Legal Consent to Post Employee Photos on Social Media?. [Online] Windmills Marketing. Available from: https://maximizesocialbusiness.com/legal-consent-post-employee-photos-social-media-21663/# [Accessed at: 16/02/17]

Monday, December 2, 2019

Police Corruption Essays (3149 words) - , Term Papers

Police Corruption Analysis Of Police Corruption Analysis of Police Corruption Police corruption is a complex phenomenon, which does not readily submit to simple analysis. It is a problem that has and will continue to affect us all, whether we are civilians or law enforcement officers. Since its beginnings, may aspects of policing have changed; however, one aspect that has remained relatively unchanged is the existence of corruption. An examination of a local newspaper or any police-related publication on any given day will have an article about a police officer that got busted committing some kind of corrupt act. Police corruption has increased dramatically with the illegal cocaine trade, with officers acting alone or in-groups to steal money from dealers or distribute cocaine themselves. Large groups of corrupt police have been caught in New York, New Orleans, Washington, DC, and Los Angeles. Methodology: Corruption within police departments falls into 2 basic categories, which are external corruption and internal corruption. For a corrupt act to occure, three distinct elements of police corruption must be present simultaneously: 1) missuse of authority, 2) missuse of official capacity, and 3) missuse of personal attainment. (Dantzker, 1995: p 157) It can be said that power inevitably tends to corrupt, and it is yet to be recongnized that, while there is no reason to suppose that policemen as individuals are any less fallible than other members of society, people are often shocked and outraged when policemen are exposed violating the law. The reason is simple. There diviance elicits a special feeling of betrayal. Most studies support the view that corruption is endemic, if not universal, in police departments. The danger of corruption for police, and this is that it may invert the formal goals of the organization and may lead to the use of organizational power to encourage and create crime rather than to deter it (Sherman 1978: p 31) General police deviance can include brutality, discrimination, sexual hara ssment, intimidation, and illicit use of weapons. However it is not particularly obvious where brutality, discrimination, and misconduct end and corruption begin. Essentially, police corruption falls into two major categories-- external corruption which concerns police contacts with the public, and internal corruption, which involves the relationships among policemen within the works of the police department. The external corruption generally concists of one ore more of the following activities: 1) Payoffs to police by essentially non-criminal elements who fail to comply with stringent statutes or city ordinances; (for example, inviduals who repeatedly violate traffic laws). 2) Payoffs to police by individuals who continually violate the law as a method of making money (for example, prostitutes, narcotics addicts and pusshers, they have accepted bribes; they have sold narcotics. They have known of narcotics vilolations and have failed to take proper enforcement action. They have en tered into personal associations with narcotics criminals and in some cases have used narcotics. They have given false testimony in court in order to obtain dismissal of the charges against a defendant. (Sherman 1978: p 129) A scandal is perceived both as a socially constructed phenomenon and as an agent of change that can lead to realignments in the structure of power within oraganizations. New york, for instance, has had more than a half dozen major scandals concerning its police department within a century. It was the Knapp Commission in 1972 that first brought attention to the NYPD when they released the results of over 2 years of investigations of alleged corruption. The findings were that bribery, especially amoung narcotics officers, was extremely high. As a result many officers were prosecuted and many more lost their jobs. A massive re-structuring took place aftewards with strict rules and regulations to make sure that the problem would never happen again. Be that as it may , the problem did arrise once gain... Some of the most recent events to shake New York City and bring attention to the national problem of police corruption

Wednesday, November 27, 2019

Casual Analysis Essay Example

Casual Analysis Essay Example Casual Analysis Essay Casual Analysis Essay Essay Topic: Casual Child Abuse- Casual Analysis Throughout the world there are plenty of problems within countries and cities. One problem that is happening worldwide is child abuse. When most people think about child abuse they think of a child not being able to eat dinner or a child that doesnt have clean clothes. This is very stereotypical due to the facts in articles and statistics. Child abuse in America is seen every day on the news and in newspaper articles. Children are suffering from a hidden epidemic of child abuse and neglect. Every year more than 3 million reports of child abuse are made in the United States involving ore than six million (a report can include multiple children). The United States has among the worst records among industrialized nations-losing an average between four and seven children every day to child abuse and neglect. (National, Internet) America has tried to take a stand against child abuse but they cannot catch all abusers in this country. The general statistics are hard to believe since we dont notice it in our homes or within schools. A report of child abuse is made every ten seconds. It is said that more than four children die every day as a result of child abuse. It is estimated that between fifty to sixty percent of child fatalities due to maltreatment are not recorded as such on death certificates. Approximately eighty percent of children that die from abuse are under the age of four. It is hard to believe that about thirty percent of abused and neglected children will later abuse their own children, continuing the horrible cycle. (National, Internet) Some people are very sheltered when it comes to understanding what really is happening in the real world. They do not care to read the latest articles of newspapers or watch television o find atrocious news about how a child had accidentally drowned in the parents bathtub. In all seriousness, this is a never ending, horrifying problem that is always going to be worldwide. Child abuse is more than bruises or broken bones. While physical abuse is shocking due to the scars it leaves, not all child abuse is so obvious. Ignoring childrens needs, putting them in unsupervised, dangerous situations, or making a child feel worthless or stupid are also child abuse. Regardless of the type of child abuse, the result is serious. Smith, Internet) There is not any single fact which auses child abuse, abuse usually occurs in families where there is a combination of risk factors. Abuse and neglect occur mostly in families who are under pressure and lack of support. Most occur in families in which include: frequent changed of addresses, poverty, lack of education, loneliness, unemployment, serious marital problems and inadequate housing. (Causes, Internet) When people are assuming of what goes on in a childs life they never want to assume the worst. If a child has a broken arm they would never think their own parent would do that to them. Or a weet little girl would have bruises on her thighs and arms would be from a raging alcoholic of an uncle. Also, certain community attitudes may encourage child abuse. These include: acceptance of the use of violence and force, acceptance of physical punishment of children, acceptable of parents ownership of children, racism, inequality between men and women. (Causes, Internet) Although this is only some facts and statistics over something that has a much bigger role worldwide, it is still good to oe aware 0T wnat Is nappenlng every second 0T every minute 0T every cay.

Saturday, November 23, 2019

Finite Verb Definition and Examples

Finite Verb Definition and Examples In English grammar, a finite verb is a form of a  verb  that (a) shows  agreement  with a  subject  and (b) is marked for  tense. Nonfinite verbs  are not marked for tense and do not show agreement with a subject. If there is just one verb in a sentence, that  verb is finite. (Put another way, a finite verb  can stand by itself in a sentence.)  Finite verbs are sometimes called main verbs or tensed verbs.  A  finite  clause  is a word group that contains a finite verb form as its central element. In An Introduction to Word Grammar, Richard Hudson writes: The reason  finite verbs  are so important is their unique ability to act as the sentence-root. They can be used as the only verb in the sentence, whereas all the others have to depend on some other word, so finite verbs really stand out. Finite vs. Nonfinite Verbs The main difference between finite verbs and nonfinite verbs is that the former can act as the root of an independent clause, or a full sentence, while the latter cannot. For example, take the following sentence: The man runs to the store to get a gallon of milk. Runs is a finite verb because it agrees with the subject (man) and because it marks the tense (present tense). Get is a nonfinite verb because it does not agree with the subject or mark the tense. Rather, it is an infinitive and depends on the main verb runs. By simplifying this sentence, we can see that runs has the ability to act as the root of an independent clause: The man runs to the store. Nonfinite verbs take three different forms- the infinitive, the participle, or the gerund. The infinitive form of a verb (such as to get in the example above) is also known as the base form, and is often introduced by a main verb and the word to, as in this sentence: He wanted to find a solution. The participle form appears when the perfect or progressive tense is used, as in this  sentence: He is looking for a solution. Finally, the gerund form appears when the verb is treated as an object or subject, as in this  sentence: Looking for solutions is something he enjoys. Examples of Finite Verbs In the following sentences (all lines from well-known movies), the finite verbs are indicated in bold. We rob banks. - Clyde Barrow in Bonnie and Clyde, 1967I ate his liver with some fava beans and a nice chianti.  - Hannibal Lecter in The Silence of the Lambs, 1991A boys best friend is his mother. - Norman Bates in Psycho, 1960We want the finest wines available to humanity. And we want them here, and we want them now! - Withnail in Withnail and I, 1986You know how to whistle, dont you, Steve? You just put your lips together and...blow.  - Marie Slim Browning in To Have and Have Not, 1944Get busy living, or get busy dying. - Andy Dufresne in  The Shawshank Redemption, 1994 Identify Finite Verbs In Essentials of English, Ronald C. Foote, Cedric Gale, and Benjamin W. Griffith write that finite verbs can be recognized by their form and their position in the sentence. The authors describe five simple ways to identify finite verbs: Most finite verbs can take an -ed or a -d at the end of the word to indicate time in the past: cough, coughed; celebrate, celebrated. A hundred or so finite verbs do not have these endings.Nearly all finite verbs take an -s at the end of the word to indicate the present when the subject of the verb is third-person singular: cough, he coughs; celebrate, she celebrates. The exceptions are auxiliary verbs like can and must. Remember that nouns can also end in -s. Thus the dog races can refer to a spectator sport or to a fast-moving third-person singular dog.Finite verbs are often groups of words that include such auxiliary verbs as can, must, have, and be: can be suffering, must eat, will have gone.Finite verbs usually follow their subjects: He coughs. The documents had compromised him. They will have gone.Finite verbs surround their subjects when some form  of a question is asked: Is he coughing? Did they celebrate? Sources Hudson, Richard. An Introduction to Word Grammar. Cambridge University Press, 2010, Cambridge.Foote, Ronald C.; Gale, Cedric; and Griffith, Benjamin W. Essentials of English. Barrons, 2000, Hauppauge, N.Y.

Thursday, November 21, 2019

STEEP ANALYSIS ON INDUSTRY OF PULP AND PAPER Essay

STEEP ANALYSIS ON INDUSTRY OF PULP AND PAPER - Essay Example ronic medium of communication or the digitization and automation in the every aspect of business the need for physical paper has shown a decline in the recent ages (Barney, 1991). The use of the electronic medium in the businesses has affected this industry. This has led to a decline in the purchase of the paper and pulp. However, a number of new technologies have been adopted by the manufacturers which would be cost efficient and would lead to rise in the revenue of the companies. The technological shift would also lead to a rise in the production of the paper in the country. However, as most of the companies are moving towards sustainability the use of hardcopy paper using for mails and documentation are getting reduced. Since the major inputs for the manufacturing of paper and pulp is tree, the manufacturers have become more inclined towards eco friendly. This has led to a rise in the demand for the hand-made paper or of materials which are made up of recyclable products and thereby saving a lot of trees. The manufacturing companies also have to be conscious about the balance in the emissions during the process of production (Chhabra, 2010). There are a number of laws pertaining to the environmental auditing and regulations which has been set by the government of the country. The companies have to ensure that these laws are not violated while they are undertaking their production process. There is a lot of variety of paper that is being produced in India. For each of the qualities the pricing of the paper varies and hence the revenue from the expensive category of the product is quite low. Canada has a stable political environment. Along with that the trade relations with the United States and the participation in the NAFTA has helped the country to move towards a better economic position and have helped the country to complete in the larger world

Wednesday, November 20, 2019

A Comparison Between the Hmong Shamanism and Num Chai, the Healing Essay

A Comparison Between the Hmong Shamanism and Num Chai, the Healing Dance of Kung San - Essay Example Nu’m Chai which is the Kung San healing dance, is performed from dusk to dawn. Dancers etch their round path around the fire to the resonance of musical singing and clapping. During the singing and clapping, a number of the dancers keel over; yelling and try to dash into the fire but others hold them back. A number of the dancers may bleed from the nostrils while experiencing sharp bodily ache that prompts them to go into distinctive physical postures. Afterwards, several dancers scream out verbal abuse at the spirits of the departed who prowl in the shadows of the night (Ryan 15). In both rituals, the shaman is the conventional healer selected by the spirits who diagnose and treat the illnesses. He does so by traveling both worlds and restoring a person’s health. Secondly, there is an element of the shamans getting into a state of trance. They do so in order to cross between the two worlds and communicate with the spirits (Ryan 16). Thirdly, the shamans have to get rid of the evil spirits and forces that cause the sickness and restore health. Fourthly, the shamans chant to get into the state of trance. The chanting forms a connection with the spirits as the shaman has to call them. Lastly, there is an element of music in both rituals. Hmong shamans have drumming which marks the beginning of the journey and rattles to help summon the spirits. In the Nu’m Chai, singing and clapping accompany the dancing (Ryan 17). The rituals provide the need for emotional connection between the spirit world and the humans. The humans believe the connection between well being and sickness to the spirits that have to be appeased. Secondly, both rituals provide a sense of community and belonging to which members can identify with. This is beneficial to members who receive health after sickness and improve both

Sunday, November 17, 2019

12 Steps to Recovery Essay Example for Free

12 Steps to Recovery Essay Addiction of any substance is an extremely difficult thing to accept. When we finally realize that We have a problem it is up us to admit it. Once we have accepted that we are addicted we have made the first and most important step to recovery. We learn that once recovery is what we want in our lives there are steps to take these steps is to mean we are ready to completely give yourself to a higher power. This higher power can be anything or anyone we want it to be, whether it be God or someone we can really trust and depend on. There are 12 steps to recovery that will help us stay clean and help us be successful in staying in recovery. This we call the â€Å"12 Step Program. † The first step to recovery is we admit we’re powerless over our addiction and our lives have become unmanageable. This means admitting weeven have an addiction problem. By saying your life has become unmanageable states that we don‘t want to continue living your life the way have been during your addiction. Our addiction has taken over our life, and admitting that we’re an addict helps us take responsibility for our actions instead of blaming others as we did before. The second step is we have come to believe that a power greater than ourselves could restore us to sanity as we knew it. See more:  The Story of an Hour Literary Analysis Essay For most of us our higher power is god. We would give everything to our higher power and ask him for forgiveness. We then would recite the Serenity Prayer to help us. The Serenity Prayer is â€Å"God grant me the serenity to accept the things I cannot change, the courage to change the things I can, and the wisdom to know the difference! † This is a very powerful prayer as I feel today. The third step is that we’ve made the decision to turn our will and our lives over to the care of God as we understand and know him. We allow him to guide us through the recovery process we are going through. He lets us know that we are not alone in this, and we will never be alone again as long as we have him in our lives. The fourth step is making a searching and fearless moral inventory of ourselves. We look inside ourselves to find out what our morals are and to figure out what we believe in. We figure out what we stand for and learn what we think is right and wrong in life. In this step you must become brutally honest with yourself knowing that there’s nothing we can do to change the past. This does not mean you are a bad person but that you have made some bad decisions in our lives, that we as human beings are not perfect. The fifth step is when we have admitted to God, ourselves, and another human being the exact natures of our wrongs we have done during our addiction. Completing this step gets the monkey off your back pursay. More than most people the addict lead a double life. This means we are only showing what we want people to see. Not being honest and showing our true colors. We still continued to lie and expected to be able to stay clean. Through this step we learned that this is not possible in order to stay clean and live a honest life through recovery. Those of us that belong to religious sanctuaries can confide in the proper person of that faith . Others that are not religious may find someone they can confide in such as a doctor or therapist. Someone that we can trust to keep what has been said in confidence. We cannot disclose anything to our family because we are not allowed to say things to them that will make them unhappy. We cannot save our own skins by making someone else unhappy. By doing so our fears come closer and we begin to realize that our life is opening up and showing what our life was really about . This is the scariest thing we will do. And the hardest step to complete out of all 12 of them. The sixth step is when we ask God to remove these defects of character. Which in turn means we surrender our whole self to God? When we are ready, we say to him something like this: â€Å"My Creator, I am now willing that you should have all of me, good and bad. I pray that you now remove from me every single defect of character which stands in the way of my usefulness to you and my fellows. Grant me strength, as I go out from here, to do your bidding. Amen† The seventh step we become willing to ask God to help us to remove all of our shortcomings. This is not a long step and like I said previously it’s not one of the hardest steps to do during recovery.

Friday, November 15, 2019

JEdgar Hoover :: essays papers

JEdgar Hoover J. Edgar Hoover was a young 25-year-old when he became the acting director of the Federal Bureau of Investigations. His first federal job was as a clerk in the files division, and he quickly became one of the most respected and feared men in the free world. Even presidents knew better than to cross him. A consummate politician, Hoover was one of the first to ride the â€Å"media train† to power. He used the media as a tool and he knew that what people read and what they see and hear directly affect what they think. A brief biography, as an introduction to the man will aid us in the understanding of who he was, and through this we may gain incite into the reasons for why he did the things he did. Hoover was born New Years Day 1895 in Washington D.C. the youngest of three children. He had an older brother and sister that lived and an older sister that died as a baby. His mother, Annie Hoover had the greatest influence on him as a child. She was strong willed and militaristic in her approach to raising her children and running a family. She instilled in him a strong sense of right and wrong, and taught him the work ethic for which he would live by. Hoover was a winner, during his school years and beyond. As a boy Hoover was afflicted with a speech impediment. He was so determined to overcome this handicap that he read aloud for hours a day until he no longer stuttered. Hoover was short and slight in stature but he was athletic and quite agile. He was a member of his high school track team that went all-American. He was on the debate team and did quite well. This is probably where he got his combative nature. He was also the captain of his ROTC company in college. Giving him the leadership skills that he would need in later years. Hoover graduated near the top of his class from George Washington University with a bachelor’s degree in Law. (Powers, pp.48-52) With all of this going for him one might expect him to join the army as an officer as other men his age were being drafted to war, but as sole provider for his mother he was exempt from the draft. He also got his first taste of federal service when his uncle got him a position as a clerk in the files office of the Department of Justice.

Tuesday, November 12, 2019

Oral Language and Reading Comprehension Essay

This paper is intentionally made to show the comparison between oral language and reading comprehension. Oral language and reading comprehension are both essential to every individual. All of us had undergone oral language when we are still young and as it develops and as we grow and mature, it enables us to be more knowledgeable and prepares us to a more needed comprehension in reading. This two are significant and are interrelated to each other. As a parent, talking to the child helps expands vocabulary, develop background knowledge, and inspire a curiosity about the world. The more a child engages into certain experiences and more learning that starts from parents and then to teachers, it will widen their minds and permits them into a more broad understanding of different things. Oral language is the very learning that each of us has gone through and we still have it up to now. This paper will broaden your knowledge with regards to the comparison between oral language and reading comprehension. Background of the Study: Oral language means communicating with other people. On the other hand, reading comprehension is the act of understanding what you are reading. The definition can be simply stated the act is not simple to teach, learn or practice. Reading comprehension is an intentional, active, interactive process that occurs before, during and after a person reads a particular piece of writing. Oral language and reading comprehension are both essential because in oral language we are trained on how to communicate well with other people. Reading comprehension, on the other hand, is also a way of understanding the book that we read; it could be just a simple magazine, newspaper, or even the books we used in school. A person must be able to understand what he or she is reading. It is necessary that we know how to talk or communicate but one thing that is very useful as well in our everyday lives is the ability to read and understand what we read. There is a complete difference between â€Å"reading† and â€Å"reading with comprehension†. Now, as you go and read this paper, you will be fed with more ideas with the comparison between spoken language and reading comprehension and how these two work together for a more fluent practice of communication. It will develop your communication and reading skills; that it is not enough to know how to speak and read but being able to speak and at the same time realize what you are reading and even apply these in real life situations. Related Study: Oral language A great deal of research has been done in the field of oral language acquisition. As a means of attempting to negotiate their environment children actively construct language (Dyson, 1983; Halliday, 1994; Sulzby,1985). From a child’s earliest experience with personal narrative development, oral language acquisition must be continually fostered. (IRA and NAEYC, 1998). This becomes the building block for establishing success in all areas of literacy. Oral language begins to develop at a very young age as children and parents interact with one another in the natural surroundings of the home environment (Teale, 1978; Yaden, 1988). A child’s home environment greatly impacts the rate, quality and ability to communicate with others (MacLean, Bryant and Bradley, 1987; Martinez, 1983; National Research Council 1999). Factors related to language growth in the home environment include parent interaction, books, being read to, modeling; home language and literacy routines all closely parallel those of the classroom and school. The development of oral language is an ongoing natural learning process. Children observe oral communication in many contexts – home, preschool, prekindergarten, and begin to develop concepts about its purposes (Dyson, 1983; Halliday,1994;Martinez, 1983). Target skill areas such as sequencing, classification, and letter sounds oral language skills are all components of early childhood educational programs (Kelley and Zamar, 1994). Meaning is a social and cultural phenomenon and all construction of meaning is a social process. Developmental stages of child language development: Phase I – Protolinguistic or â€Å"Protolanguage†, Phase II – Transition, Phase III – Language. The Protolanguage Stage (which is associated with the crawling stage) includes noises and intonation, physical movement, adult/infant interaction – this exchange of attention is the beginning of language. During the Transition Stage (which is associated with the developmental stage of walking) there is a transition from child tongue to mother tongue. During this stage the â€Å"pragmatic† mode develops; a demand for goods and services that seeks a response in the form of an action. In Phase III – Language Stage, the child moves from talking about shared experience to sharing information with a third person. The child realizes that reality is beyond their own experience; they invite confirmation, enjoy shared experience. From the ontogenesis of conversation we are able to gain insight into human learning and human understanding. Meaning is created at the intersection of two contradictions – the experiential one, between the material and the conscious modes of experience, and the interpersonal one, between different personal histories of the interacting taking part (Halliday,1994). Properly developed oral language enables a child to effectively communicate their thoughts and viewpoints with others. It is also important for young children to have developed listening skills as they begin to experience the power of communication. The environment influences ones desire to communicate as well as the frequency of communication. Oral language develops through authentic experiences (Harste, Burke and Woodward, 1994). Kindergarten classroom environments that are alive with social interaction are ideal environments for nourishing speaking and listening skills. As children participate in communicative events, they slowly acquire an understanding of the relevance of these forms. Students need to be provided and encouraged to participate in environmental literacy activities, as those experiences are indispensable to language development (Brown and Briggs, 1987). Development of oral language skills must be addressed in Kindergarten as an integral part of the daily curriculum in order for students to be able to succeed throughout schooling and in today’s society (Goodman, 1992; IRI and NAEYC,1998). Kindergarten programs need to be structured but not formal. Classrooms that are carefully structured allow for maximum oral language acquisition through authentic literacy activities that take place in natural ways during a school day (Ellermeyer, 1988). Education is inquiry based, and as such the focus with education becomes learning, and the task of teaching becomes the inquiry process. The learner is central, in the process of the learning-inquiry cycle (Harste, Burke and Woodward,1994). Students need to be provided and encouraged to participate in environmental literacy activities, as these experiences are indispensable to language development. Dyson (1983) conducted a study of the role early language plays in early writing. Through observations of children at a Kindergarten writing center she concluded that oral language is an integral part of the early writing process. Talk provided both meaning and for some children the systematic means for getting that meaning on paper. The child as a language learner progresses along a developmental continuum. Language acquisition is fundamentally a social process in which language is used to make and share meaning of experience (Corter and Park, 1993). Children require opportunities to interact with both peers and adults in a wide variety of settings as they learning and practice language and literacy knowledge, skills, and strategies (Brown and Briggs 1987; Coohn, 1981; Dyson, 1983; Ellermeyer, 1988). Children like to talk about themselves, their friends, their families, their pets, their hobbies, etc. Engaging young children in conversation about things with which they are familiar affords them a comfort level to experiment with ways to express themselves. Opportunities to increase oral language abilities and applications are embedded within the literacy program. Conversation, collaboration, and learning through others are integral to learning. A child’s oral language ability is the basis for beginning literacy instruction, and as such initial informal assessments as well as ongoing assessment during the school year would provide key information regarding a child’s oral language abilities.

Sunday, November 10, 2019

Challenges of Money Market Mkt in India Essay

The India money market is a monetary system that involves the lending and borrowing of short-term funds. India money market has seen exponential growth just after the globalization initiative in 1991. It has been observed that financial institutions do employ money market instruments for financing short-term monetary requirements of various sectors such as agriculture, finance and manufacturing. The performance of the India money market has been outstanding in the past 20 years. The central bank of the country – the Reserve Bank of India (RBI) has always been playing the major role in regulating and controlling the India money market. The intervention of RBI is varied – curbing crisis situations by reducing the cash reserve ratio (CRR) or infusing more money in the economy. Money market instruments take care of the borrowers’ short-term needs and render the required liquidity to the lenders. The varied types of India money market instruments are treasury bills, repurchase agreements, commercial papers, certificate of deposit, and bankers acceptance. The major players in the money market are Reserve Bank of India (RBI), Discount and finance House of India (DFHI), banks, financial institutions, mutual funds, government and the giant corporate houses. Indian money market has a dichotomic structure. It has a simultaneous existence of both organized and unorganized money markets. The organized structure consists of the RBI , all scheduled and commercial banks and other recognized financial institutions as mentioned above. However, the unorganized part of the market consists of local moneylenders, indigenous bankers, traders, etc. This part of the market is outside the purview of the RBI. Issues and challenges of the Indian money market The money market in India has undergone tremendous developments since past twenty years. However, it is still not free of certain rigidities that are hampering the growth of the market. They are: 1. Dichotomy between Organized and Unorganized Sectors: The most important defect of the Indian money market is its division into two sectors: (a) the organised sector and (b) the unorganized sector. There is little contact, coordination and cooperation between the two sectors. In such conditions it is difficult for the Reserve Bank to ensure uniform and effective implementations of monetary policy in both the sectors. 2. Predominance of Unorganized Sector: Another important defect of the Indian money market is its predominance of unorganised sector. The indigenous bankers occupy a significant position in the money-lending business in the rural areas. In this unorganized sector, no clear-cut distinction is made between short-term and long-term and between the purposes of loans. These indigenous bankers, which constitute a large portion of the money market, remain outside the organized sector. Therefore, they seriously restrict the Reserve Bank’s control over the money market, 3. Wasteful Competition: Wasteful competition exists not only between the organised and unorganised sectors, but also among the members of the two sectors. The relation between various segments of the money market are not cordial; they are loosely connected with each other and generally follow separatist tendencies. For example, even today, the State Bank of Indian and other commercial banks look down upon each other as rivals. Similarly, competition exists between the Indian commercial banks and foreign banks. 4. Absence of All-India Money Market: Indian money market has not been organised into a single integrated all-Indian market. It is divided into small segments mostly catering to the local financial needs. For example, there is little contact between the money markets in the bigger cities, like, Bombay, Madras, and Calcutta and those in smaller towns. 5. Inadequate Banking Facilities: Indian money market is inadequate to meet the financial need of the economy. Although there has been rapid expansion of bank branches in recent years particularly after the nationalization of banks, yet vast rural areas still exist without banking facilities. As compared to the size and population of the country, the banking institutions are not enough. 6. Shortage of Capital: Indian money market generally suffers from the shortage of capital funds. The availability of capital in the money market is insufficient to meet the needs of industry and trade in the country. The main reasons for the shortage of capital are: (a) low saving capacity of the people; (b) inadequate banking facilities, particularly in the rural areas; and (c) undeveloped banking habits among the people. 7. Seasonal Shortage of Funds: A Major drawback of the Indian money market is the seasonal stringency of credit and higher interest rates during a part of the year. Such a shortage invariably appears during the busy months from November to June when there is excess demand for credit for carrying on the harvesting and marketing operations in agriculture. As a result, the interest rates rise in this period. On the contrary, during the slack season, from July to October, the demand for credit and the rate of interest decline sharply. 8. Diversity of Interest Rates: Another defect of Indian money market is the multiplicity and disparity of interest rates. In 1931, the Central Banking Enquiry Committee wrote: â€Å"The fact that a call rate of 3/4 per cent, a hundi rate of 3 per cent, a bank rate of 4 per cent, a bazar rate of small traders of 6.25 per cent and a Calcutta bazar rate for bills of small trader of 10 per cent can exist simultaneously indicates an extraordinary sluggishness of the movement of credit between various markets.† The interest rates also differ in various centres like Bombay, Calcutta, etc. Variations in the interest rate structure is largely due to the credit immobility because of inadequate, costly and time-consuming means of transferring money. Disparities in the interest rates adversely affect the smooth and effective functioning of the money market. 9. Absence of Bill Market: The existence of a well-organized bill market is essential for the proper and efficient working of money market. Unfortunately, in spite of the serious efforts made by the Reserve Bank of India, the bill market in India has not yet been fully developed. The short-term bills form a much smaller proportion of the bank finance in India as compared to that in the advanced countries. Many factors are responsible for the underdeveloped bill market in India: * Most of the commercial transactions are made in terms of cash. * Cash credit is the main form of borrowing from the banks. Cash credit is given by the banks against the security of commodities. No bills are involved in this type of credit. * The practice of advancing loans by the sellers also limits the use of bills. * Heavy stamp duty discourages the use of exchange bills. * Absence of acceptance houses is another factor responsible for the underdevelopment of bill market in India. * In their desire to ensure greater liquidity and public confidence, the Indian banks prefer to invest their funds in first class government securities than in exchange bills. * The RBI also prefers to extend rediscounting facility to the commercial banks against approved securities. Comparison of Indian money market with Developed & Developing economies MONEY MARKET IN A DEVELOPED ECONOMY (with the US in reference) The domestic money market in the United States carries out the largest volume of transactions of any such market in the world; its participants include the most heterogeneous group of financial and nonfinancial concerns to be found in any money market; it permits trading in an unusually wide variety of money substitutes; and it is less centralized geographically than the money market of any other country. Although there has always been a clustering of money market activities in New York City and much of the country’s participation in the international money market centers there, a process of continuous change during the 20th century has produced a genuinely national money market. The unit banking system: This system has led inevitably to striking differences between money market arrangements in the United States and those of other countries. At times, some smaller banks almost inevitably find that the wholesale facilities of the money market cannot provide promptly the funds needed to meet unexpected reserve drains, as deposits move about the country from one bank to another. MONEY MARKET IN DEVELOPING COUNTRIES Well-developed money markets exist in only a few high-income countries. In other countries money markets are narrow, poorly integrated, and in many cases virtually nonexistent. Despite the many differences among countries, one can say in general that the degree of development of a country’s financial system, including its money markets, is directly related to the level of its economy. Most developing countries, except those having socialist systems, have the encouragement of money markets as a policy objective, if only to provide outlets for short-term government securities. At the same time many of these governments pursue low-interest-rate policies in order to reduce the cost of government debt and to encourage investment. Such policies discourage saving and make money market instruments unattractive. Nevertheless, a demand for short-term funds and a supply of them exist in all market-oriented economies. In many developing countries these pressures have led to â€Å"unorganized money markets,† which are often highly developed in urban areas Such markets are unorganized because they are outside â€Å"normal† financial institutions; they manage to escape government controls over interest rates; but at the same time they do not function very effectively because interest rates are high and contacts between localities and among borrowers and lenders are limited. Money Market Instruments in India: 1. COMMERCIAL PAPERS (CPs) : Commercial Paper (CP) is a negotiable short-term unsecured promissory note with fixed maturity, issued by well-rated companies generally sold on discount basis. It does not originate from any specific self-liquidating trade transaction like commercial bill which generally arise out of specific trade or commercial transaction. CP was introduced in India in 1990 with a view to enabling highly rated corporate borrowers to diversify their sources of short-term borrowings and to provide an additional instrument to investors. The CP rates usually lie between prime lending rate of commercial banks and some benchmark interest rate like 91-day Treasury bill rate, bank rate, 3 month MIBOR, Average Call Money Rate, etc. Except for the bank rate, which is a policy- induced rate, other rates are market determined. Risks associated with Cps: Credit Risk: Moderate to high. The ratings of the company issuing the commercial paper should be monitored; i.e., A-1/P-1. Liquidity Risk: Moderate. If a company has credit problems it may receive a negative credit watch, which will lead to a rating being downgraded. Commercial paper also may be somewhat difficult to sell. Market Risk: Moderate, due to the short-term nature of this security. CHALLENEGES ASSOCIATED WITH CPs: * Higher financial costs force organizational decisions and changes * Substantial initial collateral requirements * More risky as debt holders can force closure of MFI * More tricky cash flow management as principal is repaid * Early negotiations require a new set of skills and contacts * Local banks may not be willing to be cooperative * Loans may be dollarized in an inflationary situation * Too many subsidized loans can retard move to market rate 2. CERTIFICATE OF DEPOSITS (CDs) : This scheme was introduced in July 1989, to enable the banking system to mobilize bulk deposits from the market, which they can have at competitive rates of interest. The major features are:   Who can issue- Scheduled commercial banks (except RRBs) and All India Financial Institutions within their `Umbrella limit’. Investors- Individuals (other than minors), corporations, companies, trusts, funds, associations etc Maturity -Min: 7 days Max : 12 Months (in case of FIs minimum 1 year and maximum 3 years). Amount- Min: Rs.1 lac, beyond which in multiple of Rs.1 lac Interest Rate- Market related. Fixed or floating Loan- Against collateral of CD not permitted Pre-mature cancellation- Not allowed Transfer, Endorsement & delivery- Any time Other conditions †¢ If payment day is holiday, to be paid on next preceding business day †¢Issued at a discount to face value †¢Duplicate can be issued after giving a public notice & obtaining indemnity CHALLENGES ASSOCIATED WITH CDs: * No additions are permitted to be made to any CD. Unless otherwise required by law CDs may not be withdrawn prior to maturity. When one purchases a CD, he has to agree with the issuing depository institution to keep your funds on deposit for the term of the CD. * CDs are not automatically renewed * CDs are relatively illiquid and taxable instruments. Hence, generally people do not find an incentive to hold CDs. * One might not get a fixed interest rate if you choose the wrong type of CD. It’s important to understand the distinction between variable-rate CDs (which can be less predictable) and those that offer fixed rates. 3. TREASURY BILLS (T-BILLS) : Treasury bills, popularly known as T-bills, are short-term finance bills issued by the government. They are not backed by any trade transaction, like the commercial bills. These bills are highly liquid and risk-free as they are backed by a guarantee from the government. They were earlier issued for 91 days but now there are also 182 days and 364 days treasury bills. These treasury bills are floated through auctions conducted by RBI. The Reserve Bank of India as the leader and controller of money market, buys and sells these treasury bills. The buying and selling operations are conducted by DFHI on behalf of RBI for stabilizing the money market. Who can buy – Treasury bills can be purchased by any one (including individuals) except State govt. These are issued by RBI and sold through fortnightly or monthly auctions at varying discount rate depending upon the bids. Denomination – Minimum amount of face value Rs.1L and in multiples thereof. There is no specific amount/limit on the extent to which these can be issued or purchased. Maturity : 91-days TBs, 182-days TBs, 364-days TBs and two types of 14-days TBills. Rate of interest -Market determined, based on demand for and supply of funds in the money market. CHALLENGES ASSOCIATED WITH T-BILLS: * T-Bills do not fetch very attractive yields. * Though T-bills are sold through auction in order to ensure market rates for the investor, in actuality, competitive bids are almost absent. The RBI is compelled to accept these non-competitive bids , hence, adequate returns are not available. It makes T-bills unpopular. * Generally , the investors hold T-Bills till maturity and they do not come for circulation. Hence, active trading and mobility in T-bill market is adversely affected. 4. REPURCHASE AGREEMENT (REPO AND REVERSE REPO) : Repo is a money market instrument, which enables collateralized short term borrowing and lending through sale/purchase operations in debt instruments. Under a repo transaction, a holder of securities sells them to an investor with an agreement to repurchase at a predetermined date and rate. In the case of a repo, the forward clean price of the bonds is set in advance at a level which is different from the spot clean price by adjusting the difference between repo interest and coupon earned on the security. A reverse repo is the mirror image of a repo. For, in a reverse repo, securities are acquired with a simultaneous commitment to resell. Hence whether a transaction is a repo or a reverse repo is determined only in terms of who initiated the first leg of the transaction. When the reverse repurchase transaction matures, the counterparty returns the security to the entity concerned and receives its cash along with a profit spread. One factor which encourages an organization to enter into reverse repo is that it earns some extra income on its otherwise idle cash. Broadly, there are four types of repos available in the international market when classified with regard to maturity of underlying securities, pricing, term of repo etc. They comprise buy-sell back repo, classic repo bond borrowing and lending and tripartite repos. CHALLENGES ASSOCIATED WITH REPURCHASE AGREEMENTS: * As far as risks are concerned although repos are collateralized transactions they are still exposed to counterparty risk and the issuer risk associated with the collateral. As far as the counterparty risk is concerned, the investor should be able to liquidate the securities received as collateral, thus largely offsetting any loss. Against this the seller /lender of bonds will hold cash or other securities as protection against non-return of the lent securities. In both the cases it is to be ensured that the realizable value equals or exceeds the exposure. * There is also the concentration risk resulting from illiquid issues which are used as collateral in the transaction. * Again, even where global agreements are signed full transfer of ownership as per contractual protections could be enforced only where a clean legal opinion is available in respect of jurisdiction concerned. In other words, repos are also prone to legal risks if care is not taken. 5. MONEY MARKET MUTUAL FUNDS (MMMF): 6. COLLATERALIZED BORROWING AND LENDING OBLIGATION (CBLO) It is a money market instrument as approved by RBI, is a product developed by CCIL (Clearing Council of India Ltd) . CBLO is a discounted instrument available in electronic book entry form for the maturity period ranging from one day to 90 Days (can be made available up to one year as per RBI guidelines). CBLO is explained as under: †¢ An obligation by the borrower to return the money borrowed, at a specified future date; †¢ An authority to the lender to receive money lent, at a specified future date with an option/privilege to transfer the authority to another person for value received; †¢ An underlying charge on securities held in custody (with CCIL) for the amount borrowed/lent. Banks, financial institutions, primary dealers, mutual funds and co-operative banks, who are members of NDS, are allowed to participate in CBLO transactions. Non-NDS members like corporate, co-operative banks, NBFCs, Pension/Provident Funds, Trusts etc. are allowed to participate by obtaining Associate Membership to CBLO Segment. In order to enable the market participants to borrow and lend funds, CCIL provides the Dealing System through: – Indian Financial Network (INFINET), a closed user group to the Members of the Negotiated Dealing System (NDS) who maintain Current account with RBI. – Internet gateway for other entities who do not maintain Current account with RBI.

Friday, November 8, 2019

The First American Political Conventions

The First American Political Conventions The history of political conventions in America is so long and steeped in lore that its easy to overlook that it took a few decades for nominating conventions to become part of presidential politics. In the early years of the United States, presidential candidates were usually nominated by a caucus of members of Congress. By the 1820s, that idea was falling out of favor, helped along by the rise of Andrew Jackson and his appeal to the common man. The election of 1824, which was denounced as The Corrupt Bargain, also energized Americans to find a better way to select candidates and presidents. After Jacksons election in 1828, party structures strengthened, and the idea of national political conventions began to make sense. At that time there had been party conventions held at the state level but no national conventions. First National Political Convention: the Anti-Masonic Party The first national political convention was held by a long-forgotten and extinct political party, the Anti-Masonic Party. The party, as the name indicates, was opposed to the Masonic Order and its rumored influence in American politics. The Anti-Masonic Party, which began in upstate New York but gained adherents around the country, convened in Philadelphia in 1830 and agreed to have a nominating convention the following year. The various state organizations chose delegates to send to the national convention, which set a precedent for all later political conventions. The Anti-Masonic Convention was held in Baltimore, Maryland on September 26, 1831, and was attended by 96 delegates from ten states. The party nominated William Wirt of Maryland as its candidate for president. He was a peculiar choice, especially as Wirt had once been a Mason. The National Republican Party Held a Convention in December 1831 A political faction calling itself the National Republican Party had supported John Quincy Adams in his unsuccessful bid for reelection in 1828. When Andrew Jackson became president, the National Republicans became a devoted anti-Jackson party. Planning to take the White House from Jackson in 1832, the National Republicans called for its own national convention. As the party was essentially run by Henry Clay, it was a foregone conclusion that Clay would be its nominee. The National Republicans held their convention in Baltimore on December 12, 1831. Due to bad weather and poor traveling conditions, only 135 delegates were able to attend. As everyone knew the outcome ahead of time, the real purpose of the convention was to intensify anti-Jackson fervor. One noteworthy aspect of the first National Republican Convention was that James Barbour of Virginia delivered an address that was the first keynote speech at a political convention. The First Democratic National Convention Was Held in May 1832 Baltimore was also chosen to be the site of the first Democratic Convention, which began on May 21, 1832. A total of 334 delegates assembled from every state except Missouri, whose delegation never arrived in Baltimore. The Democratic Party at the time was headed by Andrew Jackson, and it was obvious that Jackson would be running for a second term. So there was no need to nominate a candidate. The ostensible purpose of the first Democratic National Convention was to nominate someone to run for vice president, as  John C. Calhoun, against the backdrop of the Nullification Crisis, would not be running again with Jackson.  Martin Van Buren of New York was nominated  and received the sufficient number of votes on the first ballot. The first Democratic National Convention instituted a number of rules which essentially created the framework for political conventions that endures to the present day. So, in that sense, the 1832 convention was the prototype for modern political conventions. The Democrats who had gathered in Baltimore also agreed to meet again every four years, which began the tradition of Democratic National Conventions that extends to the modern era. Baltimore Was the Site of Many Early Political Conventions The city of Baltimore was the location of all three political conventions prior to the 1832 election. The reason is fairly obvious: it was the major city closest to Washington, DC, so it was convenient for those serving in the government. And with the nation still mostly positioned along the east coast, Baltimore was centrally located and could be reached by road or even by boat. The Democrats in 1832 did not formally agree to hold all their future conventions in Baltimore, but it worked out that way for years. The Democratic National Conventions were held in Baltimore in 1836, 1840, 1844, 1848, and 1852. The convention was held in Cincinnati, Ohio in 1856, and the tradition developed of moving the convention to different locations. The Election of 1832 In the election of 1832, Andrew Jackson won easily, garnering about 54 percent of the popular vote and crushing his opponents in the electoral vote. The National Republican candidate, Henry Clay, took about 37 percent of the popular vote. And William Wirt, running on the Anti-Masonic ticket, won about 8 percent of the popular vote, and carried one state, Vermont, in the electoral college. The National Republican Party and Anti-Masonic Party joined the list of extinct political parties after the 1832 election. Members of both parties gravitated toward the Whig Party, which formed in the mid-1830s. Andrew Jackson was a popular figure in America and always stood a very good chance of winning his bid for reelection. So while the election of 1832 was never really in doubt, that election cycle made a major contribution to political history by instituting the concept of national political conventions.

Tuesday, November 5, 2019

All About Ivory and How Its Use Endangers Elephants

All About Ivory and How Its Use Endangers Elephants Ivory is the natural raw material that makes up mammal tusks and teeth. Traditionally, the term only refers to elephant tusks, but the chemical structure of teeth and tusks of mammals such as hippos, warthogs, and whales is identical to that of elephants, and so ivory can refer to any mammals tooth or tusk that is large enough to be sculpted or scrimshawed.  Ã‚   Key Takeaways Ivory is a natural substance formed in the teeth and tusks of mammals.It has been carved and used as decorative objects for 40,000 years or more.Modern trade in ivory has pushed the cost up over $1,000 per kilogram.Ivory demand has devastated elephant populations around the world. Elephant and ivory tusk comes from the two modified incisors of living and extinct members of the Proboscidea family: Asian and African elephants and extinct mammoth from Alaska and Siberia (where preservation is possible). Other mammals with large enough teeth to be carvable include marine mammals like narwhals, walruses, and sperm and killer whales, as well as their evolutionary relatives, warthogs and hippopotami.   Elephant Ivory Close up of African savanna elephant ((Loxodonta africana) tusks. Martin Harvey / Gallo Images / Getty Images Elephant tusks are extremely large teeth which project out beyond the lips. Tusks are made up of a root and the tusk itself, and they have the same physical structures that teeth do: pulp cavity, dentine, cementum, and enamel. Elephant enamel wears off when the elephant is still quite young, and the main component of tusks (about 95 percent) is dentine, a mineralized connective tissue.   The elephant uses the tusks for defense and offense, for digging access to waterholes, lifting objects, gathering food, stripping bark, and protecting their trunks. Elephant tusks can grow up to 12 feet (3.5 meters) in length. Baby elephants have a deciduous precursor that they lose before the permanent tooth grows in. The size and shape of a tusk are related to the animals diet, and, barring trauma, tusks grow throughout the animals life. Like human teeth, the tusk carries a stable isotope record of the animals birthplace, diet, growth, behavior, and life history.   What is Ivory Used For? Lion sculpture in the world-famous Vogelherd-cave near Heidenheim; location: Vogelherdhà ¶hle near Stetten, Heidenheim, Germany; age: ca 33.000 years; era: Paleolithic; material: mammoth ivory; size: 9,2 cm;. Walter Geiersperger / Getty Images Mammoth ivory is among the oldest material used for making decorative objects and tools, with its first use documented 40,000 years ago during the European Upper Paleolithic. It is highly prized because it warms to the touch, varies in color from white to yellow, is easily carved and etched, and has an odd visual effect known as Schreger lines or angles, a unique pattern of cross-hatching that is in reality rows of microscopic tubes.   Tooth and tusk ivories have been carved into a nearly infinite number of shapes and objects: small statuary and button-like netsukes, flatware handles and furniture inlay, piano keys, combs, gaming pieces, and plaques. When a tusk is carved but still retains its overall form, thats called a scrimshaw, which was a traditional pastime of sailors on long-term voyages.   The Price of Ivory In 2014, the wholesale price for ivory was $2,100 per kilogram, but by 2017 it had fallen to $730, largely because of a new Chinese ban. The other cost of ivory is in elephants. Over the past decades, thousands of elephants have been ruthlessly slaughtered, to the point that both Asian and African elephants are listed on the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). Estimates for the elephant population in the world at the end of the 19th century were in the millions. According to the last Great Elephant Census taken in 2015, there were 352,271 African savanna elephants living in 18 different countries, down 30 percent since 2007. Those numbers account for about 93 percent of all the savanna elephants in the world. The current rate of elephant population decline is 8 percent per year or about ∠¼40,000 elephants. The tusks from a single elephant could be worth more than US $100,000.   Cost of Poaching Park Rangers at Mikumi National Park in Tanzania stand beside a bull elephant killed by poachers. Tom Stoddart / Getty Images The reason the price per kilogram of ivory dropped so steeply is in part because China ended its legal trade in ivory on December 31, 2017. Before the ban, the country had many state-licensed ivory carving factories and retail shops: evidence indicates that legal trade has ceased. However, illicit trade continues, and specific country-sanctioned legal trade continues in other places. In the fall of 2018, evidence of continued poaching of elephants was found in several parts of Africa.   Elephant poaching is conducted by helicopters, military grade weaponry, and poisoned pumpkins; dozens of wildlife rangers have been killed trying to protect the animals. Tusks are gathered from the killed elephants and exported illegally by African gangs and corrupt officials.   What Can You Do to Help? Many organizations including the U.S. Fish and Wildlife Services hold regular crushes, where confiscated ivory objects are destroyed to remove them from the market. Ivory Crush in Rome, Italy 2015. Stefano Montesi/Corbis via Getty Images The first thing you can do is not buy ivory. Although antique ivory (older than 1947) is legal to purchase, buying it still increases the market for fake antiques made on the tusks of newly killed animals, so at the least, make sure what youre buying is indeed antique. Better not to buy it at all.   There are several good charities, like the World Wildlife Foundation, Save the Elephants (African Wildlife Foundation), and the Elephant Sanctuary, which are effectively moving to protect elephants and pushing states to ban and criminalize ivory manufacture and trade. You could join them and donate money or volunteer labor, you could campaign and lobby for the elephants, you could help raise funds and sponsor the care of the animals.   The British newspaper The Guardian has an extensive list of ways you can get involved, called What can I do to help elephants? Sources Espinoza, Edgard O., and Mary-Jacque Mann. Identification Guide for Ivory and Ivory Substitutes. Washington, DC: World Wildlife Fund, 1992. Print. Online version at FWS.Fisher, Daniel C. Paleobiology of Pleistocene Proboscideans. Annual Review of Earth and Planetary Sciences 46.1 (2018): 229-60. Print.Gettleman, Jeffrey. Elephants Get a Reprieve as Price of Ivory Falls. The New York Times March 29, 2017. Print.Roca, Alfred L., et al. Elephant Natural History: A Genomic Perspective. Annual Review of Animal Biosciences 3.1 (2015): 139-67. Print.Vigne, Lucy, and Esmond Martin. Decline in the Legal Ivory Trade in China in Anticipation of a Ban. Nairobi, Kenya: Save the Elephants, 2017. Print.What Can I Do to Help Elephants? The Guardian. February 13, 2017. Web.What Is the Impact of Chinas Ivory Ban? World Wildlife Foundation 2018. Web.Wittemyer, George, et al. Illegal Killing for Ivory Drives Global Decline in African Elephants. Proceedings of the National Academy of Sciences 111.36 (201 4): 13117-21. Print.