Wednesday, May 6, 2020
Immanuel Kant Essay Example For Students
Immanuel Kant Essay Kant is a deontological philosopher; that is, in examining morality he says that the ends must not be looked at, only the means. Kant began by carefully drawing a pair of crucial distinctions among the judgments we do actually make. The first distinction separates a priori from a posteriori judgments by reference to the origin of our knowledge of them. A priori judgments are statements for which there is no appeal to experience in order to dertermine what is true and false. A posteriori judgments, on the other hand, are statements in which experience determines how we discover the truth or falsity of the statement. Thus, this distinction also marks the difference traditionally noted in logic between necessary and contingent truths. We will write a custom essay on Immanuel Kant specifically for you for only $16.38 $13.9/page Order now But Kant also made a less familiar distinction between analytic and synthetic judgments, according to the information conveyed as their content. Analytic judgments are those whose predicates are entirely contained in their subjects; since they add nothing to our concept of the subject, such judgments are purely explicative and can be deduced from the principle of non-contradiction. Synthetic judgments, on the other hand, are those whose predicates are altogether distinct from their subjects, to which they must be shown to relate because of some real connection external to the concepts themselves. Hence, synthetic judgments are genuinely informative but require justification by reference to some outside principle. In the opening pages of Kants Groundwork he sets his deontological claim. Nothing, he says, can possibly be conceived in the world, or even out of it, which can be called good, without qualification, except a good will. Other things can be undoubtedly good in many respects, but Kant explains that without a good will they become bad and mischievous. Kant explains, A good will is good not because of what it performs or effects, not by its aptness for the achievement of some proposed end, but simply by virtue of the volition; that is, it is good in itself, and considered by itself is to be esteemed much higher than all that can be brought about by it in favor of any inclination, nay even of the sum total of all inclinations. Its usefulness or fruitfulness can neither add nor take away anything from this value.Kants Categorical Imperative is the thing from which morality can be derived. It is the ultimate formula for determining morality. However, a brief explanation of imperatives is in need. An imperative is a command; what we must do. A hypothetical or conditional imperative is what we must do if we want X. Kants formulation of the Categorical Imperative is what we must do, regardless. He separates it from a hypothetical or conditional imperative, saying that we must act in accordance with the categorical imperative regardless of our wants or needs. The four parts, so to speak, of his categorical imperative are thus: a)Act only according to that maxim by which you can at the same time will that it should become a universal law, b)Act as if the maxim of your action was to become through your will a universal law of nature, c)Act in such a way that you always treat humanity, whether in your own person or in the person of any other, never simply as a means, but at the same time as an end, d)So act as if you were through your maxims a law-making member of a kingdom of ends. The former two are closely related to each other; the latter two are related to each other, a s well. I believe that Immanuel Kant is a very good philosophy because of his four parts of categorical imperative. I completely comply with what he says. Like he says, )Act in such a way that you always treat humanity, whether in your own person or in the person of any other I believe thats the real way of right to will. I think that all of what he says is something that we can all agree upon. His theories are something that we can all live by. By acting any differently, you can be categorized differently.
Friday, May 1, 2020
Contribution to the Patient as a Nurse-Free-Sample for Students
Question: Write a Reflection Essay on My Contribution to the Patient as a Nurse. Answer: As a nurse I want that my patients gets the best possible treatments, and I would always assure that I would try my best to go beyond any limits to provide the quality of care to the patient. I am dedicated as a nurse and I believe a dedicated nurse would provide care to the patient in any circumference, because this is the job that I am entitled with. I will offer my listening ear to whatever they say and would try to help them out in every possible way to see a better outcome. Like any other job this job will also pose challenges, but it is up to me, how I will deal with it. It becomes very difficult to see a person in pain or being limited in the extent I can comfort them, but the reality is that I am also bounded by some limits beyond which I cant extend my help. There are few qualities that a nurse should possess. One is the excellent communication skill with the patients. It is necessary to know what or how the patient is feeling or it is necessary to explain the pros and the cons of the disease to the patient and his family. To give a proper care I need to communicate and consult with the specialist (Cockell McSherry, 2012). Therefore I should possess excellent communication skills. In this job patience is the ultimate key to provide an efficient care to the patient. Some patients are just not happy with the type of care they are getting. It is my duty to listen to them patiently and then make sure that there is no valid complaint. Then I will try to reassure him that he is being given the perfect quality of care. All valid grievances of the patient and his family should be addressed properly (Engel Prentice, 2013). In this reflection essay I would like to introduce a case scenario of a patient and the quality of care I provided to the patient by using the 5 Rs of refection (McAllister, 2013). One I came across a girl, who was admitted into the community hospital for a week because of acute gastroenteritis. After the treatment she was being discharged from the hospital. After one day her mother observed that she was having difficulties in breathing and after a day she began spitting out green sputum. It was diagnosed that he has contracted with community acquired Pneumoia. A doctor can assess the patient and can prescribe medications and do the necessary treatment. But it is the role of a nurse to help the patients meet their needs including physical, mental, emotional and spiritual needs. The child was crying out of pain; I consulted a doctor and provided macrolides and antitussives to give her some relief. I tried to divert her mind from the pain and tried to talk something else. Since she is a girl of just 9 years, she was feeling anxious and was scared of the procedures. I assured her and tried in my possible ways to draw out the fear from her. I provided her with oxygen as she was having respiratory distress. I ensured that she gets a proper care on my part. I took measures to improve the airway patency. I ensured that she takes enough fluids, placed her in the semi fowler position. I have learnt from the past clinical experiences that when we are dealing with children we should avoid the medical jargon. The words used have to be as simple as possible to get down to the level of the child. Before application of the planned treatment, it is important to make a personal relationship with the child (Hazinski, 2012). All these experiences has helped me to gain knowledge about, how to deal with such situations. Once I came across a heart patient who was just 2 years old and was going to have his first open heart surgery. The night before the surgery, I went to him with a bag of toys. It contained the tubes that would be used, hairnet that he would wear the next day. He was fascinated with his new toys instead of being afraid. All these activities have helped me to understand how to deal differently with different patients. When you are communicating with a child it is very difficult to explain her difficult situation (Hockenberry Wilson, 2014). Again we have to deal differently with an elderly person just as I have stated above. Thus it can be concluded that with the increased specialization in the field of health care, the type of care provided by the nurses are also getting diverse. The nurse always remains in the primary team of care because she always has the information about the patient as a whole. As a Nurse I would try to provide a holistic care of approach to the patient. I would try to support him spiritually, mentally and physically to get a better outcome. References Cockell, N., McSherry, W. (2012). Spiritual care in nursing: an overview of published international research.Journal of nursing management,20(8), 958-969. Engel, J., Prentice, D. (2013). The ethics of interprofessional collaboration.Nursing ethics,20(4), 426-435. Hazinski, M. F. (2012).Nursing Care of the Critically Ill Child-E-Book. Elsevier Health Sciences. Hockenberry, M. J., Wilson, D. (2014).Wong's Nursing Care of Infants and Children-E-Book. Elsevier Health Sciences. McAllister, L. (2013). Reflective Practice: The What, the Why and the How, of Reflection?.The ANZTLA EJournal, (7), 50-63. Stodd, J., James, M., James, A., Cowan, C. J., Tomlinson, M., Middleton, A., ... Team, L. EXPLORING REFLECTION IN THE SOCIAL AGE OF LEARNING.
Sunday, March 22, 2020
Lightweight Directory Access Protocol free essay sample
Network directories on the other hand are specialized databases that store information about devices, applications, people and other aspects of a computer network. It is an Internet protocol that e mail and other programs use to look up information from a server. It is not limited to contact information or information about people. It is appropriate for any kind of directory like information where fast look-ups and less frequent updates exist. It was created in 1995 as an academic university project, and then commercialized by Netscape in the late 1990ââ¬â¢s. t is finding much acceptance because of its status as an Internet standard. It can also be customized to store any type of text or binary data. It is important to note that it is not a directory but a protocol. However, it organizes information in a hierarchical manner using directories. And these directories can store a variety of information and can even be used like a Network Information Service (NIS). We will write a custom essay sample on Lightweight Directory Access Protocol or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Hence, enabling anyone to access their account from any machine on the LDAP enabled network. In many cases, it is used as a virtual phone directory, allowing users to easily access contact information of other users. But it is more flexible than a phone directory. This is because it is capable of referring a query to other LDAP servers throughout the world. Thus, providing an ad-hoc global repository of information. It is hoped that at the end of this discourse on LDAP even a layman would have a simple yet clear understanding of what LDAP is. To give its advantage over X500. To reveal the purpose, and use of LDAP generally. Protocol is it is pertinent to understand what a directory and protocol is. A directory is an organized set of records: e. g. , a telephone directory which is an alphabetical list of persons and organizations with an address and phone number in each record. A directory is also a way in which complex information is organized, making it easy to find. Directories list resourcesââ¬âfor example, people, books in a library, or merchandise in a department storeââ¬âand give details about each one. They can be either offlineââ¬âfor example, a telephone book or a department store catalogââ¬âor online. The word protocol is from the Greek word ââ¬Å"protocollonâ⬠which was a leaf of paper glued to a manuscript volume, describing its contents. A protocol can be said to be a description of a set of procedures to be followed when communicating. Protocols are to communication what programming languages are to computations. They can also be used to describe what grammar is to language. In information technology, it is a set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at various levels in a telecommunication connection. For example, there are protocols for the interchange of data at the hard ware devise level as well as at the application program level. In the Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. On the internet, we have the TCP/IP protocols which comprise of: * Transmission Control Protocol (TCP), which is a set of rules to exchange messages with other internet points at the information packet level * Internet Protocol (IP), which makes use of a set of rules to send and receive messages at the Internet address level. * Other protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each being defined set of rules to use with corresponding programs elsewhere on the internet. With this in view we can now say in this context that a Light Weight Directory Access Protocol (LDAP) is a set of rules that enables us to read and edit organized set of records, resources or information. This is to put it in the simplest of terms for easy understanding. According to Donelly (2008) Strictly speaking, though, LDAP isnââ¬â¢t a database at all , but a protocol used to access information stored in an information directory (also known as an LDAP directory). A more precise formulation might look something like this: Using LDAP, data will be retrieved from (or stored in) the correct location within an information directory. LDAP is a standard, extensible Directory Access Protocol. It is a common language that LDAP clients and servers use to communicate. It requires a minimal amount of networking software on the client side, which makes it particularly attractive for Internet-based, thin client applications. LDAP (Lightweight Directory Access Protocol) is a simplified ver sion of the DAP (Directory Access Protocol) protocol, which is used to gain access to X. 500 directories. LDAP was designed at the University of Michigan to adapt a complex enterprise directory system (called X. 500) to the modern Internet. Unknown (2004). At this point you may be wondering what the X500 is. X. 500 Directory Service is a standard way to develop an electronic directory of people in an organization so that it can be part of a global directory available to anyone in the world with Internet access. X. 500 is an overall model for Directory Services in the OSI world. Such a directory is sometimes called a global White Pages directory. The idea is to be able to look up people in a user-friendly way by name, department, or organization. Many enterprises and institution have created an X500 directory. Because these directories are organized as part of a single global directory, you can search for hundreds of thousands of people from a single place on the World Wide Web. X. 500 is an international standard for directories and full-featured, but it is also complex, requiring a lot of computing resources and the full OSI stack. Thus making it difficult to run easily on a PC and over TCP/IP. The X500 is too heavy to support on desktops and over the internet, hence the need for a lightweight protocol. A lightweight protocol is any of a class of protocols designed for use on high speed inter-networks, e. g. LDAP is an open protocol, and applications are independent of the server platform hosting the directory. However, LDAP is like X500 in the sense that it is both an information model and a protocol for querying and manipulating it. LDAPââ¬â¢s data and name space model is essentially that of X500. The major difference is that the LDAP protocol is designed to run directly over the TCP/IP stack. The main thing about the X500 is that it defines a global directory structure. This means that anyone with an X500 or LDAP client may peruse the global directory just as they can use a web browser to peruse the global web. As a protocol, LDAP does not define how programs work on either the client or server side. It defines the language used for client programs to talk to servers (and servers to servers, too). It can be used to access a standalone directory service or a directory service that is back ended by X500. The LDAP protocol is both cross-platform and standards-based, so applications neednt worry about the type of server hosting the directory. In fact, LDAP is finding much wider industry acceptance because of its status as an Internet standard. Under them in the hierarchy might be entries for smaller organization and so on down. The hierarchy might end with people or resources. Each entry is identified by a Distinguished Name (DN). A Distinguished Name consists of a name that uniquely identifies the entry at that hierarchical level (e. g. Peter and Paul and Mary are different user IDââ¬â¢s that identify different entries at the same level) and a path of names that trace the entry back to the root of the tree. Where o represents the organization, and is the root of the tree ou refers to the organizational unit which is a unit within the organization uid refers to user ID of the entry. WHY USE LDAP? The main benefit of using LDAP is that information for an entire organization can be consolidated into a central repository. That is LDAP can be used as a central directory that is accessible from anywhere on the network. LDAP makes for ease of access across platforms. To buttress this, (Donelly, 2008) says ââ¬Å"Perhaps the biggest plus for LDAP is that your company can access the LDAP directory from almost any computing platform, from any one of the increasing number of readily available, LDAP-aware applications. Its also easy to customize your companys internal applications to add LDAP supportâ⬠. LDAP also supports a number of back-end databases in which to store directories. This allows administrators the flexibility to deploy the database best suited for the type of information the server is to disseminate. Hence, it has the ability to distribute servers to where they are needed. LDAP allows you locate organizations, individuals, and other resources such as files and devices in a network, whether on the Internet or on a corporate intranet, and whether or not you know the domain name, IP address, or geographic whereabouts. (Donelly, 2008).
Thursday, March 5, 2020
which the ââ¬Åwar on terrorismââ¬Â has been waged threatens to undermine the international human rights framework so painstakingly built since World War II The WritePass Journal
which the ââ¬Å"war on terrorismâ⬠has been waged threatens to undermine the international human rights framework so painstakingly built since World War II Introduction which the ââ¬Å"war on terrorismâ⬠has been waged threatens to undermine the international human rights framework so painstakingly built since World War II IntroductionBIBLIOGRAPHY:Related Introduction The way in which the ââ¬Å"war on terrorismâ⬠has been waged threatens to undermine the international human rights framework so painstakingly built since World War II. This essay argues that abandoning human rights in times of crisis is short-sighted and self-defeating. A ââ¬Å"war on terrorismâ⬠waged without respect for the rule of law undermines the very values that it presumes to protect. A balance between liberty and security must therefore be restored by reasserting the human rights framework, which provides for legitimate and effective efforts to respond to terrorist attacks. The United Statesââ¬âled ââ¬Å"war on terrorismâ⬠is premised on the notion that the events of September 11 should be seen as a wake-up call that the world has changed. The international community necessitates new tools and strategies, perhaps a new normative structure, to deal with these dire threats to the worldââ¬â¢s security. In the absence of international agreement about the new tools, strategies, and norms, the ââ¬Å"war on terrorismâ⬠is being waged on its own imperatives regardless of existing norms. The way in which this ââ¬Å"warâ⬠was waged is itself a threat to human security. Since the September 11 attacks, the United States, with the support of many governments, has waged a ââ¬Å"war on terrorism.â⬠This ââ¬Å"warâ⬠places the human rights gains of the last several decades and the international human rights framework at risk. Some methods used in detaining and interrogating suspects violate international human rights and humanitarian norms in the name of security.Throughout the world, governments have used the postââ¬âSeptember 11 antiterrorism campaign to crack down on dissidents and to suppress human rights. Efforts to define terrorism are fraught with political consequence and disagreement. The controversy is often captured in the phrase ââ¬Å"one personââ¬â¢s terrorist is another personââ¬â¢s freedom fighter.â⬠The Special Rapporteur notes that it is difficult to distinguish between internal armed conflict and terrorism. Should state-sponsored terrorism be included in this discussion? How about sub-state terrorism? Is there a difference between the terrorism of the past and the new threat of non-state-actor super-terrorism with the potential for catastrophic use of weapons of mass destruction? There is already some agreement about prohibiting certain acts the international community condemns as terrorist acts.The definition adopted in this essay is that attacks on the World Trade Centre, in London and Madrid constitute crimes against humanity in that they are, especially taken with other attacks by the same actors, part of a widespread or systematic attack on civilian populations. This view was expressed by the UN High Commissioner for Human Rights Mary Robinson in the immediate aftermath of the September 11 attacks. Another aspect of the problem of definition is that in many of the antiterrorism measures taken since September 11, 2001, governments have used vague and overbroad definitions of terrorism. Such definitions run the risk of sweeping peaceful, expressive activity into the definition of terrorism and can be the basis for repressive regimes attacking political opponents or other pre-textual uses of antiterrorism campaigns. Such antiterrorist laws violate the principle of legality and provide a basis for governments to label political opponents or human rights defenders as ââ¬Å"terrorists.â⬠In addition, it can subject them to exceptional security measures that would not be tolerated in other contexts. Below we look at how human rights has been a casualty on the war on terrorism. At the heart of the challenge to the human rights framework is the question of whether the ââ¬Å"war on terrorismâ⬠is a ââ¬Å"war,â⬠and if so, what sort of a war it is. To date, one of the characteristics of the ââ¬Å"war on terrorismâ⬠is a refusal to accept that any body of law applies to the way this ââ¬Å"warâ⬠is waged. Central to the human rights framework is the idea that there are no ââ¬Å"human rights free zonesâ⬠in the world, and that human beings possess fundamental human rights by virtue of their humanity alone. In addition, there is no gap between human rights law and humanitarian law in which a ââ¬Å"war on terrorismâ⬠may be waged, free from the constraints of international law. The essence of the rule of law requires that executive action be constrained by law. The refusal to accept that the rule of law governs the conduct of the ââ¬Å"war on terrorismâ⬠has created tremendous uncertainty and has also led to the erosion of individual rights. For example, in April 2003 the United States took the position, in response to questions posed by the UN Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions about the November 2002 killing of six men in Yemen by a missile shot from an unmanned drone, that this attack was against enemy combatants in a military operation and, thus, was beyond the competence of the Special Rapporteur and the UN Human Rights Commission. By defining the ââ¬Å"war on terrorismâ⬠as a ââ¬Å"war,â⬠the United States and cooperating governments conveniently eliminate all of the protections of human rights law, even in circumstances in which international humanitarian law does apply. It is not clear why this precedent would not be applicable to any government seeking to target dissidents, national liberation movements, or anyone opposed to a regime as being a ââ¬Å"terroristâ⬠and an appropriate military threat in this global ââ¬Å"war.â⬠The concept of ââ¬Å"terrorismâ⬠put forward is any act perceived as a threat by those waging the war against it. The battlefield is the entire planet, regardless of borders and sovereignty. The ââ¬Å"war on terrorismâ⬠might continue in perpetuity, and it is unclear who is authorised to declare it over. Human rights protections simply do not exist when they conflict with the imperatives of the ââ¬Å"war on terrorism.â⬠One such case is that of Guantanamo. The continuing detention of more than 600 alleged ââ¬Å"terroristsâ⬠at a military base in Guantanamo has become the most visible symbol of the threat to the human rights framework posed by the ââ¬Å"war on terrorism.â⬠The Guantanamo detainees essentially have been transported to a ââ¬Å"human rights free zoneâ⬠or ââ¬Å"legal black hole,â⬠where only visits by the International Committee of the Red Cross (ICRC) stands between them and the arbitrary, unreviewable exercise of executive power. The detainees are beyond the reach of any body of law and receive the treatment that their captors deem reasonable in the circumstances. The US states the detainees are to be treated consistent with the laws of war. Yet, they are denied hearings required by Article 5 of the Third Geneva Convention before a ââ¬Å"competent tribunalâ⬠to determine whether they are prisoners of war, as the ICRC presumptively believes them to be. In the eyes of their captors, they are conclusively determined to be ââ¬Å"enemy combatantsâ⬠or ââ¬Å"enemy aliens,â⬠who may be tried before military commissions and detained indefinitely regardless of whether they are convicted by those commissions. The Military Order authorizes the detention and trial of ââ¬Å"terroristsâ⬠and uses a broad definition of ââ¬Å"individuals subject to this order.â⬠Thus, US authorities may take any person in the world they believe fits this broad definition and transport them to the ââ¬Å"human rights free zoneâ⬠in Guantanamo. There the US is not subject to judicial oversight by domestic or international authorities, and the detainees can be treated in any manner until they are tried, released, or held in these conditions indefinitely. The Military Order applies only to noncitizens, leading to a stark double standard between the treatment of US citizens accused of being involved in terrorist activity and noncitizens, who are not entitled to the panoply of rights accused US ââ¬Å"terroristsâ⬠will receive. The idea that noncitizens are not entitled to international fair trial standards because they are unworthy ââ¬Å"terroristsâ⬠is at odds with international antidiscrimination and fair trial norms as well as the presumption of innocence. Trials before the military commissions, established pursuant to the November 2001 order, will not comply with essential international fair trial safeguards or guarantees of an independent judiciary. Indeed, the proceedings appear to be no different from military tribunals the international community has criticized in many other settings as a violation of international human rights standards. The availability of the death penalty in these military commissions undermines the human rights goal of eventual abolition of the death penalty; especially in light of the important strides the international community has made toward abolition of the death penalty in the Rome Statute and elsewhere, for even the most egregious crimes. These commissions also inhibit international cooperation to combat terrorism given the strong views of many states that abolition of the death penalty is a fundamental human rights issue. There is more to say about the conditions of confinement in Guantanamo Bay (cramped cells, lack of exercise, torture), especially after recent revelations about the widespread abuse of prisoners in Iraq and elsewhere. The central challenge it presents to the human rights framework is that the detainees are left without the protection of law or judicial or international oversight. Although the ICRC is allowed to visit the detainees, the United States does not agree that the detainees are prisoners of war or even entitled to the full protections of international humanitarian or human rights law. The United States has labeled the detainees as ââ¬Å"enemy combatants,â⬠but this label cannot avoid the requirement of a determination of every detaineeââ¬â¢s status by a ââ¬Å"competent tribunal.â⬠Humanitarian law requires that such determinations be made by tribunals and under procedures that guarantee fair treatment, protect vulnerable detainees, and restrain the detaining p ower. Instead, the detainees, like the six men killed in Yemen, are subject only to the discretion of an unrestrained executive authority. Fundamental human rights norms require that detentions be subject to judicial oversight. As the UN Working Group on Arbitrary Detention stated in December 2002, if prisoner of war status is not recognized by a competent tribunal,[T]he situation of detainees would be governed by the relevant provisions of the [International Covenant on Civil and Political Rights] and in particular by articles 9 and 14 thereof, the first of which guarantees that the lawfulness of a detention shall be reviewed by a competent court, and the second of which guarantees the right to a fair trial. The United States has rejected the UNââ¬â¢s position and every other form of international oversight of these detentions. As a result, the identity of the detainees are secret, and there is no international or domestic oversight of the detentions. There is no way of ascertaining whether there is any basis for the continued detention of particular detainees, which includes children as young as thirteen. Over time, a number of detainees have been released, and so far the released detainees have not been charged with any criminal offense. Thus, raising substantial questions about the grounds for their detention in the first place and even more concern about the length of the detentions. Despite assurances by United States officials, there are examples of mistakes coming to light. One such discrepancy concerns refugee law and discrimination. Almost all of the detainees have been held on minor immigration law violations, which ordinarily would not warrant detention or deportation. One commentator reports that only three of the estimated 5,000 noncitizens detained by these efforts have been charged with any offense remotely related to terrorism, indicating the ineffectiveness of such strategies. These transgressions on immigrant communities are just a part of the ââ¬Å"collateral damageâ⬠of the ââ¬Å"war on terrorism.â⬠International norms clearly prohibit discrimination on the basis of ethnicity, nationality, or religion. There is a growing recognition of the harms caused by discrimination in the social fabric of our communities. By targeting immigrant communities, the government fosters the discrimination and exclusion that human rights law has struggled so hard to eradicate, making it all the more difficult to engender understanding and cooperation between communities in the fight against terrorism. Below we evaluate the significance of a human rights framework response to terrorism. For the most part, the international community has responded to the events of September 11 and their aftermath with an insistence that the response to terrorism must unfold within basic standards of human rights and international law. For example, the United Nations Security Council in Resolution 1456 (2003) insisted that any measure taken to combat terrorism must comply with international law obligations, ââ¬Å"in particular international human rights law, refugee, and humanitarian law.â⬠The question remains whether these norms will actually govern the conduct of states and what the international community will do if they do not. The detainees in Guantanamo are in a ââ¬Å"human rights free zoneâ⬠with the active cooperation of many governments and the absence of an adequate response by the international community as a whole. Even if one contends that the detainees are not covered by international humanitarian law, the international human rights framework still requires they be tried for a recognizable criminal offense and be granted the internationally recognized guarantees of a fair trial. The United States had no difficulty complying with these requirements in response to the first World Trade Center bombing, showing it is possible for governments to create special procedures for handling classified or sensitive evidence in such trials in accordance with their legal systems. Many countries have experience trying alleged terrorists in ordinary courts under procedures that comply, or at least arguably comply, with international standards. There can be increased cooperation at every level of government within a human rights framework. Many human rights standards, beginning with Article 29 of the Universal Declaration of Human Rights, explicitly recognize limitations based on the requirements of public order or security. There is a substantial body of international, regional, and domestic jurisprudence in balancing liberty and security in a wide variety of specific contexts. These standards should be respected and enforced, not ignored. International human rights law also explicitly recognizes that there may be emergencies that justify suspension of some internatio nal human rights. If deemed prisoners of war then there is a well-defined regime of humanitarian law under which the detainees must be treated. In conclusion this essay addressed one aspect of the ongoing debate about terrorism and human rights. While urging adherence to existing human rights and humanitarian standards in the fight against terrorism and raising the alarm about how the ââ¬Å"war on terrorismâ⬠is being waged, one should not ignore the challenges posed by transnational networks of persons willing to engage in acts of mass destruction. There are opportunities for cooperative, multilateral approaches to this challenge: Expanding the jurisdiction of the International Criminal Court to cover a broader range of attacks on civilians would be a positive development and one fully consistent with the rule of law. BIBLIOGRAPHY: Amnesty International, Rights at Risk: Amnesty Internationalââ¬â¢s Concern Regarding Security and Law enforcement Measures (2002), ACT 30/001/2001 available at www.amnestyusa.org/waronterror/rightsatrisk.pdf. Amnesty International, United States of America: Memorandum to the US Government on the Rights of People in US Custody in Afghanistan and Guantanamo Bay (2002), AMR 51/053/2002, available at web.amnesty.org/library/Index/ENGAMR510532002. Amnesty International, United States of America: Restoring the Rule of Law. The Right of Guantanamo Detainees to Judicial Review of the Lawfulness of Their Detention (2004)AMR 51/0931/2004, available at web.amnesty.org/library/Index/ENGAMR510932004?openof=ENG-USA. Chinlund,à C. Who Should Wear the ââ¬Å"Terroristâ⬠Label?, Boston Globe , 8 Sept. 2003, at A15, available at www.boston.com/news/globe/editorial_opinion/editorials/articles/ Civil and Political Rights, Including the Question of Torture and Detention: Report of the Working Group on Arbitrary Detention, Louis Joinet Chairperson-Rapporteur, Executive Summary, U.N. ESCOR, Commââ¬â¢n on Hum. Rts., 59th Sess., Agenda Item 11(a), U.N. Doc. E/CN.4/2003/8 (2002), available at www.hri.ca/fortherecord2003/documentation/commission/e-cn4-2003-8.htm. Cole, D. (2003) Enemy Aliens: Double Standards and Constitutional Freedoms in the War on Terrorism at 188. European Parliament Resolution on EU Judicial Co-operation with the United States in combating terrorism, B5-0813/2001 (11 Dec. 2001), available at www.epp-ed.org/Activities/doc/b5-813en.doc Fitzpatrick, J. (1994) The International System for Protecting Rights during States of Emergency. Procedural Aspects of International Law Series: V. 19) 1994, p. 70-71. Fitzpatrick, J. (2002) Sovereignty, Territoriality, and the Rule of Law, 25 Hastings International Comparative Law Review at 303 Geneva Convention (III) Relative to the Treatment of Prisoners of War (Geneva III), 1949 Hamdi v. Rumsfeld, 124 S. Ct. 2633 (2004). Human Rights First, Ending Secret Detentions (2004)available at www.humanrightsfirst.org/us_law/PDF/EndingSecretDetentions_web.pdf. Human Rights Watch, Human Rights Watch Briefing Paer on U.S. Military Commissions (2003), available at www.hrw.org/backgrounder/usa/military-commissions.pdf. Jakob Kellenberger speech on 17 March 2004à to the UN Commission on Human Rights during the 60th Annual Session of the UN Commission on Human Rights- Statement by the President of the ICRC (17 Mar. 2004), available at www.icrc.org/Web/ Eng/siteeng0.nsf/htmlall/5X6MY5?OpenDocumentstyle=custo_print. Kalliopi, K.K, U.M. Special Rapporteur.à Preliminary Report: Terrorism and Human Rights, U.N. Doc. E/CN.4/Sub.2/1999/27 (1999), available at www.un.org/documents/ ecosoc/cn4/sub2/e-cn4sub2_99_27.pdf.at 8ââ¬â21. Military Order, of November 13, 2001- Detention, Treatment and Trial of Certain Non-Citizens in the War Against Terror, at Section 2. Press Release, The White House, Statement by the President in His Address to the Nation (11 Sept. 2001), available at www.whitehouse.gov/news/releases/2001/09/20010911-16.html. Robinson, P,à The Missing Crimes, in The Rome Statute for an International Criminal Court pp 510 ââ¬â 521. (Antonio Cassese et al. eds., 2002). S.C. Res. 1456, U.N. SCOR, 58th Sess., 4688th mtg., para 6, U.N. Doc. S/RES/1456 (2003), available at www.unhchr.ch/Huridocda/Huridoca.nsf/(Symbol)/S.RES.1456+(2003).En?Opendocument. The Queen on the Application of Abbasi and Another v. Secââ¬â¢y of State for Foreign and Commonwealth Affairs, EWCA Civ 1598, para 64 (U.K.) Sup. Ct. Judicature, (C.A.) (6 Nov, 2002), available at www.courtservice.gov.uk/judgmentsfiles/j1354/abassi_judgment.htm. United States v. Yousef, 327 F.3d 56 (2d Cir. 2003).
Tuesday, February 18, 2020
A letter in favor of your proposed changes to Magarena Assignment
A letter in favor of your proposed changes to Magarena - Assignment Example The ubeefx project development team had a few objectives that aimed at during their development strategies. Giving the game an outstanding user interface, was one such objective that development team had. In addition, attaining an overall stability of the entire program was another key goal of the development team. However, it is quite true to say that some of these goals by the development team were attained, while the many others were far much behind from being attained. This is evidenced from the many feedbacks received from the fantasy game users. ââ¬Å"Magarenaâ⬠basically entails playing a duel against the computer. In order for one to efficiently play the game, there are quite a number of requirements that are ought to be met. First, it is worth noting that the games can be run on most computers but not all computers. The minimum specific requirements that should be met in order to effectively initiate the game are; a minimum screen resolution of 1024*768 and java run time 6. In addition to this, running the game into oneââ¬â¢s computer is quite an uphill task. This made the game to be termed by many as user unfriendly. The quality of the current interface is also below the bench mark standards. The program also lacks many additional features such as multiplayer and online play. Compared to the many modern games, this is far much below the benchmarked standards. The incorporated artificial intelligence in the program cannot be said to be below the acceptable standards. This is because of the numerous inconsistencies seen in the entire program. The artificial intelligence, being a key feature in the game needs to be upgraded at all costs so as to enhance efficiency and effectiveness of the of the program. From the numerous loopholes seen the game, it is evident that a lot needs to be done in the development of ââ¬Å"Magarenaâ⬠. The entire development team needs to instill some
Monday, February 3, 2020
Organizational Behavior Terminology and Concepts Paper Term - 1
Organizational Behavior Terminology and Concepts - Term Paper Example (Robbins, & Judge, 2010). Similarly, it has become possible for organizations to manage a clientele from all parts of the world since no matter how far they are, they are always just a click away. This technological revolution, however, along with all its marvels, brings numerous challenges for the organizations as well, which need to be handled proactively. One such challenge is that of delegating an effective and efficient organizational behavior uniformly throughout the organization. (Robbins, & Judge, 2010). Organizational behavior basically encompasses everything pertaining to human interaction and their relationships in any particular organizational setting. (Kinicki, & Kreitner, 2006). It includes intra-organizational interaction (i.e. among employees of all levels), inter-organizational interactions (i.e. with partners, competitors, distributors, suppliers, etc.) as well as extra-organizational interaction (i.e. interaction with customers). (Hellriegel, & Slocum, 2007). It de als with the culture that prevails within the organization, the relationships the employee share with each other as well as with various stakeholders and the image a company exuberates as a whole. (Kinicki, & Kreitner, 2006). ... (Keyton, 2010). It is a set of norms and principles pertaining to the behavior of the employees and their interaction with each other as well as the stakeholders. (Schein, 2004). It is the general environment of the organization that stems from the various values and attitudes defined by the organization. The organizational culture may be weak or strong. A strong culture inculcates an environment of unity and mutual trust. Employees tend to align themselves with the organizational values and rules and adhere to them strongly. (Robbins, & Judge, 2010). Organizational commitment is higher, employees take ownership of what they do and there is higher employee motivation and loyalty. (Keyton, 2010). In order to induce a strong organizational culture, the organizational values should be clearly defined and should be uniformly followed across the board. The consequences should be similar for all and the compensation should be equitable. (Hellriegel, & Slocum, 2007). Source: (New Horizons, 2009). http://www.nhorizons.ca/en-change-culture-change.asp Ideally, the values should be properly listed down. Moreover, the employees should be reminded of them in a polite and interesting manner every now and then. Various team building exercises and sessions may help strengthen the culture. (Schein, 2004). However, one drawback of a strong culture may be the presence of Groupthink, that is, when everybody tends to follow or agree with what one member of the group does or says in order to avoid mental effort as well as conflicts. (Keyton, 2010). This can be avoided, though, through encouraging the employees to voice their opinions and concerns on an individual basis instead in the form of a group. (Schein, 2004). Organizational
Sunday, January 26, 2020
Economic Impact of Climate Change on Water Resources
Economic Impact of Climate Change on Water Resources Economic Impacts of Climate Change in the Mountain Regions: Water as a source of peace and economic development Abstract When we think of the mountains we usually think of the mountains themselves and not the impact they make on the area below them. The purpose of this research is to review impacts of climate change at a global scale on the mountains and the mountainsââ¬â¢ water supply. This paper also reviews major environmental/ecological, social, and economic issues facing us. Tourism industry will suffer because of it. The study concludes that climate change will bring in instability on global scale with possible water conflicts and decreasing economic developments especially in developing countries. This will bring increased people migration into the areas not much effected by water supply issues and will increase social and political instability in those areas. Keywords:relative water yield (RWY), ââ¬Å"water towersâ⬠, ââ¬Å"river piracyâ⬠Introduction It is estimated that out of 7.382 billion people in the world today (U.S. Census, 2017), about 11% of the worldââ¬â¢s population live in the mountain regions (Kohler et al, 2014). The mountains provide water for billions of people. The mountains are ââ¬Å"water towersâ⬠of the world. They cover 25% of the worldââ¬â¢s land surface and more than 50% the worldââ¬â¢s population depends on water that originates in the mountains (Viviroli et all, 2006). By comparison in 2015 we used less than 1% of fresh water. That water is made in more than 18,000 desalination plants. The water desalination production increased by 67% from 2008 (Thomas Sumner et all, 2016). The water from mountains is used for drinking, domestic use, irrigation, hydropower, transportation, tourism purposes and many other industries. Climate change in the mountains is bringing in an unpredictable winters. Winters with minimal snow or snow coverage which lasts for only a short time are the winters of today (J. Dawson et all, 2009). Climate change in the mountains will bring increased hazards and casualties, such as: fires, floods, avalanches, landslides, desertification, and mountain erosion. It will change the rainfall and monsoon patterns which will bring devastation and economic uncertainty to many regions. Climate change will increase peopleââ¬â¢s migration and will bring diseases not known in the area. The possibility of conflicts and even war might also increase. Water as a source of peace and economic development Mountains as water source around the world Climate change might have devastated outcome especially for semi-arid and arid areas which will be affected by less water coming from the mountains. The mountains help to distribute up 95% of water to these areas. In humid areas mountainsââ¬â¢ distribution of water is up to 60%. (Swiss Agency et all, 1998). Figure 1 below shows mountain water run off around the world. Figure 1: Disproportionality of mountain runoff formation relative to average lowland runoff (RWY), mapped cell by cell for mountainous areas. Disproportionality in favor of runoff is given when RWY is greater than 1, its importance being marked for RWY > 2 and essential for RWY > 5 (Viviroli et al, 2007). As can be seen in Figure 1, the most important water mountain sources are regions in the Middle East, South and central Africa, Asia, Rocky Mountains in the U.S. and the Andes. In the Figure 1, we can see that relative water runoff is very important for the lower areas in the areas of where RWY is higher than 1 2 and essential for RWY > 5 (Viviroli et al, 2007). As can be seen in Figure 1, the most important water mountain sources are regions in the Middle East, South and central Africa, Asia, Rocky Mountains in the U.S. and the Andes. In the Figure 1, we can see that relative water runoff is very important for the lower areas in the areas of where RWY is higher than 1
Subscribe to:
Posts (Atom)