Thursday, October 31, 2019

Building block assignment Example | Topics and Well Written Essays - 250 words

Building block - Assignment Example A weakness of Starbucks Cafà © is that its product is a luxury item that performs poorly during bad economic times. Another weakness of Starbucks Cafà © is high raw material costs. Starbuck Cafà © uses only fair trade coffee at its stores which is more than twice as expensive as regular coffee. Starbucks Cafà © is a company that has expanded its operations oversees. The company has further opportunities for expansion into foreign markets. The firm must expand internationally because the U.S market has become saturated. Another opportunity for Starbucks Cafà © is the potential to grow its sales in the retail marketplace by selling unprepared pounds of Starbucks coffee at supermarkets and other establishments. A threat that Starbucks Cafà © must be aware of is substitute products. In terms of competition in the coffee marketplace a major threat to the company is the continued expansion of McCafà ©. McDonald’s has over 34,000 establishments worldwide and its McCafà © operation sells quality coffee at lower prices than Starbucks

Tuesday, October 29, 2019

Date Rape Essay Example | Topics and Well Written Essays - 1000 words

Date Rape - Essay Example This will bring the researchers one large step closer to determining which factors are correlated with the occurrence of date rape incidents. This is an important aim for the researchers to focus on, as it will help them keep the acquisition of information limited to valid and relevant data. Another aim of the research should be to ensure that the data collected is of high validity as well as responsibility, as these two characteristics are major determinants of how valuable the collected data is to the research. The methodology can ensure this through the careful selection of sources, highly skilled researchers and the use of comparison groups, the latter of which is essential when determining correlations (Kumar, 2005). These tactics will be explained in further detail in the latter part of this paper. Finally, the researchers will aim to conduct the research within the time and resources allotted, since this is a proven challenge concerning primary research. Resources Needed The r esearch will require time, financial funding, and a team of experienced researchers. As time is a large constraint when it comes to primary research, the researchers will have a total of three months to conduct their research. If the research goes as planned, this will be an ample amount of time for the researchers to collect and assemble the data, so that the researchers can embark on the following stages of the research, such as statistical analysis of the data as well as the textual analysis of the gathered facts. The researchers will also have to adhere to the financial plan that the researcher will choose once the funding is secured. Finally, the research team should consist of four to five experienced and skilled researchers, who will be conducting the surveys, interviews as well as any other forms of research necessary. According to the plan for research, this number of researchers will be sufficient for completing the research within the allotted time. Sample In order to gat her sufficient and reliable evidence, the researcher will need to use a broad sample. The sample in this case will be the north side of the city of Houston (you may change it). Within this sample, the main sources of information will be police stations, hospital records, prison records and, if possible, members of support groups for rape victims, all of which are available in comparatively higher quality documentation as opposed to other areas of the Texas. The research will focus on rape cases reported within the previous year, whereas the victims interviewed will be those relevant to cases within the last two years. This is because, one year’s records of reported cases will be accessible the researchers without much difficulty, and will thus be enough. However, the researcher anticipates that finding rape victims who are willing to be give interviews will prove to be a very difficult task, not just because of the highly traumatic nature of the crime, but also the cultural f actors relevant in this situation. People do not openly discuss the sensitive topic of rape, where the victims are more likely to hide away instead of actively confronting the happening of such an incident. Thus, victims will be hesitant to be give interviews about their incidents, which will result in a very small number of interviews from this source of research. Thus, it would be more practical to take into account, the victims of more than one year. This sample size will roughly draw around a hundred cases, which is the minimum number expected from one year’s data. The sources of surveys and checking criminal records will be for extracting enough data to run statistical analy

Sunday, October 27, 2019

The Basic Concepts Behind Data Bases Information Technology Essay

The Basic Concepts Behind Data Bases Information Technology Essay Databases are collection of raw fact and figures or in single word we can say data in digital form, databases are classified on the basis of their content like text document, bibliographic and statistical etc. Databases are managed by software called DBMS (Database Management System), DBMS are responsible of storing, retrieving, accessing, security, backup and querying the data as fast as possible and in most efficient way. One of the most trusted DBMS in market is ORACLE DBMS. ORACLE is the most trusted in market and almost each and every organization uses it. One of the best security features of ORACLE is Secure Database Access.SDA is based on three things which are Under USER MANAGEMENT comes how much space has to be provided to each user, what level of access has to be provided to users, the space and rights of one user does not interfere with other. Under PASSWORD MANAGEMENT come the default passwords of users, defining the password complexity, deciding the password expiry time limit, password lock facility etc. Under RESOURCE LIMTS comes deciding CPU time, logical reads, concurrent session per user, idle time, amount of private SGA for shared sessions. The above mentioned security features comes with any enterprise level operating system for example SUN SOLARIS a UNIX flavored OS has all this security features where there is separate file system for all users, each and every file system and file has access permission defined for the root, the user and others, passwords for each user is there and they are stored in encrypted form and for each and every user the resources are defined. Briefly describe the purpose of firewalls and how they work, including a comparison of at least three principal types. Firewalls are a type of hardware or software which is used to protect the system or network. Firewall acts as fences around the system or network which do not allow anybody who wants unauthorized access or after access tries to do some sort of damage. To protect ones data and network Firewalls employ a number of technologies, of which the first one is simple set of rules means all the ports should be closed initially and as one goes with applications there must be ports defined for them and only those ports are opened for those applications to use, open ports are like holes which any hacker can use to access your system. There are 2 physical types of firewalls software and hardware, software firewalls are mostly used in home environment like the one provided by Nortel and McAfee, they are responsible for protecting you home pc against any sort of external attack. Hardware firewalls are commonly used in business environment, they are dedicated units which have the external world plugged in outside and the trusted network from inside and they are often available as a pair so that failure of one unit does not make the network open for attack. Both type of firewalls use a number of different techniques to keep your system and network safe, the first thing described is a rules based or packet filter system, here all data in and out is scanned to see that is in and out to trusted ports on the system and possibly even trusted IP addresses. Proxy server, this is in between the outside world internet and the trusted inside world network it scans all packets of data and make sure if they meet the packet filter rules before passing data to the machine in the trusted network. This adds a layer of security by never allowing the internet system come in direct contact with the trusted machine, network address translation do not make your internal IP address visible to the internet. A proxy server is great against brute force attacks. What are the differences between public key encryption methods and symmetric key encryption methods? Please provide one example of each category. The cryptographic technique based on two keys a public key available to all and a private/secret key known only to the person intended to have it. An important part to the public key encryption is that the keys are related in such a manner that only the public key can be used in encryption of the messages and only the corresponding private key can be utilized in decryption of messages. By no chance one can get private using the public key. Public-key encryption like Pretty Good Privacy (PGP), are growing in popularity for transferring information through internet. They are highly secure and comparatively simple to use. The one difficulty with public-key encryption is that one need to be aware of the recipients public key so that he/she can encrypt a message. What is required therefore is a global registration of public keys Symmetric key encryption for both encryption and decryption uses a same secret key. Exchange of message requires exchange of keys also among users. Message encrypted with secret key can only be decrypted with same secret key Secret-key algorithm is used in symmetric key encryption. Symmetric key encryption techniques are also called content-encryption algorithms. The big limitation of secret-key algorithm is the requirement for sharing the secret-key. This can be overcome by deriving the same secret key at both ends by using a user supplied text string or we can say password based on password-based encryption algorithm, other way round is to securely exchange the secret-key among themselves. Size of the key defines the strength of the symmetric key encryption used. Consider the following cipher text: EHWWHU EH GHVSLVHG IRU WRR DQALRXV DSSUHKHQVLRQV WKDQ UXLQHG EB WRR FRQILGHQW VHFXULWB (Edmund Burke) a) Decipher the cipher text above using a 26-character Caesar Cipher. Explain your reasoning Explain how you would quickly determine if the above cipher text is the result of a simple substitution or a transposition cipher, also explaining the difference between each. Please justify your answer. The cipher text gets decrypted to BETTER BE DESPISED FOR TOO ANXIOUS APPREHENSIONS, THAN RUINED BY TOO CONFIDENT SECURITY A shift of 3 was used to give the output as the quote mentioned above. The above cipher can be determined as simple substitution cipher as we can list down the two alphabet words in English and shifting each alphabet to certain position gives any one of the word. Substitution cipher is all about replacing one character or alphabet with other and transposition cipher is all about jumbling of the words together instead of replacing characters, transposition cipher changes the order of the characters and can be analyzed by frequency analysis. Unfortunately your computer has been infected by some malicious code and you do not know when this infection happened. Luckily you have performed backups on a weekly basis since you acquired your computer. Your idea is to use the backups starting from the beginning, rebuilding the first backup and so on, applying all changes in order. Discuss the feasibility of this approach offering ways to improve it, if necessary. This is the safest way of rebuilding computer again and would definitely solve the issue as this is the gradual step by step up gradation of the system and would bring the system to state where it was infected but without the problem. What I feel like if we start restoring the system from back rather than doing from start and checking for the stability of the system. This approach saves time and effort as after restoring first only you have the probability of solving the issue or what we can do is not do one by one incremental steps but keep an interval of the backups and do. Please compare and contrast incident response plans and business continuity plans. List heir key elements (what would one expect to see in such a document?) The incident response plan is defined as what make up a security incident and highlight the phases of incident response. The incident response plan document is focused on how information reaches the appropriate personnel, investigation of the incident, bringing down damage and strategy to respond, documentation and evidence preservation. The incident response plan consists of responsibility area and pen down and brings in effect procedures for handing security incidents. The document emphasizes on the considerations required to create an incident response plan. The incident is formulated to safeguard against intrusion to organizational resources. An incident is defined as information confidentiality loss, data integrity compromise, theft or damage of IT assets like computer, printer etc, service denial, misuse of assets or services or data, system infection by malicious software, unauthorized access, system abnormal behavior, alarms for intrusion detection and their responses. The incident response goals are incident occurrence verification, business restoration continuity, minimized incident impact, determine the way of attack, prevention against future attacks, response time of security and incident should be improved, illegal activity prosecution, situation and response has to be made aware to management. The incident response life cycle begins by incident preparation, then comes the discovery of the incident, notification, analysis and assessment, response strategy, containment, re infection prevention, affected system restoration, documentation, preservation of evidence, external agencies notification, update policies and response review. The business continuity planning is required for making an organization safe from internal and external threats and identifies the soft and hard assets to provide effective recovery and prevention of the organization. The following threats are there to an organization as Staff death or injury, building are damaged, loss of communication and IT infrastructure, disruption in transport making staff unavailable, stress and demoralization in staff, other business disruption or closing down on which a company is dependent, reputation damage and business change demands. To cover up the following threats following steps should have been planned sufficient workforce with right expertise and motivation to manage and lead the organization, access to key IT system and records, staff communication should be reliable and clear, ability of paying the staff in case of crisis also, product and services procurement and media demand responses. The steps involved in developing a business continuity plan in systematic way are analysis of business, risk assessment, strategy development, plan development and plans should be rehearsed. One hundred years ago, Louis Brandeis and Samuel Warren warned us that, Numerous mechanical devices threaten to make good the prediction that what is whispered in the closet shall be proclaimed from the housetops.' Cryptography is an enabling technology for self-help privacy. Conversely, cryptography can be used to conceal criminal conspiracies and activities, including espionage. a) How have computers changed the ways in which we have to keep certain information private? b) What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? c) How does cryptography help or hinder protection of privacy and public safety? d) What policies are needed and appropriate in a networked world regarding the use of cryptography? e) Consider a public key encryption. Ann wants to send Bill a message. Let Annpriv and Annpub be Anns private and public keys respectively. The same for Bill (Billpriv and Billpub). i) If Ann sends a message to Bill, what encryption should Ann use so that only Bill can decrypt the message (secrecy)? ii) Can Ann encrypt the message so that anyone who receives the message is assured that the message only came from Ann (authenticity)? iii) Is it possible for Ann to devise a method that will allow for both secrecy and authenticity for her message? Please justify your answer. Computers help a lot in keeping private informations secure. With all the security features into the system like firewalls and other security features one can keeps his/her information secure from un authorized access. Initially for keeping the information private one has to classify the physical files or documents having information as classified or confidential and have to be kept in safe custody so that unauthorized access is not there, the initially the information transfer has to be taken through physically under supervision but with computers and secure software systems and various encryptions which are efficient and complex to break, transport of information has become easy without any extra effort. With increasing use of information technology in form of computers has also created new types of threats where hackers who are experts in breaking the system security and network security and get easy access of ones private data. People use the information transfer and other IT mea ns to transfer information which cannot be scanned by authorities for example terrorist organizations uses the networks and other safe methods to transport the information which could not be easily get hold of decrypted by organizations working against them. The biggest advantage of public key cryptography is the secure nature of the private key. In fact, it never needs to be transmitted or revealed to anyone. It enables the use of digital certificates and digital timestamps, which is a very secure technique of signature authorization. We will look at digital timestamps and digital signatures in a moment, but as discussed above cryptography can be used by organizations or individuals involved in wrong activities to transfer data which cannot be caught or decrypted by authorities working against them, hence cryptography can go against world peace. Cryptography use should be mandated for the right purposes. There are few cryptographic policies that have been challenged, both literally and figuratively. In particular export controls, key escrow and government control have been issues argued recently, with final decisions still unresolved. International agreements and foreign decisions regarding these topics have influenced the current U.S. position. Ann should use the public key encryption method to send a message to Bill. Ann can create her digital signature of the message using the private key which can be verified using public key to see message is authentic. Yes Ann can use public key encryption for encrypting the message to maintain the confidentiality or secrecy of message and she can use digital signatures with public key encryption to maintain the authenticity of the message.

Friday, October 25, 2019

Heritage and Identity in Pat Barkers Regeneration Essay -- Pat Barker

The presence of Jews in England has been a source of controversy for many reasons. On page 35 of Pat Barker's historical novel Regeneration, Siegfried Sassoon reveals the nature of his relationship with his father, who left home when he was five, and gives an account of his Jewish history. Though he hadn't been raised Jewish and apparently had no association with his Jewish relatives, Sassoon was subjected to the discrimination that was often seen in England before and during WWI. Through Sassoon's Jewish heritage and the other characters relation to the past, Barker exposes the need of mankind to identify with the past in order to come to terms with the present. There is much history concerning the Jewish people and their presence in England as an organized community, beginning in 1066 when Jewish merchants were encouraged to move to England. Professor Daniel J. Elazer, in summarizing an article by Aubrey Newman, states that from 1066 to 1290 the Jews suffered persecution in the form of "blood libels, mass riots, and discriminatory legislation" (4), followed by expulsion from England until 1655 when a Sephardi Rabbi was able to convince Oliver Cromwell to allow the Jews readmission. Most of the Jews coming into England were Sephardi Jews, well educated and successful businessmen from Spain and Amsterdam, until later in the seventeenth century when Jewish immigrants from Northern Europe began to arrive. These Jews were known as Ashkenazi Jews and were of a lower social class than the Sephardi (5). Anti-Jewish sentiment in England can be attributed to more than religious persecution. It includes religious, race, and social issues and is researched in depth in Anti-Semitism in British Society, 1876-1939, by Professor Colin Hol... ...ows both Rivers and Prior to embrace the present. By denying the past, many of the characters in Barker's novel struggle with the present. Many are unable to deal with the horrors of war witnessed and experienced in their recent past. Others, such as Rivers and Prior, struggle with issues from their childhood as well. Regeneration shows that by making a connection with the past and accepting it for what it is, the characters are able to continue their lives with some sense of order and purpose. Works Cited Barker, Pat. Regeneration. New York: Plume, 1993. Elazer, Daniel. "British Jewry." Jerusalem Center For Public Affairs. 14 April 2004. <http://www.jcpa.org/dje/articles3/british.htm> Holmes, Colin. Anti-Semitism in British Society, 1879-1939. London: Edward Arnold Ltd., 1979. Westman, Karin E. Pat Barker's Regeneration. New York: Continuum, 2001.

Thursday, October 24, 2019

Social Responsibility in Business

In examining the mission statements of multiple companies, it is apparent that corporations claim to prioritize social responsibility. Companies like Whole Foods, Ben &Jerry’s, Camano Island Coffee Roasters all actively contribute to different social causes. Even Philip Morris prioritizes â€Å"actively [participating] in societal concerns that are relevant to [its] businesses† over generating returns for its stockholders (Philip Morris, 2011). There are many different views on the extent to which corporations should be involved in societal concerns.The three most prominent are the stockholder theory, the concept of social business, and the stakeholder theory. Of these, the stakeholder theory is the most appropriate. Because corporations are considered to be individuals within our society, they bear a certain amount of responsibility to their fellow citizens, so it is not enough for them to act only in the interest of their stockholders. However, corporations are entitl ed to earn profits, and therefore cannot be expected to act as purely social businesses.Consequently, businesses must look for a happy medium within the stakeholder theory, acting in the interests of the stockholders, customers, employees and civil society. Milton Friedman, a major proponent of the stockholder theory, argues that beyond legal compliance, â€Å"the social responsibility of business is to increase its profits,† meaning corporations hold responsibilities only to their shareholders and the law (Friedman, 1970). One of the main points he addresses is the fact that when a company manager spends the company’s money on a social cause, he/she takes away from the maximum possible returns to the stockholders.In addition to taking from the stockholders, the price of the product may rise, taking away from the consumer, or wages might fall, taking away from the employees. Because of this, the manager â€Å"is in effect imposing taxes, on the one hand, and deciding how the tax proceeds shall be spent, on the other† (Friedman, 1970). Friedman claims taxes are the responsibility of the government and giving the corporation’s money to a social cause is a form of taxation without representation. This would be the case if the manager were merely donating the funds to a cause of his/her choosing.However, Camano Island Coffee Roasters (CICR) supports its own industry by ensuring that they participate in Fair Trade. In addition to participating in Fair Trade, CICR helps the coffee farmers by making sure they own the land they work, as well as helping to keep their children well nourished (Gunter, 2007). By helping the farmers from whom CICR buys its coffee, it ensures that it can use â€Å"the top 1% of the available coffee market† (Gunter, 2007). As a result of its acts of altruism, Camano Island Coffee Roasters has been able to ensure a top quality product and consequently has been a very successful corporation.Friedman’s theory is also similar to the â€Å"trickle-down† theory. He believes that by maximizing profits, corporations will help the less fortunate by providing better goods and services as well as higher wages. However, like the â€Å"trickle-down† theory, the result is the CEOs of corporations make millions of dollars, whereas the lower level employees barely make enough to survive. Ben and Jerry’s is a perfect example of a company that does not abide by Friedman’s philosophy, and yet has been extraordinarily successful.They manage to provide the highest quality product possible, in addition to paying their employees what they call â€Å"living wage,† making sure the lowest paid employees are still making well above the minimum wage (LEDA article). For Ben and Jerry’s, the tax, as Friedman would call it, is taken from the highest paid employees of the company. An article reviewing Ben and Jerry’s business ethics says: â€Å"Consistent with [their mission for social responsibility], the highest paid employees of Ben & Jerry's would not earn more than seven times more than the lowest paid full-time employees† (LEDA article).Despite the success of socially responsible corporations, Friedman would argue that these companies would have had greater success if they had focused solely on turning higher profits. Therefore it is critical to consider the possibilities for corporations to act in an unethical manner even when complying with Friedman’s philosophy. When Ford released the Pinto, it was aware of the potential for customers to be killed due to a flaw in the Pinto’s design.Despite this knowledge, based on a cost-benefit analysis, Ford determined it would be less costly to deal with the law suits brought by people who were injured or killed rather than to recall and fix each car. Ford was well within the legal requirements for car safety at the time and legally sold the Pinto, despite the danger. How ever, by not considering the consequences of its actions beyond just the financial, Ford was responsible for over fifty deaths (American Decades, 2001). According to Friedman, this decision to value profit over human lives was perfectly ethical. On the other side of the pectrum from the stockholder-oriented philosophy is a new field of business called social business. By definition, a social business is a non-loss, non-dividend company whose focus is not on profits, but on furthering a social cause (Yunus, 2010). Nobel Peace prize laureate Muhammad Yunus is the founder of this field of corporate social responsibility. In 2006, Yunus collaborated with a French food company called Danone to launch the first social business, Grameen Danone. Its mission is to provide children in rural Bangladesh with nutrients that are lacking from their diet.An article on the Danone website says: â€Å"the success of the project will above all be judged on non-financial criteria: the number of direct and indirect jobs created (milk producers, small wholesalers, door to door sellers), improvements to children's health, protection of the environment etc†¦Ã¢â‚¬  (Danone, 2011). However, based on the way we currently measure the success of corporations, Grameen Danone would appear to be a very unsuccessful business. Do social businesses and non-profit organizations necessitate a change in the conventional methods of determining the success of a corporation?It is highly unlikely that many corporations will adopt such a radical method as social business. Therefore, while social businesses should be commended, and even used as inspiration, for their contribution to society, it is more reasonable for corporations to focus on the interests of both their stockholders and community. R. Edward Freeman is one of the founders of the stakeholder theory, which says that companies hold responsibilities to five main groups including shareholders, consumers and the general public.Unlike soci al business, Freeman’s stakeholder theory is not meant to be a foil to the stockholder theory, but instead, Freeman argues that the views of both Friedman and Yunus are just narrower versions of the stakeholder theory (Theoretical and Pedagogical Issues). Freeman says that in modern society businesses must consider multiple stakeholders when making decisions. Whole Foods provides an example of a company which takes into account more than just making profits. Whole Foods purchases its products from local farmers despite the fact that this raises the costs of its goods.Even though this may hurt its checkbook, Whole Foods is able to sell healthier and higher quality products while also supporting its local community. In addition to performing altruistic acts, many of Whole Foods’ customers are loyal because of its ethical methods of doing business (Conversation with John Mackey, 2011). Whole Foods also goes beyond merely making profits by creating trust with its employees . When executing a merger with the company Wild Oats, Whole Foods needed to close down many of the Wild Oats locations because they were in markets where there were already Whole Foods stores located.However, instead of firing the Wild Oats workers, Whole Foods offered solid job security and alternate positions at the existing Whole Foods locations. In an interview, in regards to the job security offered to Wild Oats employees, Whole Foods CEO John Mackey said, â€Å"First of all, that’s the right thing to do, and secondly, if people have a lot of anxiety that they could lose their jobs, that inhibits their ability to learn and adapt. I feel you’ve got to offer security if you want to get people to move forward. Otherwise they’re too scared. † (John Mackey Interview, 2008)Not only does this stakeholder approach to business result in societally beneficial actions, but it also leads to more efficient, harder working employees. However, there are problems wi th the stakeholder approach to business ethics. Many argue that an adoption of stakeholder theory, over stockholder, would â€Å"[undermine] shareholder property rights†¦ and discourage equity investment† (Ethics Gone Wrong, 2000). Advocates of this concept claim that because corporations must cater to the needs of groups other than their shareholders, the â€Å"potential of [the stockholders’] investment†¦ diminishes significantly† (Ethics Gone Wrong, 2000).Contrary to this idea, investment vehicles like the Calvert Investment Mutual Fund provide â€Å"investment portfolios that integrate two distinct research frameworks: a rigorous review of financial performance, and a thorough assessment of environmental, social and governance performance. † (Calvert Investments, 2011). The success of the Calvert Mutual Fund provides evidence that even when considering corporations that apply stakeholder-oriented business practices, the value and â€Å"trad e-ability† of equity capital does not diminish.Therefore, even if most corporations adopt a stakeholder-oriented perspective, the effects on the stock market and on equity capital will be much less severe than critics predict. Another issue often addressed by critics of the stakeholder theory is that an adoption of the stakeholder philosophy would result in an increase in self-serving behavior among managers. This is because managers will be able to appeal to the conflicting demands of different stakeholders in order to circumvent certain responsibilities, as well as indulge in self-serving behaviors.Advocates of stockholder-oriented business claim that adopting the stakeholder philosophy will not only multiply the amount of self-serving managers, but will also make it even more difficult to discipline such behavior. Alexei M. Marcoux, a critic of the stakeholder theory, says, â€Å"Between the ability of managers to justify their self-serving behavior in terms of the balance d pursuit of stakeholder interests†¦ and the protections that a stakeholder-oriented corporate law must afford to managers†¦ the accountability of managers for their actions must necessarily suffer. (Ethics Gone Wrong, 2000). However, if firms are so intent on adhering to a strict ethical code, there will be internal means by which such dishonorable behavior can be disciplined. Furthermore, in the hiring process, firms will ensure that managers will not act in self-serving ways, but instead maintain high ethical standards. Among the various philosophies regarding the social responsibility of businesses there is a spectrum ranging from exclusively profit-oriented to solely serving the community.However, because corporations are considered individuals within our society, it is incumbent upon them to use their position to achieve a balance between the responsibilities they hold to their shareholders and the responsibilities they hold to the other member of the society. Theref ore, corporations should adhere to stakeholder-oriented business ethics. Bibliography: Yunus, Mohammad. Building Social Business. New York, NY: PublicAffairs, 2010. Print. â€Å"The Ford Pinto Case. †Ã‚  American Decades. 2001. Encyclopedia. com. 5 May. 2011  . Makower, Joel. â€Å"Milton Friedman and the Social Responsibility of Business. †Ã‚  World Changing(2006): n. pag. Web. 5 May 2011. . Marcoux, Alexei. â€Å"Business Ethics Gone Wrong. â€Å"CATO Institute  22. 3 (2000): n. pag. Web. 5 May 2011. . Hooker, John. â€Å"Why Business Ethics?. † (2003): n. pag. Web. 5 May 2011. . Freeman, Edward, Ramakrishna Velamuri, and Brian Moriarty. Company Stakeholder Responsibility: A New Approach to CSR. †Ã‚  Business Roundtable Institute for Corporate Ethics  (2006): n. pag. Web. 5 May 2011. . Fassin, Yves. â€Å"The Stakeholder Model Re? ned. â€Å"Journal of Business Ethics  83. (2006): 113-135. Web. 5 May 2011. . Tupate, Patel. â€Å"Ben & Jerry' s a Moo-del of Corporate Social Responsibility. †Ã‚  LEDA  n. pag. LEDA at Harvard Law School.Web. 5 May 2011. . Gunter, Marie. â€Å"Fair Trade or Fairly Traded?. â€Å"Articlesbase. 2007. Web. 5 May 2011. . Freeman, Edward, Andrew Wicks, and Thomas Jones. â€Å"Stakeholder Theory: The State of the Art. â€Å"Theoretical and Pedagogical Issues  n. pag. Web. 5 May 2011. . â€Å"Public Trust in Business- John Mackey of Whole Foods. †Ã‚  Business Ethics and Leadership. Web. 5 May 2011. . Danone Website: http://www. danone. com/en/what-s-new/focus-4. html Calvert Investments Website: http://www. calvert. com/products-funds-by-sri-approach. html Philip morris Website: http://www. philipmorrisusa. com/en/cms/Company/Mission_Values/default. aspx? src=top_nav

Wednesday, October 23, 2019

Dalit Discourse in Indian Education Dhanaraju Vulli Essay

Abstract There are two types of school system India in the issue of medium of instruction i.e the regional language system and the English language system. There is a clear cut division between the uppers castes elite children and Dalit children in getting of English medium education in Indian society. The Dalits children are given education in regional language schools while English language school education is meant for the upper castes children. This division has always been reflecting between government and private English medium schools. In the name of mother tongue the state and the upper caste elite always compel the regional medium of instruction in the policy making. This was one of the current problems in Indian Educational system. This paper can be divided into four parts. The first part will highlight the language policy after Indian Independence. The second part discusses the concept of mother tongue and its importance in the contextualizing of educational discourse in India. In the third part I would highlight the current debate on language policy and its importance in the Indian educational system. This is very important in the understanding of politics of medium of language in the present educational discourse. The last part deals with the response of the Dalits towards the English education and how they attack the upper caste nature towards regional medium education. In an attempt to locate the importance of educational policy in the wider socio-historical and political context, I will address an  ideological deconstruction of politics of mother tongue in the present Indian educational system. Keywords: English education, language, mother tongue, globalization. Introduction The question as to which language should be used as a medium of instruction in country like India is a debatable subject. The question is often posed in binary terms: Should the medium of instruction be a regional language or English? Language is a vehicle for learning as well as expression of ideas. An advanced language (English) helps in mentally provide people to  communicate each other across the world. On the other hand, an underdeveloped language has its limitations. It keeps people underdeveloped, more so those in deprived sections. The school system is divided into two types in the context of medium of instruction i.e the regional language system and the English language system. There is a clear cut division between the  uppers castes elite children and Dalit children in getting of English medium education in Indian society. The dalits  cholderns are given education in regional language schools while English language school education is meant for the upper castes childr en. This division has always been reflecting between  government and private English medium schools. In the name of mother tongue the state and the upper caste elite always compel the regional medium of instruction in the policy making. This was one of the current problems in Indian Educational system. India. In the third part I will highlight the current debate on language policy and its importance in the Indian educational system. This is very important in the understanding of politics of medium of language in the present educational discourse. The last part discusses the response of the Dalits towards the English education and how they attack the upper caste nature towards role of mother tongue in the Indian education .In an attempt to locate the importance of educational policy in the wider sociohistorical  and political context, I will address an ideological deconstruction of politics of mother tongue in the present Indian educational system. Historical View of the Language Policy in Indian Education The historical view of the evolution of the language policy in India let know us how the importance of English and its role in Indian Education. India is multilingual country. It has been reflecting in the formulation of the language policy. The Indian constitution has provided that the primary education must be taught through the mother tongue or regional language. However, a status survey of language instruction in the country exposed that of the 1652 mother tongues listed by the 1961  Census, there are 51 languages which are spoken by more than The present paper can be divided into four parts. The first part 100,000 people each. Of these 51 languages, 16 have no script of will highlight the language policy after Indian Independence. their own, and only the remaining 35 languages are accepted as The second part discusses the concept of mother tongue and its media of instruction at the school level1. English is a common importance in the contextualizing of educational discourse in  language and it is an obligatory language in the higher education The National Council of Educational Documented the demand and importance of English language in  the position paper in connection with the National Curriculum The Indian  government has been following three-language Framework (2005) as they stated: â€Å"English in India today is a formula in Education as the National Commission on Education symbol of people’s aspirations for quality in education and fuller 1964-1966 recommended. Subsequently three-language formula participation in national and international life†¦ The level of in Education was reflected in the National Education Policies of introduction of English has now become a matter of political 1968 and 1986. The Commission said that the three-language response to people’s aspirations, rendering almost irrelevant an system is an appropriate formula for the Indian school education academic debate on the merits of a very early introduction†. and it can be good approach to accommodate different language The Commission also mentioned that â€Å"English will continue to people but it has been criticized by the different sections in the enjoy a high status so long as it remains the principal medium of society on the implementation. The Dravidain movement in education at the university stage, and the language of Tamilnadau is the preeminent instance as they vehemently administration at the Central Government and in many of the states. Even after the regional languages become media of  opposed the imposition of Hindi language on south India. Higher education in the universities, a working knowledge of There is no proper planning for formulating language policy in English will be a valuable asset for all students and a India. It can be seen as a question of status planning rather than reasonable proficiency in the language will be necessary for achievement planning. Finally, the three- language formula has those who proceed to the university†. been emerged as a policy after elaborate debates and discussions among political and academic peoples with interest of national However, there is controversial about the English as a medium of instruction in Indian educational system. The contradiction of multilingual languages. The National Focus Group on Teaching of English has taken a  strong position in connection with ‘English language question’: The Central Advisory Board on Education also discussed on the â€Å"English is in India today a symbol of people’s aspiration for issue of English language and recommended that English must quality in education and a fuller participation in national and be compulsory subject in the schools from 6th class onwards and international life. Its colonial origins now forgotten or students must acquire enough knowledge of English so as to be irrelevant, its initial role in independence India, tailored to high able to receive education through this English in the higher education now felt to be insufficiently inclusive socially and education. There is another development took place in the linguistically, the current state of English stems from its development of language policy in India. The first National overwhelming presence on the world stage and the reflection of Education Commission had studied the recommendations given this in the national arena†4. by the Central Advisory Board on Education. Finally they came up with conclusion that three-language formula must be included There is an astonishing faith among all sections of the society in in the context of  multilingual Indian educational system. I argue both rural and urban areas that English has the transformative that once upon a time the English language was important part of power language. English is seen not just as a skill language, but a mechanism of exclusion language due to upper caste as a means of a better life, a pathway out of exclusion and nationalists’ creation as they differentiated native language and suppression from the unequal society. The English language has alien language but now it can be seen as a tool of inclusion. In emerged as a powerful agent for social change in India. the post modern India the English language is important factor to include all the sections of Indian society. The main reason is an Mother Tongue as the Medium of Instruction increasing demand for the language which is an important tool There is a popular perspective that advocates the use of mother for the progress and development of the country. Encourage linguistic diversity in schools. This perspective argue that mother tongues are not merely speech varieties but are  languages that provide social and emotional identity to  individuals, express the essence of their cultures, and give them a sense of rootedness. Schooling in the language of the child reflects respect for her and an appreciation of her culture. The exclusion of the mother tongues from school hence is seen as ‘harmful to the child’s self esteem’. According to Pattanaik5 children are thereby â€Å"reduced to  minorities in their own homes†. Extending the realm of  pedagogy, the argument links the acknowledgement and  acceptance by the school of the language and culture of the child to a positive identity of self and thereby to effective educational achievement. As Edward says, â€Å"the rejection of a child’s language is unlikely to enhance feelings of self worth which are important for educational success†6. Further, this perspective argues that â€Å"the right to education in a language that the child understands is a basic human right and an essential ingredient of equality in education†. Pattanaik forcefully observes that to â€Å"control and dictate the language of access† to knowledge is a â€Å"positive suppression of human talent. It deprives individual and society of free choices, curbs creativity and innovativeness and restricts participation or potential participation in mul tiple spheres of human interaction, thus imposing limits on freedom†. Current Debate on Medium of Instruction Current language politics in India is an exemplary case of the issues and controversies surrounding linguistic globalization. A primary characteristic of linguistic globalization is the increasing spread and domination of the English language, which we can  capture by the term ‘global English’8. As a post-colonial democracy, India provides a context for examining linguistic globalization that is generalizable to other cases. Furthermore, in juxtaposition to the homogenizing tendency of global English, India embraces multilingualism; its federal system is based on its linguistic diversity. India’s first Prime Minister, Jawaharlal Nehru, a modern  socialist at heart and one of the premier leaders at the 1955 Bandung conference, was utterly convinced of this linkage  between the English language and technology and modernity9.  Yet he also â€Å"discovered India† through its rich and enduring diversity. He valued the adivasi, or tribal, cultures of India as much as, if not more  than, for example, the Bengali bhadralok, an early middle-class intelligentsia that emerged under colonial The Chennai Declaration (2012) has emphasized the importance rule. of mother tongue in the multi-lingual country like India as â€Å"One 10 of the significant commonalties of the Common School System As well documented by Robert King (1998), Nehru, as well as will be the plurality of mother tongues in dynamic interface with many others feared that the major regional languages of multilingualism of child’s neighborhood. This would duly independent India, such as local languages, could be divisive by include Braille and other sign languages as well. According to fomenting narrow identities, leading to â€Å"fissiparous tendencies† this radical and dynamic conception of language education, that could tear India apart. The narrative of English as the mother tongue with a multi-lingual interface is acknowledged as language of modernity and regional languages such as regional the most potent medium of education to enable the child to i. as pre-modern, parochial and even reactionary was well given the nostalgia for  think, analyze and act; ii. acquire, internalize and transform established in Nehruvian India. Today, modern language knowledge critically; iii. Learn other the caliber of Nehru’s leadership , such Nehruvian narratives languages, including English, proficiently; iv.catalyze cultural still resonate. Indeed, many of India’s political and economic and literary renaissance; v. Negotiate with the dominant process leaders today espouse the Nehruvian language ideology. of alienation with advantage, thereby avoiding being pushed-out; and vi. Question and resist oppression and explore the path of Nandan Nilekani, the co-founder of Infosys Company has put it; in India today English is a symbol of an economy comes of  age12. It is the language of international business, science and This approach believes in quality education. The quality research. In contrast, Nilekani depicts supporters of Kannada in education begins with mother tongue. Mother tongue is very the English-versus-Kannada controversy as  Ã¢â‚¬Å"chauvinistic† and important that gives high levels of ability in learning many ideologically and politically motivated. As part of Nilekani’s languages in India. Indian constitution also acknowledged the accusation of the ideological nature of pro-Kannada forces is the importance of mother tongue language as the National Curricular claim that they are denying access to English to those who have Framework, 2005 and the Right of Children to free and historically been the have-nots in Indian society, in particular the Compulsory Education Act, 2009 provided the mother tongue as lower-castes and the lowest-of-the low, the Dalits or tool for development critical thinking. However, for most Untouchables. children, particularly for the tribal and minority language children, there is no provision for education in the mother This language ideology of English as a skill, a ‘key’ or tongue. Education of such children imposes an unfamiliar school ‘passport’ critical for â€Å"upward mobility† fits in with a larger language on them, which often leads to large scale dropouts. narrative on globalization. This globalization narrative depicts Mother tongue based multilingual education for at least 6 to 8 globalization as inevitable, a force on its own with no one or no  entity directing or controlling it. Globalization, in this narrative, regional language schools cannot therefore think of achieving is an autonomous, â€Å"invisible hand† process. The linguistic anything in the globalised economy†. dimension of this process is one where English is seen as neutral Accordingly, â€Å"the divide between the English medium schools and inevitably spreading globally. The regional language schools is a caste-class divide†, which In this context, one of the most prominent public intellectuals in can be overcome by the marginalized â€Å"hijacking† the tool of India today, Ramachandra Guha differs with Nandan Nilekani exclusion, English17. As the leaders of a Dalit Association in and claim that support for Kannada is not chauvinistic, except Hyderabad Central University, put it: â€Å"The middle class and the when the private sector is obligated, or forced, to use it. It is rich can afford to send their children to private schools. For the legitimate and indeed preferable for the government to endorse poor and Dalit, the only option is government schools. Then why and approve of changing the official name of Bangalore to the these people were denied an opportunity to learn English†18. For more Kannadiga â€Å"Bengaluru,† according to Guha; it is not these Dalit leaders, those opposing English in state schools are legitimat e for regional language enthusiasts to economically â€Å"regressive and biased† English, and the pro-English linguistic disenfranchise migrants from other parts of India, as for example globalization narrative, are seen as empowering the powerless pro-Marathi fanatics in Bombay have attempted A similar, and a necessary tool for upward mobility. â€Å"soft† liberalism reasoning seems to have been the basis for the Karnatak High Court decision in the summer of 2008 against the In the central schools the medium of instruction is where the state government mandating Kannada as the medium of upper castes and other central government employee children get instruction in private schools13. The court’s decision repeatedly the education. Even though the children of a few reserved referred to the freedom of parents to make choices for their category employees’ children benefit from these schools, the children, i.e., the freedom of the individual and, by extension, divide between the English medium schools and the regional the market based on individua l choices. Language schools is a caste or class divide based on social and economic category. The divide itself was created by upper caste More recently, Kannada activists have been seeking classical intellectuals for their own vested interest. Since the days of language status for Kannada-a further central governmental Indian national movement the upper caste intelligentsia argued categorization. This is the political space opened up for investing  that the colonial rule particularly Lord Thomas Macaulay had Kannada speakers with the â€Å"moral content of a community.† In introduced English education that convert local people into other words, to act politically, i.e., to make political claims, clerks to serve in colonial government. The real character of the regional language activists need to build community, and invest English education was emphasized by Lord Machulay often that community with moral content. There is indeed Kannada quoted ‘flourish India in blood and the colour but European in chauvinists who preach an exclusive Kannadiga identity14, task and manner’, the educational enterprise of the Government giving a â€Å"divisive and dangerous†15 or â€Å"particularist at all levels of education remained within the confines of protectionist† content to their politics. But we need not condemn colonial needs and did not break the limits of colonial interest. all pro-local language politics as such. Language politics in India With this concept, colonial education elevated western is contested because of the moral content with which many local knowledge and culture that represented the colonizer. For language activists have been able to imbue the community, i.e., instance, Grants, the East India Company officer stated that ‘for with a political transformation that is empowering and moral. the continuation of British rule it was necessary to create a cla ss of Indians’ that people brought about only from the western knowledge. This perhaps, was a natural consequence of the ideas Dalit Discourse on Medium of Instruction References 17. Aggarwal Kailash S., ‘English, Laloo: a Bihari Story’, The Independent, (Bombay), 23rd September, (1993) Chaturvedi M.G and Mahel B.V., Position of Languages in School Curriculum in India, NCERT, New Delhi, (1976) 18. Interview with Mr. Gummadi Prabhakar and Dara Suman leaders of Ambedkar Students’ Association, Hyderabad Agarwal S.P. (ed )., Commissions and Committees in India, Central University, Hyderabad, Dated: 12th May, (2013) Vol. 5, Concept Publishing Company, New Delhi, (1993) Government of India., Report of the National Knowledge 19. Terry Eagleton, Ideology,( Longman, New York), 13,(1996) Commission, New Delhi, (2007) NCERT National Council of Educational Research and 20. Dalit Freedom Network http://www.nd Dalit network. org/go?/dfn/about/C33/, Accessed on 22 May, (2013) Training, National Focus Group Position Paper on Teaching of English, NCERT, New Delhi, 1, (2006) International Science Congress Association