Saturday, May 23, 2020

The War Of The Vietnam War - 1784 Words

Conflict Throughout a War Regarded as the longest war in all of United States History, lasting from 8 May 1950- 15 August 1975, the Vietnam War is one of the most controversial wars. Supporters of the war believed in the Domino Theory and were convinced that the United States needed to stop the possible spread of Communism. However, because this was a civil war between the North and South, many felt that the United States did not need to interfere with it. The United States ultimately lost the Vietnam War because of unreliable weapons, tactics, unique terrain, the anti-war movement at home, and opposition from the Vietnamese population. The United States had superior technological and military advantages in the Vietnam War. However, the ground troops were never adequately supplied to make a statement to the Viet Cong at the beginning of the war. The first version of the M16 Assault Rifle was terrible and was the â€Å"standard issue for infantrymen. The M16 was a gas-operated, magazine-fed rifle that could f ire .223-caliber bullets accurately over several hundred yards. Its ammunition came in 20-30 rounds, making it relatively easy to reload† (Weapons of the Vietnam War). Because it was gas-operated, the gun was prone to jamming. Any sediment such as bullet residue, water, sand, dirt, would prevent another round from efficiently accelerating through the barrel effortlessly. Vietnam’s jungle like terrain provided all the debris to appear consistently inside the soldier’sShow MoreRelatedThe War Of Vietnam And The Vietnam War1525 Words   |  7 PagesThe war in Vietnam is The United States and other capitalist bloc countries supported South Vietnam (Republic of Vietnam) against the support by the Soviet Union and other socialist bloc countries of North Vietnam (Democratic Republic of Vietnam) and the Vietcong of war. Which occurred during the Cold War of Vietnam (main battlefield), Laos, and Cambodia. This is the biggest and longtime war in American history during the 1960s (Best 2008). It is also the most significant war after World War IIRead MoreThe War Of The Vietnam War1475 Words   |  6 Pageson one such event, the Vietnam War, came from entertainment-based programs and the play Miss Saigon. Despite heavy coverage in such well-known comedic films as Forrest Gump and Good Morning Vietnam, the true events were anything but a laugh for those involved. In spite of the relative recentness of the events in Vietnam, many of today’s youths know little about the topic. The events in Vietnam raise the ever-present question on the ethics of third party involvement in a war otherwise unrelated toRead MoreThe War Of The Vietnam War1729 Words   |  7 Pagesspread of communism all around the world. This is what lead to the gruesome war that lasted over a decade in Vietnam. A great deal of social changed happened all over the world, but particularly in America as the Vietnam War dragged on. As people became more aware of the atrocities going on in Southeast Asia, the endless domestic support turned into widespread explosive protest. During the first few years of the Vietnam conflict, Americans full heartedly supported the United States and its governmentRead MoreThe War Of The Vietnam War1379 Words   |  6 Pagestensions over the Vietnam war caused many americans to become divided on the actions taken by the government across seas. Americans questioned whether the government could be trusted. The feeling of betrayal and government secrecy created the â€Å"Credibility Gap,† in which many americans believed that the government no longer was for the people, but for anything else that would benefit the government. The Vietnam War exacerbated the gap between the pro-war traditionalists and anti-war liberals along withRead MoreThe War Of The Vietnam War1430 Words   |  6 Pagesended in 1989, the Vietnam war is still being fought, but on a different battlefield, one of public opinion. Some call this war an atrocity, a war the United States should never have joined. Others call it a crime, committed by the power hungry politicians of the U.S. Now that new information from both sides of the war has surfaced and the wounds of battle have had more time to heal there is yet another opinion emerging. The Vietnam War was in fact only one of many proxy wars fought under the umbrellaRead MoreThe War Of The Vietnam War1155 Words   |  5 PagesThe Vietnam War cost many Americans their lives in the 60s and 70s. Many were drafted into the war by choice and others selectively chosen to join to help America. The contributions made had a major impact on the American side of the Vietnam War. Though many contributions were made none stand out any more than others. It is sometimes said there is always a hero in the war who helped the victory. Wars, however, do not have war heroes because a hero is making an undeniable contribution to the war andRead MoreThe War Of The Vietnam War1592 Words   |  7 PagesThe Vietnam War was said to be one of the most significant wars in the twentieth century. This w ar took place from November 1, 1955 to April 30, 1975. It was at the time, the longest war in American history. Much of the conflict was centered in Vietnam, Laos, and Cambodia. During that time, approximately 58,219 US troops were killed in action. The reason America got involved in the Vietnam War was to stop the spread of communism in South East Asia and beyond. â€Å"America’s involvement in Vietnam derivedRead MoreThe War Of The Vietnam War1204 Words   |  5 Pagesus†¦ When that is the way you are, how do you conduct your life?† The Vietnam War killed over fifty eight thousand Americans and over 61% of the men killed were 21 years or younger. Most Americans are conflicted with the fact whether the Anti War Movement played a factor in prolonging the Vietnamese War. â€Å"In every story there are two sides and in between lies the truth.† Anonymous The United States become involved in Vietnam after the French withdrew when the Republican President Dwight EisenhowerRead MoreThe War Of The Vietnam War877 Words   |  4 PagesAnother big difference in this war was that the Vietnam War was had more disapproval and was more expressive within the American public, unlike the Korean War. The ANITWAR MOVEMENT started in the 1960s this group was never enacted until this era. There was not a group like this in Vietnam, but there were many groups that opposed the war. The main object of these revolts was the American military presence in Indochina. The ANITWAR MOVEMENT caused an influence not only socially, but also in the realmRead MoreThe War Of The Vietnam War1421 Words   |  6 PagesIn July and August of 1972, Jane Fonda made radio broadcasts from Hanoi that changed the way Americans thought of the Vietnam war and of her. To this day, many people view her as a traitor and criticise her actions in Vietnam; however, some people we re truly inspired by her words and what she had to say. Despite people s personal opinions, Fonda was a powerful speaker and knew how to convey her message to her audience. She tried to convince people that the American government and military were the

Monday, May 18, 2020

The Us Policy On Maternity Leave Falls Short - 1665 Words

The US policy on maternity leave falls short when compared to the rest of the world’s industrialized countries. This country is the last industrialized one left to not have mandated paid maternity leave for new mothers. American mothers are plagued with the pressure of having to take care of their newborn(s) and economic situation for at least twelve weeks. They’re at a greater risk of having an unstable income, family life, and health. This is despicable. It is imperative that the United States rectifies this situation and introduces paid maternity leave for the workforce as an emendation in order to provide mothers with a sense of security and wellbeing while taking time off to care for their newborns. It’s time for the US to join the†¦show more content†¦If you look at total paid leave provided, it averages at 53.7 weeks with a 59.2% of wages being paid. All of these numbers are extremely impressive compared to the zero weeks of paid maternity leave t hat the United States provides. Additionally, paid maternity leave ends up providing a huge benefit to the children of the employee as the report, â€Å"The Economics of Paid and Unpaid Leave,† from the Council of Economic Advisors stated in the following: Other studies have found that maternity leave increases women’s likelihood of successfully nursing their infants. There is also evidence that children have shorter hospital stays when their parents are able to stay home and care for them. The current evidence on children’s outcomes emphasizes the importance of the early childhood and prenatal environment, so there are likely large long-term benefits of polices that improve infant health. One study found higher educational attainment, lower teen pregnancy rates, higher IQ scores, and higher earnings in adulthood for children whose mothers used maternity leave, suggesting paid leave policies can have long-term benefits as well. Children who do not have adequate parental care are more likely to show up sick to school and infect others. Studies also suggest that those with paid sick leave are more likely to utilize preventative health care such as cancer screening. Therefore, not only does

Tuesday, May 12, 2020

Negative Effects of the Lincoln Assassination - 3130 Words

Logan Flanagan 22 March 2013 Negative Effects of the Lincoln Assassination Soon after President Abraham Lincoln died on Good Friday, April 15, 1865, the fatal bullet with which he was murdered was removed. Dr. Curtis, one of the doctors who performed the procedure, later wrote, â€Å"‘There it [the bullet] lay upon the white china, a little black mass no bigger than the end of my finger—dull, motionless and harmless, yet the cause of such mighty changes in the world’s history as we may perhaps never realize’† (Swanson 135). The doctor was correct in his statement that Lincoln’s death would have substantial and far-reaching effects. The assassination of the sixteenth president of the United States of America had many negative results that†¦show more content†¦Booth’s family, a well-known family of actors that was famous before the assassination, lost its positive reputation forever. Also, people who knew Booth or were associated with him were persecuted for his wrongdoing. An article from the Amer ican Civil War Roundtable of Australia, a conference in Australia for people interested in the Civil War and its aftermath, says that four supposed co-conspirators—Lewis Powell, David Herold, George Atzerodt, and Mary Surratt—were hanged for their part in the assassination plot. Mary Surratt’s sentencing was considered very controversial because some evidence against her was later determined to be erroneous, and her sentence of death shocked the nation. Three men—Sam Arnold, Michael O’Laughlin, and Dr. Samuel Mudd—were given life prison sentences, and another man, Edmen Spangler, was imprisoned for six years (Curry 24). These people were accused of assisting Booth in his assassination plot. While Powell, Herold, Atzerodt, Arnold, and O’Laughlin were actually found guilty in helping Booth in his plot, and Dr. Mudd had aided Booth’s escape, Spangler and Surratt’s participation in the assassination plot or its execution was uncertain; they were tried and punished partially because they were associated with Booth. As a result of Lincoln’s death, Booth’s family and acquaintances were blamed, hated, and persecuted. The ill effects of, and the blame for,Show MoreRelatedAbraham Lincoln s Second Inaugural Address1070 Words   |  5 PagesOn March 4, 1865 Abraham Lincoln delivered his second inaugural address as president of the United States. The inaugural address came at the very end of the American Civil War, and just a month before the assassination of Abraham Lincoln. Prior to this address, the United States had been split into two different independent states, the Union and the Confederacy. Throughout Abraham Lincoln’s first term and the very beginning of his second, Lincoln had to deal with the secession of the eleven statesRead MoreHow Did The Radical Republican s Rise For The Failure Of The Post Civil War Reconstruction?1619 Words   |  7 Pagescontribute to the failure of the post-civil war reconstruction? The time between 1863, when Lincoln passed the ten percent act, until the year 1877, when reconstruction was officially ended, will be evaluated with information provided by the sources. The investigation will specifically look to how the Lincoln assassination allowed for the rise in the Radical Republican Party from 1866 to 1868 and the party’s effect on reconstruction acts leading to the failure of the post-civil war reconstruction eraRead MoreCivil War1284 Words   |  6 Pagesï » ¿American Civil War Milan Patel The journal paper discusses the problems faced by Abraham Lincoln and Jefferson Davis that contributed to civil war in their respective states. It analyses the contribution of each person in the American civil war. The achievements of both commanders will also be discussed together with their weaknesses. Introduction A civil war involves the conflict between different groups in the same state. The main objectives of the civil war are the intention of one group toRead MoreThe Slavery Of African Slaves Essay1163 Words   |  5 PagesPresident Lincoln gave the black people hope and this is what they needed. Initially his decisions and actions are to preserve the Union; however, they were the black people’s only hope for freedom. President Lincoln needed the black people as much as they needed him. Southerners prideful thinking led them to believe they are superior to blacks. The South could not function without the labor of the slaves and depended on them heavily for working the fields and running households. The treatmentRead MoreWalt Whitman and Abraham Lincoln3895 Words   |  16 PagesWalt Whitman and Abraham Lincoln Table of contents 1. Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 2. Whitman’s position in American literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 3. Whitman’s poetry before the civil war†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...............3 4. Lincoln’s death – a turning point for Whitman†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.6 5. Walt Whitman’s four poems on the American nation’s grief†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 5.1 Hush d Be the Camps To-day†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..7 5.2. When Lilacs Last in the Dooryard Bloom d†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 Read MoreThe Importance Of Labor And Labor Unions1125 Words   |  5 Pagessettlement for themselves. In June of that year 40,000 freed slaves were given 40 acres and a mule and settled on Sherman Islands â€Å"Give Me Liberty, An American History Pg. 555, only to be taken back by President Andrew Johnson, following the assassination of President Lincoln. â€Å"Give Me Liberty, An American History Pg. 562. During the Reconstruction following the American Civil War in 1865 the southern economy was hurting from the failure of the Confederate currency and loss of land and much of theirRead MoreGun Control Is Necessary, And Delay Means More Death And Horror1305 Words   |  6 Pagesquestion: Is it worth it to put society at risk just so people can exercise their Constitutional rights? It is important to weigh the pros and cons of gun control in the debate today. Therefore, if the affirmative is able to provide multiple positive effects of banning private ownership of handguns, the affirmative will win today’s debate. My first contention addresses the fact that â€Å"the notion that a good guy with a gun will stop a bad guy with a gun is a romanticized vision of the nature of violentRead MoreCorruption And Corruption Of Corruption1421 Words   |  6 Pagesfavoritism to a relative family member. It is typically associated in a negative light which runs down to employment, federal work, and other places. In essence, nepotism is everywhere. In politics, it holds no place. However there is reason to believe that patterns of a relative in the field are acts of nepotism. This act of corruption applies to politics because it fosters negativity. Nepotism not only provides plenty of negative press coverage, but it can cause others to lose confidence in the organizationRead MorePolitics And The United States Government1578 Words   |  7 PagesRepublican president as well. GOP.com says, â€Å"The Republican Party is fighting for a freer and stronger America where everyone has the opportunity to achieve the American Dream.†(GOP.com) Abraham Lincoln, a Republican President, was our 16th president and was in office from March 1861 until his assassination on April 15, 1865. During his presidency, he worked vigorously for the abolishment of slavery. He presented the Emancipation Proclamation ending slavery in states not controlled by the Union. ThisRead MoreThe Civil Rights Movement Essay1634 Words   |  7 PagesLuther King Jr. was born in Atlanta, Georgia on January 15, 1929. His parents were Martin Luther King Sr. and Alberta Williams King. His father was the pastor the Ebenezer Baptist Church in Atlanta. He grew up in a structured family and felt the effects of racism daily but never had to face the violence of racism growing up. He began his education in the segregated schools of Atlanta where he excelled as a student. At the age of fifteen he graduated from high school and attended his freshmen year

Wednesday, May 6, 2020

An Analysis Of Henrik Ibsen s A Doll s House

A Doll’s House Ashleen Kaushal TOPIC: The theme of heredity in the play I. Introduction Henrik Ibsen’s three-act play, A Doll’s House, follows a seemingly typical housewife as she becomes painfully aware of the flaws in her marriage with a condescending, chauvinistic man. Ibsen uses the ideology of a Victorian society as a backdrop to inject the theme of heredity in the play. He employs several characters to demonstrate the different facets of heredity in order to highlight how this concept can impose restraints on a person’s individual development. II. Body 1. First Main Point i. Point: With Dr. Rank, Ibsen broaches the theme of heredity as it manifests at a physical level, in order to show how difficult it can be to escape from the shambles of your past. ii. Evidence: Nora to Mrs. Linde: â€Å" [Dr. Rank] has consumption of the spine. The fact is, his father was a horrible man who had mistresses . . . so . . . the son’s been delicate all his life† (2.183-184). It can be assumed that â€Å"consumption of the spine† is a euphemism for syphilis, which Dr. Rank inherited from his father as an infant. iii. Analysis: †¢ â€Å"son’s been delicate all his life†--- shows us how Rank was never able to fully live his life. He’d always had to carry the burden of his father’s sins. †¢ Syphilis was incurable at the time, meaning that Rank’s tragic fate was sealed before he was even born. †¢ His illness symbolizes the moral corruption of society and how people are conditioned byShow MoreRelatedAnalysis Of Henrik Ibsen s A Doll House 1823 Words   |  8 PagesA Doll House is a play that was written by Henrik Ibsen in 1879. Nora Helmer is a wife and mother who secretly loaned money to save her husband’s, Torvald, life. Torvald views and treats Nora has a doll and she goes along with it. As conflict comes and goes Nora decides that her current life is not what she wants for herself. She no longer wants to be anyone’s â€Å"doll† and decides to leave her family in search of independence. This play was controversial during the time it was written becauseRead MoreAnalysis Of Henrik Ibsen s A Doll House 1152 Words   |  5 PagesHenrik Ibsen’s play â€Å"A Doll House† addresses the importance of the roles women play throughout this time period. Women are thought to be like â€Å"dolls† to their husbands, by obeying thei r commands and keeping a good image. We see the main character, Nora Helmer struggle to keep her perfect image of a great wife as troubles start to arise. Throughout the play we begin to see Nora push through her troubles and find her true identity, Nora shifts from being the loving, perfect wife, to being a strongRead MoreAnalysis Of Henrik Ibsen s A Doll House884 Words   |  4 Pagestransform minor lies such as white lies into something more dangerous. When one works to conceal a lie, a cloud of deception hangs over those involved and can lead to the destruction of friendships, relationships, and even marriages. In Henrik Ibsen’s A Doll House, he uses the motif of lies and deception to illustrate the fragileness of the Helmer’s marriage, which ultimately leads to its demise. Nora Helmer, a naà ¯ve woman who has never been given the chance to mature into an independent womanRead MoreAnalysis Of Henrik Ibsen s A Doll House995 Words   |  4 Pagesimagining and guiding the integration of all these elements belongs to the director. One of the toughest tasks of a director is to reinvigorate a socially important and renowned production while maintaining its original message and composition. Henrik Ibsen’s A Doll House is a socially important realistic play that portrays the gender dynamics that plagued the nineteenth century and questions the expectations held for women in a household and society. The play is still incredibly influential because the issuesRead MoreAnalysis Of Henrik Ibsen s A Doll House 851 Words   |  4 PagesHenrik Ibsens’s, A Doll House, details the lives of the Helmers, a seemingly perfect couple. As the story progresses from act to act, it becomes quite obvious that their relationship is everything but perfect. Complic ations arise quickly when a forged loan by Nora Helmer is brought to her husband Torvald’s attention. The prejudices women experience, particularly, Nora is a definite tone in this play. Henrick Ibsen does a great job at showing both sides of the oppression of women, particularly withinRead MoreAn Analysis Of Henrik Ibsen s A Doll s House923 Words   |  4 Pages A Symbol of the Times Henrik Ibsen masterfully uses symbolism to add depth and meaning to his play A Doll’s House. The story is about a housewife named Nora who gets into trouble when she forges her father’s name to borrow money for her husband’s sake. Many objects take on new meaning in this story, from the Christmas tree in the opening scene to the slammed door at the end. Ibsen uses Nora as symbol representing how many women in that time period were treated like objects. The literal meaning ofRead MoreAnalysis Of Henrik Ibsen s A Doll s House 909 Words   |  4 Pages The three-act play A Doll’s House by Henrik Ibsen, is centered around the protagonist, Nora Helmer whose never been by herself. She lived with her father until he became ill and was left to die on his deathbed, to living with her obliviously controlling husband, Torvald Helmer, who treats her like a possession more than a person. In the beginning of the play, Nora’s sneaky attitude is caused by her hu sband treating her like a â€Å"doll† (hence the name, A Doll’s House). He’s about to get a new jobRead MoreAnalysis Of Henrik Ibsen s A Doll s House 1381 Words   |  6 PagesNora’s Transformation from Repression to Liberation in A Doll’s House The play in prose A Doll’s House is written by Henrik Ibsen, and set in Norway in 1879. By inserting symbols into the storyline, Henrik Ibsen reveals the theme of female submissiveness and male superiority during the 19th century and highlights character revelation in the play, namely through Nora’s transformation from being repressed to being liberated. Ibsen includes a variety of symbols throughout this work, specificallyRead MoreAnalysis Of Henrik Ibsen s A Doll s House 989 Words   |  4 PagesHenrik Ibsen’s â€Å"A Doll’s House† is a tragic story depicting women as less equal to men. The story uses symbolism throughout the play, playing off the title. In Ibsen’s story he shows the tale of Nora Helmar, a ditz woman with a spending habit who devotes herself to her husband Torvald. Torvald is an overbearing man who treats his wife Nora as lesser than himself, as if she was a child. Controlling her, the play looks into Torvaldâ €™s mind and shows he believes Nora is actually less than a child butRead MoreAnalysis Of Henrik Ibsen s A Doll s House 1325 Words   |  6 PagesFamilies Destroyed by Secrecies In Henrik Ibsen’s A Doll s House† (March 20, 1828 - May 23, 1906) and â€Å"Oedipus the King†, by Sophocles (which is an Athenian tragedy performed 495 B.C.E. - 405 B.C.E.) both have men who were destroyed by a secret which lead them to their horrible outcomes on life because of the conflicts in their relationships with their families although, both pieces of Literature were written many years apart from each other and in different areas of time. Two characters who

Avatar (2009) and Princess Mononoke (1997) Free Essays

Literature is a powerful tool that can be used to address very pertinent issues in the world today, a major concern is a human interaction with the environment and the aftermath of the interaction, CGI Avatar and Anime Princess Mononoke have been used to illustrate the effect of human interaction with the environment. The two sets are primarily meant for children who need to be environmentally conscious as they grow up. Various postulations have been used to define the relationship between human beings and the environment. We will write a custom essay sample on Avatar (2009) and Princess Mononoke (1997) or any similar topic only for you Order Now Therefore, there is a need to evaluate how literature can be used to address environmental issues, Glotfelty and Fromm (1996) state that ecocriticism revolves around establishing the relationship between various kinds of literature and the surrounding physical environment.an analogy is drawn of the way feminism examines the language and literature from a gender-based perspective is the same way ecocriticism bases its notion in an earth-anchored approach to literary studies. One of the most important aspects that can be used to dissect how human beings interact with the environment is using literature to figure out is either gender is majorly involved in the destruction of the environment or not ,as addressed by Bradford, Mallan, Stephens McCallum( 2008) Ecofeminism is viewed as , †Arising from the fusion of feminist and ecological thinking in the early 1970s, [ecofeminism] proposed that the social assumptions that underpin the domination and oppression of women are the same assumptions that bring about the abuse of the environment.† Avatar (2009) and Princess Mononoke (1997) offer contrasting views on the relationship between the environment and human beings.CGI Avatar, by James Cameron, forces the viewer to only choose between deep ecology and anthropocentrism which is environmentally destructive. Whereas Anime princess Mononoke, directed by Hayao Miyazaki tries to offer a more balanced and relatively less idealized notion as opposed to Avatar, the realistic arrangement between non-human nature and human beings. Avatar is in 3D, while Princess Mononoke is characterized by shades and nuances. Avatar is about a struggle where the victor has to destroy the competitor whereas Princess Mononoke is about a heated struggle between the conflicting parties where both sides eventually end up learning from each other. Representation of the environment in Avatar Avatar employs a Manichaean worldview (Givens and Matthew,2011) this is where two antagonistic forces viciously oppose each other and aim at being victorious over each other by elimination. Narminio and Kapell( 2011) The Na’ vi, cherish and happily live with nature characterized by religious practices that respect the environment ,they use analytical methods and instincts to understand how to coexist with the environment and at the other extreme end are the humans ,who viciously conquer new lands with paying homage or respect to the initial inhabitants ,they end up colonizing the new lands, the human beings behavior can be condensed in a western colonialism metaphor. In the first encounter, Neytiri shouts to Jake. â€Å"You have a strong heart, but you are stupid, like a child!† This modestly represents how our species coexist, Jake who is initially depicted as destructive when it comes to dealing with the environment. Whereas the Na’vi have always maintained and affirmed to the wisdom of their ancestors of always adopting deep ecology, this is despite the fact that they are not technologically endowed but they are able to interact better with the environment than humans. Human being practice shallow environmentalism, all they do as depicted by Cameron in Avatar is centered towards them. This is in contrast to the Na’vi, who always seek forgiveness for the animals they kill for food because they acknowledge they are taking away precious life. They always avoid destructive activities that affect the environment and only kill human beings when defending themselves. From this Avatar depicts that there is no sure way to interact peacefully with nature. In Avatar, the Na’vi can be depicted in terms of environmental ethics as being ‘holistic biometric’ this is because they comply with the approach. In fact, they comply thoroughly Arne Naess (2005) assertions on deep ecology as depicted below; The nurturing and flourishing of human (Na’vi) and the non-human(non-native) interaction should only benefit the Na’vi as the latter’s life form doesn’t benefit it benefits the former’s. The diversity of life forms is a catalyst that spurs the growth and development of both human life form and non-human life forms. Social justice environmentalism which can be defined as humans are obliged to ensure that they should not destroy the diversity of life forms expect if the activity is meant to satisfy very vital needs. The human being as depicted in Avatar behaves like a machine which is programmed to comply to cost benefits. What this shows is that they are ruthless colonizers who are only motivated by self-interest materialism. The notion of ethics has been mutilated in Avatar because it only defines the interaction between humans but quiet on how they should interact with the environment. Therefore, the human being as illustrated by Cameron in Avatar is a narcissistic figure, who is a cynical pragmatic and very suspicious of his environment and end up destructing it ,they do not position themselves in the role of ensuring they protect and conserve the environment ,they see them as being superior to everything and end up destroying the environment. Zeman( 2012) Avatar has clearly deviated from the expected Hollywood formula of having the Victors suffer but eventually triumph over evil. It is appalling that almost. In 99% of Avatar’s cases, humans have been depicted as not being able to evolve and live in harmony with the environment, they do not shift their beliefs to adjust to pressing issues and are highly insensitive to other issues that do not affect them directly. The movie’s plot should have ended with human beings being defeated and sent back to their original habitat. Representation of the environment in Princess Mononoke In contrast to Avatar, Mononoke’s views on the interaction between human beings and the environment are very interesting because the characters are flexible enough to shift their beliefs to suit the ever-changing dynamics of realities. At the end of the movie, the wolf-princess ends up remaining in the forest as its guardian and a fascinating turn of events is that she befriended a human being, something that at the beginning of the movie would not have been possible. Because she was furiously charging at human beings. Initially, the step of having human beings in the forest was faced with harsh criticism but later on both parties reconciled and they were able to live in together with harmony. Eboshi who was given chance to change her mindset, after being spared by Princess Mononoke agrees to change Iron Town by also considering the need to preserve it and the surrounding. Mononoke’s message which Is in contrast to Avatar is that the human character should be flexible enough to adjust to the ever-changing issues that affect the environment. However, if they cannot be intrinsically driven to do so then if it means destroying and influencing them to change cause even against their will but at the end, their character should be molded to be flexible in regards to environmental interaction. If they are able to change even if it means through suffering then it means the suffering was for a good cause. The new characters developed will be able to preserve the environment for future use. This is clearly depicted by Ashitaka who at the end says, â€Å"Even in the midst of hatred and slaughter, there is still much to live for. Wonderful encounters and beautiful things still exist.† In contrast to Avatar here, the characters define their own rigid paradigms, Princess Mononoke, flexibility in a change of beliefs encourages paradigms to shift and address the emerging issue. In Mononoke, it becomes evident that human beings are able to evolve as dictated by changing beliefs into a state of rich awareness about their interaction with the environment, this is the product of having made mistakes in the past and using them to find the right path that defines how beneficial it is to have a healthy relationship with the environment, this can be viewed as a mix of both deep ecology and shallow environmentalism. The advantage of this change in tune is that even if there are future challenges, ways will be invented to ensure that the challenge that bears conflict between human beings and the environment is amicably resolved. Because human beings inevitably have to exploit the natural resources but they should do so in a way that accommodates both the human and non-human. Princess Mononoke can be condensed in, former times, humans and nature interact in harmony but this peaceful coexistence is broken when human beings start conquering and exacting dominance over non-humans by use of guns. What follows is a conflict between nature and man, brute force is used to end the conflict since dialogue failed. The battle saw both parties losing and the iron Town was destroyed, the old forest set ablaze and this brought the forest spirit to an end. But Ashitaka and Mononoke eventually bring the peace that sees a peaceful coexistence between human and nature. In contrast to Avatar, Princess Mononoke brings forth a rather realistic lesson and effective in that it encourages both parties to acknowledge and learn from mistakes. Conclusion From the comparative analysis, it can be concluded that Avatar (2009) teaches a very poor lesson, this is because it shows that the majority of the species are incapable of constructively learning from their mistakes. It is also appalling that the mistakes mushroom to the extent that nothing can be done to change the whole situation, the film also states that those human beings who are able to adjust are those that have gone through a learning process to avert their prejudices and make their beliefs flexible in order to become a Na’vi. The movie also lets narcissism win, the individualistic nature should be shrugged because it does not shape most characters in the movie to be environmentally conscious. This is in total contrast to Princess Mononoke, this movie brings out a philosophy that should be adopted by many. Initially, there was an antagonism between human beings and entry to the forest but after some suffering and heated exchanges, it can be seen that at the end human beings were able to change their stand and addresses the need to coexist mutually and in harmony in the forest. How to cite Avatar (2009) and Princess Mononoke (1997), Papers

Capstone-online shopping the retail stores - Myassignmenthelp.Com

Question: Discuss about the Capstone-online shopping the retail stores. Answer: Introduction: The research proposal is trying to investigate the impact of virtual reality online shopping on the retail stores and its advantages and disadvantages for the customers. Due to the advancement of technology, internet is helping people in various ways including online shopping. Virtual reality has immense impacts on the ways people purchase products online without any difficulties. There is an enhanced popularity of online shopping. There are vital effects of the 3D virtual world on the mode of communication of the customers with the retailers. This has lead to the reduction of footfall in the retail stores. The proposal tries to find out the impacts of the virtual reality online shopping on the stores and its advantages and disadvantages. The analysis will be done based on the research objectives and the research questions will be addressed accordingly. Justification The virtual reality online shopping is becoming very popular and research needs to be done to know about its impact on the retail stores and the shopping behavior of the customers through online. The research about the advantages and disadvantages of virtual reality online shopping needs to be conducted to help the customers in knowing about the technicalities of virtual reality. The authors have stated a number of opinions about virtual reality but there have been a number of gaps leading to the conduction of further research about the topic. Aim of the research: The main goal of the research is to critically analyze the research gaps about the future of virtual reality online shopping and its impact on the stores. Research objectives: The objectives of the study are discussed as follows: To investigate the impact of virtual reality on online shopping To find out the future trend of virtual reality online shopping To analyze the impact of virtual reality online shopping on the store To figure out the advantages and disadvantages of virtual reality online shopping Research questions: The questions of the study are as follows: What are the impacts of virtual reality on online shopping? What is the future trend of virtual reality online shopping? What are the impacts of the virtual reality online shopping on the retail stores? What are the advantages and disadvantages of virtual reality online shopping? Literature Review There has been an immense impact of the online shopping in the life of an individual. Virtual reality has helped in the transformation of the online shopping pattern. It is able to attract a lot of people today. There is a huge technical impact of 3D on the virtual reality online shopping. It helps in the communication of the people with the retailers. It has the possibility of reincarnate in the environments in the future. Virtual shopping is having impacts on the retail stores and the footfall has reduced remarkably. Online shopping helps the customers in effective decision making sitting at home. There are various factors that virtual reality takes into consideration like market disruption, reduction of friction and rich customer feedback. The radical development of internet has helped the customers to access the products at any point of time using the Smartphone or laptops. An idea of immersive shopping came up from an organization that helped the customers in scrutinizing the vi rtual versions of the products, move through the virtual shops and make a purchase of them. People are facing various problems regarding online purchase of goods and online transactions. Research Methodology Research methodology deals with the different types of techniques and methods of research. Research methodology is a systematic process that assists in conducting the whole research in an organized and systematic manner. The methodology helps in understanding of the different techniques of research. Hence, a research method is described as a structured process of research. Types of investigation There are three types of research study. These are exploratory, hypothesis testing and descriptive research. An exploratory research design is helpful for the researcher when he is not having any clear idea about the particular topic of the research. The research study will be conducted with the help of some scientific point of view. Descriptive research study has a contribution in conducting the research with the help of relevant theories and concepts (Parahoo 2014). It helps in linking the topic of the research with the model or theory. In hypothesis testing, the researcher needs to make a hypothesis about the topic at the initial part of the research (Creswell 2013). The researcher is then required to make analysis of the theories with respect to the models. This research study will include descriptive research by thoroughly analyzing the research topic. Data collection method Various types of data are used for a research process. Data are collected from primary as well as secondary sources. Primary data are the ones that are collected from the respondents through surveys, interviews and questionnaires (Dillman, Smyth and Christian 2014). On the other hand, secondary data is referred to as those collected from sources like journals, websites of companies, blogs and several books (Strauss 2016). The researcher is required to collect data from the primary as well as secondary sources. The researcher will collect the primary data from the common people, the ecommerce companies and the retailers through questionnaires. Secondary data can be collected from the relevant journals, websites and observations from books. There is a huge importance of the secondary data to get the relevant data regarding the topic. For the study of this research, the researcher needs to collect primary data from the common people who do or do not shop online and the retailers. The researcher will make a field survey and take the opinions of the respondents about the future of virtual retailing online shopping, its impact on the retailers and its advantages and disadvantages. The researcher has another way of collecting the feedback and taking the responses of the people through online. He will be responsible for sending the postal questionnaire to the people and collect their feedback. The researcher may share the screen with the respondents and help them in understanding about how to give their opinions. The primary data will be helpful in getting to know the insight into what the customers feel about virtual online shopping and whether it is providing any advantages to them (Peppers and Rogers 2016). Secondary sources will be able to give an understanding of the theoretical views about online shopping, its ad vantages and disadvantages, its impact on the retail stores and the impact of virtual reality on online shopping. This information will not be as updated since it will be taken from any journals or articles, published earlier. So focus should be given on the primary data more than that of the secondary data. Sampling method There are mainly two types of sampling method in a research process. These are probability and non-probability sampling. These types are very much effective in an attempt to select the samples for conducting the survey and collect the data for analysis and findings. Probability sampling helps in selecting the respondents in a random manner (Rea and Parker 2014). Simple random technique is a very effective technique for probability sampling and can be used in this type of research (Fowler 2013). On the other hand, non-probability sampling is quite different from the probability sampling and through this type of sampling; the researcher always has the option of choosing the sample according to his or her need. The researcher of this research will use the probability sampling method to select the sample of the respondents for the research. The researcher will select the respondents in a random manner to collect their views about virtual reality online shopping by using the simple random sampling. Accessibility issues There is every chance of a researcher to face difficulties in accessing the relevant data or collection of necessary information in the research process (Denscombe 2014). The feedbacks of the respondents are not always right and the analysis gives rise to incorrect inferences. They may give positive as well as negative feedback about any topic or company. The researcher faces various types of issues regarding the data to be collected. People are very busy and have very less time to give their feedback out of their busy schedule. Various retailers may not be willing to give their consent about the impacts of virtual reality online shopping on the retail stores to maintain the reputation of their brands in the market. Many people are not aware about the virtual reality online shopping, proper information will not be available for the research analysis, and the objectives of the research may not be met. Ethical issues The researcher of the project needs to maintain some ethical issues while conducting the entire research process. The researcher should not reveal the personal details of the respondents for the sake of privacy. As per the Data Protection Act 1998, the researcher needs to maintain privacy of the data as well so that others are not able to know about the information being collected (Merriam and Tisdell 2015). The data that will be collected for analysis should not be published in the public. The researcher is also responsible for taking the consent of the respondents and gives them flexibility in giving their responses. The researcher must use the data for ethical purposes so that any organizations or individuals are benefitted out of it. Data analysis plan The plan regarding analysis of data in the research is primarily of two types, qualitative and quantitative data analysis techniques. The researcher will take the assistance of the quantitative data analysis to make an analysis of the data that will be collected from the different retailers and customers who prefer online shopping. Quantitative data analysis will be helpful for the evaluation process so that it can be done in a descriptive manner (Clemence, Doise and Lorenzi-Cioldi 2014). The researcher shall take the help of questionnaires to collect the responses of the customers and the retailers. This will be similar to a survey about the impact and the future of virtual reality online shopping. The interview of the respondents may be structured, unstructured or semi-structured. The impacts of the virtual reality online shopping, future and advantages of virtual reality online shopping will be assessed with the help of the data to be collected. Research limitations There will be a number of limitations regarding the conduction of the research by the researcher. Time constraint is a factor to be considered in the research. Another factor is the budget required for the conduction of the research. These two limitations must be taken into account before initiating the research. Structure of the proposed research The research proposal contains five important parts. The first part is the introductory one, which contains the aim of the research and questions of the research. Second part is the literature review that deals with the key elements of the topic. The third part is the methodology which is the most significant portion of the research proposal. It contains the data collection process, sampling and the techniques of data analysis. The fourth one is the findings and analysis of the data that have been collected. The last part is the conclusion of the entire research. Time horizon (Gantt Chart) Main stages/activities Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Topic selection Data collection from the secondary sources Framing layout of the research Literature Review Formation of the research plan Selection of the appropriate research techniques Primary collection of data Analysis and interpretation of data collection Conclusion of the study Formation of draft Submission of final work Figure 1: Time Chart (Source: created by author) First week is used for the selection of the topic and collection of data by taking the help of the various secondary sources like journals and books. The second week is also taken for the collection of the data, literature review and the framing of the research layout. The third week is also for literature review and formulation of the research plan. The fourth week is concerned with the selection of the appropriate research technique, primary collection of data and analysis of the collected data. The fifth week will be taken for making a conclusion of the research and formation of the draft. The sixth week will be taken for the final submission of the research work. Expected Result The research proposal will help in finding out the impact that will be created with respect to virtual reality modes in online shopping. It can be seen that these methods helps in attracting many customers of the modern world. The impact of 3D in the technical part has affected the level of communication in a positive manner for the owners of the retail stores. It will also result in evaluating the various factors that are the disruptions in the market, friction reduction and the effective feedback of the customers. Conclusion Thus, it can be concluded that the most important part for this topic is the literature review portion, which has helped me in gaining a better insight about the online shopping methods with respect to virtual reality. The 3D style of virtual reality has helped in gaining more success and created an impact on the online shopping methods, which has increased the communication of the customers with those of the retailers. This has led to a reduction in the number of customers visiting the stores for purchasing the products, as the extensive use of internet has helped in revolutionizing the modes of online shopping. The use of the techniques that are available in the research methods will help me in progressing with the study in an efficient manner. References Clemence, A., Doise, W. and Lorenzi-Cioldi, F., 2014. The quantitative analysis of social representations. Routledge. Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Denscombe, M., 2014. The good research guide: for small-scale social research projects. McGraw-Hill Education (UK). Dillman, D.A., Smyth, J.D. and Christian, L.M., 2014. Internet, phone, mail, and mixed-mode surveys: the tailored design method. John Wiley Sons. Fowler Jr, F.J., 2013. Survey research methods. Sage publications. Merriam, S.B. and Tisdell, E.J., 2015. Qualitative research: A guide to design and implementation. John Wiley Sons. Parahoo, K., 2014. Nursing research: principles, process and issues. Palgrave Macmillan. Peppers, D. and Rogers, M., 2016. Managing Customer Experience and Relationships: A Strategic Framework. John Wiley Sons. Rea, L.M. and Parker, R.A., 2014. Designing and conducting survey research: A comprehensive guide. John Wiley Sons. Strauss, J., 2016. E-marketing. Routledge. Introduction There is an importance of writing the journals in a reflective manner, as it helps the students to reflect the new knowledge that they have gained during the course of the research process and in class as well. It helps in solidifying the experiences that is associated with learning by recording the resources that helped them during the course along with the new knowledge, which will help them in developing a new conclusion. From the present course, I have been able to gain enough knowledge about virtual reality that can help in the online shopping methods for the consumers. By researching from the books, websites and journals that have been published previously authored by different writers, I have gained ample amount of knowledge with respect to the topic by reviewing the literatures, which has also helped me in designing the research methodology so that the research can be conducted in an efficient manner. Reflective Journal Scope The potential benefits that are present while gaining knowledge about the topic by conducting the research, helps in making a self-assessment about the topic that is provided for the study. The reflective journal helps the students is forming opinions about the missing areas, which can be improved during the course of the study. On the contrary, it can be seen that with the help of reflective journals, the strong points can be identified through the study, which can be applied in a real life scenario. Additionally, it helps the students to create new opinions and view things on a broader perspective, as the risks can be identified that are present while exploring or thinking and when applying the knowledge in practical as well. Reflective Analysis Overview of the industry The first assignment deals with the literature review about what the different authors have stated about virtual reality and its impact on the online shopping. From the first assignment, I have gained enough knowledge about what the authors have tried to assert and the how virtual reality is gaining popularity among the consumers. I have also experienced the pain of standing in the queue while going to shop in the shopping malls or any reality stores. I was unaware about virtual reality earlier like many people. Techniques of virtual reality This assignment has helped me in gaining enough knowledge about the online shopping and the different tools and techniques used in the virtual reality like creation of 3D virtual world for the process of effective communication between the retailers and the shoppers. I have come to know about how the authors have critically argued about the importance of virtual reality and its impacts on the online shopping and the offline retail stores (Merchant et al. 2014). Advantages and disadvantages of virtual reality As far as I am aware about the assignments, the authors have stated about the advantages and disadvantages of virtual reality online shopping. There are many gaps in the research conducted by the different authors about the impacts of virtual reality (Wexelblat 2014). This is an emerging topic in the market and people are doing various researches about the virtual reality and how it can be improved for the various other reasons. I also get to know that there are significant impacts of the technological features like perceived interactivity, perceived personalization and perceived sociability (Rix, Haas and Teixeira 2016). Analysis I leant that virtual reality helps in the virtual communication that are different from face-to-face communication. Virtual reality assists the consumers in getting a proper understanding of the journey of the consumers, correct identification of the blind spots that are available in the stores and also measure the time spent by them in the stores in viewing the products. After the thorough learning of the assignment, I came to know about the different factors that have been mentioned in the assignment. These are market disruption, reduction of the friction and the rich customer feedback. These factors helped to know more about the virtual reality (Otaduy, Okamura and Subramanian 2016). Popularity of virtual reality Virtual reality is gaining popularity because of the availability of rich contents. As per my analysis, the retailers are differentiating themselves from the competitors through the proper usage of virtual reality (Olshannikova et al. 2015). The smaller businesses are enjoying the advantages of getting faster to the market because of the virtual reality. They are able to introduce more innovative products in the market and getting the feedback of the people. I think that these need to be done on a continuous basis so that they can attract more customers in the future and get success. This also helps in the enhancement of the brand value (Gregory 2017). Efforts of the retailers I have read that the retailers are always trying to reduce the effort of the consumers in purchasing the products. This have rise to a number of ecommerce companies that are very successful in the market. The retail stores are incurring huge losses as per the different articles and journals. The retailers are trying to have frictionless transactions with the customers so that they do not get the pain of travelling to the retail stores, stand in the queue and spent lots of time and energy (Brown and Green 2016). Virtual reality helps the customers in shopping online and more cashless transactions. As per my thoughts, people do not always have the money ready in hand. This leads to problems in purchasing of products at that point of time. Cashless transactions help in purchasing of any kinds of products at any point of time. There are disadvantages of many things apart from the advantages. The disadvantages of virtual reality give an indication that people must be aware while purchasin g products online (Seidel and Chatelier 2013). Various types of frauds There are various types of frauds taking place in the online transactions. I have read and understood that virtual reality is also known as immersive multimedia or computer simulated multimedia. Oculus Rift, PlayStation and HTC Vive are the mainstream medium for virtual reality (van Gelder et al. 2017). Internet has also helped in increasing the popularity of virtual reality. The case of a company mentioned in the assignment helped in getting an insight into how the companies are utilizing the concept of virtual shopping (Huang et al. 2016). Strategy of marketing As per my analysis, virtual reality has become a clever strategy of marketing for the products. Virtual reality helps in the 3-D digital mock up, product life cycle management and 3-D design software. The interface in the online shopping helps in improving the interaction between the customers and the computer. It also helps in increasing the effectiveness of viewing three dimensional photo realistic items, real time interactivity of the consumers and services regarding fully interactive product customization. The assignment helps in gaining knowledge about the future of virtual reality, which will be helpful for me in the future in accessing the online form of purchasing products (Ruhrmair et al. 2015). Proposal of the research The second assignment deals with the proposal of a research that needs to be undertaken since many gaps have been identified in the first one. I have come to know about the way a research needs to be done to get the necessary data. I have understood the various ways a sample from the entire population can be drawn so that we can get the best responses according to the needs. The aim and objectives of the research needs to be properly formulated so that the research can be done properly taking into consideration the topic. The proposal has tried to figure out the impacts of virtual reality on the retail stores, the future of virtual reality online shopping, the advantages and disadvantages of virtual reality and the impact of virtual reality on the online shopping. It is very important and critical to address the research questions in the proposal. The second assignment also discusses about the literature review about the statements of the authors. Sampling method According to me, the research methodology is the most important part of the research proposal. The research methodology takes into consideration the sampling method, the types of investigation to be conducted and the methods of collection of data. The methods of collection of data are very significant in any research process. I strongly feel that the respondents need to be given liberty and flexibility in giving their responses. Data collection techniques I have gathered knowledge about the sources of primary as well as secondary sources of data. The primary sources are the collection of data through surveys and online and offline questionnaires. The questions can be open ended as well as closed ended. Open-ended questionnaires give more flexibility to the respondents. Secondary sources of information are the various journals, books and articles. People who do not have time and energy to do field survey and collect information are resorted to secondary sources of information. Internet helps in this process of accumulating data from the journals and articles. On the other hand, as per my observation, information from the primary sources help in understanding the thoughts of the respondents that is occurring presently and updated. There are various types of sampling methods in a research process. I have gathered enough information about probability and non-probability sampling. Type of sampling for the research I have inferred that probability sampling helps in selecting the respondents randomly from the entire population. Non-probability sampling helps the researcher to choose the samples according to his own needs. If I perform any research, I need to keep many factors in mind including the ethical issues. I need to stay ethical in conducting any research. Many people will not be interested in giving their responses for the research to be done. I must not disclose the personal details of the respondents as well as maintain the privacy of data that will be collected during the research. I have great responsibilities in utilizing the data in the future. The analysis of the data that have been collected, is very critical for the proper addressing of the topic. In accordance with the assignment 2, many people may not be aware about the concept of virtual reality and this can be a drawback in the collection of data. Proper data will not be gathered if proper response is not received. The resea rch proposal has also included a fact that most of the retailers will not be interested in giving responses as they want to deny the fact that the popularity of online shopping is gaining popularity and will be more beneficial to people in the future. The last but not the least part that I have learnt from the assignment 2 is that the Gantt chart helps in keeping a track of the whole research process. The chart includes the course of actions in the different weeks of a month. This helps in making the research successful within a specific period. Conclusion These assignments have helped me in gaining adequate knowledge about the how a research proposal is made and how virtual reality will help the customers at large for online shopping in future. The reflective journal helps in gaining knowledge about what has been done in the last two assignments and what I have learned from them. The advantages and disadvantages of virtual reality on online shopping, the future of virtual reality online shopping, its impact on the online shopping and the advantages and disadvantages have been considered in the reflective journal. It has also stated about what I have learnt about the research proposal and how the researches are done using the various research techniques. Reference List Brown, A. and Green, T., 2016. Virtual reality: Low-cost tools and resources for the classroom.TechTrends,60(5), pp.517-519. Gregory, J., 2017.Virtual reality. Cherry Lake. Huang, Y.C., Backman, K.F., Backman, S.J. and Chang, L.L., 2016. Exploring the implications of virtual reality technology in tourism marketing: An integrated research framework.International Journal of Tourism Research,18(2), pp.116-128. Merchant, Z., Goetz, E.T., Cifuentes, L., Keeney-Kennicutt, W. and Davis, T.J., 2014. Effectiveness of virtual reality-based instruction on students' learning outcomes in K-12 and higher education: A meta-analysis.Computers Education,70, pp.29-40. Olshannikova, E., Ometov, A., Koucheryavy, Y. and Olsson, T., 2015. Visualizing Big Data with augmented and virtual reality: challenges and research agenda.Journal of Big Data,2(1), p.22. Otaduy, M.A., Okamura, A. and Subramanian, S., 2016, July. Haptic technologies for direct touch in virtual reality. InACM SIGGRAPH 2016 Courses(p. 13). ACM. Rix, J., Haas, S. and Teixeira, J. eds., 2016.Virtual prototyping: Virtual environments and the product design process. Springer. Rhrmair, U., Martinez-Hurtado, J.L., Xu, X., Kraeh, C., Hilgers, C., Kononchuk, D., Finley, J.J. and Burleson, W.P., 2015, May. Virtual proofs of reality and their physical implementation. InSecurity and Privacy (SP), 2015 IEEE Symposium on(pp. 70-85). IEEE. Seidel, R.J. and Chatelier, P.R. eds., 2013.Virtual reality, trainings future?: perspectives on virtual reality and related emerging technologies(Vol. 6). Springer Science Business Media. van Gelder, J.L., Nee, C., Otte, M., Demetriou, A., van Sintemaartensdijk, I. and van Prooijen, J.W., 2017. Virtual burglary: Exploring the potential of virtual reality to study burglary in action.Journal of Research in Crime and Delinquency,54(1), pp.29-62. Wexelblat, A. ed., 2014.Virtual reality: applications and explorations. Academic Press.

Friday, May 1, 2020

Enterprise Class Hadoop and Streaming Data †MyAssignmenthelp.com

Question: Discuss about the Enterprise Class Hadoop and Streaming Data. Answer: Introduction: The following assignment is the analysis of the big data threats and the steps which is taken to prevent the threats of the big data. The given assignment discusses about an organization known as the European Union Agency for Network and Information Security (ENISA) the center of network and the expert in the Information technology securities threat which assist the European nation bodies. The ENISA organization works with the members of the EU in assisting the securities related to the IT. The ENISA is also responsible for improving network and provide security to the entire European nations. The Big data is the collection of the huge data which is not only complex and not useful the purpose of the big data is to derive some pattern or the algorithm from these data to study the pattern which may include the behavior of the people related to certain companies (Kimwele, 2014). The source of the data can be from anywhere like the application of the internet of things or telecommunicati on and it can be in huge amount. The application of the big data is increasing every day and a more advanced and matured technique is getting developed to use the big data to derive the information (Kitchin, 2014). Many companies have admitted that the application of the big data has been huge and it has increased the effectiveness and efficiency in making the decision in the business. It is expected that in the coming days the demand of the big data is going to increase in all the sectors of the company be it a healthcare, banks, markets specially in for the military purpose and intelligence system. However despite of all its business there is various risks associated with the big data which is the prime targets of the hackers to retrieve the information. There are various threats related to the big data some of them are: Through the usage of the big data not only the original data but the confidential data are also at risk as with the high replication of the big data for purpose to store and the outsourcing of the big data these type of the technology are new ways of the breaching and the leakage of the data. The big data are posing threat to the privacy of the individual which has the impact on the data protection. In the big data at the time of the creation of the link at the collection of the data is the major cause of the penalization the extra creation of the link is the major cause of the leakage of the information and data. Thirdly different stake holders of the big data like the service providers data transformers, data owners have different opinion about the usage of the data thus their idea of usage of the data may conflict which makes its a difficult environment to opiate upon. Thus in such difficult envenom t the security of the data may be compromised. Lastly in many areas of the information and communication technology (ICT) .They are applying own security and privacy which is the best practice according to them but it would relatively decrease the all over security and the privacy risk related big data area(Walker 2014). As still in the early stage of the big data the rising pattern is embracing the Security-by-default principle which has proved to be both practical as compared to the effort and cost in term of time and money required to provide ad hoc solutions for the problem later on. Lastly the assignment analyses how there are huge gap between the problems related to the big data and the counter measures to tackle the problems of the big data. Therefore the assignment discuses about the lack of the proper countermeasures of the big data and how important is to take correct counter measures so that the next generation can also utilize the application of the big data. Therefore in the particular a valid question rises whether the current trends of the countermeasures for taking up the existing solutions which is against the data threats in the Big Data which mainly focuses on the amount of the data. The current countermeasures are made which is mainly to counter the scalabilities of the big data which does not fit the big data problems which results in the partial and ineffective approach to the protection of the big data(Walker 2014). The assignment enlists some of the guidelines and approaches for the countermeasure of the next generation of the data. Some of the recommendations enlisted are as remarked by the assignment are: I) to stop following the current approach to the traditional data and work on defining the Big Data related solutions ii) To find and identify the gaps and required needs for the current practices and to work in planning the specific definition and the specific standardization activities. To work in training and teaching the IT profession nals about the big data and teach they correct measures of usage of the big data. iv) To work in defining the correct tools and measures for security and privacy for the protection of Big Data and it environments v) To clearly find and identify the assets to the Big Data and to simplify the selection of solutions mitigating risks and threats (Walker 2014). Various major threats have been listed by the assignment. Some of them are: Threat due to Information leakage and sharing because of the human error Threat due to Leakage of the data through the Web applications (unsecure APIs) Threat due to inadequate planning and design or incorrect adaptation. Threat due to inception of the information. Above all the threats described by the assignment the significant threat can be leaks of the data via Web applications (unsecure APIs). As all the threat described by the assignment is a human error and it can be corrected with proper attention but the breaching of the data due to Web applications (unsecure APIs) is the breach which can take place due to the software which do not have enough capability to protect the data (Halenar, 2012). According to the assignment various sources has claimed that the security is of the less concern while building the big data. The new software components designed for the protection of the big data is usually built with the authorization of the service level, but there are few utilities which is available to protect the core features and application interfaces (APIs) (Kayworth Whitten, 2012). As we know that the big data are built and designed on the web services models. The application interfaces (APIs) become a prime target to well-known cyber at tacks, like the Open Web Application Security Project (OWASP). Which is in the top ten lists and there are few countermeasures to tackle them. The vendor of the security software Computer Associate (CA) and various other related sources find out via report that the data breaches are due to not a secure application interfaces (APIs), in various industries such as the photo and video sharing services and especially the social networks which includes the Face book, Yahoo and Snap chat (Chen Zhang, 2014). An example can be demonstrated the threat in the social networks and can be the injection attack to a company known as the Semantic Web technologies through the injection of the SPARQL code. The flaws in the security are very common in the newly available big data languages such as the RDQL and the SPARQL where both are read-only query languages. The utilization of the newly designed query languages has introduced the vulnerabilities which was already present in the misuse of the quer y languages of the old-style. The attacks on the languages like SQL, LDAP and Path are well known and dangerous for the usage. The libraries of this new language have been given the tools to check the user input and simultaneously minimizing the risk. There are other big data software products for an example Monod, Hive and Couched who also suffers from the traditional threats which includes the execution of the code and the remote SQL injection. The assets targeted by these threats belong to group Data and asset type Storage Infrastructure models (such as Database management systems (DBS) and Semantic Web tools). According to the assignment the threat agent is someone who has the clear intention and decent capability to plant a threat regarding the usage of the big data systems (ODriscoll, Daugelaite Sleator, 2013). It is crucial for the users of the big data to be aware of these threats and prevent them in their system. The various categories of the threat agents are Corporations: The category of the cooperation comes under the organizations which are involved in the tactics. In this category the cooperation are considers as the threat agents whose motivation and aim is to gain a competitive advantages over their competitors which is their main target. Depending on the cooperations size and its sector these corporations usually acquire the significant capabilities which range from the technology in the area of their expertise. Cyber criminals: Another threat agent is the cyber criminals the main target of these cyber criminals is to financial gain and they hack and breach the data of the company which is confidential and has a high demand in the market. These cyber criminals opiates on all levels be it a local or a global operator. Cyber terrorist: the main differed between the Cyber criminals and the Cyber terrorist is that the motive behind the data breaching is not only financial but also political, religious or social gain over the people (Labrinidis Jagadish, 2012). They basically operate at the global level to spread terror in the country and target the critical infrastructure o the country which includes the health and financial sector of the country which cause severe impact in society and government. Script kiddies: they are basically unskilled or incapable hackers who use the programme and scripts of the hackers to hack the computer system. Online social hackers (activists): The hackers who target the social media are politically and socially motivated individuals which use the platform to promote their believing and causes They mainly targets small children and girls to torture them mentally and promote cyber bullying in the social media. Employees: This category of the threat agent involves the people who works for the particular organization and have access to the data of the company. They mainly are the security guards or the operational staffs who are bribed by the individuals to steal the data (Zikopoulos Eaton, 2011). Nation states: Nation state is the rising threat which has become prominent in the recent times. The Threat agent which are due to the deployment of sophisticated attacks which are considered as cyber weapons with the capability of these malware (Provost Fawcett, 2013). The above threat agents identified implies that to avoid these threats people while using the social media should not post their private details such as the photograph or location as it can use by the hackers to cyber bully the users. Secondly the company needs to keep tab on their employees of their activities against and stealing of the data. The ETL is full form is extraction, transformation, and loading. ETL is the process in which the data is extracted from the source system and brought into the data warehouse. The first step is the extraction where the data is extracted from the various sources and is assembled in the certain place the second step is the transformation phase where the data is transformed according to the target requirement and last phase is the loading phase it is the phase in which the data is loaded into its warehouse and ready for the delivery (Boyd Crawford, 2012). For the better performance of the ETL various steps are enlisted: Loading the data incrementally: For the proper management of the data it should be arrange in certain matter which can be increasing or decreasing or any order according to the user need it will help in better management of the data and it will to find the record afterward as the user will remember the pattern (Tankard, 2012). The partition of the large tables: Using the relational database its use can be improved by the partition of the large tables when the large table data are segmented into the smaller part it will help in quicker and efficient access of the data (Singh Khaira, 2013). It will allow easier switching of the data and quick insertion, deletion and updating of the table. Cutting out the extra data: sometimes the table of data can become complex due to presence of the unwanted data. Therefore the table should be properly analyzes and the not required data should be eliminated to make the table more simple and easily accessible. Usage of the software: various software like hardtop and the map reduce which is designed for the distributed processing of large data over a cluster of machines (Al-Aqrabi et al 2012). It uses the HDFS application which segments data into the small part and make them into simple cluster. The data which is duplicated through which the system maintains the integrity automatically. According to the case study European Union Agency for Network and Information Security (ENISA) which is center of the network and the expert in the Information technology securities threat which assist the European nation bodies is currently not satisfied with the IT securities that is followed in the world it has enlists the various securities which includes the usage of the big data which is not only the original data but the confidential data which are at risk as with the high replication of the big data for the purpose of storage and the outsourcing of the big data these type of the technology are new ways of the breaching and the leakage of the data. Secondly the big data are posing threat to the privacy of the individual which has the impact on the data protection (Ackermann, 2012). The assignment also enlists 5 major threats related to the data mining. The assignment also enlists threat agent such as cooperation, people, cybercrime which spreads the online hacking. The assignm ent finally enlists countermeasures made mainly to counter the scalabilities of the big data which does not fit the big data problems which results in the partial and ineffective approach to the protection of the big data (Ackermann et al 2012). Thus the assignment clearly explains the current counter measures for the big data is not enough and should implement better strategies to avoid the misuse of the big data. References Ackermann, T. (2012).IT security risk management: perceived IT security risks in the context of Cloud Computing. Springer Science Business Media. Ackermann, T., Widjaja, T., Benlian, A., Buxmann, P. (2012). Perceived IT security risks of cloud computing: Conceptualization and scale development. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y. (2012, April). Investigation of IT security and compliance challenges in Security-as-a-Service for Cloud Computing. InObject/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 2012 15th IEEE International Symposium on(pp. 124-129). IEEE. Amanpartap Singh, P. A. L. L., Khaira, J. S. (2013). A comparative review of extraction, transformation and loading tools.Database Systems Journal BOARD, 42. Boyd, D., Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon.Information, communication society,15(5), 662-679. Chen, C. P., Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data.Information Sciences,275, 314-347. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Halenar, R. (2012). Real Time ETL Improvement.International Journal of Computer Theory and Engineering,4(3), 405 John Walker, S. (2014). Big data: A revolution that will transform how we live, work, and think. Kayworth, T., Whitten, D. (2012). Effective information security requires a balance of social and technology factors. Kimwele, M. W. (2014). Information technology (IT) security in small and medium enterprises (SMEs). InInformation Systems for Small and Medium-sized Enterprises(pp. 47-64). Springer Berlin Heidelberg. Kitchin, R. (2014).The data revolution: Big data, open data, data infrastructures and their consequences. Sage. Labrinidis, A., Jagadish, H. V. (2012). Challenges and opportunities with big data.Proceedings of the VLDB Endowment,5(12), 2032-2033. Loske, A., Widjaja, T., Buxmann, P. (2013). Cloud Computing Providers Unrealistic Optimism regarding IT Security Risks: A Threat to Users?. McAfee, A., Brynjolfsson, E., Davenport, T. H. (2012). Big data: the management revolution.Harvard business review,90(10), 60-68. ODriscoll, A., Daugelaite, J., Sleator, R. D. (2013). Big data, Hadoop and cloud computing in genomics.Journal of biomedical informatics,46(5), 774-781. Provost, F., Fawcett, T. (2013). Data science and its relationship to big data and data-driven decision making.Big Data,1(1), 51-59. Rakes, T. R., Deane, J. K., Rees, L. P. (2012). IT security planning under uncertainty for high-impact events.Omega,40(1), 79-88. Tankard, C. (2012). Big data security.Network security,2012(7), 5-8. Understanding big data: Analytics for enterprise class hadoop and streaming data. McGraw-Hill Osborne Media.