Tuesday, May 12, 2020

The War Prayer By Wilfred Owen - 1865 Words

Society is constantly redefining knowledge. Some would argue knowledge comes from logic and proven ideas, yet others would refute that personal experiences and human emotions develop knowledge. As argued in Twain’s â€Å"The War Prayer,† those in power construct knowledge, forming a narrative that society accepts as the truth.Through the conventions of language, authority figures are able to create a false sense of reality, a reality that one believes to be true but cannot actually prove, as argued by Wilfred Owen in â€Å"Dulce Et Decorum Est†. While Twain’s â€Å"The War Prayer† initially follows the narrative that wartime is a hopeful and patriotic experience, the second half, as well as Owen’s â€Å"Dulce Et Decorum Est,† deconstruct the narrative and†¦show more content†¦The phrases â€Å"the country† and â€Å"in every breast† creates the sense that absolutely every American believes in these familiar conce pts and to feel anything differently from the predetermined emotions picked out by the nation s leaders should cause embarrassment and self-questioning among one. The personification of patriotism as a â€Å"holy fire [that] burned,† signifies that the embers are still building, as patriotism is still rising and the nation is getting stronger with the addition of every supporter. However this â€Å"burning fire† contrasts the â€Å"smothering dreams [that one] too could pace†¦ his hanging face, like a devil’s sick of sin†(Owen). These patriotic dreams are â€Å"smothered,† slowly fading and weakening after Owen exposes to society what is truthfully going on amongst the soldiers on the battlefront. The faces that display excitement from the U.S. civilians at home contrast the â€Å"hanging faces, like a devil’s sick of sin.† The faces and attitudes of these soldiers are so lifeless and gruesome that they represent that of a  "devil,† an image feared by a group derived from a strong religious foundation and who pray against â€Å"sin† upon such men. Though the men are previously characterized as hopeful and strong, Wilfred Owen and his personal battlefront experiences contrast this view, conveying the soldiers as weakened and forgotten by the authority figures who once promised to award honor among such â€Å"heros†. Euphemisms convince Americans toShow MoreRelatedThe War Prayer By Wilfred Owen1933 Words   |  8 Pagesexperiences and is driven by human emotions. As argued in Twain’s â€Å"The War Prayer†, knowledge is constructed by those in power, forming a narrative that is accepted by society as the truth. Through the conventions of language, authority figures are able to create a false sense of reality, a reality that is believed to be true but cannot actually be proven, as argued by Wilfred Owen in â€Å"Dulce Et Decorum Est†. While Twain’s â€Å"The War Prayer† initially follows the narrative that wartime is a hopeful and patrioticRead MoreWilfred Owen s Life And Work1207 Words à ‚  |  5 PagesWilfred Owen born in Oswestry, raised in Birkenhead and Shrewsbury. In 1913 Owen broke from the Roam Catholic Church and went to teach English in France. Owen always had the determination to become a poet. While teaching in France, he worked on the rhyming patterns which became the prominent characteristics of his poetry. In 1915 Owen enlisted in the British Army. His first experiences in January-May 1917 of active service was as an officer at the Battle of the Somme. Battle of Somme, led to hisRead MoreWilfred Owens Anthem for Doomed Youth Analysis Essay777 Words   |  4 PagesWilfred Owens Anthem for a Doomed Youth is exactly that, an anthem ( a solemn song) to commemorate the innocent youth, whose lives were taken to soon by war. By using the word anthem, he calls to mind the glory and honor of a national anthem, however; he goes on to explain that there is no honor or glory in death, pairing the words doomed and youth together creates so much sorrow as well, it provides a woeful impression as it foretells of young people having no hope. Written in sonnet form, it isRead MoreCulce Et Decorum Est and Anthem of the Doomed814 Words   |  3 Pageschange in society and given voice to controversial topics. Wilfred Owen influenced his nation and became a powerful and significant agent of change through his literature as he demonstrated throughout his poetry how war is not something to be glorified yet is a horrific injustice suffered by many. By analysing Dulce Et Decorum Est and Anthem Of The Doomed it can be said that Owen’s significant message is to confront the idea of glorifying war and the patriotic sentiment of trench warfare. The horrificRead MoreWilfred Owen Anthem for Doomed Youth Analysis1000 Words   |  4 PagesAnthem of the Doomed Youth by Wilfred Owen The poem I chose to study is Anthem of the doomed youth by Wilfred Owen. Wilfred Owen, the son of a railway worker, was born in Plas Wilmot, near Oswestry, on 18th March, 1893. Owens youthful illusion of the glory of fighting as a soldier was reflected in his words to his mother on his return to England shortly before volunteering for the army...I now do most intensely want to fight. In the summer of 1917 Owen was badly concussed at theRead MoreClose Study of Texts - Wilfred Owen Essays1004 Words   |  5 Pagesdoes Owen’s portrayal of the relationship between youth and war move us to a deeper understanding of suffering? As an anti-war poet, Wilfred Owen uses his literary skills to express his perspective on human conflict and the wastage involved with war, the horrors of war, and its negative effects and outcomes. As a young man involved in the war himself, Owen obtained personal objectivity of the dehumanisation of young people during the war, as well as the false glorification that the world has beenRead MoreThe Soldier By Rupert Brooke And Anthem For Doomed Youth By Wilfred Owen1367 Words   |  6 PagesYouth’ by Wilfred Owen are two World War One era sonnets, both making a comment on what it means to die in war. The two poets show very different views on war, as both had very different experiences in war. Rupert Brooke died before he made it to war, his poem highlights the soldier as a hero and glorifies dying in war, in contrast Wilfred Owen shows a grittier side to death in war, as he experienced war first hand and his poem is real and brutal. The poets make their particular views on w ar clear withRead MoreEssay about Analysis of Anthem For Doomed Youth by Wilfred Owen937 Words   |  4 PagesAnalysis of Anthem For Doomed Youth by Wilfred Owen The first poem that I am to analyse is Anthem for Doomed Youth, written by Wilfred Owen. This poem is a sonnet. It has fourteen lines. In this poem, the first and fourth lines rhyme, as do the second and third. The first stanza is mainly about the battlefield, whereas the second stanza is more about the feelings of friends and family back at home. This poem starts off at a quick pace, and then slows down throughout Read MoreWilfred Owen Poetry799 Words   |  3 PagesPoetry is a form of writing that can be used to convey very strong emotions and ideas to the reader, this can be seen in the works of famous poet Wilfred Owen, Owen is the most well-known English trench warfare poet who fought in World War I. His military career began in 1915, when he enlisted himself in the Artists Rifle group and soon became a second lieutenant, like many young men he was ready to fight and die for his country. In 1917 he was wounded in battle and was diagnosed with shell shock;Read More The Negative View of Society in Wilfred Owens Poetry Essay1156 Words   |  5 PagesDulce et Decorum est and Anthem for Doomed Youth are both written by Wilfred Owen, and both are written to show â€Å"the war [World War I] and the pity of war†. Owen does this by regaling very sad and often shocking poems that I believe are very effective in deliveri ng their purpose. Both poems present negative views of society through tone and metaphors and Dulce et Decorum est also uses similes. A poem that presents a negative view on society is Dulce et Decorum est. It is a satirical poem about

Wednesday, May 6, 2020

Essay about Fiscal Policy - 498 Words

Fiscal Policy Most people nowadays seem to think that fiscal policy cannot be used to influence economic activity, and they are supported in this view by the majority of professional macroeconomists. Students are taught that output and employment are determined by the demands and supplies of individuals interacting in a gigantic market and that governments cannot alter the outcome of this process except temporarily and destructively. The Congressional Budget Office (CBO) bases its projections of the federal budget on assumptions about output that are largely independent of fiscal policy. An increase in federal expenditure, the CBO assumes, will have no positive effect at all on real output; rather, it will have a negative effect,†¦show more content†¦It is true that the present expansion, which has now lasted for more than six years, has been accompanied by a tightening of the fiscal stance, but this has been possible only because there has simultaneously been a long and sustained expansi on of private expenditure financed by borrowing. The article concludes that the expansion of net lending cannot continue for much longer without making debt-income levels impossibly high; therefore, in contradiction to the political consensus of the moment, fiscal policy will have to be expanded substantially and progressively compared with what the CBO is now projecting if a prolonged recession is to be avoided. The Theory Behind It We assume that an addition to government expenditure increases the gross domestic product (GDP) directly while a cut in the tax rate adds to private disposable income, thereby increasing GDP indirectly. We maintain that the overall impact of the governments fiscal operations on the economy can be measured by combining these two policy instruments into a single constructed variable - the total flow of government expenditure divided by the average tax rate, which we call the fiscal stance, the definition of which implies that it would exactly equal GDP if the budget were balanced.(1) The budget deficit, measured ex-post facto, is a bad measure of theShow MoreRelatedFiscal Policy And Fiscal Policies1193 Words   |  5 Pagesrecession to containing inflation, achieving full employment to increasing economic output. Fiscal policy is one of the tools often used to realise these goals and create financial stability. There are two ways in which fiscal policy can be implemented, either a con tractionary fiscal policy, or an expansionary fiscal policy, which I will explore in this assignment. The aim of an expansionary fiscal policy is to raise expenditure, whereby economic output and household income will also increase. ThisRead MoreFiscal Policy And Fiscal Policies838 Words   |  4 Pagesactive fiscal policy† (CNBC) in order to have its economy back on the reasonable range. Fiscal policy affects aggregate demand depending on the government’s spending and taxation. Thus, if the government decides to make changes in its taxation such as discounting corporate taxes, the aggregate demand curve will shift. In addition to that, money spent on public services and welfares will increase government spending which will affect aggregate demand as well. Economic Analysis Fiscal Policy â€Å"FiscalRead MoreFiscal Policy And Fiscal Policies1560 Words   |  7 PagesFiscal Policy Brooks (2012) defines that fiscal policy is adjusting government revenue and spending in order to influence the direction of the economy and meet the economic goals of the country. The two main tools in fiscal policy are taxes and expenditure. Fiscal policy is set by the government and parliament and often used a combination with monetary policy, which set by Reserve Bank of Australia as an example. Furthermore, this essay discusses the Australian government fiscal policies during theRead MoreFiscal Policy And Fiscal Policies1046 Words   |  5 PagesFiscal Policy Generally fiscal policy is the set of strategies that government implements or plans to use with certain activities such as the collection of revenues and taxes and expenditure that can influence the overall economic condition of the nation. A well written or planned fiscal policy can lead the nation to the steady path of the strong economy, increase employment and also maintains healthy inflation. Every country needs fiscal policy as fiscal policy plays a vital role on monitoringRead MoreFiscal Policy And Monetary Policy862 Words   |  4 PagesFiscal Policy vs Monetary Policy Fiscal policy is a way for the government to control the economy financially. The Federal Government sometimes partakes in actions to stimulate the economy. Fiscal Policy focuses on changing government spending, controlling inflation, encouraging economic growth, and to reach full employment. Monetary policy is a policy the Federal Reserve Board enforces which consists of changes in the money supply which influences the interest rates in the economy. This can helpRead MoreEssay on Fiscal Policy718 Words   |  3 Pages Fiscal Policy can be explained in many ways, for example. Fiscal policy is the use of the government budget to affect an economy. When the government decides on the taxes that it collects, the transfer payments it gives out, or the goods and services that it purchases, it is engaging in fiscal policy. The primary economic impact of any change in the government budget is felt by particular groups—a tax cut for families with children, for example, raises the disposable income of such families. DiscussionsRead MoreFiscal Policy2022 Words   |  9 Pagesnation. There are many tools to stabilize the economy and reduce the frequency and the altitude of economic fluctuations. Among these tools are the fiscal policy and monetary policy. This report discus ses the fiscal policy and why the governments use this too to stabilize the economy and encounter the economic fluctuations. Definition Fiscal policy is a macroeconomic tool used by the government through the control of taxation and government spending in an effort to affect the business cycle andRead MoreFiscal Policy, Crowding out, Supply-side, Economics1957 Words   |  8 Pagesï » ¿ Economics Assignment #2 Question I. Fiscal Policy and the Crowding Out Effect. (a) What is the essence of the accounting identity (the so called saving investment identity) that the two distinguished professors refer to? Saving investment identity  is a concept in National Income accounting that states that the amount saved (S) in an economy is equal to the amount invested (I). It is an equilibrium expressed in terms ofRead MoreFiscal Policies And The Fiscal Policy904 Words   |  4 PagesBefore we talk about ways to assess fiscal policy of an economy, I would like to describe what we mean by fiscal policies and why it is important for an economy. Fiscal policy is the use of government revenues and expenditure to influence growth of an economy. Fiscal policies that increase demand in an economy are called as expansionary policy whereas those which reduce demand are called as contractionary fiscal policies. These policies are most effective in a fixed exchange rate regime with perfectRead MoreFiscal Policies And The Fiscal Policy1091 Words   |  5 PagesThe fiscal policy is the means by which the government of a country adjusts its spending levels and the tax rates that are applied so as to monit or and influence a country’s economy. On the general scale, there are two types of fiscal policies. These are the contractionary and the expansionary fiscal policy. The expansionary policy is used mostly to spur economic growth in the times of low periods in the business years (Langdana, F. K. p.34) The contractionary policy on the other hand seeks to reduce

The Golden Compass Chapter Ten Free Essays

Part Two Bolvangar Chapter Ten The Consul And The Bear John Faa and the other leaders had decided that they would make for Trollesund, the main port of Lapland. The witches had a consulate in the town, and John Faa knew that without their help, or at least their friendly neutrality, it would be impossible to rescue the captive children. He explained his idea to Lyra and Farder Coram the next day, when Lyra’s seasickness had abated slightly. We will write a custom essay sample on The Golden Compass Chapter Ten or any similar topic only for you Order Now The sun was shining brightly and the green waves were dashing against the bows, bearing white streams of foam as they curved away. Out on the deck, with the breeze blowing and the whole sea a-sparkle with light and movement, she felt little sickness at all; and now that Pantalaimon had discovered the delights of being a seagull and then a stormy petrel and skimming the wave tops, Lyra was too absorbed by his glee to wallow in landlubberly misery. John Faa, Farder Coram, and two or three others sat in the stern of the ship, with the sun full on them, talking about what to do next. â€Å"Now, Farder Coram knows these Lapland witches,† John Faa said. â€Å"And if I en’t mistaken, there’s an obligation there.† â€Å"That’s right, John,† said Farder Coram. â€Å"It were forty years back, but that’s nothing to a witch. Some of ’em live to many times that.† â€Å"What happened to bring this obligation about, Farder Coram?† said Adam Stefanski, the man in charge of the fighting troop. â€Å"I saved a witch’s life,† Farder Coram explained. â€Å"She fell out of the air, being pursued by a great red bird like to nothing I’d seen before. She fell injured in the marsh and I set out to find her. She was like to drowning, and I got her on board and shot that bird down, and it fell into a bog, to my regret, for it was as big as a bittern, and flame-red.† â€Å"Ah,† the other men murmured, captured by Farder Coram’s story. â€Å"Now, when I got her in the boat,† he went on, â€Å"I had the most grim shock I’d ever known, because that young woman had no daemon.† It was as if he’d said, â€Å"She had no head.† The very thought was repugnant. The men shuddered, their daemons bristled or shook themselves or cawed harshly, and the men soothed them. Pantalaimon crept into Lyra’s arms, their hearts beating together. â€Å"At least,† Farder Coram said, â€Å"that’s what it seemed. Being as she’d fell out of the air, I more than suspected she was a witch. She looked exactly like a young woman, thinner than some and prettier than most, but not seeing that daemon gave me a hideous turn.† â€Å"En’t they got daemons then, the witches?† said the other man, Michael Canzona. â€Å"Their daemons is invisible, I expect,† said Adam Stefanski. â€Å"He was there all the time, and Farder Coram never saw him.† â€Å"No, you’re wrong, Adam,† said Farder Coram. â€Å"He weren’t there at all. The witches have the power to separate their-selves from their daemons a mighty sight further’n what we can. If need be, they can send their daemons far abroad on the wind or the clouds, or down below the ocean. And this witch I found, she hadn’t been resting above an hour when her daemon came a flying back, because he’d felt her fear and her injury, of course. And it’s my belief, though she never admitted to this, that the great red bird I shot was another witch’s daemon, in pursuit. Lord! That made me shiver, when I thought of that. I’d have stayed my hand; I’d have taken any measures on sea or land; but there it was. Anyway, there was no doubt I’d saved her life, and she gave me a token of it, and said I was to call on her help if ever it was needed. And once she sent me help when the Skraelings shot me with a poison arrow. We had other connections, too†¦.I haven’t seen her from that day to this, but she’ll remember.† â€Å"And does she live at Trollesund, this witch?† â€Å"No, no. They live in forests and on the tundra, not in a seaport among men and women. Their business is with the wild. But they keep a consul there, and I shall get word to her, make no doubt about that.† Lyra was keen to know more about the witches, but the men had turned their talk to the matter of fuel and stores, and presently she grew impatient to see the rest of the ship. She wandered along the deck toward the bows, and soon made the acquaintance of an able seaman by flicking at him the pips she’d saved from the apple she’d eaten at breakfast. He was a stout and placid man, and when he’d sworn at her and been sworn at in return, they became great friends. He was called Jerry. Under his guidance she found out that having something to do prevented you from feeling seasick, and that even a job like scrubbing a deck could be satisfying, if it was done in a seamanlike way. She was very taken with this notion, and later on she folded the blankets on her bunk in a seamanlike way, and put her possessions in the closet in a seamanlike way, and used â€Å"stow† instead of â€Å"tidy† for the process of doing so. After two days at sea, Lyra decided that this was the life for her. She had the run of the ship, from the engine room to the bridge, and she was soon on first-name terms with all the crew. Captain Rokeby let her signal to a Hollands frigate by pulling the handle of the steam whistle; the cook suffered her help in mixing plum duff; and only a stern word from John Faa prevented her from climbing the foremast to inspect the horizon from the crow’s nest. All the time they were steaming north, and it grew colder daily. The ship’s stores were searched for oilskins that could be cut down for her, and Jerry showed her how to sew, an art she learned willingly from him, though she had scorned it at Jordan and avoided instruction from Mrs. Lonsdale. Together they made a waterproof bag for the alethiometer that she could wear around her waist, in case she fell in the sea, she said. With it safely in place she clung to the rail in her oilskins and sou’wester as the stinging spray broke over the bows and surged along the deck. She still felt seasick occasionally, especially when the wind got up and the ship plunged heavily over the crests of the gray-green waves, and then it was Pantalaimon’s job to distract her from it by skimming the waves as a stormy petrel; because she could feel his boundless glee in the dash of wind and water, and forget her nausea. From time to time he even tried being a fish, and once joined a scho ol of dolphins, to their surprise and pleasure. Lyra stood shivering in the fo’c’sle and laughed with delight as her beloved Pantalaimon, sleek and powerful, leaped from the water with half a dozen other swift gray shapes. He had to stay close to the ship, of course, for he could never go far from her; but she sensed his desire to speed as far and as fast as he could, for pure exhilaration. She shared his pleasure, but for her it wasn’t simple pleasure, for there was pain and fear in it too. Suppose he loved being a dolphin more than he loved being with her on land? What would she do then? Her friend the able seaman was nearby, and he paused as he adjusted the canvas cover of the forward hatch to look out at the little girl’s daemon skimming and leaping with the dolphins. His own daemon, a seagull, had her head tucked under her wing on the capstan. He knew what Lyra was feeling. â€Å"I remember when I first went to sea, my Belisaria hadn’t settled on one form, I was that young, and she loved being a porpoise. I was afraid she’d settle like that. There was one old sailorman on my first vessel who could never go ashore at all, because his daemon had settled as a dolphin, and he could never leave the water. He was a wonderful sailor, best navigator you ever knew; could have made a fortune at the fishing, but he wasn’t happy at it. He was never quite happy till he died and he could be buried at sea.† â€Å"Why do daemons have to settle?† Lyra said. â€Å"I want Pantalaimon to be able to change forever. So does he.† â€Å"Ah, they always have settled, and they always will. That’s part of growing up. There’ll come a time when you’ll be tired of his changing about, and you’ll want a settled kind of form for him.† â€Å"I never will!† â€Å"Oh, you will. You’ll want to grow up like all the other girls. Anyway, there’s compensations for a settled form.† â€Å"What are they?† â€Å"Knowing what kind of person you are. Take old Belisaria. She’s a seagull, and that means I’m a kind of seagull too. I’m not grand and splendid nor beautiful, but I’m a tough old thing and I can survive anywhere and always find a bit of food and company. That’s worth knowing, that is. And when your daemon settles, you’ll know the sort of person you are.† â€Å"But suppose your daemon settles in a shape you don’t like?† â€Å"Well, then, you’re discontented, en’t you? There’s plenty of folk as’d like to have a lion as a daemon and they end up with a poodle. And till they learn to be satisfied with what they are, they’re going to be fretful about it. Waste of feeling, that is.† But it didn’t seem to Lyra that she would ever grow up. One morning there was a different smell in the air, and the ship was moving oddly, with a brisker rocking from side to side instead of the plunging and soaring. Lyra was on deck a minute after she woke up, gazing greedily at the land: such a strange sight, after all that water, for though they had only been at sea a few days, Lyra felt as if they’d been on the ocean for months. Directly ahead of the ship a mountain rose, green flanked and snow-capped, and a little town and harbor lay below it: wooden houses with steep roofs, an oratory spire, cranes in the harbor, and clouds of gulls wheeling and crying. The smell was of fish, but mixed with it came land smells too: pine resin and earth and something animal and musky, and something else that was cold and blank and wild: it might have been snow. It was the smell of the North. Seals frisked around the ship, showing their clown faces above the water before sinking back without a splash. The wind that lifted spray off the white-capped waves was monstrously cold, and searched out every gap in Lyra’s wolfskin, and her hands were soon aching and her face numb. Pantalaimon, in his ermine shape, warmed her neck for her, but it was too cold to stay outside for long without work to do, even to watch the seals, and Lyra went below to eat her breakfast porridge and look through the porthole in the saloon. Inside the harbor the water was calm, and as they moved past the massive breakwater Lyra began to feel unsteady from the lack of motion. She and Pantalaimon avidly watched as the ship inched ponderously toward the quayside. During the next hour the sound of the engine died away to a quiet background rumble, voices shouted orders or queries, ropes were thrown, gangways lowered, hatches opened. â€Å"Come on, Lyra,† said Farder Coram. â€Å"Is everything packed?† Lyra’s possessions, such as they were, had been packed ever since she’d woken up and seen the land. All she had to do was run to the cabin and pick up the shopping bag, and she was ready. The first thing she and Farder Coram did ashore was to visit the house of the witch consul. It didn’t take long to find it; the little town was clustered around the harbor, with the oratory and the governor’s house the only buildings of any size. The witch consul lived in a green-painted wooden house within sight of the sea, and when they rang the bell it jangled loudly in the quiet street. A servant showed them into a little parlor and brought them coffee. Presently the consul himself came in to greet them. He was a fat man with a florid face and a sober black suit, whose name was Martin Lanselius. His dsmon was a little serpent, the same intense and brilliant green as his eyes, which were the only witchlike thing about him, though Lyra was not sure what she had been expecting a witch to look like. â€Å"How can I help you, Farder Coram?† he said. â€Å"In two ways, Dr. Lanselius. First, I’m anxious to get in touch with a witch lady I met some years ago, in the fen country of Eastern Anglia. Her name is Serafina Pekkala.† Dr. Lanselius made a note with a silver pencil. â€Å"How long ago was your meeting with her?† he said. â€Å"Must be forty years. But I think she would remember.† â€Å"And what is the second way in which you seek my help?† â€Å"I’m representing a number of gyptian families who’ve lost children. We’ve got reason to believe there’s an organization capturing these children, ours and others, and bringing them to the North for some unknown purpose. I’d like to know whether you or your people have heard of anything like this a going on.† Dr. Lanselius sipped his coffee blandly. â€Å"It’s not impossible that notice of some such activity might have come our way,† he said. â€Å"You realize, the relations between my people and the Northlanders are perfectly cordial. It would be difficult for me to justify disturbing them.† Farder Coram nodded as if he understood very well. â€Å"To be sure,† he said. â€Å"And it wouldn’t be necessary for me to ask you if I could get the information any other way. That was why I asked about the witch lady first.† Now Dr. Lanselius nodded as if he understood. Lyra watched this game with puzzlement and respect. There were all kinds of things going on beneath it, and she saw that the witch consul was coming to a decision. â€Å"Very well,† he said. â€Å"Of course, that’s true, and you’ll realize that your name is not unknown to us, Farder Coram. Serafina Pekkala is queen of a witch clan in the region of Lake Enara. As for your other question, it is of course understood that this information is not reaching you through me.† â€Å"Quite so.† â€Å"Well, in this very town there is a branch of an organization called the Northern Progress Exploration Company, which pretends to be searching for minerals, but which is really controlled by something called the General Oblation Board of London. This organization, I happen to know, imports children. This is not generally known in the town; the Norroway government is not officially aware of it. The children don’t remain here long. They are taken some distance inland.† â€Å"Do you know where, Dr. Lanselius?† â€Å"No. I would tell you if I did.† â€Å"And do you know what happens to them there?† For the first time, Dr. Lanselius glanced at Lyra. She looked stolidly back. The little green serpent daemon raised her head from the consul’s collar and whispered tongue-flickeringly in his ear. The consul said, â€Å"I have heard the phrase the M.aystadt process in connection with this matter. I think they use that in order to avoid calling what they do by its proper name. I have also heard the word intercision, but what it refers to I could not say.† â€Å"And are there any children in the town at the moment?† said Farder Coram. He was stroking his daemon’s fur as she sat alert in his lap. Lyra noticed that she had stopped purring. â€Å"No, I think not,† said Dr. Lanselius. â€Å"A group of about twelve arrived a week ago and moved out the day before yesterday.† â€Å"Ah! As recent as that? Then that gives us a bit of hope. How did they travel, Dr. Lanselius?† â€Å"By sledge.† â€Å"And you have no idea where they went?† â€Å"Very little. It is not a subject we are interested in.† â€Å"Quite so. Now, you’ve answered all my questions very fairly, sir, and here’s just one more. If you were me, what question would you ask of the Consul of the Witches?† For the first time Dr. Lanselius smiled. â€Å"I would ask where I could obtain the services of an armored bear,† he said. Lyra sat up, and felt Pantalaimon’s heart leap in her hands. â€Å"I understood the armored bears to be in the service of the Oblation Board,† said Farder Coram in surprise. â€Å"I mean, the Northern Progress Company, or whatever they’re calling themselves.† â€Å"There is at least one who is not. You will find him at the sledge depot at the end of Langlokur Street. He earns a living there at the moment, but such is his temper and the fear he engenders in the dogs, his employment might not last for long.† â€Å"Is he a renegade, then?† â€Å"It seems so. His name is lorek Byrnison. You asked what I would ask, and I told you. Now here is what I would do: I would seize the chance to employ an armored bear, even if it were far more remote than this.† Lyra could hardly sit still. Farder Coram, however, knew the etiquette for meetings such as this, and took another spiced honey cake from the plate. While he ate it, Dr. Lanselius turned to Lyra. â€Å"I understand that you are in possession of an alethiome-ter,† he said, to her great surprise; for how could he have known that? â€Å"Yes,† she said, and then, prompted by a nip from Pantalaimon, added, â€Å"Would you like to look at it?† â€Å"I should like that very much.† She fished inelegantly in the oilskin pouch and handed him the velvet package. He unfolded it and held it up with great care, gazing at the face like a Scholar gazing at a rare manuscript. â€Å"How exquisite!† he said. â€Å"I have seen one other example, but it was not so fine as this. And do you possess the books of readings?† â€Å"No,† Lyra began, but before she could say any more, Farder Coram was speaking. â€Å"No, the great pity is that although Lyra possesses the alethiometer itself, there’s no means of reading it whatsoever,† he said. â€Å"It’s just as much of a mystery as the pools of ink the Hindus use for reading the future. And the nearest book of readings I know of is in the Abbey of St. Johann at Heidelberg.† Lyra could see why he was saying this: he didn’t want Dr. Lanselius to know of Lyra’s power. But she could also see something Farder Coram couldn’t, which was the agitation of Dr. Lanselius’s daemon, and she knew at once that it was no good to pretend. So she said, â€Å"Actually, I can read it,† speaking half to Dr. Lanselius and half to Farder Coram, and it was the consul who responded. â€Å"That is wise of you,† he said. â€Å"Where did you obtain this one?† â€Å"The Master of Jordan College in Oxford gave it to me,† she said. â€Å"Dr. Lanselius, do you know who made them?† â€Å"They are said to originate in the city of Prague,† said the consul. â€Å"The Scholar who invented the first alethiometer was apparently trying to discover a way of measuring the influences of the planets, according to the ideas of astrology. He intended to make a device that would respond to the idea of Mars or Venus as a compass responds to the idea of North. In that he failed, but the mechanism he invented was clearly responding to something, even if no one knew what it was.† â€Å"And where did they get the symbols from?† â€Å"Oh, this was in the seventeenth century. Symbols and emblems were everywhere. Buildings and pictures were designed to be read like books. Everything stood for something else; if you had the right dictionary, you could read Nature itself. It was hardly surprising to find philosophers using the symbolism of their time to interpret knowledge that came from a mysterious source. But, you know, they haven’t been used seriously for two centuries or so.† He handed the instrument back to Lyra, and added: â€Å"May I ask a question? Without the books of symbols, how do you read it?† â€Å"I just make my mind go clear and then it’s sort of like looking down into water. You got to let your eyes find the right level, because that’s the only one that’s in focus. Something like that,† she said. â€Å"I wonder if I might ask to see you do it?† he said. Lyra looked at Farder Coram, wanting to say yes but waiting for his approval. The old man nodded. â€Å"What shall I ask?† said Lyra. â€Å"What are the intentions of the Tartars with regard to Kamchatka?† That wasn’t hard. Lyra turned the hands to the camel, which meant Asia, which meant Tartars; to the cornucopia, for Kamchatka, where there were gold mines; and to the ant, which meant activity, which meant purpose and intention. Then she sat still, letting her mind hold the three levels of meaning together in focus, and relaxed for the answer, which came almost at once. The long needle trembled on the dolphin, the helmet, the baby, and the anchor, dancing between them and onto the crucible in a complicated pattern that Lyra’s eyes followed without hesitation, but which was incomprehensible to the two men. When it had completed the movements several times, Lyra looked up. She blinked once or twice as if she were coming out of a trance. â€Å"They’re going to pretend to attack it, but they’re not really going to, because it’s too far away and they’d be too stretched out,† she said. â€Å"Would you tell me how you read that?† â€Å"The dolphin, one of its deep-down meanings is playing, sort of like being playful,† she explained. â€Å"I know it’s the fifteenth because it stopped fifteen times and it just got clear at that level but nowhere else. And the helmet means war, and both together they mean pretend to go to war but not be serious. And the baby means – it means difficult – it’d be too hard for them to attack it, and the anchor says why, because they’d be stretched out as tight as an anchor rope. I just see it all like that, you see.† Dr. Lanselius nodded. â€Å"Remarkable,† he said. â€Å"I am very grateful. I shall not forget that.† Then he looked strangely at Farder Coram, and back at Lyra. â€Å"Could I ask you for one more demonstration?† he said. â€Å"If you look out of this window, you’ll see a shed with forty or more sprays of cloud-pine hanging on the wall. One of them has been used by Serafina Pekkala, and the others have not. Could you tell which is hers?† â€Å"Yeah!† said Lyra, always ready to show off, and she took the alethiometer and hurried out. She was eager to see cloud-pine, because the witches used it for flying, and she’d never seen any before. The two men stood by the window and watched as she kicked her way through the snow, Pantalaimon bouncing beside her as a hare, to stand in front of the wooden shed, head down, manipulating the alethiometer. After a few seconds she reached forward and unhesitatingly picked out one of the many sprays of pine and held it up. Dr. Lanselius nodded. Lyra, intrigued and eager to fly, held it above her head and jumped, and ran about in the snow trying to be a witch. The consul turned to Farder Coram and said: â€Å"Do you realize who this child is?† â€Å"She’s the daughter of Lord Asriel,† said Farder Coram. â€Å"And her mother is Mrs. Coulter, of the Oblation Board.† â€Å"And apart from that?† The old gyptian had to shake his head. â€Å"No,† he said, â€Å"I don’t know any more. But she’s a strange innocent creature, and I wouldn’t have her harmed for the world. How she comes to read that instrument I couldn’t guess, but I believe her when she talks of it. Why, Dr. Lanselius? What do you know about her?† â€Å"The witches have talked about this child for centuries past,† said the consul. â€Å"Because they live so close to the place where the veil between the worlds is thin, they hear immortal whispers from time to time, in the voices of those beings who pass between the worlds. And they have spoken of a child such as this, who has a great destiny that can only be fulfilled elsewhere – not in this world, but far beyond. Without this child, we shall all die. So the witches say. But she must fulfill this destiny in ignorance of what she is doing, because only in her ignorance can we be saved. Do you understand that, Farder Coram?† â€Å"No,† said Farder Coram, â€Å"I’m unable to say that I do.† â€Å"What it means is that she must be free to make mistakes. We must hope that she does not, but we can’t guide her. I am glad to have seen this child before I die.† â€Å"But how did you recognize her as being that particular child? And what did you mean about the beings who pass between the worlds? I’m at a loss to understand you, Dr. Lanselius, for all that I judge you’re an honest man†¦.† But before the consul could answer, the door opened and Lyra came in bearing a little branch of pine. â€Å"This is the one!† she said. â€Å"I tested ’em all, and this is it, I’m sure. But it won’t fly for me.† The consul said, â€Å"Well, Lyra, that is remarkable. You are lucky to have an instrument like that, and I wish you well with it. I would like to give you something to take away with you†¦.† He took the spray and broke off a twig for her. â€Å"Did she really fly with this?† Lyra said. â€Å"Yes, she did. But then she is a witch, and you are not. I can’t give you all of it, because I need it to contact her, but this will be enough. Look after it.† â€Å"Yes, I will,† she said. â€Å"Thank you.† And she tucked it into her purse beside the alethiometer. Farder Coram touched the spray of pine as if for luck, and on his face was an expression Lyra had never seen before: almost a longing. The consul showed them to the door, where he shook hands with Farder Coram, and shook Lyra’s hand too. â€Å"I hope you find success,† he said, and stood on his doorstep in the piercing cold to watch them up the little street. â€Å"He knew the answer about the Tartars before I did,† Lyra told Farder Coram. â€Å"The alethiometer told me, but I never said. It was the crucible.† â€Å"I expect he was testing you, child. But you done right to be polite, being as we can’t be sure what he knows already. And that was a useful tip about the bear. I don’t know how we would a heard otherwise.† They found their way to the depot, which was a couple of concrete warehouses in a scrubby area of waste ground where thin weeds grew between gray rocks and pools of icy mud. A surly man in an office told them that they could find the bear off duty at six, but they’d have to be quick, because he usually went straight to the yard behind Einarsson’s Bar, where they gave him drink. Then Farder Coram took Lyra to the best outfitter’s in town and bought her some proper cold-weather clothing. They bought a parka made of reindeer skin, because reindeer hair is hollow and insulates well; and the hood was lined with wolverine fur, because that sheds the ice that forms when you breathe. They bought underclothing and boot liners of reindeer calf skin, and silk gloves to go inside big fur mittens. The boots and mittens were made of skin from the reindeer’s forelegs, because that is extra tough, and the boots were soled with the skin of the bearded seal, which is as tough as walrus hide, but lighter. Finally they bought a waterproof cape that enveloped her completely, made of semitransparent seal intestine. With all that on, and a silk muffler around her neck and a woollen cap over her ears and the big hood pulled forward, she was uncomfortably warm; but they were going to much colder regions than this. John Faa had been supervising the unloading of the ship, and was keen to hear about the witch consul’s words, and even keener to learn of the bear. â€Å"We’ll go to him this very evening,† he said. â€Å"Have you ever spoken to such a creature, Farder Coram?† â€Å"Yes, I have; and fought one, too, though not by myself, thank God. We must be ready to treat with him, John. He’ll ask a lot, I’ve no doubt, and be surly and difficult to manage; but we must have him.† â€Å"Oh, we must. And what of your witch?† â€Å"Well, she’s a long way off, and a clan queen now,† said Farder Coram. â€Å"I did hope it might be possible for a message to reach her, but it would take too long to wait for a reply.† â€Å"Ah, well. Now let me tell you what I’ve found, old friend.† For John Faa had been fidgeting with impatience to tell them something. He had met a prospector on the quayside, a New Dane from the country of Texas, and this man had a balloon, of all things. The expedition he’d been hoping to join had failed for lack of funds even before it had left Amsterdam, so he was stranded. â€Å"Think what we might do with the help of an aeronaut, Farder Coram!† said John Faa, rubbing his great hands together. â€Å"I’ve engaged him to sign up with us. Seems to me we struck lucky a coming here.† â€Å"Luckier still if we had a clear idea of where we were going,† said Farder Coram, but nothing could damp John Faa’s pleasure in being on campaign once more. After darkness had fallen, and when the stores and equipment had all been safely unloaded and stood in waiting on the quay, Farder Coram and Lyra walked along the waterfront and looked for Einarsson’s Bar. They found it easily enough: a crude concrete shed with a red neon sign flashing irregularly over the door and the sound of loud voices through the condensation-frosted windows. A pitted alley beside it led to a sheet-metal gate into a rear yard, where a lean-to shed stood crazily over a floor of frozen mud. Dim yellow light through the rear window of the bar showed a vast pale form crouching upright and gnawing at a haunch of meat which it held in both hands. Lyra had an impression of bloodstained muzzle and face, small malevolent black eyes, and an immensity of dirty matted yellowish fur. As it gnawed, hideous growling, crunching, sucking noises came from it. Farder Coram stood by the gate and called: â€Å"lorek Byrnison!† The bear stopped eating. As far as they could tell, he was looking at them directly, but it was impossible to read any expression on his face. â€Å"lorek Byrnison,† said Farder Coram again. â€Å"May I speak to you?† Lyra’s heart was thumping hard, because something in the bear’s presence made her feel close to coldness, danger, brutal power, but a power controlled by intelligence; and not a human intelligence, nothing like a human, because of course bears had no daemons. This strange hulking presence gnawing its meat was like nothing she had ever imagined, and she felt a profound admiration and pity for the lonely creature. He dropped the reindeer leg in the dirt and slumped on all fours to the gate. Then he reared up massively, ten feet or more high, as if to show how mighty he was, to remind them how useless the gate would be as a barrier, and he spoke to them from that height. â€Å"Well? Who are you?† His voice was so deep it seemed to shake the earth. The rank smell that came from his body was almost overpowering. â€Å"I’m Farder Coram, from the gyptian people of Eastern Anglia. And this little girl is Lyra Belacqua.† â€Å"What do you want?† â€Å"We want to offer you employment, lorek Byrnison.† â€Å"I am employed.† The bear dropped on all fours again. It was very hard to detect any expressive tones in his voice, whether of irony or anger, because it was so deep and so flat. â€Å"What do you do at the sledge depot?† Farder Coram asked. â€Å"I mend broken machinery and articles of iron. I lift heavy objects.† â€Å"What kind of work is that for a panserbjorn ?† â€Å"Paid work.† Behind the bear, the door of the bar opened a little way and a man put down a large earthenware jar before looking up to peer at them. â€Å"Who’s that?† he said. â€Å"Strangers,† said the bear. The bartender looked as if he was going to ask something more, but the bear lurched toward him suddenly and the man shut the door in alarm. The bear hooked a claw through the handle of the jar and lifted it to his mouth. Lyra could smell the tang of the raw spirits that splashed out. After swallowing several times, the bear put the jar down and turned back to gnaw his haunch of meat, heedless of Farder Coram and Lyra, it seemed; but then he spoke again. â€Å"What work are you offering?† â€Å"Fighting, in all probability,† said Farder Coram. â€Å"We’re moving north until we find a place where they’ve taken some children captive. When we find it, we’ll have to fight to get the children free; and then we’ll bring them back.† â€Å"And what will you pay?† â€Å"I don’t know what to offer you, lorek Byrnison. If gold is desirable to you, we have gold.† â€Å"No good.† â€Å"What do they pay you at the sledge depot?† â€Å"My keep here in meat and spirits.† Silence from the bear; and then he dropped the ragged bone and lifted the jar to his muzzle again, drinking the powerful spirits like water. â€Å"Forgive me for asking, lorek Byrnison,† said Farder Coram, â€Å"but you could live a free proud life on the ice hunting seals and walruses, or you could go to war and win great prizes. What ties you to Trollesund and Einarsson’s Bar?† Lyra felt her skin shiver all over. She would have thought a question like that, which was almost an insult, would enrage the great creature beyond reason, and she wondered at Farder Coram’s courage in asking it. lorek Byrnison put down his jar and came close to the gate to peer at the old man’s face. Farder Coram didn’t flinch. â€Å"I know the people you are seeking, the child cutters,† the bear said. â€Å"They left town the day before yesterday to go north with more children. No one will tell you about them; they pretend not to see, because the child cutters bring money and business. Now, I don’t like the child cutters, so I shall answer you politely. I stay here and drink spirits because the men here took my armor away, and without that, I can hunt seals but I can’t go to war; and I am an armored bear; war is the sea I swim in and the air I breathe. The men of this town gave me spirits and let me drink till I was asleep, and then they took my armor away from me. If I knew where they keep it, I would tear down the town to get it back. If you want my service, the price is this: get me back my armor. Do that, and I shall serve you in your campaign, either until I am dead or until you have a victory. The price is my armor. I want it back, and then I shall never need spirits again.† How to cite The Golden Compass Chapter Ten, Essay examples

Samsung in Apple Patent Damages Dispute

Question: Discuss about the Samsung in Apple Patent Damages Dispute. Answer: Introduction: This paper will evaluate a court case between two giant companies which sell more than half of the smartphones sold all over the world (Taube, 2016). Apple and Samsung have been playing a tug-of-war in the courts from last several years, with both choosing to end some of the other cases outside the court (Satariano Rosenblatt, 2014). The base of this paper is a news article by Balakrishnan (2016) with the same title. What happened is that Samsung copied some design from Apple and used them to great success in its products. Samsung denies having stolen Apple's intellectual property per se but admits to stealing only components from Apple. Using the complete end-product as the foundation for determining the value of penalty has been turned down by the Supreme Court in the Dec 2016 ruling when only portions are stolen and integrated as a part of a complex product. The Supreme Court has ruled that in the instance of a simple product, say a dinner plate, the complete end-product will be used, but not so for a complex product, say an oven (Balakrishnan, 2016). The ruling by the Supreme Court presents an ethical quandary. This paper will ask the question that is it okay to steal portions from someone else's efforts (intellectual property) and implement it in own's product (and possibly build something equal or better). Specifically, was Samsung ethically correct in copying components of Apple to include in this products. This paper will explore this question from the perspective of four classical ethical theories - Utilitarianism, Deontology, Virtue Ethics and Contractarianism. Map of Arguments From Moral Perspective Utilitarianism is an ethical theory that gives prominence to the consequences of an action. Utilitarianism takes upon itself to do the maximum possible benefit (or the minimum harm) upon as many sentient beings as possible which will be affected by the actions. It finds roots in guiding the legislators in the 18th century (Driver, 2014) to help them choose which laws to enact. Utilitarianism is a type of Consequentialism, as it depends on the consequences to labelling the actions as morally good or bad (Nathanson, n.d.). In the Utilitarianism school of thought, was Samsung ethically right in stealing portions from Apple? Apple is in the iOS operating system, and Samsung used the stolen assets in the Android operating system. Now, these operating systems are ecosystems in themselves and people rarely migrate from one to another. While Android boasts of openness in architecture and apps, iOS boasts of familiarity (Samuels, 2017). Thus, if these components had stayed with Apple, a large chunk of smartphone users (Samsung ones using products based on stolen concepts) would have never benefitted from these assets. The loss to Apple is the increases unfair competition and loss of sales. However, Apple is not sitting still and has sued Samsung. Thus, the greater good is for the users of both operating systems benefitting from new and novel technologies. Thus, this stealing of components is ethical. Deontology Deontology finds its foundations in duty and is a rigid ethical theory. Deontology focuses on the action. The consequences are not relevant in this school of thought. Thus, in Deontological Ethics, there is a clear-cut classification of an action as being morally good or bad. In Deontology, a person who chooses to (attempt to) kill an intruder to his house is doing the ethical thing. In Deontology, consequences can never be used to justify actions (Alexander Moore, 2016). Stealing is morally wrong action. Stealing is wrong because if it is okay, then everyone will be (morally) free to steal and everyone will be busy securing their property, and no progress will be possible. This reasoning applies to stealing a pencil from the office to the stealing of ideas. Samsung stole assets developed by Apple. The consequences are not relevant here. This copying is not ethically correct. Virtue Ethics Virtue Ethics do not codify any actions as morally right or wrong, and neither base the evaluation of the consequences. Virtue Ethics is a general school of thought promoting the correct thing, at the relevant time, with the right person, and in the appropriate measure. Such a definition leaves the analysis of every scenario open. The goal of Virtue Ethics is Eudaimonia or human flourishing (Robinson, 1999). Also, the virtues are not merely concepts and require wholehearted acceptance of the beliefs (Hursthouse Pettigrove, 2016). Virtue Ethics is about moderation and avoiding the both vices of deficiency and abundance. In the perspective of Virtue Ethics, was Samsung ethically correct in stealing components designed by Apple? By stealing from Apple, Samsung is reaping the benefits of someone else's efforts. That does not bode well for human flourishing, which is the aim of Virtue Ethics. With this action, the stealer (Samsung) is training the innocent hard worker (Apple) not to util ise efforts in developing new technologies. Someone or Samsung itself will steal those again. Thus, whatever Samsung has done is hurting the overall situation and thus is ethically wrong. Contractarianism Contractarianism does away with the idea that morality is something deep, pervasive or handed down to us humans by some deity ("Contractarianism: Crash Course Philosophy #37", 2016). Contractarianism states that whenever a group of rational, free (as in speech) and self-interested people come together, morality emerges. There is nothing hard-and-fast about morality, and it is born out of the need to uphold the agreements (explicit and implicit contracts). This school of thought considers people, being free-willed, to be the sole and best deciders of their actions. Anything goes if the parties of the contract are free-willed and keep their ends of the bargain. In the Contractarianism school of thought, was Samsung ethically right in stealing assets of Apple to include in its products? It is unclear exactly how Samsung copied the Apple's designs. However, Apple sells its products for personal use, and the assets (hardware, software, design) are the property of Apple. The contract betwe en the selling company and the buying party is by mutual will. Moreover, this contract must be upheld by either party. Samsung, howsoever, got hold of the intellectual property of Apple has violated the contract. Thus, this stealing is ethically wrong. Conclusion This paper analysed the stealing of Apple's assets by Samsung for use in its products. Needless to say, Apple is not sitting around and letting anyone run off with its hard work. The paper evaluated the act under the lens of four ethical theories. Most of the theories led to the conclusion that this stealing was morally wrong, except for the few which focused on consequences. References Alexander, L. Moore, M. (2016). Deontological Ethics. Stanford Encyclopedia of Philosophy. Retrieved 10 January 2017, from https://plato.stanford.edu/entries/ethics-deontological/ Balakrishnan, A. (2016). Supreme Court sides with Samsung in Apple patent damages dispute. CNBC. Retrieved 10 January 2017, from https://www.cnbc.com/2016/12/06/supreme-court-rules-for-samsung-in-apple-patent-case.html Contractarianism: Crash Course Philosophy #37. (2016). YouTube. Retrieved 10 January 2017, from https://www.youtube.com/watch?v=2Co6pNvd9mc Driver, J. (2014). The History of Utilitarianism. Stanford Encyclopedia of Philosophy. Retrieved 10 January 2017, from https://plato.stanford.edu/entries/utilitarianism-history/ Hursthouse, R. Pettigrove, G. (2016). Virtue Ethics. Stanford Encyclopedia of Philosophy. Retrieved 10 January 2017, from https://plato.stanford.edu/entries/ethics-virtue/ Nathanson, S. Utilitarianism, Act and Rule | Internet Encyclopedia of Philosophy. Internet Encyclopedia of Philosophy. Retrieved 10 January 2017, from https://www.iep.utm.edu/util-a-r/#H1 Robinson, D. (1999). Aristotle's psychology (1st ed.). Joe Christensen Inc. Samuels, M. (2017). Android vs iOS: Which is best for business? | ZDNet. ZDNet. Retrieved 10 January 2017, from https://www.zdnet.com/article/android-vs-ios-which-is-best-for-business/ Satariano, A. Rosenblatt, J. (2014). Apple, Samsung Agree to End Patent Suits Outside U.S.. Bloomberg.com. Retrieved 10 January 2017, from https://www.bloomberg.com/news/articles/2014-08-05/apple-samsung-agree-to-end-patent-suits-outside-u-s- Taube, S. (2016). The Samsung-Apple Court Case: How Patent Law Shapes the Market - Investment U. Investment U. Retrieved 10 January 2017, from https://www.investmentu.com/article/detail/52946/samsung-apple-court-case-patent-law-shapes-market

Friday, May 1, 2020

Challenge of Byod Security in Modern Day

Question: Describe about byod(Bring Your Own Device) security is a new challenge that modern day corporations are increasingly facing. Research the issue of BYOD security and write a report documenting your findings. Answer: Introduction Bring your device (BTOD) is also referred to as bring your technology, or bring your phone. It entails the policy of permitting the employees to bring their personal devices like laptops, the tablets, and smartphones to their place of work, and to use the tools to be able to access the privileged corporation information and the application. The BYOD scenarios the employees use their own devices for their personal and the work use. (Ghosh, Gajar Rai, 2013)This program can apparently blur in line between the business and the personal use of the mobile device. The phenomenon of the BYOD is referred as the IT consumerisation. Besides, the term is used to highlight on the same practice that is applied by the students using their phone to the education setting to use on the programs like the Kahoot. The use of the BYOD to make an important development to the business world, with approximately seventy five percent of the employees in the growing market in Russia and Brazil and around 40% i n the developed market using their technology to work. An example of the survey carried apparently showed that 95% of the employees said they used at least one personal device for work. Various factors are driving the adoption of the BYOD programs(Scarfo, 2012). Nonetheless, there is an upward trend to the adoption of the diverse use of the mobile devices, like the tablets, and the smartphones by the individual that are. This paper will clearly demonstrate on the background information of the BYOD when it came into existence, the security challenges that are the adoption of the BYOD program has posed to the business, the protection mechanism that the organization is adopting to overcome these difficulties There is also need to look at the security implications of computer networks and the issues and concept of management in ICT. . Moreover, it will also highlight on the future trends of the BYOD program to the business needs and advancement of the same in the market(Burt, 2011). Background The BYOD has come a long way with the first appearance in BYOD in 2009, to the steady fast rise in 2011. It started at the Intel when they recognize the increasing number of the employees bringing their own personal devices like the smartphones, iPhone and laptops to the workplace and using them on the corporate network of the organization. In the year 2011 the term achieved prominence when the Information services providers, Unisys and the software vendor the Citrix systems began sharing their perceptions and experience of this trend. (Assing, 2013)The BYOD has mainly been featured as factor to the consumer enterprise in the way the enterprises associates with the clients. The role was reversal in the aspect of the business when it was the driving factor in the consumer technology innovations and all their trends. To better understand the evolution of the BYOD there is need to look at past years since the term was introduced. The terms were first imposed in the year 2009, but it had its first mainstream in the year 2010.The CIOs began to experience the pressure when personal devices began to flood at the workplace. During the same period, the Android had started to pick the steam and there was introduction of the first iPad in the market. The influxes to the new devices in the market made the employees bring more devices like the smartphones, the tablets in the work place. Some of the business began to block the personal devices to their networks and their mail servers. In that year, there were many MDM companies that were started and a new API came up to manage the mobile networks. It is due to this that the IT and organizations realized they can longer ignore the element of BYOD. In the year 2011, there was official support of the Bring your device programs which were introduced at the workplace at a fast rate. According to report of Aberdeen 2011, around 75% of the companies had the BYOD policy. It is the same year the Blackberry dominance started to give t o the alternative options of mobile and the acceptance of the BYOD was all-time high. In the year 2012, there was a significant concern for the data security and the data leakages. (Shim, Mittleman, Welke, French Guo, 2013)Moreover, the users were becoming more concern of the privacy. In the same year, many businesses were now focused on the adaptation of clear communicated policies of BYOD to the users, while at the same time working to understand their privacy and implications of the security. There was an increase of the MDM solutions to cater for these implications. In 2013, the applications and the security data continued as the hot topic in regards to the BYOD. There was also a major pivot to secure the device to be able to manage the apps and the data within the business; there were issues of the data breaches which were increasing on a daily basis.. (Shim, Mittleman, Welke, French Guo, 2013)The purpose of the containerization of this apps is to be able to separate the pers onal data and the data of the corporation. Security challenges posed by the BYOD program The unknown third-party access through the mobile application When the employee downloads and installs an application for their use, they likely allow the free third party to access some of the sensitive information for the organization that may be stored to their personal devices. Applications that are downloaded be infected with the viruses and the malware; which are instructed by a hacker command and the control servers to be able to steal any data that is on the mobile devices, without even an alert from the users device. (Burt, 2011)If the employees of an enterprise connect their devices to an open WI-FI devices, the data of the company that is stored on their devices may be compromised and be stolen. Moreover, if the security apps are imposed on the devices of the employees it would become a problem to them, because it requires frequent updates, in which if they dislike this they can easily uninstall. Nevertheless, these software reduces the performance of the device and also degrade on their experience by stretching on the memory and the processor of the devices. Mixing of the personal and corporate data This is the major security challenge to the BYOD, especially when coping with the issue of storage of the personal and corporate information on the same device. Indeed, some data of the organization may be leaked at some point. Some hackers may use the keyboard logging technique and acquire some sensitive information for the company, and this data in the long hands can cause significant harm to the organization(Ghosh, Gajar Rai, 2013). IT fracture Some of the infrastructure in the organization do not conform to the BYOD setting. The BYOD entails that CIOS make various modifications to the current IT infrastructure so that it is a complaint to BYOD. (Assing, 2013)There is a need to identify the applications employees are using to interact with the corporate information. It is fundamental that the data is protected, and conform to the current IT infrastructure. Technical challenges Various technical difficulties may pose on the BYOD program; an example is the control access to the mobile conceding the deployment of BYOD. The companies are unable to determine the permission level for each of the employees when they access certain resources for the company when using the mobile devices and the external network connections. Some of the other factors which may determine the access control are; limitation on how many individuals can be able to access on the resources at one time and how the employees would gain the access to the resources of the company. (Ghosh, Gajar Rai, 2013)It is important to understand the access control aspects differ on the aspect of the location, the size, and the employees number in that company. There is also the issue of incorporating the security measures to cater a given range of devices that are portable against the risk, and usually the threat is very complex. This is so when the employees may own a random number of devices that has different operating systems, which means the needs of the security to every need to be supported equally where it is possible. Protection mechanism Comprehensive BYOD security framework The security measures that exists currently are; the Virtual Private Networks (VPN), the use of the firewalls and email filtering tools. These components are essential for the protection of the inside network and when the personal devices are engaged in the BYOD before enforcement to the formal policies. The VPNs helps to implement on the private network connections to the devices and also allows access to the resources in an environment that is controlled(Ghosh, Gajar Rai, 2013). This contributes to reducing the cost of storing the data on the personal devices. (Burt, 2011)The firewalls, helps protection of the networks by monitoring the traffic and denying access to suspicious requests. The email filters, contributes in the detection and warning of the users of the emails that are infected. The personal devices can sync the application of email thus, it becomes a benefits on the device when the application of filtering the email is active. There is the use of the Network Access Control mechanism. This tool helps to limit the number of the devices that are connected, thus it helps to determine the permission and also denies the devices that are unrecognized to the companys internal network. This mechanism was well implemented before the rise of the BYOD. Thus, it is a focal point for the enhancement of the BYOD framework.(Assing, 2013) The Identification and the Access Management is also a variation of the NAC that entails the customized device access control rules to an individual network. In addition it manages on the sign on and separation of the duties. The single purpose BYOD security mechanism On this aspect, there is need for the final user agreement, the policies that are acceptable and used and the liability agreements that are formal contracts to ensure that the companies and the employees they agree mutually on the Bring your device policies of security. It is imperative for the component to be compatible for success of the BYOD. There is also the issue partition of containerization on the mobile device storage space into the independent sections to divide personal and work data. The component that contains the company data has its own policies on the security that are implemented, and they enable for remote access on the control of the company, without affecting the personal data. In addition, there is a need for the antivirus, and spyware applications that are important to strengthen the BYOD security framework(Scarfo, 2012). Security implications of computer network The security is essential to the computer network, especially when it relies on the corporate data in an organization. It entails the protection of the information systems from theft or the damage of the hardware, and the information that is contained in them. (Shim, Mittleman, Welke, French Guo, 2013) There are various security measures that need to be put up in order to prevent the breach of the information. Some of them are the user of the account access control and the cryptography to protect the system files. (Blum, Eskandarian Hoffman, 2004) There is need to input the firewalls to help on the network security by shielding the access to the internal network services and the use of the intrusion systems for the detention. These systems helps to detect the network attacks that is in progress and helps in the forensics of the post attack. In the events of the breach of the computer network it can lead to great implications for the company. (Merete Hagen, Albrechtsen Hovden, 2008 ) The clients to the company can seek to sue the company for the disclosure of the information, on the ground of the breach of the confidentiality. Cryptography The modern cryptographic techniques are the essential in IT system that needs to store-to protect personal data. It is important to note that on itself the cryptography does not provide any protection against the data breaching; but only when it is applied correctly in a specific contest does it provide the protection to the personal data. (Merete Hagen, Albrechtsen Hovden, 2008) It is usually a large field. Some of the newer cryptographic techniques are homomorphic encryption, which are essential in the processing and the searching in the personal data. There are various techniques that exists for the searching through the encrypted data, that is able access to provide a privacy protection and selective to the sensitive data. One of the technique that is used for the designing privacy preserving systems is the homomorphic encryption. The cryptographic system is only as strong as the encryption algorithms, the digital algorithms and the message authentication codes. If any of these components are broken the system becomes damaged. Most of the system fails because of the mistakes that are done on the implementation. Some do not ensure that the plain text is destroyed after the encrypted. Others may use the temporal files to protection against the data loss when the system crash. Issues and concepts related to management of ICT security In the management of the ICT security there are various issues and concept that are related to its planning and on the development of an effectiveness. In any organization it should design, implement and maintain the coherent set policies in the planning and development of the security plan, processes and systems to be able to manage the risks to its information assets. In this aspect, it will ensure acceptable levels of the information security risks. (Swiler, Phillips, Ellis Chakerian, 2001) On the concept, it is important to have a plan phase. On this it is involves the designing the information security management, this is by accessing the information security risks and selecting the appropriate controls. The next concept is the do phase, that involves the implementing and operating the control. Nevertheless, the check phase objective that involves the review and the evaluation of the performance. The last concept it the act phase that involves any changes that are made where ne cessary on the peak of the peak performance (Saint-Germain, 2005). Security planning and development The most significant part of the deployment of the ICT management system is the planning. It is not possible to plan for the security, until the full assessment of the risk has been done, the security planning involves the deployment of the security policies and the implementation control to prevent computer risks from becoming reality. The security planning varies from one organization to another. The first aspect of the planning is the risk assessment. (Perrig, Stankovic Wagner, 2004)There is no plan of action that can be developed and implemented before the risk is assessed has been done. It provides the baseline for the implementation of the security plan. The next steps is to identify the assets. (Scarfo,2012)This is by performing of the information asset inventory by highlighting the various items that are needed to be protected within the organization. It should be done on the basis of the business plan of the organization. The next is to identify the risk to the information assets. (Shim, Mittleman, Welke, French Guo, 2013) It is vital to determine the risks that affect each of the asset in the organization. It is then necessary to identify the threat and the method of the attack. The threat is any action that is potentially harmful to the organization through the disclosure, the breach of information, modification of destruction. It is then necessary for the development of the security policies and control. (Shin, 2010) These components will give a clear guideline for the various areas of the responsibility, and the plans which highlights the steps to take and the rules to be followed in the implementation of the policies. Conclusion and future trends The rapid growth of the personal devices is continuing to redefine communication and the productivity in the workplace. As a result to this, the BYOD programs, in which the employees use their smartphones and tablets for the business aspect has increased tremendously. (Scarfo, 2012)According to Gartner he predicts that by 2017, fifty percent of the employers would require their employees to supply their own devices to work. Further research from Juniper concluded that by the year 2018, there would be more than one billion devices that are used by the program of BYOD worldwide. With the increase in the sales through the mobile devices over the last years, every business that has not implemented the BYOD policy would suffer from breach of sensitive corporate information and be shared freely outside the corporation. Nevertheless, mobility drives productivity for the CIOS and the business by increasing the number of the mobile application users in the workplace. (Shim, Mittleman, Welke, French Guo, 2013)The rolling of requests throughout the place of work will present a myriad of opportunities that are beyond the traditional use of the mobile emails and the communications. There is also the need to evaluate the BYOD needs, since most of the leaders do not understand the benefits. (Assing, 2013)Throughout the world, the BYOD market is expected to grow to more than eighteen billion dollars by the year 2017. In the paper, it has clearly demonstrated on the background information of the BYOD program and how it has advanced over the years. It has also demonstrated, on the security challenges that are posed by the BYOD programs and the protection mechanism on the same. Nonetheless, there are also future trends on the BYOD programs in which there would be exponential growth to the number of business adopting it, the increase in revenue it is projected to bring, and the improvement of the security measures to secure the corporate data. References Assing, D. (2013). Mobile access safety: Beyond BYOD. John Wiley Sons. Baker, W. H., Wallace, L. (2007). Is information security under control?: Investigating quality in information security management. Security Privacy, IEEE, 5(1), 36-44. Blum, J. J., Eskandarian, A., Hoffman, L. J. (2004). Challenges of intervehicle ad hoc networks. Intelligent Transportation Systems, IEEE Transactions on, 5(4), 347-351. Burt, J. (2011). BYOD trend pressures corporate networks. eweek 28(14), 30-31. Ghosh, Gajar Rai. (2013). Bring Your own device(BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(4), 62-70. Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., Wolber, D. (1990, May). A network security monitor. In Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on (pp. 296-304). IEEE. Hill, D. W., Lynn, J. T. (2000). U.S. Patent No. 6,088,804. Washington, DC: U.S. Patent and Trademark Office. Li, Y., Guo, H., Jajodia, S. (2004, October). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on Digital rights management (pp. 73-82). ACM. Merete Hagen, J., Albrechtsen, E., Hovden, J. (2008). Implementation and effectiveness of organizational information security measures. Information Management Computer Security, 16(4), 377-397. Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P. (2004). Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR. Perkins, C. E. (2008). Ad hoc networking. Addison-Wesley Professional. Phillips, C., Swiler, L. P. (1998, January). A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms (pp. 71-79). ACM. Perrig, A., Stankovic, J., Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53-57. Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management, 39(4), 60. Scarfo. (2012). New security perspectives around BYOD. In broadband, wireless computing, communication and Applications(BWCCA), 2012 Seventh International Conference. 446-451.IEEE. Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438. Shim, J.P., Mittleman, D., Welke, R., French , A.M., Guo, J.C. (2013). Bring your own device(BYOD): Curent status, issues, and future directions. Schneier, B. (1999). Risks of relying on cryptography. Communications of the ACM, 42(10), 144-144. Stinson, D. R. (2005). Cryptography: theory and practice. CRC press. Walker-Osborn Mann. (2013). TO Byod or.... or not to Byod. ITNow, 55(1). 38-39. Susanto12, H., Almunawar, M. N., Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical Computer Sciences IJECSIJENS, 11(5), 23-29. Swiler, L. P., Phillips, C., Ellis, D., Chakerian, S. (2001). Computer-attack graph generation tool. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX'01. Proceedings (Vol. 2, pp. 307-321). IEEE.