Monday, September 30, 2019
Twitter Swot Analysis
Twitter, a website provides online social network and microblog services, is gradually seeping through into every area of life. It was listed as the most important invention in 2009. The same with Facebook who also provide online social network service, more and more people are feeling rely on Twitter, and could not get rid of it. On twitter, we send a real-time mail which is also known as tweets to millions of people around the world within 140 characters.As users, we could share our latest news and ideas to the followers through website interface, SMS from cell phones and mobile device apps; meanwhile, we also can get the instant information about what is happening among the followings, the country and the world. On the technology aspect, Twitter has always based on open source software from the back-end to the front-end. Nowadays, Twitter has became the top ten most visited websites. Before it was known as â€Å"Twitter†, its founders named it â€Å"Twttr†.Twttr†™s idea came from Dorsey, one of the cofounders, who expressed to â€Å"enable users carrying standard cellular phones to update small groups of people on their current situation by pressing a few buttons and tapping out message. †At the spring of 2006, Dorsey sent the first tweet, and then, launched â€Å"Twttr†through the turmoil of headcount trimming in the same year together with the cofounders, Williams and Stone. Twttr became Twitter in 2007. We could feel the name as the buzzing of the SMS message alters and chips from birds.In this year, Twitter began to hit the market and its users kept growing in the next several years contributed from its word-of-mouth promotion. During its growth, the company continued to get venture capital invents. A lot of large companies were interested in Twitter as they thought Twitter has audiences in hands which would be lucrative. However, by 2011, the company still had problems which may bring risks in the future. According to the paper, the company had four issues: 1. The company was still on the way to seek prots.It was clearly that the company would be eventually pressured by the inventors as they largely relay on venture invention to support the company. Meanwhile, their application was totally free for use, in this case, advertising was almost the only tool to gain revenues. 2. The business model and strategy remain opaque. As mentioned by Ray Valde, Twitter was in a dilemma that they need a â€Å"robust revenue model†, while had to diminish perceived value which has a lot of potential value. 3. Did not commercially exploit its large and rapidly growing user base.As a kind of social media company, who has the audience, who will make money. User was the key factor that will determine Twitter’s fate. 4. The ongoing change in the top management team. The turmoil began at the start-up phase and even had not terminated by 2011. This may become mines for the company. This case write-up wi ll state Twitter’s business problems in detail, and use SWOT analysis to make the company’s situation more clarified. Then, raise solutions and suggestions for the company.2. Strategic analysis of problem SWOT analysisWeaknessesVery popular and acceptable by a large number of users Creatively changed the way of messaging Greater access to capitalInternal organizational turbulence Did not exploit the user base Unclear business strategy and no solid revenue modelOpportunitiesThreatsDominant position in social media industry Competitors started to emerge A ton of public Suffer from abandonment of users A more technologically savvy plantformStrengthsVery popular and acceptable by a large number of users Why people would like to use twitter? I will give some factors according to this case: †¢ easy use †¢ free use †¢ allow users to send and receive messages to a mailing list of recipients in real-time †¢ better than online chat †¢ strong brand loy alty †¢ could run on different devices, especially mobile devices Thanks to these advantages, Twitter got 200 million users by March 2011.Although it was far from Facebook’s users, the number was still amazing and at the leading position among social network websites. The more visitors, the more the site is worth. Just account for the amount of users, we could estimate that the website of Twitter will be extremely valuable.Creatively changed the policy of messagingIt is hard to say Twitter has a big invention on technology aspect, and to a large extent, it brought about by recon?guring existing technology. However, we cannot deny it is a big revolution and has changed the policy of messaging. Twitter was built on existing technologies like SMS (short message service), IM (instant messaging), and RSS (really simple syndication), then, combined them in a unique way. It is one-to-one association when we are using SMS and IM.Now, it is one-to-many association which facing to the public, when we are using Twitter. On Twitter, we send 140 characters instant micro-blog, use â€Å"@†to mention or replay other users, use â€Å"#†to post together the same topics. All these creations changed the way people communicate. Greater access to capital Twitter had attracted plenty of capital since its establishment. For a young company, suf?cient fund and patient inventors could allow them a more space to develop and complete their big idea.Weaknesses Internal organizational turbulenceTwitter’s internal contradiction emerged at the initial phase. When Odeo’s team launched Twttr Beta, six employees terminated contracts. Moreover, among the four cofounders (Dorsey, Glass, Williams, Stone), Dorsey and Williams had even acted as CEO; but both of them quitted. And the name of Glass was seldom raised in Twitter’s history. The establishment of Twitter extremely require collaboration, however, people in the founding team have different ex pectations. Inventors may lose con?dence in them.Did not exploit the user base In spite of the fact that Twitter’s success rides on the user base. However, according to the paper, Twitter did not commercially exploit it. Or we can say Twitter had no extra energy to do it. The top managers concentrated on how to make their product more advanced and how to attract inventions. They did not notice the user base was the valuable source for them. Actually, they owned the large amount of users and easier than other companies to conduct a survey on them.Unclear business strategy and no solid revenue modelTwitter has been trying to be different from other closest companies and exploiting which path was likely to take from the beginning. However, the path depended on how the ?rm perceived and de?ned itself. They just claim their blueprint for making the company â€Å"as large an impact as possible†instead of setting speci?c business strategy.What’s more, Twitter still ha d not built a solid revenue model even through their revenue kept increasing from 2009. As it stands, the company’s revenue was largely relay on advertising and the last was from data licensing. By comparison, Twitter had the similar ad model as Facebook, but facebook was trying to get rid of reliant on ad while Twitter was not able to do it at present.Opportunities Dominant position in social media industryAlthough the amount of users was lower than Facebook, Twitter still own the large amount of audiences. It was not the ?rst mover in this industry, but the ?rm acted quickly and was already far beyond other similar social media companies. Contributed by its dominant position, more and more people would like to choose Twitter based on the number of other users of this platform, and inventors would focus on the ?rm, then invent on it as they believe the one who owned the audiences would be valuable. A tongue of publicBecause of Twitter has the advantage of timeliness, it beca me a tool to publish news. In 2008, it played as a key tool in the U. S presidential campaign and the attacks in Mumbai, India. From then on, Twitter became an important role in politics. People became more and more believe the platform as they can use it to publish their opinion to the public. It was helpful to strong its social position and brand impact. A more technologically savvy platform As Stone said, Twitter was most likely a â€Å"information company.†In recent years, this platform value which was derived from information-sharing has reached the peak. Twitter has owned two advantages: a large user base and information-sharing platform. These resources could be used to improve revenue. There was no better savvy platform than Twitter to help companies promote services and products with limited budgets. This project was known as â€Å"promoted tweets†, launched in 2010. When followers log in Twitter, promoted tweets will appear at the top of the timeline, then a dvertisers will pay when a user engages.Threats Competitors started to emergeAs the industry was lucrative, some companies had started to emerge and attempted to share the cake. Now, it was not just Twitter provided free services, some large and competitive companies like Friendfeed, Identi. ca, Present. ly, and Google were looking at the market. These competitors were not just copy Twitter but offering some new functions that Twitter did not have. If Twitter stop improving their applications, it may be eliminated in the competition.Suffer from abandonment of usersOnce your friends left the social network platform, more and more connected users may leave it. Then, this website will face catastrophe. Now, Twitter was facing the troubleâ€â€although they had attracted a lot of users, the abandonment rate up to 40 per cent yet. On contrast, only 7 per cent Facebook users said they may never use Facebook. And Twitter’s active users were far below than Facebook. One data analys is showed that in Jun-10, only 12 millions U. S Twitter active users while the number was 137 millions for Facebook.3. Solutions and recommendationsConclusion about TwitterTwitter entered the market at a right time, and grabbed the larger resource in the industry. It was a big Internet Innovation and changed the way people communicate. However, it was true that Twitter did not do as good as other similar companies like Google, yahoo, and facebook. For example, in 2009, Google earned more than $18 from unique visitor, Facebook earned about $3, but Twitter only got lower than $1. They were still facing challenges and on the way to exploit the best path.The challenges which were brought by competitors’ expanding The denying and ongoing innovation of Internet will never stop in this age, and its sustainable innovation has brought about a new round of reform of the marketing mode. Twitter cannot just stay stuck in its old mode. In this industry, stagnate means decline. The first challenge was from the companies who imitated Twitter while developed more functions. However, these competitors had precisely pushed forward Twitter and proved microblog had the bright prospects for development. To deal with them,Twitter had better to enhance its brand loyalty, and form its own core competitiveness. Users would like to choose the one who dominated the industry because they were easy to be impacted by conformity. Moreover, Twitter should be sure to avoid following others, developing the functions what others have. They should keep creating new ideas and act quicker than competitors. Even through competitors’ function was more advanced than Twitter, it did not mean it was an appropriate product for Twitter. Another challenge was from large companies like Facebook and Google.These companies also wanted to do everything and dominate the industry. They were similar as Twitter, owned a large amount of users, but did not do microblog. Twitter was not safe even th ough it did the best in microblog. These services were another form of social media that also may grab Twitter’s market. Twitter needs not only to improve its model to attract more users, but also continue digging potential value in other area to expand the ?rm. Exploit more sources of revenue Twitter cannot largely rely on venture capital invention and advertising any more.It needs to ?nd out another way to obtain fund. The ?rst option was to imitate Google and Apple, provide more services and develop more products to increase revenue. Another option was to imitate Facebook, launch IPO. Or it can do both. I think launch IPO will be better because Twitter did not have the technology support as strong as Google and Apple. And Twitter’s revenue model was already unclear now, if it provides more products, the model may become more confused. What’s more, IPO is a better choice for long term development.Increase the R&D activities It is not only the revenue model nee ds R&D, but also the new application innovation needs R&D. When going to Twitter. com, we will basically see the same thing that the company did years ago. They did not keep working on anything that cool. Meanwhile, they did not reveal any details about the R&D plan and result. Conducting R&D could help Twitter to improve their products and services, which was necessary for a technology company. Twitter website was built on open source software. It was helpful to develop new applications. Furthermore, in order to keep an eagle eye on the competitors and customers, R&D should not be ignored by Twitter.Promote overseas marketIt was clear that Twitter owned a large number of overseas users, but had not ï ¬ gure out an effect proï ¬ t in other countries. â€Å"Promote the tweets†won a big market in the U.S, similarly, the foreign market had a large proï ¬ t that could be exploited. But it will be a big project that need marketing research and detailed plan before they d ecide to move in a foreign market.
Sunday, September 29, 2019
The Lost Symbol Chapter 16-18
CHAPTER 16 Security chief Trent Anderson stormed back toward the Capitol Rotunda, fuming at the failure of his security team. One of his men had just found a sling and an army-surplus jacket in an alcove near the east portico. The goddamn guy walked right out of here! Anderson had already assigned teams to start scanning exterior video, but by the time they found anything, this guy would be long gone. Now, as Anderson entered the Rotunda to survey the damage, he saw that the situation had been contained as well as could be expected. All four entrances to the Rotunda were closed with as inconspicuous a method of crowd control as Security had at its disposal–a velvet swag, an apologetic guard, and a sign that read THIS ROOM TEMPORARILY CLOSED FOR CLEANING. The dozen or so witnesses were all being herded into a group on the eastern perimeter of the room, where the guards were collecting cell phones and cameras; the last thing Anderson needed was for one of these people to send a cell-phone snapshot to CNN. One of the detained witnesses, a tall, dark-haired man in a tweed sport coat, was trying to break away from the group to speak to the chief. The man was currently in a heated discussion with the guards. â€Å"I'll speak to him in a moment,†Anderson called over to the guards. â€Å"For now, please hold everyone in the main lobby until we sort this out.†Anderson turned his eyes now to the hand, which stood at attention in the middle of the room. For the love of God. In fifteen years on security detail for the Capitol Building, he had seen some strange things. But nothing like this. Forensics had better get here fast and get this thing out of my building. Anderson moved closer, seeing that the bloody wrist had been skewered on a spiked wooden base to make the hand stand up. Wood and flesh, he thought. Invisible to metal detectors. The only metal was a large gold ring, which Anderson assumed had either been wanded or casually pulled off the dead finger by the suspect as if it were his own. Anderson crouched down to examine the hand. It looked as if it had belonged to a man of about sixty. The ring bore some kind of ornate seal with a two-headed bird and the number 33. Anderson didn't recognize it. What really caught his eye were the tiny tattoos on the tips of the thumb and index finger. A goddamn freak show. â€Å"Chief?†One of the guards hurried over, holding out a phone. â€Å"Personal call for you. Security switchboard just patched it through.†Anderson looked at him like he was insane. â€Å"I'm in the middle of something here,†he growled. The guard's face was pale. He covered the mouthpiece and whispered. â€Å"It's CIA.†Anderson did a double take. CIA heard about this already?! â€Å"It's their Office of Security.†Anderson stiffened. Holy shit. He glanced uneasily at the phone in the guard's hand. In Washington's vast ocean of intelligence agencies, the CIA's Office of Security was something of a Bermuda Triangle–a mysterious and treacherous region from which all who knew of it steered clear whenever possible. With a seemingly self-destructive mandate, the OS had been created by the CIA for one strange purpose–to spy on the CIA itself. Like a powerful internal- affairs office, the OS monitored all CIA employees for illicit behavior: misappropriation of funds, selling of secrets, stealing classified technologies, and use of illegal torture tactics, to name a few. They spy on America's spies. With investigative carte blanche in all matters of national security, the OS had a long and potent reach. Anderson could not fathom why they would be interested in this incident at the Capitol, or how they had found out so fast. Then again, the OS was rumored to have eyes everywhere. For all Anderson knew, they had a direct feed of U.S. Capitol security cameras. This incident did not match OS directives in any way, although the timing of the call seemed too coincidental to Anderson to be about anything other than this severed hand. â€Å"Chief?†The guard was holding the phone out to him like a hot potato. â€Å"You need to take this call right now. It's . . .†He paused and silently mouthed two syllables. â€Å"SA-TO.†Anderson squinted hard at the man. You've got to be kidding. He felt his palms begin to sweat. Sato is handling this personally? The overlord of the Office of Security–Director Inoue Sato–was a legend in the intelligence community. Born inside the fences of a Japanese internment camp in Manzanar, California, in the aftermath of Pearl Harbor, Sato was a toughened survivor who had never forgotten the horrors of war, or the perils of insufficient military intelligence. Now, having risen to one of the most secretive and potent posts in U.S. intelligence work, Sato had proven an uncompromising patriot as well as a terrifying enemy to any who stood in opposition. Seldom seen but universally feared, the OS director cruised the deep waters of the CIA like a leviathan who surfaced only to devour its prey. Anderson had met Sato face-to-face only once, and the memory of looking into those cold black eyes was enough to make him count his blessings that he would be having this conversation by telephone. Anderson took the phone and brought it to his lips. â€Å"Director Sato,†he said in as friendly a voice as possible. â€Å"This is Chief Anderson. How may I–â€Å" â€Å"There is a man in your building to whom I need to speak immediately.†The OS director's voice was unmistakable–like gravel grating on a chalkboard. Throat cancer surgery had left Sato with a profoundly unnerving intonation and a repulsive neck scar to match. â€Å"I want you to find him for me immediately.†That's all? You want me to page someone? Anderson felt suddenly hopeful that maybe the timing of this call was pure coincidence. â€Å"Who are you looking for?†â€Å"His name is Robert Langdon. I believe he is inside your building right now.†Langdon? The name sounded vaguely familiar, but Anderson couldn't quite place it. He was now wondering if Sato knew about the hand. â€Å"I'm in the Rotunda at the moment,†Anderson said, â€Å"but we've got some tourists here . . . hold on.†He lowered his phone and called out to the group, â€Å"Folks, is there anyone here by the name of Langdon?†After a short silence, a deep voice replied from the crowd of tourists. â€Å"Yes. I'm Robert Langdon.†Sato knows all. Anderson craned his neck, trying to see who had spoken up. The same man who had been trying to get to him earlier stepped away from the others. He looked distraught . . . but familiar somehow. Anderson raised the phone to his lips. â€Å"Yes, Mr. Langdon is here.†â€Å"Put him on,†Sato said coarsely. Anderson exhaled. Better him than me. â€Å"Hold on.†He waved Langdon over. As Langdon approached, Anderson suddenly realized why the name sounded familiar. I just read an article about this guy. What the hell is he doing here? Despite Langdon's six-foot frame and athletic build, Anderson saw none of the cold, hardened edge he expected from a man famous for surviving an explosion at the Vatican and a manhunt in Paris. This guy eluded the French police . . . in loafers? He looked more like someone Anderson would expect to find hearthside in some Ivy League library reading Dostoyevsky. â€Å"Mr. Langdon?†Anderson said, walking halfway to meet him. â€Å"I'm Chief Anderson. I handle security here. You have a phone call.†â€Å"For me?†Langdon's blue eyes looked anxious and uncertain. Anderson held out the phone. â€Å"It's the CIA's Office of Security.†â€Å"I've never heard of it.†Anderson smiled ominously. â€Å"Well, sir, it's heard of you.†Langdon put the phone to his ear. â€Å"Yes?†â€Å"Robert Langdon?†Director Sato's harsh voice blared in the tiny speaker, loud enough that Anderson could hear. â€Å"Yes?†Langdon replied. Anderson stepped closer to hear what Sato was saying. â€Å"This is Director Inoue Sato, Mr. Langdon. I am handling a crisis at the moment, and I believe you have information that can help me.†Langdon looked hopeful. â€Å"Is this about Peter Solomon? Do you know where he is?!†Peter Solomon? Anderson felt entirely out of the loop. â€Å"Professor,†Sato replied. â€Å"I am asking the questions at the moment.†â€Å"Peter Solomon is in very serious trouble,†Langdon exclaimed. â€Å"Some madman just–â€Å" â€Å"Excuse me,†Sato said, cutting him off. Anderson cringed. Bad move. Interrupting a top CIA official's line of questioning was a mistake only a civilian would make. I thought Langdon was supposed to be smart. â€Å"Listen carefully,†Sato said. â€Å"As we speak, this nation is facing a crisis. I have been advised that you have information that can help me avert it. Now, I am going to ask you again. What information do you possess?†Langdon looked lost. â€Å"Director, I have no idea what you're talking about. All I'm concerned with is finding Peter and–â€Å" â€Å"No idea?†Sato challenged. Anderson saw Langdon bristle. The professor now took a more aggressive tone. â€Å"No, sir. No damned idea at all.†Anderson winced. Wrong. Wrong. Wrong. Robert Langdon had just made a very costly mistake in dealing with Director Sato. Incredibly, Anderson now realized it was too late. To his astonishment, Director Sato had just appeared on the far side of the Rotunda, and was approaching fast behind Langdon. Sato is in the building! Anderson held his breath and braced for impact. Langdon has no idea. The director's dark form drew closer, phone held to ear, black eyes locked like two lasers on Langdon's back. Langdon clutched the police chief's phone and felt a rising frustration as the OS director pressed him. â€Å"I'm sorry, sir,†Langdon said tersely, â€Å"but I can't read your mind. What do you want from me?†â€Å"What do I want from you?†The OS director's grating voice crackled through Langdon's phone, scraping and hollow, like that of a dying man with strep throat. As the man spoke, Langdon felt a tap on his shoulder. He turned and his eyes were drawn down . . . directly into the face of a tiny Japanese woman. She had a fierce expression, a mottled complexion, thinning hair, tobacco-stained teeth, and an unsettling white scar that sliced horizontally across her neck. The woman's gnarled hand held a cell phone to her ear, and when her lips moved, Langdon heard the familiar raspy voice through his cell phone. â€Å"What do I want from you, Professor?†She calmly closed her phone and glared at him. â€Å"For starters, you can stop calling me `sir.' â€Å" Langdon stared, mortified. â€Å"Ma'am, I . . . apologize. Our connection was poor and–â€Å" â€Å"Our connection was fine, Professor,†she said. â€Å"And I have an extremely low tolerance for bullshit.†CHAPTER 17 Director Inoue Sato was a fearsome specimen–a bristly tempest of a woman who stood a mere four feet ten inches. She was bone thin, with jagged features and a dermatological condition known as vitiligo, which gave her complexion the mottled look of coarse granite blotched with lichen. Her rumpled blue pantsuit hung on her emaciated frame like a loose sack, the open- necked blouse doing nothing to hide the scar across her neck. It had been noted by her coworkers that Sato's only acquiescence to physical vanity appeared to be that of plucking her substantial mustache. For over a decade, Inoue Sato had overseen the CIA's Office of Security. She possessed an off- the-chart IQ and chillingly accurate instincts, a combination which girded her with a self- confidence that made her terrifying to anyone who could not perform the impossible. Not even a terminal diagnosis of aggressive throat cancer had knocked her from her perch. The battle had cost her one month of work, half her voice box, and a third of her body weight, but she returned to the office as if nothing had happened. Inoue Sato appeared to be indestructible. Robert Langdon suspected he was probably not the first to mistake Sato for a man on the phone, but the director was still glaring at him with simmering black eyes. â€Å"Again, my apologies, ma'am,†Langdon said. â€Å"I'm still trying to get my bearings here–the person who claims to have Peter Solomon tricked me into coming to D.C. this evening.†He pulled the fax from his jacket. â€Å"This is what he sent me earlier. I wrote down the tail number of the plane he sent, so maybe if you call the FAA and track the–â€Å" Sato's tiny hand shot out and snatched the sheet of paper. She stuck it in her pocket without even opening it. â€Å"Professor, I am running this investigation, and until you start telling me what I want to know, I suggest you not speak unless spoken to.†Sato now spun to the police chief. â€Å"Chief Anderson,†she said, stepping entirely too close and staring up at him through tiny black eyes, â€Å"would you care to tell me what the hell is going on here? The guard at the east gate told me you found a human hand on the floor. Is that true?†Anderson stepped to the side and revealed the object in the center of the floor. â€Å"Yes, ma'am, only a few minutes ago.†She glanced at the hand as if it were nothing more than a misplaced piece of clothing. â€Å"And yet you didn't mention it to me when I called?†â€Å"I . . . I thought you knew.†â€Å"Do not lie to me.†Anderson wilted under her gaze, but his voice remained confident. â€Å"Ma'am, this situation is under control.†â€Å"I really doubt that,†Sato said, with equal confidence. â€Å"A forensics team is on the way. Whoever did this may have left fingerprints.†Sato looked skeptical. â€Å"I think someone clever enough to walk through your security checkpoint with a human hand is probably clever enough not to leave fingerprints.†â€Å"That may be true, but I have a responsibility to investigate.†â€Å"Actually, I am relieving you of your responsibility as of this moment. I'm taking over.†Anderson stiffened. â€Å"This is not exactly OS domain, is it?†â€Å"Absolutely. This is an issue of national security.†Peter's hand? Langdon wondered, watching their exchange in a daze. National security? Langdon was sensing that his own urgent goal of finding Peter was not Sato's. The OS director seemed to be on another page entirely. Anderson looked puzzled as well. â€Å"National security? With all due respect, ma'am–â€Å" â€Å"The last I checked,†she interrupted, â€Å"I outrank you. I suggest you do exactly as I say, and that you do it without question.†Anderson nodded and swallowed hard. â€Å"But shouldn't we at least print the fingers to confirm the hand belongs to Peter Solomon?†â€Å"I'll confirm it,†Langdon said, feeling a sickening certainty. â€Å"I recognize his ring . . . and his hand.†He paused. â€Å"The tattoos are new, though. Someone did that to him recently.†â€Å"I'm sorry?†Sato looked unnerved for the first time since arriving. â€Å"The hand is tattooed?†Langdon nodded. â€Å"The thumb has a crown. And the index finger a star.†Sato pulled out a pair of glasses and walked toward the hand, circling like a shark. â€Å"Also,†Langdon said, â€Å"although you can't see the other three fingers, I'm certain they will have tattoos on the fingertips as well.†Sato looked intrigued by the comment and motioned to Anderson. â€Å"Chief, can you look at the other fingertips for us, please?†Anderson crouched down beside the hand, being careful not to touch it. He put his cheek near the floor and looked up under the clenched fingertips. â€Å"He's right, ma'am. All of the fingertips have tattoos, although I can't quite see what the other–â€Å" â€Å"A sun, a lantern, and a key,†Langdon said flatly. Sato turned fully to Langdon now, her small eyes appraising him. â€Å"And how exactly would you know that?†Langdon stared back. â€Å"The image of a human hand, marked in this way on the fingertips, is a very old icon. It's known as `the Hand of the Mysteries.' â€Å" Anderson stood up abruptly. â€Å"This thing has a name?†Langdon nodded. â€Å"It's one of the most secretive icons of the ancient world.†Sato cocked her head. â€Å"Then might I ask what the hell it's doing in the middle of the U.S. Capitol?†Langdon wished he would wake up from this nightmare. â€Å"Traditionally, ma'am, it was used as an invitation.†â€Å"An invitation . . . to what?†she demanded. Langdon looked down at the symbols on his friend's severed hand. â€Å"For centuries, the Hand of the Mysteries served as a mystical summons. Basically, it's an invitation to receive secret knowledge–protected wisdom known only to an elite few.†Sato folded her thin arms and stared up at him with jet-black eyes. â€Å"Well, Professor, for someone who claims to have no clue why he's here . . . you're doing quite well so far.†CHAPTER 18 Katherine Solomon donned her white lab coat and began her usual arrival routine–her â€Å"rounds†as her brother called them. Like a nervous parent checking on a sleeping baby, Katherine poked her head into the mechanical room. The hydrogen fuel cell was running smoothly, its backup tanks all safely nestled in their racks. Katherine continued down the hall to the data-storage room. As always, the two redundant holographic backup units hummed safely within their temperature-controlled vault. All of my research, she thought, gazing in through the three-inch-thick shatterproof glass. Holographic data-storage devices, unlike their refrigerator-size ancestors, looked more like sleek stereo components, each perched atop a columnar pedestal. Both of her lab's holographic drives were synchronized and identical–serving as redundant backups to safeguard identical copies of her work. Most backup protocols advocated a secondary backup system off-site in case of earthquake, fire, or theft, but Katherine and her brother agreed that secrecy was paramount; once this data left the building to an off-site server, they could no longer be certain it would stay private. Content that everything was running smoothly here, she headed back down the hallway. As she rounded the corner, however, she spotted something unexpected across the lab. What in the world? A muted glow was glinting off all the equipment. She hurried in to have a look, surprised to see light emanating from behind the Plexiglas wall of the control room. He's here. Katherine flew across the lab, arriving at the control-room door and heaving it open. â€Å"Peter!†she said, running in. The plump woman seated at the control room's terminal jumped up. â€Å"Oh my God! Katherine! You scared me!†Trish Dunne–the only other person on earth allowed back here–was Katherine's metasystems analyst and seldom worked weekends. The twenty-six-year-old redhead was a genius data modeler and had signed a nondisclosure document worthy of the KGB. Tonight, she was apparently analyzing data on the control room's plasma wall–a huge flat-screen display that looked like something out of NASA mission control. â€Å"Sorry,†Trish said. â€Å"I didn't know you were here yet. I was trying to finish up before you and your brother arrived.†â€Å"Have you spoken to him? He's late and he's not answering his phone.†Trish shook her head. â€Å"I bet he's still trying to figure out how to use that new iPhone you gave him.†Katherine appreciated Trish's good humor, and Trish's presence here had just given her an idea. â€Å"Actually, I'm glad you're in tonight. You might be able to help me with something, if you don't mind?†â€Å"Whatever it is, I'm sure it beats football.†Katherine took a deep breath, calming her mind. â€Å"I'm not sure how to explain this, but earlier today, I heard an unusual story . . .†Trish Dunne didn't know what story Katherine Solomon had heard, but clearly it had her on edge. Her boss's usually calm gray eyes looked anxious, and she had tucked her hair behind her ears three times since entering the room–a nervous â€Å"tell,†as Trish called it. Brilliant scientist. Lousy poker player. â€Å"To me,†Katherine said, â€Å"this story sounds like fiction . . . an old legend. And yet . . .†She paused, tucking a wisp of hair behind her ears once again. â€Å"And yet?†Katherine sighed. â€Å"And yet I was told today by a trusted source that the legend is true.†â€Å"Okay . . .†Where is she going with this? â€Å"I'm going to talk to my brother about it, but it occurs to me that maybe you can help me shed some light on it before I do. I'd love to know if this legend has ever been corroborated anywhere else in history.†â€Å"In all of history?†Katherine nodded. â€Å"Anywhere in the world, in any language, at any point in history.†Strange request, Trish thought, but certainly feasible. Ten years ago, the task would have been impossible. Today, however, with the Internet, the World Wide Web, and the ongoing digitization of the great libraries and museums in the world, Katherine's goal could be achieved by using a relatively simple search engine equipped with an army of translation modules and some well-chosen keywords. â€Å"No problem,†Trish said. Many of the lab's research books contained passages in ancient languages, and so Trish was often asked to write specialized Optical Character Recognition translation modules to generate English text from obscure languages. She had to be the only metasystems specialist on earth who had built OCR translation modules in Old Frisian, Maek, and Akkadian. The modules would help, but the trick to building an effective search spider was all in choosing the right key words. Unique but not overly restrictive. Katherine looked to be a step ahead of Trish and was already jotting down possible keywords on a slip of paper. Katherine had written down several when she paused, thought a moment, and then wrote several more. â€Å"Okay,†she finally said, handing Trish the slip of paper. Trish perused the list of search strings, and her eyes grew wide. What kind of crazy legend is Katherine investigating? â€Å"You want me to search for all of these key phrases?†One of the words Trish didn't even recognize. Is that even English? â€Å"Do you really think we'll find all of these in one place? Verbatim?†â€Å"I'd like to try.†Trish would have said impossible, but the I-word was banned here. Katherine considered it a dangerous mind-set in a field that often transformed preconceived falsehoods into confirmed truths. Trish Dunne seriously doubted this key-phrase search would fall into that category. â€Å"How long for results?†Katherine asked. â€Å"A few minutes to write the spider and launch it. After that, maybe fifteen for the spider to exhaust itself.†â€Å"So fast?†Katherine looked encouraged. Trish nodded. Traditional search engines often required a full day to crawl across the entire online universe, find new documents, digest their content, and add it to their searchable database. But this was not the kind of search spider Trish would write. â€Å"I'll write a program called a delegator,†Trish explained. â€Å"It's not entirely kosher, but it's fast. Essentially, it's a program that orders other people's search engines to do our work. Most databases have a search function built in–libraries, museums, universities, governments. So I write a spider that finds their search engines, inputs your keywords, and asks them to search. This way, we harness the power of thousands of engines, working in unison.†Katherine looked impressed. â€Å"Parallel processing.†A kind of metasystem. â€Å"I'll call you if I get anything.†â€Å"I appreciate it,Trish.†Katherine patted her on the back and headed for the door. â€Å"I'll be in the library.†Trish settled in to write the program. Coding a search spider was a menial task far below her skill level, but Trish Dunne didn't care. She would do anything for Katherine Solomon. Sometimes Trish still couldn't believe the good fortune that had brought her here. You've come a long way, baby. Just over a year ago, Trish had quit her job as a metasystems analyst in one of the high-tech industry's many cubicle farms. In her off-hours, she did some freelance programming and started an industry blog–â€Å"Future Applications in Computational Metasystem Analysis†–although she doubted anyone read it. Then one evening her phone rang. â€Å"Trish Dunne?†a woman's voice asked politely. â€Å"Yes, who's calling, please?†â€Å"My name is Katherine Solomon.†Trish almost fainted on the spot. Katherine Solomon? â€Å"I just read your book–Noetic Science: Modern Gateway to Ancient Wisdom–and I wrote about it on my blog!†â€Å"Yes, I know,†the woman replied graciously. â€Å"That's why I'm calling.†Of course it is, Trish realized, feeling dumb. Even brilliant scientists Google themselves. â€Å"Your blog intrigues me,†Katherine told her. â€Å"I wasn't aware metasystems modeling had come so far.†â€Å"Yes, ma'am,†Trish managed, starstruck. â€Å"Data models are an exploding technology with far- reaching applications.†For several minutes, the two women chatted about Trish's work in metasystems, discussing her experience analyzing, modeling, and predicting the flow of massive data fields. â€Å"Obviously, your book is way over my head,†Trish said, â€Å"but I understood enough to see an intersection with my metasystems work.†â€Å"Your blog said you believe metasystems modeling can transform the study of Noetics?†â€Å"Absolutely. I believe metasystems could turn Noetics into real science.†â€Å"Real science?†Katherine's tone hardened slightly. â€Å"As opposed to . . . ?†Oh shit, that came out wrong. â€Å"Um, what I meant is that Noetics is more . . . esoteric.†Katherine laughed. â€Å"Relax, I'm kidding. I get that all the time.†I'm not surprised, Trish thought. Even the Institute of Noetic Sciences in California described the field in arcane and abstruse language, defining it as the study of mankind's â€Å"direct and immediate access to knowledge beyond what is available to our normal senses and the power of reason.†The word noetic, Trish had learned, derived from the ancient Greek nous–translating roughly to â€Å"inner knowledge†or â€Å"intuitive consciousness.†â€Å"I'm interested in your metasystems work,†Katherine said, â€Å"and how it might relate to a project I'm working on. Any chance you'd be willing to meet? I'd love to pick your brain.†Katherine Solomon wants to pick my brain? It felt like Maria Sharapova had called for tennis tips. The next day a white Volvo pulled into Trish's driveway and an attractive, willowy woman in blue jeans got out. Trish immediately felt two feet tall. Great, she groaned. Smart, rich, and thin–and I'm supposed to believe God is good? But Katherine's unassuming air set Trish instantly at ease. The two of them settled in on Trish's huge back porch overlooking an impressive piece of property. â€Å"Your house is amazing,†Katherine said. â€Å"Thanks. I got lucky in college and licensed some software I'd written.†â€Å"Metasystems stuff?†â€Å"A precursor to metasystems. Following 9/11, the government was intercepting and crunching enormous data fields–civilian e-mail, cell phone, fax, text, Web sites–sniffing for keywords associated with terrorist communications. So I wrote a piece of software that let them process their data field in a second way . . . pulling from it an additional intelligence product.†She smiled. â€Å"Essentially, my software let them take America's temperature.†â€Å"I'm sorry?†Trish laughed. â€Å"Yeah, sounds crazy, I know. What I mean is that it quantified the nation's emotional state. It offered a kind of cosmic consciousness barometer, if you will.†Trish explained how, using a data field of the nation's communications, one could assess the nation's mood based on the â€Å"occurrence density†of certain keywords and emotional indicators in the data field. Happier times had happier language, and stressful times vice versa. In the event, for example, of a terrorist attack, the government could use data fields to measure the shift in America's psyche and better advise the president on the emotional impact of the event. â€Å"Fascinating,†Katherine said, stroking her chin. â€Å"So essentially you're examining a population of individuals . . . as if it were a single organism.†â€Å"Exactly. A metasystem. A single entity defined by the sum of its parts. The human body, for example, consists of millions of individual cells, each with different attributes and different purposes, but it functions as a single entity.†Katherine nodded enthusiastically. â€Å"Like a flock of birds or a school of fish moving as one. We call it convergence or entanglement.†Trish sensed her famous guest was starting to see the potential of metasystem programming in her own field of Noetics. â€Å"My software,†Trish explained, â€Å"was designed to help government agencies better evaluate and respond appropriately to wide-scale crises–pandemic diseases, national tragedies, terrorism, that sort of thing.†She paused. â€Å"Of course, there's always the potential that it could be used in other directions . . . perhaps to take a snapshot of the national mind-set and predict the outcome of a national election or the direction the stock market will move at the opening bell.†â€Å"Sounds powerful.†Trish motioned to her big house. â€Å"The government thought so.†Katherine's gray eyes focused in on her now. â€Å"Trish, might I ask about the ethical dilemma posed by your work?†â€Å"What do you mean?†â€Å"I mean you created a piece of software that can easily be abused. Those who possess it have access to powerful information not available to everyone. You didn't feel any hesitation creating it?†Trish didn't blink. â€Å"Absolutely not. My software is no different than say . . . a flight simulator program. Some users will practice flying first-aid missions into underdeveloped countries. Some users will practice flying passenger jets into skyscrapers. Knowledge is a tool, and like all tools, its impact is in the hands of the user.†Katherine sat back, looking impressed. â€Å"So let me ask you a hypothetical question.†Trish suddenly sensed their conversation had just turned into a job interview. Katherine reached down and picked up a tiny speck of sand off the deck, holding it up for Trish to see. â€Å"It occurs to me,†she said, â€Å"that your metasystems work essentially lets you calculate the weight of an entire sandy beach . . . by weighing one grain at a time.†â€Å"Yes, basically that's right.†â€Å"As you know, this little grain of sand has mass. A very small mass, but mass nonetheless.†Trish nodded. â€Å"And because this grain of sand has mass, it therefore exerts gravity. Again, too small to feel, but there.†â€Å"Right.†â€Å"Now,†Katherine said, â€Å"if we take trillions of these sand grains and let them attract one another to form . . . say, the moon, then their combined gravity is enough to move entire oceans and drag the tides back and forth across our planet.†Trish had no idea where this was headed, but she liked what she was hearing. â€Å"So let's take a hypothetical,†Katherine said, discarding the sand grain. â€Å"What if I told you that a thought . . . any tiny idea that forms in your mind . . . actually has mass? What if I told you that a thought is an actual thing, a measurable entity, with a measurable mass? A minuscule mass, of course, but mass nonetheless. What are the implications?†â€Å"Hypothetically speaking? Well, the obvious implications are . . . if a thought has mass, then a thought exerts gravity and can pull things toward it.†Katherine smiled. â€Å"You're good. Now take it a step further. What happens if many people start focusing on the same thought? All the occurrences of that same thought begin to merge into one, and the cumulative mass of this thought begins to grow. And therefore, its gravity grows.†â€Å"Okay.†â€Å"Meaning . . . if enough people begin thinking the same thing, then the gravitational force of that thought becomes tangible . . . and it exerts actual force.†Katherine winked. â€Å"And it can have a measurable effect in our physical world.â€
Friday, September 27, 2019
The World of Abstract Art Painting Research Proposal
The World of Abstract Art Painting - Research Proposal Example The paper "The World of Abstract Art Painting" aims to describe the abstract art by looking at the intended as well as created meaning from the artist’s and viewer’s perspective respectively. The artist in focus when it comes to contemporary abstract painting is John Walker, an English printmaker, and painter, and the work is entitled ‘Oceania – My Dilemma’ painted in the year 1983. The work is presented on triptych: oil on canvas and its dimensions on the overall are 217cm by 513cm by 4.3cm. His current collections include Maine landscapes and Seal Point Series. ‘Oceania – My Dilemma’ is a series presented in triptych formation, which uses motifs from his earlier works. The monolith motif is taken as a representation of the Duchess of Alba from the portrait of Goya of 1797. The quotation on the left panel of St. John is a representation of spiritual transcendence. The complexity of imagery in the painting reflects the painter’s Australian experience, which acknowledges European legacy contact with indigenous landscape and people. Incorporation of Aboriginal and Oceanic art elements like spirit figures, masks, barks, skulls, biblical references, and the Alba figure show a collision between traditional beliefs and the introduced Christianity. Therefore, the abstract form of art has grown over the years to take a dominant position in the world of painting. It has helped artists to break from the traditional forms and be free to include word and image in their paintings.
Third Party Rights Over Property Case Study Example | Topics and Well Written Essays - 1250 words
Third Party Rights Over Property - Case Study Example In the first instance Helen does not own the building outright as Kevin invested money into buying the shop and flats; Helen has taken out a mortgage on the building so Southern Counties Building Society would have a vested interest (the property was put up as collateral for the loan) and the second flat has been tenanted with Tom having a five year lease by deed of that flat. The amount of vested interest in the property owned by Kevin will depend on whether or not he and Helen had formed a partnership prior to buying the property, how long him and Helen had been living together in the first floor flat and what rights either of these situations (business partnership or de-facto relationship) might have on the ownership of the building. Because Helen raised the loan to buy the property it could be assumed that she might have a majority stake holding in the building and therefore could sell the business without involving Kevin. However, if Helen raised the mortgage so that her contribution to the building then equaled Kevin's then she has no right to sell the building without consulting Kevin first and the sale would be a joint decision. Kevin has another stake hold... Also any lease agreement he may have would have to be honored by the new buyer. The actual amount of impact Kevin would have on the sale of the building would depend on any agreement made between him and Helen, whether Kevin has any rights under de-facto law (which would be virtually nil in Britain as de-facto couples do not share the same rights as married couples) and whether or not Kevin is listed on the land title as co-owner. Helen would also have to pay off the mortgage owing amount on the building at the time of sale because the building is the collateral for the money loaned. Another problem that the new buyer would have to face is the lien on the property that prevented Helen from setting up a business that would act in competition to other businesses in the area. Any prospective buyer would have to be informed that the shop portion of the building could only be used as a newsagent shop. However, that covenant might not necessarily apply if the agreement was made personally between Helen and the person she purchased the shop from, as this covenant would only apply if it had been entered on the land title. If the land title had remained unregistered throughout the previous transactions then the situation for Kevin and Helen changes slightly. If Kevin does not have a legal partnership agreement with Helen then he would have difficulty proving his claim to any ownership of the building. He may be entitled to some duress under de-facto land ownership legislation, but that would be difficult to prove if he did not have something in writing that could prove the extent of his relationship with Helen (such as a Cohabitation Agreement) and the amount
Thursday, September 26, 2019
Personal statement for graduate school Example | Topics and Well Written Essays - 500 words - 1
For graduate school - Personal Statement Example Data Technology is consistently developing at an un-recordable rate, and that makes PC machines the most significant devices in our lives, they are our present and future. As I would like to think, nothing on the planet can measure the exponential development and fervor in the computing business. Murphy (1995) once highlighted that PC Machines and their technology influence every single one of us. Therefore, the interest for individuals with significant ICT information is substantially developing. Murphy (1995) stated that the beginning of innovative data administration innovation would altogether enhance the operational productivity in many nations. For work experience, I have been working in the IT office for Abu Dhabi Police for more than 3 years managing technology advancement on a daily basis, and overseeing Windows 2003 environment and Exchange. In addition, I was included in numerous operations, delicate assessment and my deliberations prompted an exceptionally dynamic IT foundation in Abu Dhabi police (Murphy, 1995). Lastly, I had the accompanying Achievement amid this term with the association: I consider myself generally well equipped for your highly respected system. Separated from the sound scholastic establishment I have laid in my field, I am most glad for my viable capability to perform particular projects. Notwithstanding my fine- received performance in the task outlines in such courses as Database management, program upgrade Tools and Computer Networking and appliance, I additionally took an interest in managing the storage system and checking the development of information and the storage system at Abu Dhabi police. For this significant assistance, I got warm acclaims from the organization and my working mates. My individual attributes incorporate initiative and creativity and systematic and critical thinking abilities, work powerfully in groups, great time administration, meeting deadlines, dependability
Wednesday, September 25, 2019
Business in Context. UK Economy Essay Example | Topics and Well Written Essays - 1750 words
Business in Context. UK Economy - Essay Example This essay stresses that political factor have a huge influence upon the economy as the policies and legislatures are drafted and implemented by the political parties are mostly related to the business trade practices. It not only has a political influence upon businesses but also the businesses create an attempt to influence environmental policy by endeavouring to position the political programme and to influence regulations and legislations. This paper makes a conclusion that the population tends to rise and the consumption habits too. The culture and the society generate demand for certain merchandises and services which are offered by the business houses as per the consumers demand. UK has shown a rise in the GDP. This is due to the socio-cultural affect. Consumers are the central point of the business. The technological advancement has made the consumers expectation more. This creates the gap between the expectation of the consumers and the predicted expectation of the business towards the consumers. The new changes in immigration law and intellectual property law stated by the UK government have gained international attention and many international corporations are looking forward to this policy. The policies have been able to attract many foreign players like Google, Intel and many other corporate. Technical advancement for any country aids in development of the business houses.
Tuesday, September 24, 2019
U.S History 1 and 2 Essay Example | Topics and Well Written Essays - 1250 words
U.S History 1 and 2 - Essay Example There have been rumblings, in the fields, amongst the other slaves about those willing to help us escape to free territory in the North. Everyday, I try to muster up enough courage to leave with others escaping through the swamps not far from here to hide as we head to the North. One day, about ten years later, in 1841, I along with a few other slaves leave in the dark of night as the owners and overseers, such as the ruthless one- eyed Williams. We made a mad dash for a wooded area just along the property farthest from the mansion. It took months of avoided all the people searching for us by hiding in the forests and swamps. We moved only in the night as not to be seen. Once I reached the North, I lived amongst the free black men and tried to reacquire my family through the slave trades, if possible. President Franklin Roosevelt, in 1942, issued Executive Order 9066 which called for all the immigrant residents from enemy nations during the war to be taken to internment camps for what was believed to be their own safety. The War Department along with other United States Departments backed this Executive Order. This was mainly to move the Japanese- Americans from their West Coast homes into the internment camps in the interior of the United States. Whether or not this was the United States best idea, is something that has been debated on for years. However in my opinion, I do not think that it was overly justified or even necessary to prevent the Japanese from gaining any further intelligence from the Japanese-Americans living on the West Coast. But, at the time, the United States Government thought it was completely necessary and justified. After, the attack on Pearl Harbor on December 7, 1941, in Honolulu, Hawaii, the United States declared war on the Japanese and decided to join forces with England and Russia in the fight against the Axis powers of Germany and Japan. But the
Monday, September 23, 2019
Legal and Regulatory Considerations in IT Security Research Paper
Legal and Regulatory Considerations in IT Security - Research Paper Example In the US, data laws used in one state are not necessarily similar to those used in an independent state. Correspondingly, data laws used in the US states are not exactly similar to those used in other nations like Britain or Canada. Technically, laws governing access and use of computerized information differ from one autonomous region to another. Succeeding sections of this paper contains a comparative analysis of data laws in Washington State, the EU, and Canada. Data privacy and encryption regulations in Washington State are covered under chapter 19, section 255 of the state’s laws. In Washington, private parties are protected by law against access and misappropriation of personal information by unauthorized parties. Washington laws define data and information as any software or hardware files, including but not limited to personal contact information, credit and debit card information, plus any encrypted business or personal documents (Lindsey & Smith, 2012). In Washington, breach of security and unauthorized access to confidential data and information constitutes acts of crime. In addition, unauthorized disclosure of personal or business information is prohibited by laws. Data owners must be informed by data controllers of any intention to disclose information prior to the disclosure (Lindsey & Smith, 2012). Persons guilty of data crimes include anyone involved in the assisting, facilitating or abetting of unauthorized access and m isappropriation of someone else information. Persons and companies found to violate these data laws are subject to remedial provisions and liabilities. One data law in Washington involves controlled misuse of unauthorized information. Unauthorized access to information, followed by subsequent viewing, circulation or sale of the information attracts economically reasonable compensations as damages. In Washington State, another law which seeks to minimize data misappropriation asserts that any unauthorized access
Sunday, September 22, 2019
Mars Rover Essay Example for Free
Mars Rover Essay Thus the force of gravity on Mars is about one-third of that on Earth. Mars is probably the planet we know the most about since it is so close to Earth, though what we know now is not even close to everything about the planet. Over the past several decades, humans have been interested about life on mars. In 1877, Giovanni Schiaparelli, an Italian astronomer, was the first person to draw a map of Mars. His map showed a system of streaks or channels, which he called canali. In 1910, the U. S. astronomer Percival Lowell made observations of Mars and wrote a book. In his book, Lowell described Mars as a dying planet where the civilizations built an extensive network of canals to distribute water from the polar regions to the center of the planet. Mars was discovered by scientists in the 1600’s. Researchers descried a pale pink object that was only visible in the early morning just before dawn. The object moved closer to the stars, got brighter over the next year and rose earlier and earlier. Then it reversed direction. Mars was the third most brightest object in the night sky, it had an intense red color and could see all night long. After moving the opposite direction for about 70 days, it reversed direction again, and gradually got dimmer. It was only visible in the evening sky and set earlier and earlier. After another year it again was a pale pink object, this time only visible just after sunset. Shortly after that, it could not be visible at all. It remained unseen for about one hundred days when the cycle began again. Each cycle took a little over two years. Scientists believed that water may have existed on the planet Mars. The total journey time from Earth to Mars takes between 150-300 days epending on the speed of the launch, the alignment of Earth and Mars, and the length of the journey the spacecraft takes to reach its target. We would need food, waste disposal, oxygen, and the matter of getting back to earth. Another reason we wouldnt send humans to mars dont know how our body would react to mars atmosphere. Mars doesnt have a magnetic field, such as earth, our planet blocks it out. If a human went to mars for a period of time there is a 40% chance they would come back with cancer. So at this time rovers are our best option. The first rover ever sent mars was in 1962 called Mariner 3. The rover never landed on mars it was a flyby which means it only took pictures of the planet while in obit. In 1965 Mariner 4 took more pictures. In 1969, flybys ended and NASA came up with spacecrafts. Mariner 9 was the first rover to take pictures of the entire surface of Mars when it landed in 1972. In the mid 70’s, they launched Viking 1 and 2, they were the first to discover ultraviolet radiation with dry soil and oxidizing nature preventing organisms from forming. The cost, to build a rover is about 2. 7 billion dollars, for us to send over humans the cost is twice as much. Sojourner, which launched in 1996 and landed in 1997, was part of the Mars Pathfinder Mission. The itty-bitty rover weighed in at 23 pounds. It was 26 inches long, 19 inches wide, and 12 inches tall. In 83 Martian days of operation, Sojourner never ventured more than 40 feet away from its lander, and its odometer for the whole trip read onl y about 330 feet. The rover snapped 550 photographs and performed tests on a rock named Yogi. In 2001 NASA discovered ice when the spacecraft Odyssey orbited Mars and took pictures. What Spirit and Opportunity found was a credit to the technology that allowed them to explore Mars. Within a couple months of landing, the Opportunity uncovered evidence of saltwater, which leaves open the possibility that life (and fossil indications) might at one time have existed on the planet. Spirit stumbled across rocks that pointed to an earlier, unrulier Mars that was marked by impacts, explosive volcanism and subsurface water [source: NASA Mars]. Water is key because almost everywhere we find water on Earth we find life, NASAs Web site. However, we are still unsure life existed on Mars. The rover Curiosity, finally landed on mars August 6, 2012, it was launched November 26, 2011. Before NASA could be launched Curiosity, the rover it had to go through series of test, drop tests, pull test, drive test, load test, stress tests, and shorting tests. So scientists had to realize that Earth and Mars revolve around the sun at different rates meaning it takes Mars 686 earths days and the Earth 365 days. They did to figure out when Mars was closest to Earth. Curiosity was launched from Cape Canaveral. Stage one, it reaches space and the tip of the cone opens and fall off. During the second stage, a centuar engine starts placing the vehicle into obit. When everything is alined the second engine starts to bring it to mars. Once Curiosity is on Mars it will do tasks such as collecting rock, soil sampling and placing them on instruments in order to be analyzed. What goes into the rover (Siceloff, Steven. Mars Rover Well-Equipped for Studies. NASAs John F. Kennedy Space Center. Nov. 22, 2011. (Dec. 9, 2011) http://www. nasa. gov/mission_pages/msl/launch/mslprelaunchfeature. html): A miniaturized gas chromatograph and mass spectrometer will separate and analyze chemical compounds in samples. A tunable laser spectrometer will look for organic (carbon-containing) compounds and determine the ratio of key isotopes both vital to unlocking Marss atmospheric and aquatic past. CheMin, an X-ray diffraction and fluorescence instrument, will measure the bulk composition of samples and detect their constituent minerals. Located on the rover arm, the Mars Hand Lens Imager will photograph rocks, soil and, if present, ice in extreme close-up. This uber-camera can spot details thinner than a human hair or focus on objects more than an arms length away. The Alpha Particle X-ray Spectrometer for Mars Science Laboratory, also located on the arm, will figure out the relative amounts of various elements present in Martian rocks and soils. Curiositys neck, or mast, is also decked out in instrumentation: The Mars Science Laboratory Mast Camera (MSLMC), attached at human-eye height, will help the rover navigate and record its surroundings in high-resolution stereo and color stills or high-definition video. The MSLMC can view materials collected or treated by the arm. Stereo hazard-avoidance cameras located further down the mast will aid the rovers navigation. Another mast-mounted instrument, ChemCam, will vaporize thin layers of material up to 30 feet (9 meters) away using laser pulses, then analyze them with its spectrometer. Its telescope can capture images of the beams target area. The Radiation Assessment Detector will monitor surface radiation levels. The Rover Environmental Monitoring Station will take readings of atmospheric pressure, temperature, humidity and wind, as well as levels of ultraviolet radiation. The Dynamic Albedo of Neutrons instrument can detect hydrogen a potential indicator of ice or water trapped in minerals up to 3 feet (1 meter) beneath the surface. Earthlings have long been fascinated by the planet Mars. Well before modern science fiction speculated about advanced civilizations upon Mars, the red planet was regarded as a malevolent agent of war, pestilence, and apocalyptic disaster inhabited with little green men. For untold millennia prior to scientific astronomy and well before there were any records which could properly be called historical, human beings recounted myths surrounding their favorite heroes and gods about Mars. It wasn’t until the 17th century when Mars was first discovered by scientists that we began to understand the red planet. The first rover sent to Mars was in 1962. The first successful mission was the 1964 trip by the Mariner 4, a United States craft that returned 21 images of the planet. In 1969 the flybys ended and In 1972 pictures were taken of the planets surface by the rover Mariner 9. Viking 1 and 2, which launched in the mid-70s, both had landers that descended to the surface of Mars. In 2003, the Mars Exploration Rover mission team launched Spirit and Opportunity, one of which was still traversing the planet as 2011 ended. Which leads us to Curiosity and 2012. Curiosity, previously known as the Mars Science Laboratory weighs 2000 pounds and has a planned mission duration of 23 Earth months, which it could exceed by quite some time, based on NASAs experience with the Spirit and Opportunity rovers. True to its old name (Mars Science Laboratory), Curiosity is packed with instruments as mentioned above. Who knows what our curiosity will lead to. Hopefully, life.
Saturday, September 21, 2019
Witness Memory as Evidence in Criminal Trials
Witness Memory as Evidence in Criminal Trials 1. When, and why, are witnesses’ memories unreliable as evidence in criminal trials in England and Wales? Memory Memory is one’s ability to recall the past events. Memory let us explain our personal experiences and perception about anything which is occurred in past. Types Of Memory There are three types of memory Episodic Memory Episodic memory refers to our memory of special event like accident, death etc. Semantic Memory There are too many general knowledge is stored in one’s mind which comes under the semantic memory type. It also refers to the information which is stored in our mind to perform any skill. It also tells us how to perform in some repeated situation. Procedural Memory Understanding the procedural memory is rather difficult to understand and contains different kind of information. Generally it refers to series of events which occurred on numerous times. Importance Of Witness Memory Witness memory is a fuel of any investigation because it let investigator to collect information about incident but human memory is too fragile to exactly remember every moment. There are also numerous factors involved which affect witness memory that is environment factors, witness factors, stress levels of the witness/victim, weapon focus. When Witness Memory Is Unreliable As Evidence? Witnesses memories are unreliable as evidence in criminal trials in England and Wales when there is a â€Å"TurnBull†direction indicated the state of witness at the time of incident happened because so many researches has found the massive impression on the quality of information. What Is TurnBull? There are too many environmental factors which affect the memory of witness and can damage the quality and quantity of information. R. V. Turnbull guidance proposed a term ADVOKATE Amount of time one observed Distance – What was the distance between event and witness Visibility – How much the scene was clear? Obstruction – Was there anything obscuring the view? Known or seen before – If the situation was familiar? Any reason to remember – What is the reason behind to remember. Time lapse – How long the exposure of event? Error or material discrepancy – Is there any discrepancy between the fact and the description (Booklet). Why Witness State Is Unreliable In England and Wales, Evidence is not reliable, when there is a Turnbull direction in a state of witness because sometime witness rely on external help to recall the incident or he may have perceived wrongly due to distance or visibility or both (Bull, 1999) Generally people under the investigation are not ready to recall the incident currently. Many factors like fear, stress and nervousness can affect their quality of information. Sometimes they rely on external resources to feed them and they wrongly perceive the series of happening occurred at TBR events. Sometimes witness may lie for any previous dispute or grudge. Witness may be biased and can provide wrong information to affect the investigation Conclusion Since witness memory depends on lots of factors which are indicated through the famous term ADVOKATE therefore investigation should be taken with caution and every term of ADVOKATE should be properly and clearly note down. To gather worthy information from the witness, should check the witness personal preference of biasness or favoritism. It should also be checked that whether the witness is pressurized by the culprit to speak lie. What changes should be made, to the procedures for identifying suspects in criminal investigations in England and Wales, according to psychological research? Human memory is too fragile to exactly remember the incident which happened that is why interviewing the witness to identifying the suspect is rather difficult task. It can also affect by the â€Å"Turnbull†directions. Usually witness replies the interviewer in broad term and can only describe six or seven characteristics of suspect like age (Between 20-30) or height (between 5’6’’ – 5’8’’) that is why it is always difficult to get accurate knowledge about victim. The accurate information may be collected through cognitive interview but this type of interview demands too much time to conclude things. These re the reasons for which psychological research stress on the identification parade to identify the culprit. (Kapardis ebrary, 2010) Why Should Be Identification Parade Arranged? Identification parade are arranged to avoid two hurdles of identifying the culprit. Verbal Overshadowing In most of crime, during the investigation, witness is interviewed by more than one officer and provided stream of information due to which he can mix up the details which is stored in witnesses’ mind and the information he is provided by the officers about culprit. If identification parade is arranged then a witness can easily identify the suspect or the person who is somehow linked with the crime. Information To The Public Some crimes are needed to announce in public through media and police shows the picture, video or sketch of suspect in public. Sometimes a totally innocent person can be suspected and shown to public. Witnesses, after seeing the police announcement about suspect can to mix-up the faces of suspect with actual culprit. In that case, after the identification parade, officers are directed to ask witnesses whether they have seen any broadcast on media or not? Asking directly to the witness is rather strange. According to researchers, it is more appropriate to ask logically by the witness rather than directly. Changing Facial Expressions. Facial expressions of people are changed with the passage of time due to weight, tiredness, hair color or culprit can deliberately change it to be hidden from the police but if culprit is arrested for identification parade then he cannot change his facial expression and can be identified by the witness. Conclusion Investigation with witness should be deal with cautious and interviewer should know the art of interviewing to get accurate information. Investigator should avoid direct questions like was that man wearing black shirt? Or did you see blood spot on right side of window? It is recommended to ask series of questions to grab the fact like the series below. What have you seen at spot? Can you tell us the gender of person you have seen? What was he wearing? It is also recommended to setup interview as soon as possible because there is margin of memory fail. Describe the extent to which offender profiling is relied upon both in criminal investigations and in criminal trials in England and Wales.? Offender Profiling Offender profiling is a tool of investigation about the culprit with the help of evidences. Offender profiling is commonly perceive as a magical ability of investigator to put hands on the culprit. It is also called psychological profiling, criminal personality profiling, profile analysis and the offender profiling is carried by the profilers or offender profilers. Offender profiling is a psychological assessment of evidence which is collected from the crime scene. Offender profiler collects evidence from the crime scene and assess assumes the personality type which usually exhibits similar patterns (Jackson Bekerian, 1997). Aims Of Profiling The aim of profiling is to get closer to suspect and get the answer of three questions What happened at the spot of incident? What personality type can be involved in it? What personality traits can be possessed by that personality type? These questions are generally analyzed by the psychologist who are expert of their field and are outside of the police department. Limitations Of Offender Profiling Although the crime scene can reflect the personality of offender and psychiatrist put insights on it but sometimes searching the link between the crime and mental state of offender is not cleared or understandable. It is also criticized that psychologist are helpful only in the crime which are committed in extreme cases of mental illness. They are not much useful in the crimes which are not committed due to mental illness. One more criticism is usually done on clinical approach that psychologists works according to science of psychology which is remain ambiguous and has flaws in it. Understanding and evaluating complex human psyche is rather difficult task and sometimes it is understood completely wrong Conclusion Offender profiling is no doubt a significant part of crime investigation but it is also limited in a way. It restricts psychiatrist to some specific pattern of personality traits while human behavior is always complex and cannot read accurately always. It is not necessary that crime scene always show the exact pattern of behavior which culprit exhibit. Identify the key ways in which the research, into common forms of decision-error, might inform and improve practice in criminal investigations and trials? Deception Identifying someone’s lie is not easy according to research reaching correct result is tending to fall between 50 to 60 percent. The more common reason of this trend is over confidence of people in their ability to judge others. Detection Of Deception Despite of fact that deception cannot be easily caught, people also make some basic judgment errors. These judgment errors are categorized in five types. Pinocchio’s Nose There is indeed some universal signs of lying like stammering, avoid eye contact, blushing but it cannot equally apply to everybody on the earth. So these universal signals may guide to wrong direction. Erroneous Assumptions Some people thing that deception can easily be caught by facial expression or they are the master of face reading. Some people do have the ability of face reading but in general this ability is over estimated. Othello Error This type of error is actually comes in existence due to Shakespeare’s drama where Othello achieved his target by accusing Desdemona but in modern criminal justice system this error misleads because most of people became nervous and feared when the feel that they are under observation. The Plausibility Problem Plausible and implausible problems have problem to judge right because we do not believe implausible event if it is reported by some old man. Countermeasures A natural liar can deceive the interviewer after noticing the interviewer suspicion and can adjust his/her behavior accordingly. Techniques To Improve Decision Errors Scholars and researchers proposed three techniques of improving decision errors. Un- spoken deeds Lying can be judged by the entire body language which includes gestures, postures, facial expressions, voice quality etc. Some common proposed techniques of judging un spoken deeds are: Decrease in movement of entire legs till feet Decrease in hand movements Sudden increase and decrease in voice. These all assumed signs should be deal with cautious because it cannot be true in every situation like deception errors and may lead to in accurate judgment. Spoken Deeds Numerous techniques are used to judge the â€Å"REAL†of words that are written or spoken. The two most famous techniques of read between the lines are: Statement Validity Analysis (SVA) which is developed by Steller and Kohnken in 1997 which is then incorporated by Criteria Based Content Analysis (CBCA). It implies that our account is different in content and quality in case of reality or imagination. This techniques uses nineteen criteria to judge a statement. This technique is not commonly use in U.K. Physiological Methods The most common technique of physiological method is Polygraph, which measures physiological reaction like heart beat, sweating etc to check the deception. The polygraph is conducted through different sensors that are attached to the body and every physiological reaction recorded as a graphical presentation. Although polygraph is considered as very effective tool of detecting deception and has been used in different countries but it is not used in U.K. criminal justice system due to complex human nature and the fact that human behavior and their psychological reactions are vary from person to person. Conclusion To improve decision making process in U.K spoken deeds and physiological test should be considered because these two techniques have been using in different countries and showing successful results to some extent but these techniques should be used with the caution and must not be rated overly. It should be used with the understanding that human nature varies from person to person and same reactions cannot be equally applied to everybody Bibliography Booklet. (n.d.). Retrieved from Police Service Of Northern Ireland: http://www.psni.police.uk/de/public_order_8th_edition.pdf Milne, R. and Bull, R. (1999).Investigative interviewing: Psychology and practice. Chichester: Wiley.†Kapardis, A., ebrary, I. (2010). Psychology and law: a critical introduction. New York: Cambridge University Press 2010. 1 | Page
Friday, September 20, 2019
A Study On Scottish Smoking Ban Social Policy Essay
A Study On Scottish Smoking Ban Social Policy Essay When it comes to health and social policy, governments have the difficult task of balancing the desires and rights of individuals with the desires and rights of society as a whole. This is particularly evident in the recent smoking legislation in the Scotland. Current literature and opinion has much focused on the effect of smoking bans on the hospitality industry, and the cost to society of tobacco-related illnesses. This literature review examines the social policy considerations of the recent ban on smoking proposed by the Scottish Executive and currently under consideration. This review first considers the smoking ban bill and an overview of smoking restriction issues. It then deals with one smoker in particular, examining the effect of the proposed legislation on the complex care issues of a middle-aged cancer patient, and the balance between her right to choose her actions, even if self-destructive, and the rights of others in the hospital where she resides. Smoking is undeniably destructive to the smoker, and the Scottish government is considering action to restrict its use. Among other things, the Scottish Smoking, Health and Social Care Bill will prohibit smoking in wholly enclosed public places (Scottish Parliament 12-2004). It faces final vote in 2005, with implementation, if it passes, scheduled for 2006. Objectives listed in the bill include preventing people, including children, from being exposed to the effects of passive smoking in certain public areas and safeguarding the health of the people of Scotland from the effects of tobacco smoke (Scottish Parliament 2-2005). There is also hope for changing public attitudes towards smoking, preventing Scots from beginning to smoke, and assisting those smokers who want to quit in breaking the habit Scottish Parliament 2-2005). Similar legislation has recently been implemented in Ireland, Norway, and parts of the US with great success (BBC 2004). According to Irish Medical Organisation p resident James Reilly, in the almost one year Ireland has banned smoking in public, cigarette sales have dropped sixteen percent, demonstrating that more Irish are quitting or reducing smoking (Salvage 2005, 36). The need to reduce the destruction caused by smoking, therefore, is not limited to Scotland. Countries around the world have begun to address the tobacco situation, with over forty ratifying the WHOs Framework Convention on Tobacco Control (WHO 2004). The FCTC just went into effect in February 2005, establishes packaging and labelling guidelines, addresses tobacco advertising, provides for regulation to prevent second hand smoke, and tightens efforts on tobacco smuggling (WHO 2004, WHO 2003). The Scottish legislation replaces the less than effective Scottish Voluntary Charter on Smoking in Public Places. Implemented in May 2000, as of 2005 only 61% of hospitality establishments had some type of non-smoking provision, demonstrating the Charters inadequacies (Anon 2005). Bill ONeil, Scottish Secretary of the British Medical Association, supports the bill, contending that each year we continue to rely on these half-hearted measures, Scots continue to suffer from passive smoke-related illnesses and significant numbers die (BBC 2004). Smoking is a profoundly destructive health and social issue. The World Health Organisation (2005) lists tobacco as the second major cause of death in the world, affecting one in ten adults worldwide. Half the people who smoke today, that is about 650 million people, will eventually be killed by tobacco (WHO 2005). The government contends, smoking is the main avoidable cause of early death in Britain, killing more than 120,000 people a year, even publishing a White Paper titled Smoking Kills (Gardiner 2004, DOH 1998). Scotlands Chief Medical Officer, Mac Armstrong states nicotine is twice as addictive as cocaine and that it takes sixteen years off the average smokers life (Johnson 2004, 8). Tobacco is also destructive to non-smokers. Smoking and exposure to passive smoke are the fourth most common risk factor for disease of any kind worldwide (WHO 2004). This risk extends to those who choose to smoke, and those who are exposed to others cigarettes, regardless of choice. The Scientific Committee on Tobacco and Health (2005) concludes that exposure to second hand smoke, also called environmental tobacco smoke (ETS), is a cause of lung cancer, heart disease, and asthma, and represents a substantial public health hazard. Jim Devine of Unison stated to continue to allow people to work in smoky environments is the 21st century equivalent of sending children up chimneys (BBC 2004). Studies find children regularly exposed to second hand cigarette smoke are more likely to develop asthma (Johnson 2004, 8). Mac Armstrong offers that due to passive smoking, between 1000 and 2000 lives are lost each year in Scotland (Johnson 2004, 8). Some smoking opponents question why it is legal at all, given its social cost and overall destructive impact on human life. Proponents of smoking argue that adequate ventilation would address much of the second hand smoke risk. However, workplaces with designated smoking areas have been shown to still expose smoke to workers (Leourardy and Kleiner 2000, 68). It also raises the question of who should pay for such ventilation. Tobacco already has staggering economic costs to society, typically claiming the lives of people at the ages when they are most productive and exponentially increasing health care costs (WHO 2005). The average smoker takes 25% more sick days than the average non-smoker (Johnson 2004, 8). These costs are passed on to all members of society, whether they choose to smoke or not, just like second hand smoke. Other typical arguments against smoking bans are economic. Tobacco companies and members of the Scottish Licensed Trade Association have argued that a full ban is unnecessary and not supported by the public (BBC 2004). Opponents of the smoking ban contend it will ruin business, cause unemployment, and take away peoples right to enjoy a cigarette with a drink in public (Johnson 2004, 8). Tobacco Manufacturers Association executive Tim Lord held that a study commissioned by the TMA showed 77% of Scots were opposed to a total smoking ban, particularly disfavouring the ban in clubs, pubs, and bars (BBC 2004). These results were not supported by independent studies, however. A policy memorandum produced for the Scottish Parliament found 70% of Scots in favour of smoking restrictions, with 59% of restaurant owners not expecting any negative impact from the legislation (Scottish Parliament 2-2004). More importantly, any economic impact of smoking restriction must be considered in light of t he tremendous cost of smoking to society. Not all opponents of smoking bans cite economic reasons. Salvage (2005, 36) contends, human rights and freedom of choice are two reasons put forward for [smoking] bans not going ahead. For example, opponents of bans cite the uproar of violation of human rights caused by the recent smoking ban in Liverpool. Health Minister Melanie Johnson stated the bill was incompatible with the Human Rights Act, because it extended smoking bans to private homes and prisons, required smokers to prove their innocence, effectively reversing the burden of proof, and extended the power of searches (Merrick 2005). MPs and peers ruled that it breached human rights laws, while a cross-party human rights committee found the smoking ban bill incompatible with the right to a private life, and possibly the right to a fair trail and the protection of property (Merrick 2005). These impositions on human rights, however, seem based on the bills reach beyond public places, and the manner with which that reach is exe cuted. It is unlikely that the legislation currently under consideration in Scotland will have similar flaws. Questions do arise of the National Health Services ability to enforce such legislation. Under the current bill, smoking policies would be enforced by environmental health officers, hired by local councils (Scottish Parliament 12-2004). It is questionable whether they will have the same effect as would police officers, particularly if trying to enforce no-smoking legislation in pubs and bars. As the patient considered here is confined to a hospital, enforcement is not an issue. Of greater concern regarding the National Health Service is whether it will be able to provide the necessary support for smokers who want to quit. Approximately one-third of smokers try to quit each year, but only three percent succeed (Lewis 2005). Kevin Lewis (2005), Clinical Director of Smoking Cessation of Shropshire, Telford, and Shrewsbury, believes, however, there is great potential for smoking cessation in primary care. If smoking bans are accomplish their objectives of reducing the number of smokers and amount they smoke, adequate resources must be available. The greatest success occurs when a motivated individual is provided with a combination of personal support and pharmacotherapy (nicotine replacement or bupropion), under the care of a trained medical professional, typically a nurse (Lewis 2005). As the government progresses with smoking legislation, preparation and funding for the NHS are imperative to the ultimate success of smoking restrictions. To provide some background on the specific case considered in this review, the female patient in reference is forty-three years of age. She began smoking at the age of fifteen, and smoked regularly throughout her life. This is not surprising, as 80% of smokers take up tobacco as children and teenagers (Johnson 2004, 8). The patient was diagnosed with lung cancer at the age of forty, which has progressed with some rapidity; her cancer is now inoperable, untreatable, and terminal. She has recently suffered loss of mobility, in addition to general physical degeneration. Due to these complications, the patient now requires a wheelchair to travel even short distances, including going outside the hospital. She is unable to navigate the wheelchair to the common area outside the facility without assistance. The patient, however, continues to smoke, and the recent ban will make her unable to smoke in her room or a designated indoor area of the hospital. In addition, hospital staff is not allo wed to assist her in going outside for smoking purposes, per hospital policy. She must therefore wait for visitors to take her out. There are several factors of prominence in this particular case study. First, while the government has some (albeit debated) responsibly to protect its citizens from themselves, there are no grounds for the need to guard this woman from the effects of smoking (Lambert and Dibsdall 2002). She has irrevocably made the decision to smoke, and bears the consequences. It is unlikely that quitting smoking now will have a pronounced difference on the time she has remaining or on her prognosis. The government therefore has no right for intervention to protect her from the harms of tobacco. The debate then emerges between her human rights to decide her own behaviour and receive adequate care, her responsibility to society, the rights of hospital staff, patients, and visitors regarding second-hand smoke, and the mandate of the hospital to act in the best interest of the patients health and well-being. Advanced societies recognise the right of every human being to make choices regarding his or her behaviour and life, to the point these choices negatively impact others (Perry 1985, 568). The patient, as a part of a larger society, has a responsibility to the members of her community. She is affected by legislation that could save others, and her government does have a responsibility to encourage its citizens to make wise decisions. Smoking is certainly not a wise decision, as even tobacco companies and smoking ban opponents acknowledge its addictive nature and potential for impaired health (Anon 2005; Black, McKie and Allen 2003, 69). The patient undoubtedly recognises this, as she is dying due greatly to her choice to smoke. Certain laws are passed not because they are required for everyone, but because they are needed by most (Perry 1985, 574). For example, many people would drive at excessive speeds from time to time were it not for speed limits. While there are a few that could probably do so without accident, most need speed guidelines to drive safely. The major difference with smoking is the effect of tobacco smoke on those in the general area. Second-hand smoke, as discussed previously, has been shown to be almost as deadly as actually smoking, and it is often beyond the control of the non-smoker to limit smoking in his or her vicinity. Those commonly cited in this argument are wait staff in clubs and bars, but the same would apply to hospital staff required to clean a designated smoking area or move patients in and out of it (Aung et al 2001, 283; Cuthbert and Nickson 1999, 33). These workers are then faced with either exposing themselves to a potential carcinogen or giving up their jobs (Aung et al 2001, 280). As the patients rights extend only to the point they impact others, the government is therefore within its bounds to restrict her smoking in enclosed areas of the hospital. The question then presents itself, does the patient have the right to continue her destructive behaviour, and what is the hospitals mandate to prevent her injurious choices? J. David Velleman (1999), in writing about his own bout with cancer, discusses the rights of smokers in society. Instead of focusing on second hand smoke as the effect of smoking on non-smokers, he considers the relationship between the individual and society. He sees himself as my sons father, my wifes husband, my parents son, my brothers brother (Velleman 1999, 606). However, he comes to the conclusion that a person has a right to make his own life shorter in order to make it better, if he so chooses and however he defines better. Social organisations, like governments or hospitals, only have the right to intervene when the individual is incapable of rational decision (Velleman 1999, 613). While the patient therefore has the right to smoke, she does not have the right to expect assistance from the hospital. A hospital, as a medical facility, has a corporate responsibility to its patients to promote their healthy living (BBC 2005). Hospitals would not be expected to provide candy machines for uncontrolled diabetics or allow suicidal patients to keep sharp objects. The hospital has a responsibility to promote health (BBC 2005). While this patient may not be more harmed by continuing to smoke, providing assistance or a smoking area for her would require the hospital to do the same for all its patients, thereby assisting many in smoking which would damage their health. The visible issue is her mobility; if she were able to go outside unassisted, her smoking choice would not be limited. It is the combination of her damaging desire to smoke and her degenerative condition that create the quandary. The most feasible solution is to ask the patient to provide her own assistance to and from the outdoor smoking area. Since she is choosing destructive behaviour that the hospital cannot support, she must find a way to accomplish such behaviour. The government and the hospital in the above instance have the right to impose smoking restrictions on the patient for the good of society as a whole. Both organisations have a mandate to protect those in their community from risk to health, and smoking is most certainly a risk to health. Neither, however, has the right to prevent her from smoking. Therein lies the balance. In her situation, she must find or arrange for someone to help her in her choice to smoke. We as members of society can choose to pursue self-destructive behaviours, but society has no obligation to support us in their pursuit. REFERENCES Anon 2005. Second hand smoke: health risks. Scottish Executive Health website [online]. Available at www.scotland.gov.uk, accessed 19 March 2005. Aung, M. et al, 2001. An exploratory study of the smoking issue in restaurants. Management Decision, vol. 29, no. 4, pp. 279-285. Available at www.emeraldinsight.com, accessed 19 March 2005. BBC 2004. Scotland smoking ban to go ahead. BBC news, Scotland [online]. Available at www.bbc.co.uk, accessed 19 March 2005. BBC 2005. The Hippocratic Oath. Nova online [online]. Available at www.bbctv-ap.co.uk, accessed 19 March 2005. Black, M., McKie, L., Allen, E., 2003. A community development approach to tobacco control. Health Education, vol. 103, no. 2, pp. 68-74. Available at www.emeraldinsight.com, accessed 19 March 2005. Cuthbert, L., Nickson, D., 1999. Smoking in the restaurant industry: time for a ban? International Journal of Contemporary Hospitality Management, vol. 11, no. 1, pp. 31-36. Available at www.emeraldinsight.com, accessed 19 March 2005. DOH 1998. Smoking Kills: a White Paper on tobacco. The Stationery Office, London. Gardiner, B., 2004. Scotland readies tough smoking ban, England may follow. Associated Press, Oban, Scotland, Nov. 15, 2004 [online]. Available at www.cbsnews.com, accessed 19 March 2005. Johnson, J., 2004. The Huff Puff CafÃÆ'Â ©. The Sunday Herald, Fresh Section, December 5, 2004. Available at www.emeraldinsight.com, accessed 19 March 2005. Lambert, N., Dibsdall, L.A., Frewer, L.J., 2002. Poor diet and smoking: the big killers. Comparing health education in two hazard domains. British Food Journal, vol. 104, no.1, pp. 63-75. Available at www.emeraldinsight.com, accessed 19 March 2005. Leourardy, B., Kleiner, B., 2000. New developments concerning tobacco smoke in the workplace. Management Research News, vol. 23, no. 7, pp. 67-70. Available at www.emeraldinsight.com, accessed 19 March 2005. Lewis, K., 2005. Helping patients to quit smoking. The Practitioner, 8 March, 2005. Available at www.emeraldinsight.com, accessed 19 March 2005. Malam., S., et al 2004. Workplace Smoking Policies in Scotland. Scottish Exectuive and NHS Health Scotland, research report [online]. Available at www.healthscotland.uk, accessed 19 March 2005. Perry, T., 1985. Two Domains of Rights. Philosophy and Phenomenological Research, vol. 45, no. 4, June 1985, pp. 567-580 [online]. Available at www.emeraldinsight.com, accessed 19 March 2005. Salvage, F., 2005. Smoking Cessation: Should it be banned? Chemist Druggist, March 5, 2005 [online]. Available at www.emeraldinsight.com, accessed 19 March 2005. Scottish Parliament 2-2004. Prohibiltion of Smoking in Regulated Areas (Scotland) Bill. Policy Memorandum, introduced 3 February 2004 [online]. Available at www.scottishparliment.uk, accessed 19 March 2005. Scottish Parliment 12-2004. Smoking, Health and Social Care (Scotland) Bill. Executive Bill, introduced 16 December 2004 [online]. Available at www.scottishparliment.uk, accessed 19 March 2005. van Teijlingen, E., Bruce, J., 1999. Systematic reviews of health promotion initiatives the Smokebusters experience. Health Education, vol. 99, no. 2, pp. 76-83 [online]. Available at www.emeraldinsight.com, accessed 19 March 2005. Velleman, J., 1999. A Right of Self-Termination? Ethics, vol. 199, no. 3, pp. 606-628, April 1999 [online]. Available at www.emeraldinsight.com, accessed 19 March 2005. WHO 2003. An international treaty for tobacco control. World Health Organisation [online]. Available at www.who.int, accessed 19 March 2005. WHO 2004. Tobacco Treaty set to become law, making global health history. World Health Organisation [online]. Available at www.who.int, accessed 19 March 2005. WHO 2005. Why is tobacco a public health priority? World Health Organisation [online]. Available at www.who.int, accessed 19 March 2005.
Subscribe to:
Posts (Atom)