Wednesday, October 30, 2019

1) What kind of political animal are you - Centrists 2) Federalist No Essay

1) What kind of political animal are you - Centrists 2) Federalist No. 10 and Federalist No. 51 - Essay Example Explaining the definition of the Centrist is necessary in order to discuss the type of political animal that best fits my political profile. Republicans, of course, are represented by the elephant while Democrats by the iconic donkey. As a moderate, the Centrist is more temperate, with values ranging in the middle of both sides of the most radical political values. If politics could be best compared to geography, the temperate Centrist might be represented by the kitten, an animal with the ability to bear its claws and scratch while also purring with a docile demeanor that is more submissive than aggressive. In Federalist 10, written during the birth period of the nation, the idea of establishing factions or allowing faction-style leadership to gain control is mentioned as a problem for society and for the political system and future growth of the country. The wiles of men, or their desire to build faction-style leadership without checks and balances, create the necessity to have multiple representatives in power to avoid faction-like control from maniacal groups or those who seek to build a country model based on tyrannical leadership or dictatorship. The remedy is acceptance of the Republic constitution with a moderated leadership fully representatives of multiple social views and political ambitions. This warns, basically, of the dangers of factions and creating a political system that could be overwhelmed by social and political angst over ideologies. Federalist 51 basically states the same thing, only more detailed regarding the problems posed when there are no checks and balances systems in government. To avoid these problems, creation of different political divisions, with different controls, avoids tyrannical leadership or faction leadership from corrupting the political machine. Further, the development of individual state powers, over that of the federal system, is a solution provided to ensure that

Monday, October 28, 2019

Adapting the Law to the Online Environment Essay Example for Free

Adapting the Law to the Online Environment Essay Formulating unique conception of the Web in â€Å"Weaving the Web† Berners-Lee emphasized that the intention was to create a system with â€Å"one fundamental property: it had to be completely decentralized.† In the vision of Berners-Lee: â€Å"That would be the only way a new person   somewhere could start to use it [the Web] without asking for access from anyone else†[1]. In the initial years of the Web’s functioning, Berner-Lee’s ideal of a highly decentralized universal system has been shared by tens of millions of people around the world who have appreciated and marveled at an invention that makes it unexpectedly easy for anyone with a computer to connect with anyone else with a computer, anywhere in the world, and to store and send information almost at will. But the Internet and the Web have also moved to the center of attention for governments, business leaders, lawyers and judges, police forces and military establishments, and anyone else dependent on the rule of law and authority structures in modern society. This is a result of the ability and tendency of Internet users to simply skirt or leap over many of the rules and institutions designed to maintain order in the pre- Internet world. Previously designed rules and legal structures enacted for slower-paced, relatively public tangible transactions in a world rimmed everywhere with borders (local, provincial, national) suddenly were challenged as never before when the Internet made it physically conceivable to carry out transactions of almost any kind in a manner simultaneously immediate, anonymous, inexpensive, and seemingly borderless. However, the process of certain democratization, overcriminalization and simply lazier-affair went beyond predictable limits – internet identity theft, credit card fraud, controversies with gambling and online porn reveal significant need to adapt the law to online environment, to analyze the specifics of cyber crimes and to create effective regulatory norms. Traditional Crime and Cyber Crime: Defining Boundaries From the primary perspective, the Internet imitates and, in most cases, runs parallel to what is often happening in normal life, therefore, it is no wonder that the law had to take account of this new parallel of real life. Hence the frequent appeals for â€Å"cyberlaw† or â€Å"cyberspace law.† Simultaneously, the imitation of life by the Internet does not completely transcend existing forms of activities in their entirety. Thus while electronic forms of information are the hallmark of the Internet and tend to undermine tangible media, or even render them obsolete, prior forms of information may coexist alongside them, albeit uneasily and suffering permanent corrosion. In so far as it is not possible to divine the extent to which the Net will generate parallel or independent forms of activity, the development of the appropriate law cannot be predictable. One has to determine in each specific sphere of activity how far the parallels go and how big or small the change over the normal may have been before working out the legal response. Consequently, the lack of time or resources cannot be the main reasons for the non-development of Internet law, as Edwards and Waelde suggest[2], although they recognize, somewhat indirectly that the Internet is still developing and so must the Internet law. Edwards and Waelde view â€Å"Internet Law† as being a result of (the usual) adaptation process that the law undergoes to catch up with new technological phenomena. They regard Internet Law as a necessity, contrary to the â€Å"core pragmatic† perception of those they refer to as looking upon the Internet as law-free.[3] And although the regulation of Internet content, transactions and activities seems to be logical and self-evident, the problems start appearing from the very definition of cyber crime. Black’s Law Dictionary defines a â€Å"crime† as a â€Å"social harm that the law makes punishable; the breach of a legal duty treated as the subject-matter of a criminal proceeding.†[4] Anglo-American crim ­inal law has for centuries possessed a set of definitions of â€Å"crimes† that encompass the varied categories of social harms humans can inflict on one another, for instance homicide, rape, robbery, arson, vandalism, fraud, child abuse, etc. According to Susan Brenner, crimi ­nal law does not typically differentiate offenses based upon the instrumentalities that are used in their com ­mission; we generally do not, for example, divide homi ­cide into â€Å"murder by gun,† â€Å"murder by poison,† â€Å"mur ­der by strangulation† and so on.[5] As Brenner points out, criminal law does treat the use of certain instrumentalities as â€Å"aggravat ­ing factors,† the use of which can result in an enhanced sentence upon conviction; this is how criminal law gen ­erally deals with using a firearm or other dangerous in ­strumentality in the commission of a crime.[6] This approach could, perhaps, have been taken with regard to cyber crime; we could simply define hacking as a type of trespass, analogous to real-world trespass. The â€Å"crime† of real-world trespass is gaining access to a physical space a building or a parcel of land without authorization. We could have pursued hacking in an analogous fashion, perhaps prosecuting it as tres ­pass and then characterizing the use of computer tech ­nology as an aggravating factor.[7] However, that is not the approach the law has taken and is tak ­ing to the use of computer technology to inflict social harms. What is emerging is a division between tradi ­tional crimes (trespass, burglary, theft, stalking, etc.) and cyber crimes. The latter encompass the use of com ­puter technology to commit either (a) social harms that have already been identified and outlawed generically (trespass, burglary, theft, stalking, etc.) or (b) new types of social harm that do not fall into traditional â€Å"crime† categories. It is necessary to adopt cyber crime-specific laws for the first category of conduct because, as Brennan’s hacking-trespass example illustrates, computer tech ­nology can be used to commit social harms in ways that do not fit comfortably into our existing offense categories. Another Brennan’s example of a denial of service attack[8] simply eludes conventional crimi ­nal law: it is not theft; it is not extortion; it is not black ­mail; it is not vandalism or trespassing or any other â€Å"crime† that has so far been defined. We must, therefore, define new â€Å"cyber crimes† to encompass denial of service attacks and other â€Å"new† varieties of criminal activity. In conceptualizing the varieties of cyber crime, it is helpful to divide them into three categories offered by Marc Goodman: crimes in which the computer is the target of the criminal ac ­tivity, crimes in which the computer is a tool used to commit the crime, and crimes in which the use of the computer is an incidental aspect of the commission of the crime.[9] When a computer is the target of criminal activity, the perpetrator attacks an innocent user’s computer or computer system either by gaining unlawful access to it or by bombarding it from outside. Cybercrimes that fall into this category include simple hacking (gaining access to a computer system or part of a computer system without autho ­rization) and aggravated hacking (gaining access to a computer system or part of a computer system without authorization for the purpose of committing a crime such as copying or altering information in the system). The target cybercrimes also include denial of service attacks and the dissemination of viruses, worms and other types of malware. The cyber crimes in this cate ­gory tend to be â€Å"new† crimes and therefore generally require new legislation. A computer or computer system can also be the in ­strument that is used to commit what is essentially a traditional crime. Cybercrimes in which a computer is the tool used to carry out criminal activity include online fraud, theft, embezzlement, stalking and harass ­ment, forgery, obstruction of justice and the creation or dissemination of child pornography. These are conven ­tional crimes, but it may be difficult to prosecute online versions of these crimes using existing substantive law; a jurisdiction’s theft statute may not, for example, en ­compass a â€Å"theft† of intangible property when the theft consists of copying the property, instead of appropri ­ating it entirely. In State v. Schwartz, Oregon State of Appeal held that â€Å"†¦by copying the passwords, defendant stripped them of their value.†[10] Jurisdictions may therefore find it necessary to amend their existing substantive criminal law to ensure that it can be used against these cy ber crime variants of tradi ­tional crimes. The last category consists of cyber crimes in which the use of a computer or computer system is incidental to the commission of the crime. This category includes, for example, instances in which a murderer uses a com ­puter to plan a murder or lure the victim to the murder scene; it can also include a blackmailer’s using a com ­puter to write extortion letters to his victim or a drug dealer’s using a computer to monitor his sales, inventory and profits. Here, the computer is merely a source of evidence and new substantive criminal legislation is generally not needed. The cases in this category can, however, require new law to resolve procedural issues such as the processes used in gathering evidence of cyber crimes. The basic federal cyber crime provision is 18 U.S. Code  § 1030; among other things, it criminalizes hacking, cracking, computer fraud and the dissemination of viruses, worms and other types of malware. The statute accomplishes this by directing its prohi ­bitions at conduct that targets a â€Å"protected computer† and then defining â€Å"protected computer† as a computer encompassed by federal jurisdiction.[11] Section 1030 defined a â€Å"protected computer† as either (a) a computer used exclusively by a financial institution or the federal government or used nonexclusively by a financial institution or the federal govern ­ment if the conduct constituting the crime affects its use by the financial institution or federal government; or (b) a computer used in interstate or foreign commerce or communication.[12] The notion of basing the statute’s prohibitions on conduct directed at a â€Å"protected computer† was introduced when  § 1030 was a mended in 1996; until then, it criminalized con ­duct that was directed at â€Å"federal interest computers,† i.e., computers used by the federal government or lo ­cated in more than one state.[13] The 1996 amendment broadened  § 1030’s reach; it now encompasses conduct directed at any computer con ­nected to the Internet. In 2001, the Patriot Act amended  § 1030 to make it clear that the statute can be used to prosecute criminal conduct which occurred outside the United States, a position the Department of Justice had long taken, for instance in case United States v. Ivanov. The Patriot Act expanded the definition of a protected computer to include com ­puters used in interstate or foreign commerce that are located outside the United States if they are â€Å"used in a manner that affects interstate or foreign commerce or communication of the United States.†[14] Problematic Aspects: Copyright, Child Pornography, Identity Fraud in Internet In order to address the problems in regulation of online environment more effectively, this paper aims to focus on several most problematic aspects of the issue – copyright violations, child pornography and identity theft or credit card fraud. Defined by Culberg, copyright is â€Å"a legal device giving the author (or holder of the copy ­right) the exclusive right to control the reproduction of his or her intellectual creation† for a specific period of time.[15] Copyright law in the United States derives from the U.S. Constitution and is therefore exclusively federal; states do not have the authority to legislate in this area.[16] Defenses to a charge of criminal copyright infringe ­ment are, first, that the offense cannot be prosecuted be ­cause the five year statute of limitations has run.[17] Other defenses are the â€Å"first sale† doctrine and an argument that the defendant did not act â€Å"will ­fully.† The first sale doctrine lets one who purchased a copyrighted work freely distribute the copy she bought.[18] Under the doctrine, however, the purchaser can only distribute the copy she bought; she cannot copy the purchased item and distribute the copies.[19] Since most computer software is distributed through licensing agreements, the first sale doctrine typically does not apply when someone is charged with software piracy.[20] With regard to the claim that a defendant did not act â€Å"willfully,† there is some ambiguity as what is required to show â€Å"willfulness.† Courts disagree as to whether it requires an â€Å"intent to copy or intent to infringe.†[21] The newest weapon in the federal arsenal of copy ­right statutes is the Digital Millennium Copyright Act, which added two sections to title 17 of the U.S. Code. Section 1201 makes it unlawful to circumvent measures used to protect copyrighted works, while  § 1202 makes it unlawful to tamper with copyright management in ­formation. Another new section, 17 U.S. Code  § 1204, creates criminal penalties for violating either sections 1201 or 1202 of the DMCA. The first criminal prosecu ­tion under the DMCA was filed in 2001 against Dmitry Sklyarov, a Russian citizen, and his employer, Elcom ­soft, Ltd.[22] They were charged with violating 17 U.S. Code  § 1201(b) (l) (A), by trafficking in technology designed to circumvent the rights of a copyright owner, and with violating 17 U.S. Code  § 1201(b) (l) (C), by trafficking in technol ­ogy marketed for use in circumventing technology that protects the rights of a copyright owner. Another area that is a high priority in federal com ­puter crime prosecutions is child pornography. To un ­derstand the current state of the law outlawing child pornography, it is necessary to understand the First Amendment, which states, in part, that Congress is to make â€Å"no law abridging the freedom of speech.† The U.S. Supreme Court has interpreted this part of the First Amendment as prohibiting the criminalization of any but a very few limited categories of speech: â€Å"[T]he First Amendment bars the government from dictating what we see or read or speak or hear. The freedom of speech has its limits; it does not embrace certain cat ­egories of speech, including defamation, incitement, obscenity, and pornography produced with real chil ­dren.†[23] From the critical as well statistical perspective, child pornography appears a relatively recent addi ­tion to the list. However, the rise of com ­puter technology raised concerns about â€Å"virtual† child pornography, i.e., pornography created using morphed or other artificial images of children, and in 1996 Congress adopted the Child Pornography Prevention Act, codified as 18 U.S. Code  § 2251. This Act extended the prohibitions on manufacturing, possess ­ing and distributing child pornography to encompass pornography that featured not only â€Å"real† children but what â€Å"appeared† to be a real child.[24] In 2001, a coalition of free speech advocates challenged these provisions of the federal child pornography statutes; they argued that because no â€Å"real† children are harmed in the creation of â€Å"virtual† child pornography, it does not fall under a category of speech that cannot constitutionally be criminalized.[25] When the case was before the Supreme Court, the Department of Justice argued that virtual child pornography can be criminalized because (a) pedophiles use it to seduce children into sexual acts and (b) it stimulates pedophiles into molesting chil ­dren.[26] The Supreme Court rejected these arguments and held that the prohibition of virtual child pornogra ­phy violated the First Amendment, so the statutory provisions at issue were unconstitutional and unenforce ­able.

Saturday, October 26, 2019

Cultural Competence Essay -- essays research papers

The American Academy of Family Physicians website defines cultural competence as: â€Å"A set of congruent behaviors, attitudes and policies that come together as a system, agency or among professionals and enable that system, agency or those professionals to work effectively in cross-cultural situations. The word "culture" is used because it implies the integrated pattern of human thoughts, communications, actions, customs, beliefs, values and institutions of a racial, ethnic, religious or social group. The word competence is used because it implies having a capacity to function effectively.† Campinha-Bacote constructed a model that depicts cultural competence into five different areas: cultural awareness, cultural knowledge, cultural skill, cultural encounter, and cultural desire. When working as a healthcare professional, one needs to strive for cultural competence by mastering each of these areas. To begin my journey on mastering each area of cultural competence, I need to first assess my placement in each of the five categories. A very important area is cultural awareness. This involves conducting self-examination of any biases that I may have towards a certain culture. I am guilty of having such biases. While I do not have many biases, it is important that I work through each one and realize that biases are not facts. I am a Caucasian female who grew up in the suburbs of Detroit. I attended a private school from kindergarten until my sophomore year of college. My school was not very diverse. Once I started working, I was able to meet a few more people of different cultures. All of my professions have been in the suburbs, and the majority of people have been Caucasian. Eastern Michigan University is very diverse. I am glad that I am finally able to experience such an environment. Cultural knowledge is when a health care professional seeks information regarding different cultures and ethnic groups. They look at the differences that one culture/ethnic group may have regarding treatment of an illness, health conditions, and biological variations. I have yet to do any personal research in this area. I have learned about some of these differences in a few of the nursing classes this past year and a half. I know that this is a detrimental area of nursing, especially since our country is becom... ...nts who have been of a different culture and I am willing to care for many more. By reviewing my position in each of the areas in the model, I realize that I do not yet fit into the expectations. I believe that I am on my way to achieving cultural competence. I still need to work on cultural awareness. I need to conduct a further self-examination to be sure I understand each of my biases. I need to start researching to improve my cultural knowledge. My cultural skill needs to improve in the aspect of becoming more comfortable in conducting a cultural assessment. I engage in conversations, and in friendships with people of other culture (cultural encounter) and enjoy becoming culturally aware and knowledgeable (cultural desire). This guide is very appropriate for the nursing field. I believe that I am culturally competent enough to work in a health care profession. I will continue to improve in each category. Everyday is a new day. I will be exposed to people of many backgrounds. I need to be ready and willing to adapt so that each person will feel equally comfortable and will receive equivalent healthcare. http://www.aafp.org/fpm/20001000/58cult.html#2 October 6, 2004

Thursday, October 24, 2019

Prewriting Strategies Essay

1. In academic writing, assignments may require students to present the results of their research without including their personal opinion. By avoiding first- and second- person pronouns, and writing in the third person will help one doing so. The use of first- and second- person also gives the writing an informal feel. When writing academically, the writer should always be formal. 2. www.jackiekcooper.com/MovieReviews/Limitless.html a.In this movie, Jackie Cooper has the starring role and holds his own even in scenes with the legendary star Robert De Niro. In this sentence the adjective legendary describes Robert De Niro. b.In the film Cooper plays Eddie Morra, a down-on-his-luck aspiring writer. The adjective describes the writer as being aspiring. c.His girlfriend Lindy is fed up with his shiftless ways and breaks up with him. The adjective describes his ways as shiftless. d.When he takes the pill, his life becomes much clearer. The adjective describes life as clearer. e.It is not a great role and De Niro is only adequate in it. The adverb describes how De Niro acted in the role. f.It is not a great role and De Niro is only adequate in it. The adjective describes the role as not great. g.In â€Å"Limitless† the story centers totally on his character and he rises to the occasion to give the role his all. The adverb describes how the story centers on hi s character. h.Eddie may be riding high for a while but there is always that possibility of him falling down or being brought down. The adverb describes how Eddie is riding. Overall, the critic used the adjectives and adverbs in a very descriptive and effective way. 3. This class has already taught us that although we may have the imagination to write, we have much more to learn about proper academic writing mechanics. The most important lesson we have learned is to proofread carefully. When we first started our studies at the University of Phoenix, we were not aware of the significant difference between academic writing and casual writing. The difference between academic writing and casual writing is becoming clearer to us. The difference between the two is clearest when we receive instructor feedback. We will continue to pay closer attention to details in our writing. This is the way that we will change our focus in the future and also the way we will come closest to achieving our goals. 4. There are three key parts of a paragraph; the topic sentence or introductions, the body of the paragraph or supporting information, and the conclusion that summarizes the content of the paragraph. 5. It is important that the topic sentence and supporting points within that paragraph be directly related or else the writer’s message will be lost, and the reader will be confused. The writing will not flow smoothly, and the reader will be forced to work at trying to figure out exactly what they are reading. Unless the topic sentence and supporting paragraphs do not connect or relate, the reader will be left confused. In the end, the reader may dismiss the frustrating writing altogether. 6. An evaluation is the writer’s informed judgment about a reading. The author did a great job summarizing and tying in what they have learned from the reading. The author was able to relate to the topic by adding an experience he or she conducted to the material. One thing the author could have done better was to point out why he or she thought it was a good overview.

Wednesday, October 23, 2019

End of Life Ethical Issues Essay

In this workshop activity, you are required to investigate and report on ONE ethical principle as it is demonstrated in a case study situation, then review and assess the reports prepared by your fellow students.Read the case studies below and decide which ethical principles are involved in each situation: (a) describe the principle  Principle of Respect for Autonomy The Webster dictionary (2002) defines Autonomy as â€Å"personal rule of the self that is free from both controlling interferences by others and from personal limitations that prevent meaningful choice.† And in keeping with this definition we, as registered nurses, must respect the right for individuals to act intentionally, with understanding, and without controlling influences to their free will. (b) explain how it applies in the case study situation  The difficulties, and moral dilemma’s, that are encountered in making â€Å"end of life† verves â€Å"quality of life† decisions involved in situations like Edward Biltons should always be related to the principal of respect for autonomy, when the patient has competently made their own choices. The ICU nursing staff and Mr Bilton’s parents need to accept and acknowledge that Edward has made his own choices based on his own values and belief systems. As health care professionals that will experience similar situations to this, it is important to not have own morals and beliefs influence our patients’ decisions about their care. In the health care environment, an individuals’ autonomy is applied through obtaining informed consent. It could be argued that he has not formally withdrawn consent for treatment as he is unable to communicate at this stage, but his living will sets out that in the event of an accident he does not wish to be artificially kept alive should he be fully dependent and disabled . Clearly this dependence and disability is evident in the fact that despite he should regain consciousness, he will be severely neurologically impaired. (c) offer your perspective on or resolution of the dilemma. You need to rationalise your perspective using the ethical principles and practices you have researched  With this scenario, other people must afford Edward the respect he deserves, give him the means to exercise his will, and not contradict his previously made decisions pertaining to his autonomy. The principle of respect for autonomy indicates that individuals’ should be allowed to freely make their own decisions in relation to the health care they receive. We grant this freedom of autonomy to our patients when they can give their consent to, or refusal from, treatment whilst in our health care facility and this same respect for their autonomy should be afforded in situations like Edward Biltons. In this situation Edward Bilton has previously and in sound mind made a decision of his future in certain circumstances.