Thursday, November 28, 2019

The Indonesian Tourism Industry Tourism Essay Example

The Indonesian Tourism Industry Tourism Essay The capital metropolis of Indonesia, Jakarta with a entire populations of 9.6 million ( BPS, 2012 ) with five countries viz. West, East, North, South and Central, has positive economic growing since period 2000 to 2011, which largely was sustained by the three chief sectors such as ( 1 ) fiscal, existent estate and concern services sector, ( 2 ) trade hotel and eating house sector and ( 3 ) fabrication sector. ( BPS, 2012 ) The increasing of economic growing gives impacts to the touristry industry in Indonesia. In January 2011, the Culture and Tourism Minister of Republic Indonesia announced the replacing of Visit Indonesia Year stigmatization with Fantastic Dutch east indies as portion of touristry run that expected to pull 7.7 million foreign tourers and bring forth $ 8.3 billion of gross. Whereas 50 % of this gross will be generated from meetings, convention and exhibitions that will take topographic point in assorted topographic point in Indonesia. ( The Jakarta Post, 31st December 2010 ) . Jakarta, where the cardinal authorities, trade, services and industry are located at, makes Jakarta a finish for concern travelers or as a authorities cardinal meeting. In add-on, with the completing installations at JIExpo Kemayoran in North Jakarta, Jakarta Convention Center in Central Jakarta, Balai Kartini in South Jakarta, Semanggi Expo in South Jakarta, Jakarta will go one of the touristry finish for MICE ( Meeting, Incentive, Convention, and Exhibition ) concern. ( Sarya, 2011, p.16 ) We will write a custom essay sample on The Indonesian Tourism Industry Tourism specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Indonesian Tourism Industry Tourism specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Indonesian Tourism Industry Tourism specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Table 1. : The statistic of figure of international tourer reaching through gate Airport Year 2008 2009 2010 2011 Soekarno Hatta, 1,464,717 1,390,440 1,823,636 1,933,022 Ngurah Rai, 2,081,786 2,384,819 2,546,023 2,788,706 Polonia, 130,211 148,193 162,410 192,650 Sam Ratulangi 21,795 29,715 20,220 20,074 Batam 1,061,390 951,384 1,007,446 1,161,581 Juanda, Surabaya 156,726 158,076 168,888 185,815 Adi Sumarmo 19,022 16,489 22,350 23,830 Minangkabau, 40,911 51,002 27,482 30,585 Others 1,257,939 1,193,612 1,224,489 1,311,468 Sum 6,234,497 6,323,730 7,002,944 7,647,731 Beginning: Biro Pusat Statistik, 2012 Table 1.1 shows that the international tourers who arrived through Jakarta s International Airport viz. Soekarno Hatta, have increased twelvemonth to twelvemonth which in 2011, it reached about 1.9 million. The entire international tourers who came to Indonesia in 2011 have about reached the mark of the Culture and Tourism Minister to pull 7.7 million foreign tourers. Hotel Industry For some large states like Jakarta, which has many concern activities, hotel becomes one of the most productive income-producing belongingss ( Internal information Colliers International Indonesia, 2012 ) . There are four benefits from hotel industry for a state ( Medlik A ; Ingram, 2000, p.4 ) , which are, In some countries, hotel as an attractive force of visitant who bring passing power and who tend to pass more money than they do when they are at place. This visitant disbursement power frequently gives large part to the economic system gross of a state. In Jakarta, hotel, trade and eating house sector is one of top three sectors which give a biggest part in GDP for largely old ages. From period 2009-2011, hotel, trade and eating house sector has contributed 20 % for DKI Jakarta s GDP ( Gross Domestic Product ) . ( BPS, 2009 2011 ) In countries which having foreign visitants, hotels play large functions as alien currency earners which can give large part to their state s balance of payments. For states which have little possibilities of export may take hotels as their alien currency earners. Hotels can supply many occupation chances that this function is of import for countries which have little figure of beginnings of employment, where they contribute to regional development. Hotel can move as a medium to promo the merchandises of other industries. Largely hotel are supplied with nutrient, drink and other consumables which purchased from local husbandmans, fishermen and other providers. Using local merchandises in their services makes this hotel non merely can lend straight to their economic system gross to state as a alien currency earners but besides indirectly as an mercantile establishment to advance other local industries. Hotels may go societal activity Centres for local people and frequently their eating houses and other installations can pull local usage. The positive macroeconomic growing encourages the positive growing of hotel supply in Jakarta, as a respond from hotel groups for the positive growing of room demand. Some hotel groups expand their hotel concatenation by increasing their figure of hotel, such as Tauzia ( local concatenation ) which its hotel direction will develop 23 hotels until 2012, consist of 15 units Harris Hotel and 8 units of Pop Harris. Next, there is the Accor group ( international concatenation based on France and the largest operator of hotels in Asia Pacific ) program to spread out their web across Indonesia from 40 hotels in 2011 to 100 hotels by 2015. PT Surya Semesta Internusa Tbk ( SSIA ) , who own and manages the 5-star Gran Melia Hotel Jakarta and Melia Hotel Bali, plans to spread out its gross in the cordial reception market by developing a budget hotel web in 2012. The increasing figure of hotel for a budget hotel to a five stars hotel for period 2000 2011 are shown on the Figure 1.2, ( from the period 2012 2015 are projection figure ) , Beginning: Adopted from informations internal Colliers International Indonesia, 2012 Figure1. : The hotel supply in Jakarta by figure of hotel from period 2000-2015 Beginning: Adopted from informations internal Colliers International Indonesia, 2012 Figure1. : The hotel supply in Jakarta by figure of room from period 2000-2015 Based on the Figure 1.2, the supply of hotel since 2000-2011 are dominated by 5-star hotel and 4-star hotel, whereas until 2011 there were already 37 five-star hotel and 35 four-star hotel in Jakarta. These hotel groups which play in Jakarta hotel market consist of international and local trade names. Some of international trade names in Indonesia which the author would wish to advert are Holiday Inn, Sheraton, Four Seasons, Kempinksi, InterContinental, Hilton International, Ritz-Carlton and Mandarin Oriental. While the local trade names besides sharply work to construct their ain concatenation, from Santika, Mulia and Sultan to the Sahid Group and many others. The Emerging of Budget Hotel in Jakarta The construct of Budget Hotel in Jakarta began to emerge in 2006, initiated by the Accor Group, France with the Hotel Formule1, which plans to construct four other subdivision of this hotel in Bali, Semarang, Yogyakarta and Jakarta. Then followed by Santika Group with their Amaris Hotel that until 2012 holding 22 Amaris hotel and planning to spread out the concatenation by adding another 13 Amaris Hotel. Basically the key participants in budget hotel market are hotel groups who already have established their star hotel ironss, and because they can see the possible market and demand of budget hotel, they add one line in their concatenation for budget hotel. Some of the hotel groups are shown in Table 1. : Hotel groups and their trade name on star and budget hotel. Table 1. : Hotel groups and their trade name on star and budget hotel Hotel Group Star Hotel Brand Budget Hotel Brand Aston International Aston Hotel ( 3 Star ) Fave Hotel Accor Group Grand Mercure ( 4 star ) Novotel ( 4 star ) Pullman Hotel ( 5 star ) Ibis Budget Hotel ( antecedently Formule 1 ) Grahawita Santika Santika Premiere ( 4 Star ) Santika Hotel ( 3 Star ) Amaris Hotel Tauzia Hotel Management Harris Hotel ( 4 Star ) Pop Hotel PT Intiland Development Grand Whiz ( 3 Star ) Whiz Hotel Beginning: Adopted from informations internal Colliers International, 2012 Budget hotels are known for its low menu hotel ( Barrows A ; Powers, 2009, pp.273 ) , where invitees can see remaining at good quality hotel, with a low monetary value. The invitees pay merely for what they use. This will ensue in non merely cost efficiency for the costumier but besides for the investor. Based on Colliers International Indonesia information 2012, in twelvemonth 2011 there are merely 6 budget hotels in Jakarta, which are, Formule 1, Menteng by Accor Amaris Hotel, Panglima Polim by Santika Formule 1, Cikini by Accor Amaris Mangga Dua Square by Santika Amaris Soekarno Hatta, Cengkareng by Santika Amaris Senen by Santika In the Figure 1.3 shows the entire figure of budget hotel in Jakarta since emerged in 2006 to 2012. Beginning: Adopted from informations internal Colliers International Indonesia, 2012 Figure1. : The figure of budget hotel in Jakarta from period 2006-2012 The Segment of Budget Hotel The chief section of budget hotel in Jakarta is concern traveler. The high demand of concern activities in Jakarta, which require low monetary value adjustment with limited service, has encouraged budget hotel as a chief penchant for company in taking their concern adjustment. In add-on, there is a displacement work system among corporation when they will make enlargement into a new country. In the epoch of the 1990s, to supervise or guarantee the possible for concern in country which freshly initiated, the company normally sends a direct top direction ( Hari et al. , June 2011, p.44 ) . Since 2000 s, with the bettering economic system and quality of human resources, the corporation began to depute the undertaking at in-between direction degree ( Hari et al. , June 2011, p.44 ) . In add-on, by deputing undertakings to the degree of direction, the costs will be cheaper than directing the top direction. Those alterations of form, so impact the travel concern in Indonesia, from the outgrowth of low cost bearer ( LCC ) to the mushrooming budget hotel ( limited service hotels ) which merely provide the basic demands of the invitees: the comfy suites for remainder. Basically the potency of concern traveller market in Jakarta is rather big, because of few grounds, which are: The betterment in all sectors and positive economic growing has large impact in the increasing of concern activity in Jakarta. In their concern activity, the concerns frequently do concern trip to out of town, even abroad. And as a cardinal authorities, trade, services and industry, Jakarta becomes one of the most finishs for concern travelers in Indonesia. Based on informations from Asia Pacific Business Traveller Research 2011 by Accor Group, the cost which spent for hotel adjustment for Indonesian concern traveler is $ 92/night ( 2011, p.11 ) , while the norm long stay is 2.08 twenty-four hours. ( BPS, 2011 ) As the entire concern traveler in Indonesia in 2011 is about 90 % of the entire domestic tourer in Indonesia ( Siahaan, 2012 ) , hence concern travelers will be around 6.84 million in a twelvemonth. Therefore from this sum of concern travelers, there is about $ 1.3trillion of the entire cost of the trip that flows into the hotel industry in 2011. Global fiscal crisis in 2008 had besides triggered the corporation to cut their concern travel budget. There are some schemes that they have done during 3 old ages after the crisis ( 2009-2011 ) . Based on Ascend Corporate Travel Survey 2012 , from 340 respondent of concern travelers who based 43 % Europe, 30 % North America and 17 % Asia Pacific, there is an increasing figure of company which planning to alter their pick of hotels to salvage money in 2011. Whereas this status was encouraged budget hotel as a penchant adjustment for company for concern trip The Industry of Budget Hotel in Jakarta What becomes interesting from budget hotel market in Jakarta is how the supply and demand of budget hotel is significantly increasing in the short period of clip. Many hotel groups or air hose groups expand their concern to put in budget hotel, by seeing the possible demand of this hotel. For case, AirAsia Group, an air hose company based on Malaysia, who became a innovator of supplying a budget air hose ( Low Cost Carrier, LLC ) , has besides interested to make budget hotel with trade name Tune Hotel. After first established in Malaysia in 2007, Tune Hotel has spread in 6 states, such as Malaysia, Indonesia, England, Thailand, Filipina and Australia. In 2009, they launched two Tune Hotel in Bali which is in Kuta and Seminyak and in 2013, they are be aftering to spread out 13 Tune Hotels in Indonesia which will be in Jakarta, Bekasi, Surabaya, Pekanbaru, Makassar, Sola, Palembang, Tangerang and Bali ( Kompas, 5th September 2012, p.19 ) In the Figure1. : The growing in footings of figure of suites from period 2000-2012 below shows that budget hotel s growing compared with 3, 4 and 5 star hotels in footings of figure of suites is lifting important since emerged in 2006. Beginning: Adopted from informations internal Colliers International Indonesia, 2012 Figure1. : The growing in footings of figure of suites from period 2000-2012 The important supply of budget hotel is a respond for important demand from the market. It can be seen from the tenancy rate of budget hotel which is rather good better than 3 5 star hotels. The Figure1. : The tenancy rate from 5-star hotel to budget hotel shows that merely two old ages after budget hotel has emerged to the market, its tenancy rate is extremely better than 3 5 star hotels, even 5-star hotel has the lowest tenancy rate from 2000-2011. Beginning: Adopted from informations internal Colliers International Indonesia, 2012 Figure1. : The tenancy rate from 5-star hotel to budget hotel The higher demand of budget hotel than 3, 4, 5 star hotels gives an thought that budget hotel likely has satisfied their client and could make their trueness clients who wants to make repetition purchases of their services. However, before making high client satisfaction degree and holding trueness clients, there are values that budget hotel should give to their client. How client value creative activity that budget hotel has done to their client and how this value creative activity impacts their client satisfaction and trueness that finally will increase their demand degree and how this client value creative activity impacts to the hotel profitableness that impact the supply degree will be a intent for this research. Problem Designation Due to the demand of budget hotel is higher than 3, 4, 5 star hotels, therefore there is a mark that likely budget hotel has satisfied their client that finally could make client trueness who wants to make repetition purchases of their services hotel. However, in order to fulfill their client and make client trueness, they should give values to their client. Therefore, the issue in this thesis is to analyze The Impact of Customer Value Creation on Budget Hotel towards Customer Satisfaction, Customer Loyalty and Hotel Profitability . There are four countries of research job, What value creative activity that budget hotel has done towards its clients? What is the client satisfaction degree of budget hotel as an impact of client value creative activity? What are the ruling values in act uponing client satisfaction which will take to make client trueness? How is the profitableness degree of budget hotel compared to 4 and 5 star hotel as an impact from client satisfaction and client trueness? Research Objective The chief intents of this research paper are: To place and explicate the client s value of budget hotel To place and explicate of client satisfaction of budget hotel as impacts of the client value creative activity To place and explicate the ruling value in act uponing client satisfaction degree of budget hotel, which will take to make client trueness To place and explicate the correlativity between client satisfaction and client trueness of budget hotel To analyse the profitableness degree of budget hotel compared with 4 and 5 star hotel as an impact from client satisfaction degree and client trueness Significant Research The survey is important because it provides information which will be helpful for the readers: The survey is important in understanding the client behaviour and needs better. The survey will turn to the issue of client value creative activity to better the client satisfaction to make client trueness. The survey may be utile for many interested parties, particularly: Budget hotel groups. They may utilize this research to back up sweetening of client satisfaction and relationship Students and internal parties of Swiss German University. This research can be used as a mention for lectors and other pupils to carry on farther research. The research worker. The consequence of this research can be used to enrich my cognition. Academicians. The consequence of this research can be used to make farther research in the same industry. Scope and Limitation of Thesis In order that the survey on this topic more focal point, and to acquire the benefit from the survey, therefore the survey limited to: The value creative activity by budget hotel in Jakarta towards its client The impact of client value creative activity on client satisfaction and trueness The impact of client satisfaction and trueness on profitableness degree of budget hotel compared with hotel industry.

Math Autobiography free essay sample

Math can be very tricky for some people, easily making it their least favorite subject. For me, its different. I have always loved math, even when it is challenging. For my essay, I will write about whether or not I consider myself good at math, my good and bad experiences in math, my future plans as an educator and what I hope to accomplish this semester during this course. When younger, usually math was the first homework I would work on. I guess the reason I do that is because I love math and because I think I am a pretty decent math student. I usually I know what to do. I especially like doing Algebra because it is filled with proportions and multiplication. Those are my favorite areas in math. I guess I started loving math when I was in elementary school. I was great, and some students in my class were really good too, so there was always a little competition. We will write a custom essay sample on Math Autobiography or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page We would always get multiplication sheets and I was always finishing them quickly, along with some of the other proficient math students. In a way, those kind of competitions were fantastic for me. I was motivated to do well on them. The students also pushed me to be great even if they didnt realize it. I would have to say the best teaching and learning techniques that worked for me is hands on activities and basically breaking things down step by step. The worst would have to be, when a teacher just hand you the problems and expect you to know what to do. Even though math is one of my best subjects, I still expect my teacher to actually teach me. In teaching mathematics, I would help my students make the connection between classroom learning and their life outside of school. I would provide them the tools they need to handle issues they will come across with numbers in daily life and also prepare them for higher learning in math. As someone who enjoys the logic of math, I strive to make my passion for it contagious so that my future students will not only understand math but also enjoy learning it. With that goal in mind, I would make my lessons engaging and allow my students to tap into their own interests by offering options on assignments as often as possible. With that being said, I feel that math is very important; we use it in our everyday lives and would be lost without any knowledge of it. Teachers need to help students to understand and not just do math. We need to remember that everyone learns differently and we need to encourage that. I feel that reflecting on my personal experiences with Math will help me be a better teacher than if I hadnt taken the time to see what things can go wrong when teaching math to my students.

Sunday, November 24, 2019

The Medieval Joseon Dynasty of Korea

The Medieval Joseon Dynasty of Korea The Joseon Dynasty (1392 to 1910), often spelled Choson or Cho-sen and pronounced Choh-sen, is the name of the last pre-modern dynastic rule in the Korean peninsula, and its politics, cultural practices and architecture reflect an explicitly Confucian flavor. The dynasty was established as a reformation of the hitherto Buddhist traditions as exemplified by the preceding Goryeo dynasty (918 to 1392). According to historical documentation, the Joseon dynastic rulers rejected what had become a corrupt regime, and reconstructed Korean society into the precursors of what is today considered one of most Confucian countries in the world. Confucianism, as practiced by the Joseon rulers, was more than simply a philosophy, it was a major course of cultural influence and an overriding social principle. Confucianism, a political philosophy based on the teachings of the 6th century BC Chinese scholar Confucius, emphasizes the status quo and social order, as a trajectory aimed towards creating a utopian society. Confucius and Social Reformation Joseon kings and their Confucian scholars based much of what they perceived as the ideal state on Confucius stories of the legendary Yao and Shun regimes. This ideal state is perhaps best represented in a scroll painted by An Gyeon, the official court painter to Sejong the Great  (ruled 1418 to 1459). The scroll is titled Mongyudowondo or Dream Journey to the Peach Blossom Land, and it tells of Prince Yi Yongs (1418 to 1453) dream of a secular paradise supported by a simple agricultural life. Son (2013) argues that the painting (and perhaps the princes dream) was likely based in part on the Chinese utopian poem written by the Jin dynasty poet Tao Yuanming (Tao Qian 365 to 427). Dynastic Royal Buildings The first ruler of the Joseon Dynasty was King Taejo, who declared Hanyang (later to be renamed Seoul and today called Old Seoul) as his capital city. The center of Hanyang was his main palace, Gyeongbok, constructed in 1395. Its original foundations were built according to feng shui, and it remained the main residence for the dynastic families for two hundred years. Gyeonbok, along with most of the buildings in the heart of Seoul, was burned down after the Japanese invasion of 1592. Of all the palaces, Changdeok Palace was the least damaged and so was rebuilt shortly after the war ended and then used as the main residential palace for Joseon leaders. In 1865, King Gojong had the entire palace complex rebuilt and established residence and the royal court there in 1868. All of these buildings were damaged when the Japanese invaded in 1910, ending the Joseon Dynasty. Between 1990 and 2009, the Gyeongbok Palace complex was restored and is today open to the public. Funeral Rites of Joseon Dynasty Of the many reformations of the Joseons, one of the highest priority was that of the funeral ceremony. This particular reformation had considerable impacts on 20th-century archaeological investigations of Joseon society. The process resulted in the preservation of a wide variety of clothing, textiles, and papers from the 15th through 19th centuries, not to mention mummified human remains. Funeral rites during the Joseon Dynasty, as described in the Garye books such as the Gukjo-ore-ui, strictly prescribed the construction of tombs for the members of the elite ruling class of Joseon society, beginning in the late 15th century AD. As described by the neo-Confucian Song Dynasty scholar Chu Hsi (1120-1200), first a burial pit was excavated and a mixture of water, lime, sand, and soil were spread on the bottom and the lateral walls. The lime mixture was allowed to harden to a near-concrete consistency. The body of the deceased was placed in at least one and often two wooden coffins, and the entire burial covered with another layer of the lime mixture, also allowed to harden. Finally, an earthen mound was built over the top. This process, known to archaeologists as lime-soil-mixture-barrier (LSMB), creates a concrete-like jacket that preserved virtually intact coffins, grave goods, and human remains, including over a thousand pieces of very well preserved clothing for the entire 500 year period of their use Joseon Astronomy Some recent research on Joseon society has been focused on the astronomical capabilities of the royal court. Astronomy was a borrowed technology, adopted and adapted by the Joseon rulers from a series of different cultures; and the results of these investigations are of interest to the history of science and technology. Joseon astronomical records, studies of sundial construction, and the meaning and mechanics of a  clepsydra made by Jang Yeong-sil in 1438 have all received investigations by archaeoastronomers in the last couple of years. Sources Choi J-D. 2010.  The palace, the city and the past: controversies surrounding the rebuilding of the Gyeongbok Palace in Seoul, 1990–2010.  Planning Perspectives  25(2):193-213.Kim SH, Lee YS, and Lee MS. 2011.  A Study on the Operation Mechanism of Ongnu, the Astronomical Clock in Sejong Era.  Journal of Astronomy and Space Sciences  28(1):79-91.Lee E-J, Oh C, Yim S, Park J, Kim Y-S, Shin M, Lee S, and Shin D. 2013.  Collaboration of Archaeologists, Historians and Bioarchaeologists During Removal of Clothing from Korean Mummy of Joseon Dynasty.  International Journal of Historical Archaeology 17(1):94-118.Lee E-J, Shin D, Yang HY, Spigelman M, and Yim S. 2009.  Eung Taes tomb: a Joseon ancestor and the letters of those that loved him.  Antiquity  83(319):145-156.Lee K-W. 2012.  Analysis of Korean astronomical records with Chinese equatorial coordinates.  Astronomische Nachrichten  333(7):648-659.Lee K-W, Ahn YS, and Mihn B-H. 2012.  Verification o f the calendar days of the Joseon Dynasty.  Journal of The Korean Astronomical Society  45:85-91. Lee K-W, Ahn Y-S, and Yang H-J. 2011.  Study on the system of night hours for decoding Korean astronomical records of 1625–1787.  Advances in Space Research  48(3):592-600.Lee K-W, Yang H-J, and Park M-G. 2009.  Orbital elements of comet C/1490 Y1 and the Quadrantid shower.  Monthly Notices of the Royal Astronomical Society  400:1389-1393.Lee YS, and Kim SH. 2011.  A Study for the Restoration of the Sundials in King Sejong Era.  Journal of Astronomy and Space Sciences  28(2):143-153.Park HY. 2010.  HERITAGE TOURISM: Emotional Journeys into Nationhood.  Annals of Tourism Research  37(1):116-135.Shin DH, Oh CS, Lee SJ, Chai JY, Kim J, Lee SD, Park JB, Choi I-h, Lee HJ, and Seo M. 2011.  Paleo-parasitological study on the soils collected from archaeological sites in old district of Seoul City.  Journal of Archaeological Science  38(12):3555-3559.Shin DH, Oh CS, Shin YM, Cho CW, Ki HC, and Seo M. 2013  The pattern of ancient parasite egg contaminati on in the private residence, alley, ditch and streambed soils of Old Seoul City, the Capital of Joseon Dynasty.  International Journal of Paleopathology  3(3):208-213. Son H. 2013.  Images of the future in South Korea.  Futures  52:1-11.

How to Write a Literature Essay on #8220;The Red and the White#8221;

How to Write a Literature Essay on #8220;The Red and the White#8221; A literature essay is used to closely examine a piece of prose, poetry, or a treatise. If you have to write one on, let’s say â€Å"The Red and the White: A Family Saga of the American West†, you need to know how to draft one for your instructor to give you a good grade. After all, you need to thoroughly analyze the written masterpiece you read. So, here are the steps your instructor will expect you to follow to write your first ever literature essay. Reading and Research Phase Analyzing a book becomes a lot easier if you have read the text thoroughly. Ideally, critical analysis requires deeply reading the text. If you do not have time for this, try to read the book at least once. After reading the primary text, you need to research secondary sources. Look up relevant facts on â€Å"The Red and the White† for a literature essay and carry out some additional reading on the major themes presented in the book. However, remember that these secondary sources are just an aid for your work. The ideas you present must be your own. At this stage choose the topic you wish to write about. You probably have already discovered some interesting aspects you can write on. For instance, you can focus on characters, themes, and historical events which motivated the author. For more topics on a literature essay about â€Å"The Red and the White: A Family Saga of the American West†, refer to 20 topics on â€Å"The Red and the White† for a literature essay. Introduction This is the first and most important part of the literature essay. It contains three basic components: a hook, a transition, and your thesis. The hook is a sentence that is used to grab your reader’s attention. You should broadly state the topic you are writing about. Try to make the introduction as interesting as possible. The second component, the transition, connects the broad idea of the hook to the specific work of literature you will be writing about. Include the title of the work; the name of the author in the introductory part of your essay. Also mention any special awards/accolades the book has received. The last part of the introduction is the thesis. A thesis is the central idea the entire essay. It should be a strongly worded statement that is equally clear and succinct. You can also provide a preview of your essay; simply list the major ideas your paper discusses. Body of the Essay The body of the essay is composed of three to five paragraphs. Each paragraph presents one idea which ties back into your original thesis. These paragraphs should be structured as follows: Topic sentence Explanation of the idea Supportive evidence from the text Connecting the idea to your main thesis The paragraphs should be structured in a way that allows the essay to flow smoothly from one topic to another. Keep your focus on proving the central idea you stated in the introduction. Conclusion Reiterate your central idea. Try to describe the broader significance of your topic. Finally, state why the literary aspect under discussion was used and how it illustrates your idea. This template is an ideal format to follow when writing a literature essay. Although it focuses on a specific book, you can easily generalize these guidelines and use them for any literature essay you need to work on in the future.

Thursday, November 21, 2019

Reading and answer questions Essay Example | Topics and Well Written Essays - 1000 words

Reading and answer questions - Essay Example The company has utilized every chance to ensure the positive message about their products reaches across its target markets. They have advertized and promoted their products on television, billboards featuring talented athletes. Because they manufacture practicable products, they sponsor teams that wear their products on the pitch during marches to relay practicable information about the products. They maintain different brands to grab a larger share of the market as a marketing strategy. c. The UnderArmour has established an effective supply chain network to help distribute its product. The company largely utilizes business partners in the line of sales to distribute the products. The major supply chain is based in Baltimore and two distribution centers: one in Baltimore and the other in Rialto, California. These distribution centers work with smaller distributers and co-ordinates with interested purchasers to make trade arrangements. d. Their product design is focused on the needs of sportsmen. The company’s apparel, for instance, is designed to absorb sweat keeping the sportsman dry through the match, the footwear are designed on strong and lighter materials to enhance a player’s mobility and stamina. They have developed their products design using unique materials, which positions them well in the market as well as reducing the chance of their products being counterfeited. e. The company operated in numerous countries and therefore, enjoys the benefits of outsourcing labor especially from cheap-labor countries like China. Most of their manufacturing occurs in the US but most production occurs overseas when the idea is looked at in an aggregate perspective. f. The company has numerous distribution facilities in different parts of the United States and the word at large. It has set a team of expert involved in research in terms of studying the market trends and the design materials of the

Domestic Terrorism Master Essay Example | Topics and Well Written Essays - 2750 words

Domestic Terrorism Master - Essay Example Both domestic and international terror groups have the same enemies both terrorists group enemy is the government as these terrorist groups usually consist of the oppressed class, and this class feels that it is the government's fault that they do not get their fair share. Thus the government is the common enemy of both the terrorist groups. A good example of domestic terrorism is that Various recent events, most particularly the bombing of the Federal Building in Oklahoma City, Oklahoma in April, 1995, thus proving the fact that Organized extremist/terrorist groups of particular concern with regard to their abilities to recruit from, and exist within the United States armed services have historically been racist and/or anti-government in character. (http://www.fas.org/irp/eprint/presley.htm) Terrorist have started to use the in two ways. The First and most common way is that, the Internet has developed into a forum through which both terrorist groups and individual terrorists can spread their intense and influential messages of hate and violence far and wide. Through this fast developing forum they can also communicate with one another and with those who show sympathy towards them. The Second way in which terrorist use the internet for their terrorism is that, individuals as well as groups have attempted to make an attack on a lot of computer networks, as well as those on the Internet this is called cyber terrorism or cyber warfare. At present, terrorists proffer to use the Internet for their purposes more than they are attacking it. At least twelve of the thirty groups on the State Department's list of selected foreign terrorist organizations keep Web sites on the Internet. Whereas U.S. officials strongly believe that a number of terrorists use encrypted E-mail to plan their evil acts of terrorism, the majority of groups seem to use the Internet so that they can spread their propaganda all around the world. Good number Internet sites of terrorist groups seek to promote the organization's political and ideological agenda. A good example is of this is that directly after the Peruvian terrorist group Tupac Amaru broke into the Japan's Ambassador's residence which was in Lima as well as apprehended scores of diplomatic, political and military officials hostage in December 1996, sympathizers of Tupac Amaru in who were citizens of U.S. and Canada developed quite a lot of solidarity Internet sites, one of the sites even had comprehensive drawings of the terrorists' plan of assault on the residence of the Japanese Ambassador's. When most of the free and English speaking world thinks of the word enemy, a warrior dressed assassin or foreign solder from a communist country usually comes to mind. Enlisted soldiers, sailors, airmen and marines who fight tirelessly to defend our country see the enemy as that exactly. Unfortunately, there is a new enemy threatening our way of life. This enemy attacks through e-mail messages and internet connections.

Wednesday, November 20, 2019

Information systeams Essay Example | Topics and Well Written Essays - 1500 words

Information systeams - Essay Example More so, the bank offers offshore banking services for the UK expatriates and foreigners residing in the UK. On the other hand, Barclays bank traces its origin in 1690 through a gold smith banking business in London. Later in 1736, an investor named James Barclay joined the business, which expanded tremendously to become a nationwide bank under the name Barclays and Co. Currently, the bank is a British multinational banking as well as a financial service company whose headquarters are in London, UK (Jain, 2005:96). The bank serves millions of customers with its outstanding services like saving accounts, current accounts, loans, mortgages, and much more all over the globe. This paper will evaluate the process of the two named banks’ personal loan processes and compare the two bank processes, not forgetting to outline the type of information system the banks use to process the personal loans NatWest personal loan There are two types of personal loans, which are secure and unsecu red loans. Unsecured loan is that which is supported by the credit worthiness of the borrower without using collateral or property. On the other hand, the secured loan is the loan acquired after rendering property or any other collateral as security to stand in place of the loan acquired. Unsecured loan is the most common type of loan acquired by individuals of all categories. To begin with, NatWest bank offers unsecured personal loans at a rate of 8.9% APR typical and this loan is available to existing current account holders only. The other account holders like the Advantage Gold,  Advantage Private, and Black Current Account holders the APR or preferential representative rates at 6.4% for loans ranging between ?7,500 and ?14,950. In addition, the applicant must be eighteen years and above and should be UK residence. In order for a borrower to estimate or work out how much loan he would like to borrow, the rates, monthly repayments and total loan costs, the bank offers personal loan calculators online. More so, the bank offers Jargon Buster to clarify confusing terminologies that are commonly associated with loans. Prior to unsecured loans, the bank also offers secured personal loan. This is a type of loan granted by banks over security of one or more asset. These assets will belong to the bank after the customer defaults on his personal loan repayments. In most cases, this loan is offered to people who offer houses or even personal vehicles as their security or collateral, which means that customers with these assets are the only individuals entitled to the loan. Unlike the unsecured loans, secured loans are more flexible in a manner that the borrower chooses on the period of repayment and can borrow as much amount of cash as they need as long as it is of the same value with the asset offered. Nevertheless, secured and unsecured personal loans fall under the same department. NatWest secured personal loan interest rates are paid based on personal circumsta nces where loans extending to ?14,950 have a maximum term of five years, while loans ranging from ?14,950 to ?25,000 have a maximum period of seven years. More so, home improvement loans over ?15,000, the repayment period takes up to ten years. In addition, no matter how much the amount one borrows, NatWest offers a minimum term of one year, and the borrower can repay the credit earlier

Case study Essay Example | Topics and Well Written Essays - 1250 words - 22

Case study - Essay Example The company decided to retain all its employees. Moreover, it opted to continue with its production techniques which were quality-oriented. Philippines is an Island country which was a Spanish colony. All local people are Christians and use Filipino as an official language although English is widely used especially by the elite. The country gained independence in 1946. Democracy in the country gained ground in 1992 after Fidel Ramos took over power. The president opened up the economy to external investors with the aim of creating employment for the local population. The decision by AmeriTech to relocate to Philippines was aimed at enabling the firm to gain a competitive advantage with the lower labor costs in the country and easy access to emerging markets in Asia. The only employee who was transferred to Philippines was William Bill Dawson. Although he was intelligent, he never attended college. However, he was able to move to positions and secure the topmost position in Ameritech. The transition was easy but, some changes in the production process were needed. During the startup period, the company offered the unused employees their normal salaries. Many employees were happy with the working conditions under their new employer. Bill was assigned Miguel in order to help him with cultural difficulties that might face him in the new country. Miguel was not trusted by the employees because of his background. Unlike Bill, he was not close to the employees. In addition, he was not happy with the fact that he was living far away from his family. After acquisition, production levels remained low. Bill discovered that the employees wasted a lot of time by having extended breaks and endless chats. In addition, the employees would engage in activities that were not related to their work, eg birthday parties for some employees. However, Miguel informed bill that this was part of Filipino

Sunday, November 17, 2019

Philosophy Essay Example | Topics and Well Written Essays - 750 words - 34

Philosophy - Essay Example He believed that it was up to every person to contemplate and search into his soul to find out who he or she was. Except for very rare instances cited by a few historians, he hardly ever worked. He also never wrote. He prided himself on the questions he asked. Even this is not entirely true. He didn’t pride himself on anything. He never offered answers. One of his most famous sayings is:†I know that I know nothing.† This is a whole complex issue known as the â€Å"Socratic Problem.† Socrates was extremely cynical and many of his sayings were paradoxical because they contradicted common sense. Some of these are: â€Å"No one desires evil.† "No one errs or does wrong willingly or knowingly." "Virtue—all virtue—is knowledge." "Virtue is sufficient for happiness." "I know that I know nothing noble and good† (Irwin, 64). But by far his most famous saying is â€Å"I only know that I know nothing.† Plato wrote a series entitled Socratic Dialogues (The Republic, Apology of Socrates, etc.) in which he presented discussions between Socrates and other contemporary philosophers and between Socrates and his many students. As the only source of Socrates’ philosophical beliefs is Plato’s writings, it is difficult to distinguish those of Socrates’ beliefs from those of Plato. There are those who believe that Plato did, in fact, have his own philosophical orientation. There is controversy among scholars over what these were because of the difficulty of separating Socrates from Plato in Plato’s dialogues. Consequently, distinguishing the philosophical beliefs of Socrates from those of Plato and Xenophon is not easy and it must be remembered that what is attributed to Socrates might more closely reflect the specific concerns of these thinkers. The matter is complicated because the historical Socrates seems to have been notorious for asking questions but not answering them, claiming to lack wisdom concerning the subjects

Review of a presentation Essay Example | Topics and Well Written Essays - 1250 words

Review of a presentation - Essay Example The progress in the identification and discovery of the lupus disease has paved the way for immunology application in its study thus making the foundation for its current treatment. The disease has shown uneven prevalence interns of race and gender. It is more prevalent in black American women their white counterparts. Lupus is classified in to five types where each type presents different signs and symptoms and causes. This type includes Discoid lupus erythematosus, subacute cutaneous lupus erythematosus, drug-induced lupus, neonatal lupus and SLE (systemic lupus erythematosus. The real cause of lupus has not been established yet. This is so due to the many factors that are contributed with the real development of and diagnosis of the disease. Currently, there is no single specific test for the disease and it can last some time before it is established. These calls for several tests to establish the disease like Medical history, Blood tests, ANA test, Skin Biopsy and Kidney biopsy. The disease manifest itself in different symptoms like pain or swelling in joints, muscle pain, fever with no known cause, red rashes, most often on the face, chest pain when taking a deep breath among others. The disease is believed to be caused by epigenetic factors, which are demonstrated by a study of a set of chemical reactions that switch part of the genome on and off at a strategic location and time. Lastly, the re is no cure for the disease but the most applicable treatments aims at treating the symptoms. Evaluation History of lupus The history of lupus disease can be split in three broad periods: Classical era- this period is dated back in the 13th century where the name of the disease was coined. Several physicians gave the disease different names depending on their own thoughts and presentation of the disease. Example of these physicians was Rogerius in 13th century who coined the name lupus describing the facial lesions caused by the disease. Neoclassical Era- this perio d began back in 1872, and it was marked by description of the disease’s dissemination manifestations by Osler. Modern era- this was marked by the discovery of LE cells in1948 in the bone marrow of patients with acute disseminated lupus erythematosus by Hargraves and his colleagues. This was followed by the discovery of immunology of the disease by Moore in 1950’s and systematic occurrence of the disease in patients by Arnett and Shulman in 1954. Epidemiology The disease has shown prevalence of 20 to 150 cases per 1000,000 people. Its prevalence is more in African American Women compared to their white counter part at 164 and 406 respectively situation which has tripled for the last forty years. The prevalence of the disease is highly exhibited in women due to their estrogen hormones aged 20-45 years of age. Lupus disease is highly prevalence in Asians, Afro- Americans, Afro-Caribbean and Hispanic Americans. Classification Lupus disease is classified in to five types wh ere each type has its own specific cause. 1. Discoid lupus erythematosus which result in scar causing skin lesion and can lead to the development of SLE. 2. Subacute cutaneous lupus erythematosus. Mostly commonly in women aged 15-40 years of age manifested inform of skin lesions. 3. Drug-induced lupus which is cause by continuous use of specific drugs like procainamide and guanidine. 4. Neonatal lupus. It is passed from the mothers and appears as skin rashes

Friday, November 15, 2019

The history and effects of child sexual abuse

The history and effects of child sexual abuse Child sexual abuse is definitely not a new or modern phenomenon and even though it was not necessarily acknowledged before the 1800s, it does not mean that it did not exist. Throughout history, documentation about child sexual abuse has existed, with references especially to Greek and Roman civilisations, as well as in colonial America and Europe (Bolen, 2002). Jean-Claude Chenais (1981), in a study using multiple data sources has been pivotal in the attitude changes in Western societies over the issue of child sexual abuse over the last hundred years. His studies have shown that due to a number of different contributing factors, in some European countries like Germany and France, child sexual abuse was so frequent as to be considered normal (Bagley King, 2004). As cited in Bolen (2002), in his research on classical childhood analysis of different historical eras, DeMause (1988), states that: The history of childhood is a nightmare from which we have only begun to awaken. The further back in history one goes, the lower the level of child care, and the more likely children are to be killed, abandoned, beaten, terrorised and sexually abused. In her research of historical child sexual abuse, Florence Rush has found that it is predominantly a phenomenon of the patriarchal systems in history, where children were considered as property of the father. In Talmudic law it is the tradition that a female daughter can be betrothed by her father by means of sexual intercourse after the age of three. Even though not encouraged, sexual acts including intercourse with a child younger than three years is not a crime. Such sexual activity with young girls was not discouraged by the Catholic Church either in history, as in a Papal decree of the sixth century stated that for a marriage to be valid it was copulating that was the overriding factor and consent only desirable. The age of the girl was taken into consideration for the purpose of betrothal where if the girl was not at least seven years old than this was considered invalid. Also, through history we find however that sexual abuse was not limited only to girls. Especially in Greece , it was popular to use boys for sex. It was also common to castrate young boys and buy or sell them as sex slaves (Bagley King, 2004). In its broad sense, child sexual abuse is when an older person forcibly engages in sexual activity with a child. The definition of the terms sexual assault on children or child molestation is different in different legal jurisdictions (Rowan, 2006). As cited in Kinnear (2007), child sexual abuse is defined by Fraser (1981) as being the exploitation of a child for the sexual gratification of an adult, whilst Baker and Duncan (1985) claim that [a] child (anyone under 16 years) is sexually abused when another person, who is sexually mature, involves the child in any activity which the other person expects to lead to their sexual arousal. In their 2003 report on the maltreatment of children, the Childrens Bureau of the US Department of Health and Human Services defines it as the involvement of the child in sexual activity to provide sexual gratification or financial benefit to the perpetrator, including contacts for sexual purpose, molestation, statutory rape, prostitution, pornography, exposure, incest, or other sexually exploitation activities (U.S. Department for Health and Human Services, Administration for Children, Youth and Families, 2005). The age of consent is also different from one country to another. However, it is commonly understood, that a child is not able to understand or willingly consent to sexual experiences with an older person. It is also acknowledged that there exists sexual experimentation between young people and therefore molestation charges are only enforced when the older person is sixteen or eighteen and that child is three or five years younger (Rowan, 2006). There are certain factors which categorise sexual encounters as abuse according to the World Health Organisation. As well as the age difference it also includes in the definition the misuse of a position of authority by the adult which then leads to sexual acts. The child must also be unwilling to participate in such acts even if he or she did not offer resistance. It also requires the attempt to touch the genitals or breasts of a child or make the child touch the ones of the adult. If the adult attempts to touch the child by exposing himself or if the child is undressed, made to, as well as the attempt to seduce or tempt to take to another place whilst psychology threatening the child (Fegert, 2003). Sociological definitions of child sexual abuse differ from the clinical or legal ones and whilst some are universally acknowledged some are less so even though equally important and influential (Lawrence, 2004). One of the definitions widely accepted by child protection services is that of Schechter and Roberge and it states that Sexual abuse is defined as the involvement of dependent, developmentally immature children and adolescents in sexual activities they do not truly comprehend, to which they are unable to give informed consent (Schechter Roberge, 1976). When researching child sexual abuse, it is common to associate this with the phenomology of pedophilia. When assessing and treating sex offenders however, professionals know that it is important to explore different variables that have an important role in such deviant sexual behaviour. The sexual preference and history, including any of crime or violence, are taken into consideration. Any other disorders such as endocrine or neuropsychological ones as well as any other biological factors are to be explored (Langevin, 2003). By definition, a pedophile is generally an individual who for no less than a period of six months fantasises about having sexual encounters with young children or is sexually aroused by the thoughts of such fantasies. Usually the sexual urges of such individuals are focused on children younger than thirteen years of age. Pedophiles can be frustrated from these urges and often suffer from interpersonal difficulties because of these sexual impulses. However, even i f not necessarily always the case, some pedophiles will act upon such fantasies and are usually only apprehended or brought to attention because of this. Most pedophiles are usually not necessarily disturbed enough about such fantasies about children and as a consequence do not seek voluntary medical help (Hall Hall, 2007). The key factor in the assessment of pedophilia is the age of the children for whom interest is shown. In its most strong forms, exclusivity is shown towards prepubescent children with no sexual urges or interest in other adults. Not all pedophiles however commit sexual offences with child victims and not all sex offenders with children are pedophiles (Seto, 2004). Dr Langevin (2003) noted however, that even though there seem to be a number of factors that are common between pedophile priests and other pedophiles in terms of sexual preferences, pedophile priests generally have less antisocial behaviour characteristics. In light of the huge amount of media coverage of the clergy abuse crisis in the last few years, it seems that even though much interest by the community has been sparked on the topic, little research has been carried out by psychological and clinical bodies. This may be due to a long existing mutual indifference between the Church and the mental health field. Only a few studies have actually addressed the issue of the pedophile priest or the priest who sexually abuses children. Despite the surmounting media coverage and attention of the issue providing an alarming public assumption that most priests are pedophiles, an American study estimated however that only 2% of priests are pedophiles whilst another 4% being ephebophiles. However, it is also taken into account that a probably large number of sexual abuse cases by the clergy are not reported (Plante, 1999). Michael Rezendes (2002), part of the Boston Globes Spotlight Team was one of the first journalists who brought attention to t he issue of child sexual abuse allegations against the American clergy. A year of investigations carried out by this team resulted in the resignation of Cardinal Bernard Law on the 13th December, 2002. This was mainly due to the exposure of a series of shortcomings and mistakes, in his handling of a well known pedophoile in Boston; Rev John J. Geoghan, where after being reported of sexual misconduct with children, he was reassigned. However, it was clear that Geoghn was only a sign of a more serious problem. The Spotlight Team investigated further into the Archdiocese of Boston and by the time of Laws resignation, had published over 800 stories. An earlier singular case which also received worldwide publicity however dates back to 1984, where Fr Gilbert Gauthe of Lafayette, Louisiana was charged on multiple counts of child sexual abuse. This was the first criminal case of its kind to receive such level of media attention and publicity and also was the first time that a civil suit was initiated against a diocese on the grounds of failure to protect children from a known abuser in its clergy (Murphy, Buckley Joyce, 2005). Dr Richard Sipe, a psychotherapist and psychiatrist as well as a former Roman Catholic Priest, wrote extensively on the subject of child sexual abuse and reports that even as early as 1976, before the big scandals broke out on the media, there opened a programme, the first, perhaps, in the world dedicated to the treatment of psychosexual disorders for clergy. This included the treatment of disorders which involved the sexual abuse of children. The need for such a programme and its preparation, years before i ts opening, shows that knowledge of Catholic Clergy who had problems of sexual misconduct was already widespread in the 1960s and 70s (Sipe, 1995). With such an increasing interest in the phenomenon of priests as sexual abusers of children, the Catholic Church seemed to be spiralling into a crisis as portrayed so by the media, with an increasing number of people coming forward with new allegations all over the world. Philip Jenkins (2001), as cited in Dokecki (2004) explores the terms of moral crisis as opposed to moral panic. In order to fully understand weather the Catholic Church was being victimised by a new panic born out of media frenzy or if the panic was due to a moral crisis deeply rooted in actual facts and reality of the problem, one must also explore the issue in its full context. It is worth noting and reflecting upon the possibility of child abuse scandal by clergy as being a classic example of social construction. This is not to belittle the seriousness of priests com mitting such lewd acts with children, but it is more a manner of asserting how the media portrayal of such events can impact the way it shapes the social response to it (Jenkins, 2001). The way that this issue in the US has been widely covered and reported by the media, it has undoubtedly generated a growing popular feeling of mistrust in the church. This might have been a trigger in the claim that the Catholic Church has been inefficient in its response to such abuses and allegations, as the increasing number of cases began to crop up all over America as well as the rest of the world. By 2004, the time of the Globes investigation of the Boston cases, it was reported that between 1950 and 2002, four thousand three hundred priests were alleged to have abused or molested almost eleven thousand children or adolescents (Paine Hansen, 2002). A study of child abuse committed by clergy which was conducted by the John Jay College for the United States Conference of Catholic Bishops in 2002 recorded these figures. However, this only reflects the numbers for those victims who actually reported their abuse and came forward to the Church authorities. Studies have shown that a great number of victims, especially males, never come forward to disclose their abuse to anyone and even more never report it to the authorities. It is also important to note that not all dioceses participated in this study and not all kept official and accurate records (John Jay College of Criminal Justice, 2002). In the matter of establishing whether the problem of child sexual abuse by clergy in the Catholic Church is just moral crisis as opposed to just moral panic, numbers alone do not suffice. It is often normally recognised for organisations and public entities to take defensive measures when dealing with such serious accusation against its employees or members. Most importantly the defense would most certainly be targeted against a blanket condemnation of the whole organisation. Sometimes, such corporations genuinely fail to recognise and acknowledge the fact that the destructive effects of such allegations have deeper roots than simply moral panic (Dokecki, 2004). Studies of other organisations entrusted with the care of children show that the prevalence of child sexual abuse is also of concern. In his study as reported in The Washington Times (1991), Patrick Boyle outlined that between 1971 and 1989 there were one thousand, one hundred and fifty seven reports of child sexual abuse out of a million volunteers (all adults) and four million member scouts; with the majority believed to be boys aged between eleven and seventeen. Case studies also seemed to indicate that in order to safeguard the image of the Boy Scout organisation, certain information was covered up in order to prevent the possibility of a crisis scandal. The police were not involved if the alleged abuser left the organisation. However, it was common practice for these offenders to move to other states and join new troops whilst those reported to the General Headquarters still managed to bypass the system and re-roll in new States (Boyle, 1994). Other studies of different organisa tions for youths and children also show sexual abuse incidents reported. These include institutions like the Big Brother Organisation, the YMCA as well as other athletic organisations and centres for child care-giving in day care institutions or families. In sporting organisations, the perpetrators were found to be involved in the majority of cases with a school; i.e., teachers or principals who appeared to have multiple victims, with one coach reported to have four hundred counts of sexual abuse. The majority of these cases occurred in the US, the UK and Ireland. In both the sports organisations and the Big Brother one, however, it seemed that legal action was taken against the perpetrators and screening processes put in place for all future volunteers (John Jay College, 2002). As seen from the community, the sexual abuse crises in the Catholic Church presented a larger moral shock than any other abuse scandal, predominantly because of the social status priests hold within the same community. The priest is believed to be not merely a man serving the pastoral functions for his church, but also a delegate of Christ on Earth. The priest is often held in a position of trust within society; where people look upon him as a source of comfort and advice. In Catholic communities the clergy are viewed as central and present in everyday life through their work within the parish and as reference points for the safeguarding of the souls (Cozzens, . However, priests do not only function in a society as preachers of the word of God. In most cases, they will take on the role of therapists, care-givers and educators. They do not only earn their loyalty from the altar, but mainly from being there for the sick, the troubled, the dying and the dead. It is understood, because o f such an intimate involvement in social and community life, that any case of sexual abuse by a member of the clergy will have relational and social implications as well as personal ones (Frawley-ODea, 2007). According to Lebacqz (1985), from an ethical perspective, priests are professionals and as such, a relationship of mutual trust needed. The clergy however go beyond our normal understanding of their sacramental office and thus in the relationship between priest and child, the typical power discrepancy is significantly amplified. This is so because the context of the relationship is the church and also the professional is a priest and the client a child (Dokecki, 2004). From their early years children are socialised to view the Church as a mother and a priest as a fatherly figure; hence also priests being called father.

Advance Communications Systems Gsm Information Technology Essay

Advance Communications Systems Gsm Information Technology Essay In Telecommunications Applications, cellular is the fastest and very demanding Technology. Today, It is representing a continuous increasing percentage of all telephone subscriptions around the globe. GSM is the most popular standard for mobile telephony systems. It is estimated that around 80% of worldwide mobile market uses this standard. Currently there are about 4 Billion cellular subscribers around the world. GSM differs from its previous technologies in that both signalling and speech channels are digital. Thus GSM is considered as 2nd Generation (2G). Definition: Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization group established in 1982 to create a common European mobile telephone standard that would formulate specifications for a pan-European mobile cellular radio system operating at 900 MHz. It is estimated that many countries outside of Europe will join the GSM partnership. The GSM family of technologies has provided the world with mobile communications since 1991. In over twenty years of development, GSM has been continually enhanced to provide platforms that deliver an increasingly broad range of mobile services as demand grows. Where the industry started with plain voice calls, it now has a powerful platform capable of supporting mobile broadband and multimedia services. GSM is now used in 219 countries and territories serving more than three billion people and providing travellers with access to mobile services wherever they go. GSM An open, digital cellular technology used for transmitting mobile voice and data services EDGE An open, digital cellular technology used for transmitting mobile voice and data services HSPA An open, digital cellular technology used for transmitting mobile voice and data services GPRS A  very widely deployed wireless data service, available now with most GSM networks 3G/WCDMA The air interface for one of the International Telecommunications Unions family of third-generation mobile communications systems LTE Designed to be backwards-compatible with GSM and HSPA, Long Term Evolution incorporates MIMO in combination with OFDMA GSM Roaming The ability for a customer to make  and receive calls, send  and receive data, or access other services when travelling outside the coverage area of their home network IMB A technology, defined as a part of the 3GPP Rel. 8 standard, which enables spectrally-efficient delivery of Broadcast services using TDD radio techniques. 2. GSM Network The GSM technical specifications define the different entities that form the GSM network by defining their functions and interface requirements. The GSM network can be divided into four main parts: The Mobile Station (MS). The Base Station Subsystem (BSS). The Network and Switching Subsystem (NSS). The Operation and Support Subsystem (OSS). The architecture of the GSM network is presented in figure 1. 3. GSM Network Operations GSM network architecture: There are four main areas of GSM Network: Mobile station (MS) Network and Switching Subsystem (NSS) Operation and Support Subsystem (OSS) Base-station subsystem (BSS) Simplified GSM Network Architecture Mobile station Mobile stations (MS) are also widely known as mobile equipment (ME), cell or mobile phones. This is the part of a GSM cellular network which is used and operated by user. The size of mobile phone In recent years is becoming more and more smaller whereas the level of functionality has greatly increased. The two basic element of mobile phone are the hardware and the SIM. The main element of the mobile phone is hardware which includes the display, case, battery.Another important element of the Mobile are the electronics which are used to generate the signal, and process the data receiver and to be transmitted. International Mobile Equipment Identity (IMEI) is installed in the phone at manufacture and cannot be changed. The network can check whether the mobile has been reported as stolen with its IMEI while the registration of the phone. The network determines the identity of the user with The SIM or Subscriber Identity Module. The SIM includes variety of information including a number known as the International Mobile Subscriber Identity (IMSI) Network Switching Subsystem (NSS) The GSM network subsystem contains a variety of different elements. This is the element of GSM which provides the main control and interfacing for the whole mobile network. NSS is also known as the core network and includes the following elements: Authentication Centre Home Location Register SMS Gateway Visitor Location Register Equipment Identity Register Gateway Mobile Switching Centre Mobile Switching services Centre Base Station Subsystem (BSS) The system used to communicate with other mobiles on a network is called Base Station Subsystem (BSS) section . It consists of two elements: Base Station Controller Base Transceiver Station Operation and Support Subsystem (OSS) Operation and Support Subsystem (OSS) is used to control and monitor the overall GSM network and is connected to components of the NSS and the BSC.It is also used to control the traffic load of the BSS. As the subscriber population increases with the resulted number of BS, some of the maintenance tasks are transferred to the BTS, thus it allows savings in the cost of ownership of the system. Each interface between the different elements of the GSM network is defined in the GSM structure. This facilitates the information interchanges can take place and also that network elements from different manufacturers can be used. Development of GSM Air Interface is the key elements of the development of the GSM, Global System for Mobile Communications. Elements including the modulation, GSM slot structure, burst structure and the like were all devised to provide the optimum performance. Modulation format is an important development of the GSM standard , the way in which the system is time division multiplexed, which provides a considerable impact on the performance of the system as a whole. For example, the modulation format for the GSM air interface and battery life are directly associated and the time division format adopted enabled the cellphone handset costs to be considerably reduced as detailed later. Reference: http://www.brighthub.com/mobile/windows-mobile-platform/articles/14286.aspx#ixzz0hoQeU6uY 4. GSM Advantages Disadvantages GSM Advantages GSM is grown-up means this development means a more constant network with healthy features. Fewer signal fall inside buildings. Ability to use repeaters. Talk-time is generally advanced in GSM phones due to the pulse nature of transmission. The availability of Subscriber Identity Modules allows users to switch networks and handsets. GSM covers almost all parts of the world so international roaming is not a problem. The subscriber can enjoy the broadest international coverage. It is possible with the GSM roaming service. Good coverage indoors on 850/900 MHz. Repeaters possible. Very good due to simple protocol, good coverage and mature, power-efficient chipsets. Some More Advantages most popular Communication Mobile, wireless communication, support for voice and data services. Total mobility International access, chip-card enables use of access points of different providers. Worldwide connectivity One number, the network handles every location. High capacity Better frequency efficiency, smaller cells, and more customers per cell. High transmission quality High audio quality and reliability for wireless. Disadvantages of GSM Pulse nature of TDMA transmission used in 2G interferes with some electronics, especially confident audio amplifiers. 3G uses W-CDMA now. Intellectual property is concentrated among a few industry participants, creating barriers to entry for new entrants and limiting competition among phone manufacturers. GSM has a permanent maximum cell site range of 35 km, which is imposed by technical limitations. GSM has some disadvantages when compared to some of the newer mobile network technologies. GSM is known as a second-generation system. Third-generation systems feature higher data transfer rates. Higher transfer rates allow better call quality and additional services such as high-quality streaming video and high-speed Internet capabilities. Evolution from 2G to 3G 2G networks were built mainly for voice data and slow transmission. Due to fast changes in user expectation, they do not gather todays wireless needs. Cellular mobile telecommunications networks are being upgraded to use 3G technologies from 1999 to 2010. Japan was the first country to introduce 3G nationally. How is 3G different from 2G and 4G While 2G stands for second-generation wireless telephone technology, 1G networks used are analog, 2G networks are digital and 3G (third-generation) technology is used to enhance mobile phone standards. 3G helps to simultaneously transfer both voice data (a telephone call) and non-voice data (such as downloading information, exchanging e-mail, and instant messaging. The highlight of 3G is video telephony. 4G technology stands to be the future standard of wireless devices. 5. GSM Applications: 1. GSM-R: (Global System for Mobile Communications-Railway) GSM-R is the latest technology for railway communications based on International wireless communications standards. The GSM-R system is based on GSM and EIRENE-MORANE specifications and it guarantee at 350 mph without any data loss in communication. GSM-R is one part of  ERTMS  (European Rail Traffic Management System) which is composed of: GSM-R. ETCS  (European Train Control System). Frequency band GSM-R uses a specific  frequency band in Europe, which is as follows: 876  MHz 880  MHz: used for data transmission (uplink) 921  MHz 925  MHz: used for data reception (downlink) Channel spacing is 200  kHz. GSM-R occupied a lower extension of GSM 900  MHz frequencies (890  MHz 915  MHz range for transmission and 935  MHz 960  MHz range for reception), as per 3GPP TS 05.05 V8.20.0 (2005-11). In  China  GSM-R occupied a 4  MHz wide range of the E-GSM band (900  MHz-GSM). GSM-R uses GSM-R allows the services and applications for mobile communications in many domains: Transmission of Long Line Public Address (LLPA) announcements to remote stations down the line Control and protection (Automatic Train Control/ETCS) and  ERTMS) Communication between train driver and regulation centre, Communication of on-board working people Information sending for  ETCS Communication between  train stations,  classification yard  and  rail tracks 2. GSM for Disaster Management: GSM Technology is being used for prevention in disasters. Many cellular companies offer charity disaster relief services to the effected areas. The response program is an initiative to make sure that the communications are going on during disasters. The response team is made up of volunteers and telecom engineers who bring their equipments and the whole Mini-GSM system. Basically this is an entire Portable Mobile Network so that the effected people can have contact with the other people around the world. As we have seen in Haiti Earthquake disaster. 3. Remote monitoring applications using GSM Telemetry Remote Tank Level Monitoring Wireless Remote Monitoring for Pumps Leakage detection in Tanks Automated Condition Monitoring Remote communications to PLC using GSM Telemetry GSM Odometer (Mileage Management System) GSM odometer is such a device used to facilitate fleet administration of vehicles. This will report all necessary information about the vehicle through E-mail or mobile SMS. This device is based on GSM modem with embedded software. This is concept is called Mileage management System. This is a very useful technology for those organizations which need vehicle administration on daily basis. This system is fully compatible with your vehicle and central control room. GSM odometer also reports the following information: The total number of working hours of the vehicles Speed profiles of the vehicles Tracking using GSM location service Benefits of Mileage Management System: It provides very accurate mileage information of the vehicle. Easy vehicle service recall. Better customer services. Less process time 70 to 80% reduction in cost for daily fleet administration. Correct invoicing, information about the mileage may easily be integrated into the fleet owners billing and administration Enhanced Security Mobile Application Security: The mobile users around the globe are steadily increasing and hopefully will continue to grow more rapid in future. Openess offers benefits to the customers, device management and operators. But on the other habd oppenness also chanllenges the security risks and malicious applications. Therefore security is the key concern for the mobile and communications industry. GSM Association Mobile Application Security Initiative identified the need of security applications across mobile operating systems to reduce the malware while facilitating the users. The challenge for mobbile applications are many. Some are included which are: Proactively protect mobile users from fraud and malicious applications Assure quality and accountability of mobile applications Maintain trust in mobile platforms (and avoid similar problems in the Internet world) Secure existing and future business Protect operators against costs originating from malicious applications Facilitate certification processes to reduce barriers for developers Ensure consistency across different OS platforms and operators. 6. GSM Security and Encryption Description of GSM Security Features Security in GSM consists of the following aspects: subscriber identity authentication, subscriber identity confidentiality, signaling data confidentiality, and user data confidentiality. The subscriber is uniquely identified by the International Mobile Subscriber Identity (IMSI). This information, along with the individual subscriber authentication key (Ki), constitutes sensitive identification credentials analogous to the Electronic Serial Number (ESN) in analog systems such as AMPS and TACS. The design of the GSM authentication and encryption schemes is such that this sensitive information is never transmitted over the radio channel. Rather, a challenge-response mechanism is used to perform authentication. The actual conversations are encrypted using a temporary, randomly generated ciphering key (Kc). The MS identifies itself by means of the Temporary Mobile Subscriber Identity (TMSI), which is issued by the network and may be changed periodically (i.e. during hand-offs) for additi onal security. Signal and Data Confidentiality The SIM contains the ciphering key generating algorithm (A8) which is used to produce the 64-bit ciphering key (Kc). The ciphering key is computed by applying the same random number (RAND) used in the authentication process to the ciphering key generating algorithm (A8) with the individual subscriber authentication key (Ki). As will be shown in later sections, the ciphering key (Kc) is used to encrypt and decrypt the data between the MS and BS. An additional level of security is provided by having the means to change the ciphering key, making the system more resistant to eavesdropping. The ciphering key may be changed at regular intervals as required by network design and security considerations. Figure 6 below shows the calculation of the ciphering key (Kc). Subscriber Identity Confidentiality To ensure subscriber identity confidentiality, the Temporary Mobile Subscriber Identity (TMSI) is used. The TMSI is sent to the mobile station after the authentication and encryption procedures have taken place. The mobile station responds by confirming reception of the TMSI. The TMSI is valid in the location area in which it was issued. For communications outside the location area, the Location Area Identification (LAI) is necessary in addition to the TMSI. The TMSI allocation/reallocation process is shown in Figure 8 below. 7. ADVANCEMENT IN THE GSM TECHNOLOGY: 1. INTERNET MOBILE SERVICES: IMS has been an major discovery by the 3GPP LTE concepts being introduced in the GSM mobile phones as its architecture is constantly being developed and more number of mobile service providers are implementing it to deliver services such as MMS and INTERNET. Because of this rapid advancement in the IMS technology is soon going to replace the traditional technologies used few years. Applying an IMS technology to an wireless mobile network is not an complex procedure as it only requires the mobile operators to possess the IMS core, Application servers and customer service to take care of the needs of the users. The IMS can be modified upon the 2G and 3G mobiles as well because the mobile operators want to globalise this technology by migrating it from AMERICA to different places across the globe and making it fully commercial by 2008. Mobile networks have become an major trend in carrying out all the IP operations as this will enable a mobile device to have both Mobile and fixed broadb and services and hence increasing the efficiency of the services. 2. VOIP OVER CELLULAR NETWORKS: VOIP has been an major interest and an advancement in the mobile industry as it is currently being implemented in almost 85% of the mobile across the globe and hence it is an globally accepted standard for the GSM mobiles as it is going to match the standards of the IMS multimedia Telephony in the 3GPP technology and it will give rise to many services such as Internet and MMS servicesd on the handset. The growth of the VOIP has been a huge success because it is constantly trying to eliminate the concept of voice over the wi-fi and many operators are trying to develope the VOIP in an better way to decerase the operational costs and to launch few new services such as Push to Talk and intergrated mashups for the 3g mobiles. 3. GSM operation onboard aircraft: GSM technology allows the air passengers to use their mobile phones to talk during the flight and the passengers are permitted to have incoming and outgoing calls and send and receive the text messages via SMS by the means of GPRS technology and the mobile phones are fitted with network access which have an on board network to allow the passengers to call but will be charged with an roaming cost of making calls. The frequency what we are assigning here is in the 1800hz bandwidth and it is generally lower than 900 mhz to avoid the ground interference. ARCHITECTURE: The LTE 3GPP concept is been used in the GSM onboard system , since the connectivity of the mobile phones in the plane is normally through the GSM standards which is being developed by the 3GPP networks. 8. CONCLUSION: Hence the technical advancements in the GSM Technology is going to be more feasible because the GSM service onboard is perhaps the best mode of advancement in the GSM technology because it is capable of delivering swervices over the flight where it effectively manages the On board system on the plane and the aviation industry is really benifited by bthis move of Mobile technology which can benifit the aviation industry also. To ensure subscriber identity confidentiality, the Temporary Mobile Subscriber Identity (TMSI) is used. The TMSI is sent to the mobile station after the authentication and encryption procedures have taken place. The mobile station responds by confirming reception of the TMSI. The TMSI is valid in the location area in which it was issued. For communications outside the location area, the Location Area Identification (LAI) is necessary in addition to the TMSI. The TMSI allocation/reallocation process is shown in Figure 8 below.

Wednesday, November 13, 2019

Nation of Immigrants Essay -- Immigration

The American dream is an illusion of any person aspiring to be a part of a nation that calls itself â€Å"the home of the free†. Often imagery of America communicates ideas of freedom, equality, and success in life, from these we associate the American Dream. Immigrants are trying to escape from other nations where there are people dying in the streets and families that cannot make enough money to put food on the table. These people see America as the land of prosperity and opportunity; many come to this country for refuge. This view is shared throughout American history, when the Native Americans first arrived, to the settlers forming their colonies, to the Industrial Revolution, to the gold rush, and to this very day. Many people die to reach this land full of promise for a better life. However, the land of opportunity is not open for anyone, which is contradictory due to the nature of freedom and history of immigration in the United States of America. Immigration is the reason for the foundation of our country. The colonists first fled to America in search of freedom from religious oppression. As a consequence, white men wiped out large numbers of natives from the land through disease and battle. The debate over who has the absolute right to this land will never cease – natives or immigrants. Over many, many years the immigrants have controlled America. The original immigrants have founded a nation on this land and paved a way for opportunities for all other men except the natives who they drove out to the worst pieces of real-estate. After forming a nation, the immigrants have one thing to fear, history repeating itself. This uneasiness is seen as far long ago as Benjamin Franklin who worried that the growing population of German... ...al Encyclopedia of the Social Sciences. Ed. William A. Darity, Jr. 2nd ed. Vol. 3. Detroit: Macmillan Reference USA, 2008. 581-583. Gale Virtual Reference Library. Web. 27 Mar. 2012. Lochhead, Carolyn. A Legacy of the Unforeseen. 2006. Elements of Argument: A Text and Reader. By Annette T. Rottenberg and Donna Haisty. Winchell. Boston, MA: Bedford/St. Martins, 2009. 706-10. Print. Keen, Judy. "For Immigrants, Living the Dream Is Getting Tougher." USA Today 16 June 2009. Academic Search Premier. Web. 2 Apr. 2012. Mintz, Steven. "Food in America." Digital History. History Online, 2007. Web. 01 Apr. 2012. . Samuelson, Robert J. The Hard Truth of Immigration. 2005. Elements of Argument: A Text and Reader. By Annette T. Rottenberg and Donna Haisty. Winchell. Boston, MA: Bedford/St. Martins, 2009. 704-06. Print.

Muslim Womens Rights: Misunderstood Essay -- freedom, education, caree

â€Å"And they (women) have rights similar to those (of men) over them in a just manner†¦ (Surah Al Baqarah 2-228) Islam is a religion of peace, equality, and tolerance. It discusses the issues of life regarding to politics, academics, social, economics, and spirits. In addition, there are also rights and obligations for men and women to act according to Islamic teachings for their prosperity in this world as well as in the eternal life. With respect to women’s rights in Islam, non-Muslims interpret the Islamic teaching in an erroneous manner due partly to lack of understanding; however, it is also partly due to bad conduct of some Muslims in Muslim countries. Non-Muslim society thinks that women in Islam have no freedom. Men are dominant and women are submissive to her father, brother, husband or son. According to Islamic teachings, Muslim women possess freedom. They have the right to acquire education, choose a career, and select a life partner. The first example was set by Khadija. She was the lady who liked Muhammad (P.B.U.H) and asked him to marry. Muhammad (P.B.U.H) accepted her proposal and married her. Indeed, they also have the right take Khula (the right of Muslim woman to take divorce from her husband in Islam) under the worst circumstances. Moreover, there are no restrictions for women to work and hold leadership positions. In history, there are famous Muslim women scholars, philanthropists, and rulers. The first wife of Muhammad, Khadija is business women. Also, Ashifa Bint Abdullah was the first woman to be appointed by Caliph Umar Ibn Alkhatab as a market inspector and a manager. According to the Quran, men and women have the same spirit; there is no superiority in the spiritual sense betw... ...t create these false allegations. Muslim women have equal rights as men in certain conditions. Men have authority or take actions to protect women from dangers. Islam believes in equality, as a matter of fact, God has given men more strength. For instance, if a thief enters the house, will you say, â€Å"I believe in women’s rights- I believe in women’s rights†- Will you tell your mother, your sister, your daughter, your wife, to go and fight the robber? No, but naturally, you will fight them. So, in physical strength, man is one degree higher than the woman. On the contrary, the mother is three times preferred than the father as the mother is one degree higher. In conclusion, both Muslim men and Muslim women are equal. They are equal but not identical. They have equal rights and are able to work as long as they are in Islamic limits, rules and dress code.

Sunday, November 10, 2019

Fast Food Transforming American Society Essay

Fast food has grown to be a big part of American Society. According to Eric Schlosser, â€Å"Over the past few decades, fast food has infiltrated every nook and cranny of American Society† (3). In a sense, his statement about fast food is not too exaggerated. Today, we see fast food all over America, whether it is through television advertisements, billboards, and magazines. America has grown to be the number one fast food country in the world. The increase of fast food has resulted in good business for the fast food industry: â€Å"In 2000 Americans spent about $110 billion on fast food compared to $6 billion in 1970† (Schlosser). Why are Americans spending huge amounts of money on fast food? How has the fast food industry grown to become a huge influence on American society? Seyhan Sipahi states, â€Å"Recent global economical crisis†¦had a crippling effect on almost all financial sectors in many countries. Surprisingly, the fast food industry had not be adversely affected†¦Ã¢â‚¬  What is keeping the fast food industry alive? Could it be that more families are turning to fast food because recent economic crisis? The fast food industry has grown to be more efficient than when it first started. Making food selling more convenient, fast and for a cheap price has attracted customers. There are multiple ways the fast food industry has transformed American society and what it is to live in America. In this generation, more mothers are in the workforce than there were in the past. Since â€Å"Women’s labor force participation is significantly higher today than it was in the 1970s, particularly among women with children† (Labor Force Participation of Women and Mothers, 2008, The Editor’s Desk) ever since then the rate has been going up. Now that both parents are away from home working it makes it harder for them to make home cooked meals. Due to the lack of home cooked meals, many Americans families have turned to fast food. According to Schlosser, â€Å"three generations ago more money was being spent on food in the United States to make meals at home† (3). Fast food has taken over the diet of many American families. It is more convenient to buy something that is near by, prepared fast, and is reasonably priced for its proportion. Another reason why people choose fast food is because frankly it is delicious. Nothing that is made at home can compare to something made at a fast food restaurant. It is hard to get sick of fast food because there are so many restaurants to choose from that each have their own tastes in foods. The largest class in America is the middle class. Since middle class makes up the majority of the American population it is reasonable to say these families with lower income tend to buy fast food more often. Fast food restaurants have grown to be more efficient in the way that they produce their meals. On â€Å"Dec. 12, 1948, when Richard and Maurice transformed their barbecue joint into the first McDonalds restaurant, focusing on speed, value and high volume. † (Hill). This helped build a kind of assembly line of workers, each worker in charge of one job. For example, in order to make a hamburger, one would be in charge of getting the buns, another in charge of putting the patty, another in charge of putting the lettuce and tomato, and on. In doing this, production of the food becomes much faster. Food being frozen before preparing it is another way that fast food restaurants have grown more efficiently. Schlosser gives an example with guacamole that is made in Mexico, frozen, and shipped to the restaurant (40). Many fast food restaurants do this with the products they serve, although their advertisements may say fresh. Drive-throughs and computerized cash registers have also helped fast food restaurants speed up time for their consumers. An example of how drive throughs are so successful is Victoria’s experience: There’s just one place that Victoria Vollaire stops every day. It’s not the supermarket. It’s not the ATM. It’s the drive-thru. This costs her $400 a month right out the drive-thru window. â€Å"I don’t like getting out of the car,† explains Vollaire, who lives in Ontario, Calif. , and works as a hotel guest service aide. More than half the money spent on fast food rolls in through the drive-thru lane. (Horovitz) Drive-throughs give restaurants the ability to take multiple orders and give convenience for customers that are in a hurry. People like the conscience of not even having to get out of there cars to get their food. Computerized cash registers with buttons for every order possible help to make orders quick and precise. These days it is not surprising to see a fast food restaurant almost at every corner in America. A study was made on how fast food restaurants cluster around schools in America. Steven Gortmaker, in charge of this study, states, â€Å"78% of schools had at least one fast food restaurant within 800 meters. Fast food restaurants tend to cluster near schools and offices because it is more convenient, with the idea to gain more business. Many fast food restaurants are close to places where children and adolescent are close by. They do this because these two age groups are the most targeted by the fast food industry (Fast Food Targeted Marketing). Another study, on a high school that sold fast food products concludes that fast food is 70% of all food sold at the school (Calderon. ) As the expansion of fast food companies continues to increase, more restaurants are seen closer together. Before, companies use to stay away from competition, but now they are clustered all over the place. It seems as though fast food restaurant expansion has forced them to cluster even to the extent of having fast food shopping centers. Fast food has greatly transformed popular culture in America. By looking at McDonalds as an example, McDonalds has far surpassed any other fast food chain in America and possibly the world. McDonalds has grown very close to many children: â€Å"A survey for American schoolchildren found that 96 percent could identify Ronald McDonald† (Schlosser). What makes fast food so popular in America? Many people appraise fast food industries for their products because they are delicious and affordable. Did affordability of fast food make it so popular? Fast food transforms popular culture in America mainly through advertising. Whether it is on television, sponsoring professional athletes, or even promoting events like the Olympics or the World Cup. It is said that â€Å"In 2009, teens saw 5 fast food ads each day† (Fast Food Targeted Marketing). The majority of the commercial on TV are based on fast food companies. Fast food has become a trend in American society, eating it is in the norms of society today. Fast food advertisement has a monkey, see monkey do effect on people. If people see famous celebrities on TV eating or promoting the fast food company, it encourages them to go. The constant selling of fast food causes higher demands in agricultural resources. According to Schlosser, â€Å"The fast food chains now stand atop a huge food-industrial complex, taking control of American Agriculture† (59). It is getting harder for farmers outside of this â€Å"food industrial complex† to find business. Many times farmers and cattle ranchers become hired hands for the agribusiness giants† (Schlosser). Although the giant agriculture business may seem powerful, it is still on the bottom of the fast food companies because they are what make their business. â€Å"The fast-food industry changed the nation’s retail economy, eliminating small businesses, encouraging the spread of chains and uniformity, fast food has transformed American agriculture† (Schlosser). Apart from agriculture fast food, companies have also influenced how cattle should be raised, killed, and made into ground beef. The influence of the fast food companies on slaughterhouses has made the work environment a dangerous place. These slaughterhouses sound dangerous for the workers as well as for those consuming the meat. Meatpacking as grown to be one of the most dangerous jobs in America (Gardner). There is a lot of equipment that is dangerous and can cause severe injuries to workers. According to Gardner, â€Å"at least 29. 3% of meat workers suffered injury or illness compared to 9. 7% for the rest of manufacturing†¦Ã¢â‚¬  (Working Conditions in American Slaughterhouses: Worse than You Thought). Carl Karcher started his fast food business by buying one hot dog cart and then from there he bought another three hot dog carts in Los Angeles. Not too much time past before Karcher had some competition. Recently moved from New Hampshire, the McDonald brothers came to California to find jobs. They opened up a hamburger shop and became famous for their delicious hamburgers. The brothers strived in coming up with new ways to make more money until finally one day they closed down their shop. A few months later the McDonald brothers reopened their shop, with a bigger grill, and a whole new process to make hamburgers. They would divide the food preparations into tasks. This is what started the whole assembly line style to preparing fast food and has been implemented by many fast food restaurants ever since. Two groups that fast food companies look to for hiring are teenagers and illegal immigrants. Having these two types of groups as a workforce allows fast food companies to spend less money on hired hands and more on advertising and expanding (Schlosser. ) Having workers that are not looking for a long-term job lets fast food companies have fewer benefits for their workers. The wages for fast food employees is far too little in ratio to the work that is expected. Fast food companies hire teenagers because they can survive with low pay and most are dependent on their parents. The statistics from the ages, 16-20, alone makes up 25% of the fast food workforce (Food Services and Drinking Places). Immigrants, on the other hand, cannot complain if they get paid so little because they are illegal and will work under most circumstances. The expansion of fast food companies has created many jobs over the years. Out of all food services and drinking places, fast food companies make up 47% (Food Services and Drinking Places). In the past few decades, food-related illness has increased (Schlosser). The way food is processed has affected its quality. Many of the livestock used to produce that typical hamburger patty are mistreated. The most common sickness that the livestock catch is E Coli. In December 2006 â€Å"71 people became sick with E. coli after eating at Taco Bell restaurants in New Jersey, New York, Pennsylvania, and Delaware† (O’Shea). It is hard to know for sure what is in fast food because most of the time this side of the story is covered up. Aside from meats getting pathogens, artificial flavoring is another key aspect of many fast food products. Many fast food companies injected their products with artificial flavoring. McDonalds for example â€Å"infuses its fries and chicken sandwiches with essences that mimic beef tallow† (Tamminen). Does the food taste that bad that places like McDonalds has turn to artificial flavoring? Can the chemicals being put in fast food be harmful to humans? Although there maybe some companies using artificial flavors, there many other companies that live up to natural flavors. What is the future of fast food industry in America? Will the fast food industry just keep growing until one day it not only becomes a big part of American life but also other places around the world? Fast food companies are expanding at an increasing rate causing high demands for more food. At this rate, could it be possible that someday the fast food industry will control all of the food distribution in America? They practically do already because they are the greatest contributors in meats, corn, potatoes and more. What will be the future for fast food in America? At its grown rate, the fast food industry seems to be taking over many Americans highways. Having many fast food chains by highways makes it all most impossible to not run into a fast food restaurant. Will the constant expansion of fast food restaurants bring down the big grocery stores and replace them? America has grown accustom to convenience when it comes to food. What do other countries think when they see America? Should America be proud because it is the number one fast food country in the world? It is hard to say where fast food will take America in the future, but one thing is certain: fast food and America can never be separated.