Tuesday, August 25, 2020

Econ308 Final paper Essay Example | Topics and Well Written Essays - 3000 words

Econ308 Final paper - Essay Example n not exclusively were the methodological investigative techniques adjusted, yet what was broke down moved from a worry with assessment of the all encompassing framework, as confirm in speculations of creation, work hypothesis of significant worth, and industrialist collection, to speculations that were essentially worried about the reasonable selections of people. While neoclassical monetary scholars introduced their hypothetical models as a movement on the inadequacies of the traditional model, the degree to which the neoclassical model is a movement on the defective old style model is far from being obviously true. In spite of the fact that there are clear methodological contrasts partitioning the traditional and neoclassical methodologies, a persuading contention could be made that the neoclassical model just deserts the worries of old style financial aspects for a methodology progressively fit to quantitative investigation. In researching the degree that neoclassical financial aspects can be esteemed a movement on the traditional model, this exposition inspects the direction of the old style and the neoclassical monetary models, considers the degree to which their hypothetical concerns cover, lastly examines the degree to which the neoclassical model can be named a genuine movement on the old style model, or if the two model establish sepa rate methodologies. There are various contrasts and similitudes in the issues that old style and neoclassical financial aspects address. Specialists find the major distinctive factors in the zone of philosophy, esteem hypothesis, and financial investigation. In traditional financial matters market analysts pose various focal inquiries; these issues incorporate the idea of monetary development, and how is riches dispersed between the types of wages, lease and benefit. In specialist these worries old style business analysts approach the issues from a sociology point of view. They accentuated how merchandise are collected and how surplus amassing is executed; thus old style market analysts from Adam Smith to Karl Marx were essential worried about the

Saturday, August 22, 2020

How to Patent an Idea in the United States - Overview

Step by step instructions to Patent an Idea in the United States - Overview A US patent for an innovation awards property rights to the inventor(s). A US patent must be given by the US Patent and Trademark Office otherwise known as the USPTO. Instructions to Patent an Idea - US Patent Property Rights The property rights that a US patent gives your innovation implies the option to forestall other people who don't have your authorization from making, utilizing, offering available to be purchased, or selling your development in the United States or bringing your creation into the United States. To get a US patent, all applications must be documented in the US Patent and Trademark Office. For increasingly broad data about US licenses and the activities of the US Patent and Trademark Office. US Patent Application ProcessDifferent US Patent TypesWhere to Get US Patent FormsUsing a Patent Attorney or AgentFile Electronically The most effective method to Patent an Idea - Utility Patent Application Utility licenses might be allowed to any individual who imagines or finds any new and valuable procedure, machine, article of assembling, or pieces of issues, or any new helpful improvement thereof. DefinitionHow to File For The most effective method to Patent an Idea - Design Patent Application Configuration licenses might be allowed to any individual who concocts another, unique, and elaborate plan for an article of assembling. DefinitionHow to File For Step by step instructions to Patent an Idea - Plant Patent Application Plant licenses might be conceded to any individual who imagines or finds and abiogenetically repeats any particular and new assortment of plant. DefinitionHow to File For

Wednesday, July 29, 2020

Exhibitions@MIT

Exhibitions@MIT [by Leah Brunetto 12] No matter what your background or level of involvement in the arts, MIT has a lot to offer. Aside from the numerous student programs and activities, for-credit visual arts/music/theater arts classes, non-credit Student Art Association classes, and opportunities for cross-registration, you can even exhibit your work on the MIT campus! My name is Li, and I am a freshman (soon to be sophomore!) very much engaged in both the internal and surrounding art worlds. I am interested in the fine arts, darkroom/digital photography, and modern dance choreography, all of which Ive been able to pursue at MIT one way or the other. I especially am fascinated by the representation of personal narratives, as well as imagined/less apparent terrain and organisms. Recently, I had the opportunity to exhibit a sampling of seventeen paintings in the Wiesner Student Art Gallery, located on the second floor of the Student Center, the central point for student life at MIT. Before coming to MIT, I had only exhibited in groupsa couple shows with art classes in high school, and one with other students in a regional competition. Exhibiting independently was an entirely new experience, one which was made possible and encouraged by MITs artistic community. My exhibit was titled Pieces of Paradise, and I formally described it as a collection of paintings drawn from emotional histories, observations on faith/love/power, and conceptual abstractions. The title originally belonged to a storyboard (and the associated blog) I created the summer before I came here, but the notion behind it has come to be a sort of thematic umbrella that reaches over much of my work. Here are a couple images from the gallery: ABOVE: A Shift of Power. This piece was also displayed in the 2008 Globe Scholastic Art Competition in Boston, the 2009 MIT Student Art Association Calendar, and in the upcoming 30th edition of Rune, MITs journal of art and letters. So, you may ask, how does one go about getting their work shown publicly? For me it was mostly by chance. I hadnt ever thought of the possibility. One of my supervisors at the Office of the Arts showed my portfolio to the director of the Student Art Association, who then asked if Id like to exhibit. However, the Student Art Association (SAA) is always open to student submissionsgetting a show is really just as simple as asking (as are many other opportunities here at MIT). Once you are confirmed to exhibit, MIT will take care of all the costs, as well as the publicity (and even put it on the MIT homepage!). It requires some collaboration, for instance, designing the postcards and deciding how to hang the show. In doing so, you have the responsibility to meet and work with a variety of people who take part in different stages of the exhibition design process. In the end, you can, of course, add a personal touchyour own soundscape to set a mood for the gallery, foam placards holding de scriptions under your work, or even a guestbook where the public can write their observations and impart some knowledge. ABOVE: Taormina Memorial. This piece was inspired by the WWII memorial park in Taormina, Sicily. Aside from solo exhibitions, there are also several opportunities for group exhibitions on campus. These may be arranged by friends or particular student groups, or may display work done by a particular MIT course (such as photography). Winning prizes through the annual origami and mural competitions, for instance, can also bring your work into the public. Im excited to be exhibiting again this monththis time collaboratively with three grad students (two from the Visual Arts Program, one from the Media Lab) for the Harold and Arlene Schnitzer Prize in the Visual Arts Exhibition (May 26th, 4-6PM): If youre on campus, keep your eyes open for other interesting displays, and dont be afraid to get involved! :-)

Friday, May 22, 2020

Separation of Church and State, or Not Essay - 1151 Words

Today, people in America believe in the phrase â€Å"separation of church and state.† This has been the belief since trials in the 1960s when people started use a phrase â€Å"wall of separation of church and state† from a letter President Jefferson wrote. These trials took prayer out of public schools along with any textbook having biblical truth. Many people say that this phrase is backed up by the First Amendment. Before â€Å"separation of church and state† was believed by many, schools could use quotes that made a spiritual impact, children could pray in school, and if a public school hung the Ten Commandments up it was not questioned. There were fewer problems in the United States before the 1960s. Statistics show there was less violence,†¦show more content†¦This Destiny President Washington is talking about is God, and how he plays a role in the lives of people on earth. The phrase, wall of separation, came from a letter President Jefferson wrote, but it was taken out of context. In earlier years, that quote along with the rest of the letter was used in the Supreme Court rulings to keep spiritual principles in schools. In 1844, a church stated they could teach morals but not through a Christian view. The court said, â€Å"Why take out the text that teaches morals† (America’s Godly Heritage). Later on, The phrase separation of church and state’ was reintroduced by former Klansman Hugo Black, historically one of our most liberal Supreme Court judges. In the 1947 Everson v. Board of Education, Justice Black invoked Thomas Jefferson stating, The First Amendment has erected ‘a wall of separation between church and state.’ . . . that wall must be kept high and impregnable(Flax). This is one of the first times the Supreme Court did not use Jeffersons entire letter to go against the side for the separation of church and state, but they rather go with what the people would like to hear from them. The citizens like to fill comfortable, and if they are not there must be something wrong with how one person or many are treating them. Hansen3 People today still use this in school to keep the Bible or ideas associated with the Bible out of the schools. Fisher Ames warned the UnitedShow MoreRelatedSeparation Of Church And State1446 Words   |  6 Pagesthe separation of church and state still necessary in the overall legal and social aspects of a modern society such as the United States? Research and history show that maintaining the church separate from the government is important for the ongoing success of a free and well functioning society. Separation of church and state is a political and legal doctrine which states that government and religious institutions are to be kept separate and independent from one another. Ideally, the church shouldRead MoreSeparation Of Church And State Essay1513 Words   |  7 PagesSeparation of church and state is a defined as, the understanding of the intent, and function of the Establishment Clause, and Free Exercise Clause. The Combination of church and state has been a topic that, many generations have struggled with for centuries. The first amendment of the constitution states that â€Å"Congress shall make no law about our religious beliefs, or prohibiting our free exercise of religion† If we put our faith in the constitution to define the founding father’s standpoint ofRead MoreThe Separation Of Church And State902 Words   |  4 PagesA Closer look at the Separation of Church and State in the United States Although â€Å"God† is mentioned in the Constitution, this country was built upon the principle of separation of church and state. Despite this ideal, those elected into office: propose, pass, and deny laws based on their religious beliefs, completely disregarding the previously mentioned principle. The problem with that is that the country is so ethnically and culturally diverse that one religion representing an entire nation ofRead MoreThe separation of church and state1200 Words   |  5 PagesThe separation of church and state has been a long debated topic in the history of America. Although founded upon Christian ideals, the framers of the Constitution explicitly outlined the government to function secularly, in what is commonly referred to as the â€Å"Establishment Clause†. When interpreting the Constitution in regards to religion, there are two primary philosophies. The first philosophy this paper will explore will be referred to as Positive Toleration. In gen eral, the idea of positiveRead MoreSeparation of Church and State701 Words   |  3 PagesSeparation of Church and State To understand Locke’s argument for the separation of church and state you first need to understand what the purpose of the government is. Locke stated that the government is supposed to support civil interest. These civil interests include property, life, and security. Therefore the government’s job is to protect the civil interests of the people using force lawfully. Once Locke institutes the power of the government he develops three important assumptions vitalRead MoreSeparation Of Church And State1095 Words   |  5 PagesThe separation of church and state has been encountered and challenged several times in the Supreme Court, which was first mentioned by Thomas Jefferson. However it is not solidly stated in the Constitution on what is right or wrong and good or bad. This theory was modified from various elements from the Constitution essentially the first and fourteenth amendments. In the first amendment it is written Congress shall make no law respecting an esta blishment of religion or prohibiting the free exerciseRead MoreThe Separation Of Church And State1632 Words   |  7 Pages We are currently living in a time where freedom of religion is guaranteed in the United States. It has been since the first amendment of the Declaration of Independence was adopted in 1791. The first amendment prohibits the making of any law respecting the establishment of religion or impeding the free exercise of religion ( (Rotunda, 2004). This amendment established the separation of church and government that our country was founded on and still practices today. We as Americans are freeRead MoreSeparation Of Church And State1825 Words   |  8 PagesSeparation of church and state refers to the division of the relationship between religion and government. Various laws apply to different countries around the world about the separation of church and state. Some involve religion so much into their daily lives; it controls how their country is run. In other places, where it is not mandated as much, it becomes a problem in disputing what is and what is not right. The United States of America faces this issue as they struggle deciding what the meaningRead MoreThe Separation Of Church And State1594 Words   |  7 Pagesdirection and control exercised over the actions of the members, citizens, and inhabitants of communities, societies, and states. While documents have been written to help the leaders of our country, there is constant debate over what changes need to be made. Some believe that the country is falling apart while others think minor adjustments need to be made. The separation of church and state is also a topic of debate. The question of what needs to be changed and where religion falls in all of this are alwaysRead MoreThe Separation Of Church And State Essay1641 Words   |  7 PagesThe separation between church and state is a debate that continues to grow with tension as the culture of America rapidly polarizes. A long-standing claim that America was founded on Christian doctrine is a common argument in favor of the church and state to remain tog ether, yet the most commonly used metaphor explaining what the â€Å"Separation of Church and State† contextually means in today’s terms is simply that government and religion should not coincide with one another in any capacity. Evidence

Saturday, May 9, 2020

Introducing Samples of Time Management Essay for Frontier Dnp Program

Introducing Samples of Time Management Essay for Frontier Dnp Program Work smart Some folks believe in working hard, but it's always preferable to work smart. Do not procrastinate If you're working in a part-time job and at the exact time you're studying, make an effort not to procrastinate too much. It is essential that you remember to look at how you are going to integrate graduate school into your present circumstance. The direction you spend your free time will have a huge effect on your success rate. Up in Arms About Samples of Time Management Essay for Frontier Dnp Program? You Develop Time Management Skills Working while studying requires a good deal of discipline, particularly in the field of time management. When there are learning opportunities all around us, a number of them come with a larger price tag than a few of the others. You are able to easily depend on us to find essay help as we have a tendency to assist and guide the students with the aid of our profess ional experts. Nurses who need to advance their abilities and career opportunities may want to think about learning online at Bradley. Choosing Good Samples of Time Management Essay for Frontier Dnp Program Fully being a responsible student, it is vital for you which you stay away from them and always write high-quality essays. Students may easily become much better writers and critical thinkers by showing the right writing abilities. There are 3 important steps that you ought to follow when you're writing an on-line essay. Then the very best way is set a request I want to acquire essay papers written. The info utilized for the essays is taken from reliable sources. Today, several on-line tutoring websites supply the very best essay writing services at reasonable prices. You may also seek the advice of several on-line essays which are already published on several sites. Now it's possible to buy top quality essay for a finance paper in a timely method. To start with, go for an intriguing topic for your abortion term paper if it isn't already assigned by your teacher. A research paper is a sophisticated kind of essay. Writing an essay and just a research paper consumes lots of time. The essay writing help can be seen in a multitude of ways, a few of which are direct while others aren't. Also, you're encouraged to understand how to set boundaries, avoid distractions and procrastination. It is not simple to write about yourself because you need to go over all your strengths, weaknesses, good, and bad habits at the exact same moment. Samples of Time Management Essay for Frontier Dnp Program: No Longer a Mystery Writing an essay on information technology needs an appreciable measure of information and a fair comprehension of the subject. The resources offered for internet essay serve the aim of distinct heights of the academic curricula. When t he research is done, make an outline for your customized term paper which likewise requires added concentration. Providing evidence for the GRE essays would end up being invaluable if you prefer to create the amount of credibility. The New Angle On Samples of Time Management Essay for Frontier Dnp Program Just Released The first thing you have to do for writing a great management term paper is to select an appropriate topic. Understanding how to develop and manage a team to find the absolute most out of their performance capabilities is important. Technologies, including the use of simulation and distance learning through online courses, will need to play an essential role also. A modern HR management system has self-service functionality that makes it simpler to manage timesheets and lessens the effort required in the HR approach. The Downside Risk of Samples of Time Management Essay for Frontier Dnp Program Big or little grants, it doesn't matter because all of them provi de completely free money to send you to school and receive a degree. Also, online programs could possibly be in a position to admit more students simply since they do not will need to vie for a seat in class. They feature flexible class scheduling, and many schools offer clinical placements close to the student's home area. The ideal ADN-to-MSN nurse practitioner programs make it possible for students to finish their degrees in 2-3 decades, requiring 48-62 credits. At precisely the same time, each amount of undergraduate education you get will raise your general earning capacity. For example, some on-line PhD programs do not need the GRE. Nurses pursuing their degree on the internet can also continue to work complete time, and lots of programs make it possible for students to complete clinical requirements at their present workplace or at a neighborhood medical facility. Completion of the degree is dependent upon a few factors.

Wednesday, May 6, 2020

Tokya Disneyland , Disney in Asia Free Essays

Beyond Tokyo: Disney’s Expansion in Asia DISNEY IN ASIA Early in 1999, Michael Eisner, CEO of The Walt Disney Company, voiced his opinions concerning potential markets for his firm’s entertainment products and services. A major thrust for the new millenium would be development in Asia. †¢ We could be getting close to the time for a major Disney attraction in the world’s most populous nation. We will write a custom essay sample on Tokya Disneyland , Disney in Asia or any similar topic only for you Order Now † The Walt Disney Company, Annual Report, 1998. †¢ â€Å"I am completely confident that Chinese people love Mickey no less than they love a Big Mac. Statement by Michael Eisner, CEO of The Walt Disney Company, during a trip to China in January 1999, Knight-Ridder/Tribune Business News, 16 June 1999. INTERNATIONAL THEME PARKS AND RESORTS: DISNEY EXPERIENCE Tokyo Disneyland [pic] Euro Disney (now Disneyland Paris) [pic] DISNEY AND CHINA IN THE 1990s Relations between the Disney Company and the government of China had not been particularly tranquil in recent years. Disney held firm on its position on the movie. â€Å"Disney’s potential business in China is infinite.But Disney has to decide whether it wants to facilitate business or stand for free speech. † Not all of Disney’s relationships with China were negative however. The liberalization of China’s markets had generated benefits for the firm. ‘The Lion King’ had brought in almost $4 million in 1996 and the soundtrack had sold 1. 4 million copies. POTENTIAL OF THE ASIAN MARKET Building and investing in a multi-billion dollar theme park would represent another major, long-term commitment for The Walt Disney Company. Therefore, much research and planning were involved in this decision.In addition to the attractiveness of each of the remaining cities, Shanghai and Hong Kong, the market characteristics of the demand for theme park experiences by the Chinese people would have to be carefully evaluated. Although the success of the Tokyo Disney theme park would strengthen the case for another facility in Asia, other data and experience brought up additional questions. Between 1993 and 1998, more than 2000 theme parks had been opened in China, developed and financed by both domestic and foreign investors.Disney management was convinced that a huge, child-loving populace would support a lively theme park business. Instead, many projects were swamped by excessive competition, poor market projections, high costs, and relentless interference from local officials. Cultural Factor The Chinese had a cultural disposition toward pampering children, which had been accentuated by the nation’s one-child pe r couple policy. Although many theme parks in China had not been successful, it was still generally believed that an exciting experience of high quality would attract visitors to a park.A mundane experience would be unlikely to spark interest in a second visit. Based on the repeat visitors at every other Disney theme park, management was quite confident that they would be successful in attracting Chinese visitors not only the first time, but also the second, third, and fourth times. CASE Questions for Review 1. What cultural challenges are posed by Disney’s expansion into Asia? How are these different from those in Europe? There are some cultural challenges posed by Disney’s expansion into Asia.For example, Disney in Hong Kong soon realized that its attempts at cultural sensitivity had not gone far enough. For instance, the decision to serve shark fin soup, a local favorite greatly angered environmentalists. The park ultimately had to remove the dish from its menus. Furthermore, there is negative media coverage of the relatively new theme park for Hong Kong Disneyland in terms of cultural challenge. On the other hand, in order to make the park â€Å"culturally sensitive†, Hong Kong Disneyland would be trilingual with English, Cantonese and Mandarin.The park would also include a fantasy garden for taking picture with the Disney’s characters, popular among Asian tourists, as well as more covered and rainproof spaces to accommodate the â€Å"drizzly† climate. Attendance and operating income in France were less than anticipated and a major restructuring of the Euro Disney operating company was affected in 1994. Cultural challenges, as well as a European recession in the early 1990s, resulted in less than expected success of the park and its related hotels and facilities.Renamed Disneyland Paris early in 1994, and with enhanced performance, the Disney European experience finally began to pay off for this facility, which, by the late 1990s, was the largest theme park in Western Europe! With these two, quite different, experiences in operating a large theme park and resort facility outside of the continental United States, the Eisner management team was ready to move into China. Two locations were â€Å"in the running† early in 1999, representing quite different operating and financial strategies and structures.Either Hong Kong or Shanghai would likely be the site of the next Disney theme park. This was the challenge faced by the Disney management team, with a target decision date of June 1999. 2. How do cultural variables influence the location choice of theme parks around the world? Cultural obstacles influence the location of new theme parks in Asia. One is finding the right location. Often, more important than content is whether a venue is located in a metropolis, whether it is easily accessible by public transportation. However, in cultural perspective, there is an additional threat of competition, both from local attractions and those of other international corporations because of the fact that it seems that Asian travelers are loyal to their local attractions. Therefore, the stiff competition of the theme park industry in Asia will center on not only which park can create a surge of interest in its first year but also which can build a loyal base of repeat customers. In deciding on a site for a China theme park, a number of factors had to be identified, considered, and evaluated.In consultation with the Disney Board of Directors, they were looking for an â€Å"international character† for this park. A diversified visitor base would reduce the risks of problems in one country having an adverse effect on international visitor flow. Infrastructure in the area of the park and the region supporting it were also important. Visitors should be able to reach the park easily, by a variety of forms of transportation — airports, railroads, roadways, tunnels, bridges, bus lines, etc. hould be well established or enhanced while the park was being constructed. A prime area would be easily accessible and would also support a park most efficiently. The park and the region should contribute to visitors extending their time spent at the Disney facility. Management knew that convincing visitors to stay at the site, in a Disney hotel, was likely to generate greater cash flows from the park and its ancillary facilities. A stock of hotel rooms to upport park visitors was also important. Rooms at a variety of price points, from economy to luxury should be available when the park opened. 3. What location would you recommend for Disney’s next theme park in Asia? Why? We recommend Malaysia for Disney’s next theme park in Asia. Therefore, one of such strategic locations is the state of Johor in Malaysia due to the fact that Malaysian officials wanted to develop Johor in order to rival its neighbor Singapore, as a tourist attraction.In fact, there can be a Disneyland in Singapore; however, we don’t want to create a competitive environment between Hong Kong and Singapore. For us, there shouldn’t be two large Disney lands per region. Therefore, the best location in Asia to build a new theme park is Malaysia. We think that Malaysia Disneyland can rather bring in a new set of customers. EPILOGUE Despite its already large size, the Asian theme park industry is still developing. How to cite Tokya Disneyland , Disney in Asia, Papers

Tuesday, April 28, 2020

Volcano and Eruption free essay sample

Volcano Essay A volcano is an opening, or rupture, in a planets surface or crust, which allows hot magma, volcanic ash and gases to escape from below the surface. It is a raised area of land, which usually forms a mountain or hill. Volcanoes are generally found along tectonic plates- diverging or converging. There are four main types of volcanoes, dome, shield, composite cone and cinder cone, which are based on their shape. There are three levels of activity, active, dormant and extinct. Mt.Tambora, located on Sumbawa Island off Indonesia, erupted on April 10th in 1815 and is still known as the deadliest eruption today. It killed around 91,00 people. Mt. Tambora is a composite cone volcano and is still active today. The 1815 eruption consisted of mostly volcanic ash, which was so large it went up into the stratosphere and spread throughout the earth. Within seconds, ash, lava and molten rock (pyroclastic flow) started to speedily come down the volcano. We will write a custom essay sample on Volcano and Eruption or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The temperature of that was about 1,250 °C. The pyroclastic flow totally destroyed a small Indonesian town, just a few kilometers from Mt.Tambora. The entire population of the town was instantly killed. Before Mt. Tambora erupted, it is estimated to have been about 4,000m tall. The ? eruption reduced it to 2851m, and left behind a caldera with a 7km diameter. There were no really early signs of eruption but there were some a few days before. They did not have technology back then to monitor the volcano so people weren’t prepared and therefore thousands died. Though the eruption was short the long-term effects were huge. The main impacts from the Mt. Tambora eruption were environmental. The ash from the volcano was so large and spread so far it prevented a large portion of the Sun’s energy to penetrate through to earth. Therefore, the following year of 1816 was incredibly cold and known as â€Å"The year without a summer†. With barely any sun there were major repercussions. It caused the largest famine of the 19th century and major loss of livestock. Vegetation couldn’t grow and hypothermia was common, due to all these conditions around 71,00 people died during 1816. It even snowed in Quebec during summer!Indonesia is a LEDC country and it took years and years for Sumbawa Island to get going again. It is believed it cost around $56 million in recovery, which is a lot for a poor country. Once all the ash settled into the ground from the atmosphere the soil was fertile and was eventually good for growing crops. It is assumed that people were not happy with the abnormally cold weather but had to adapt and move on. It would have been difficult time for them. Mt. Tambora was certainly a very significant event in environmental history and is an interesting eruption.

Friday, March 20, 2020

ACT Hand Scoring Should You Order It

ACT Hand Scoring Should You Order It SAT / ACT Prep Online Guides and Tips Did your ACT scores seem way out of whack? Enough that you think there was an error in the scoring process? It’s possible to get your test rescored manually for a fee. Read on to find out why you might decide to use ACT Score Verification (also known as ACT Hand Scoring) and how you can order it. What Is Hand Scoring? The multiple choice sections on the ACT are scored with scantron machines, which is why there's so much emphasis on filling in the answer sheet accurately with dark marks.Machines may interpret a stray mark as an answer or penalize you because you accidentally skipped a question and bubbled in a string of answers in the wrong spots.If you order score verification, your test will be reviewed again by a human being to see if there was a problem in the original scoring process or if you made an obvious bubbling error that would be apparent to a human grader but not a scantron. ACT score verification is available for both the multiple choice and essay sections of the test (if you did ACT Writing).It’s a $50 fee for the multiple-choice section, $40 for the essay section, or $90 for both.If you're at all familiar withSAT Hand Score Verificationor have ordered it before, you should know thatACT Score Verification differs in one important way.For SAT Hand Scoring, there's the risk tha t your score will go down if mistakes in scoring are found that aren’t in your favor.For the ACT, your score will either stay the same or go up- ordering hand scoring can’t hurt your score, it can only hurt your wallet.If the ACT does find a scoring mistake that works in your favor, your scores will be changed and the fee will be refunded. Special note: In past years, ordering ACT essay score verification meant that your essay was reread and rescored (if your score was higher; otherwise, your score stayed the same). Now, however, getting score verification for your ACT essay only gets you confirmation your essay was scored by two independent graders (or by a third grader if the two scores differed by more than a point in any domain) and that your essay was scanned correctly. When Should You Use Score Verification? Here are a couple of scenarios where you might consider Hand Scoring as a score verification method: Scenario 1: Your Overall Score Was Very Different from What You Expected How different is â€Å"very different†?If you get a score on one or more of your ACT sections that is five or more points lower than the score you consistently earned in practice sessions, you might consider hand scoring. With this much of a discrepancy, it’s likely that something weird happened in the scoring process or you did something on the answer sheet that caused your answers to be read inaccurately. Scenario 2: You Missed Many â€Å"Easy† Questions That You Would Normally Get Right If you look at your score report and notice that you got a bunch of questions wrong in subjects that you usually ace, you might start to question your scores.However, you should consider ordering the Test Information Release, described in my next point, to verify the difficulty level of the questions you missed before jumping to any conclusions. Scenario 3: You’ve Investigated Other Score Verification Options The ACT Test Information Releaseprovides a more comprehensive view of the test. It includes all the questions, a list of your answers, the answer key, scoring instructions, and the writing prompt and scoring rubric along with your scores (if you took the ACT with Writing).You can order the Test Information Release for $20 (per test date). This will either clear up confusion about your scores or verify that something went wrong and you need to order ACT Score Verification (hand scoring). When Should You NOT Use Hand Scoring? You shouldn't jump right to hand scoring if your score is only a little lower than you expected it to be. Say you get your scores back and you did about four points worse than you expected on one or more sections. Do you order hand scoring?I would say that’s the tipping point. A discrepancy between expectations and reality of four points or less is probably not significant enough to indicate an error in scoring. If you're still concerned, you should go ahead and order the Test Information Release so you can understand your scores better.Try not to jump right to blaming the test if you score a couple points lower than you expected- it’s not going to help you learn from your mistakes! The best place to learn is on top of a pile of past mistakes. How to Request Hand Scoring To have your test hand scored, just fill out this form and mail it to the ACT within 12 months of your test date.Include your name (the original one that you wrote on the test), address, and date of birth along withthe ACT ID, testing location, and test date from your original score report. You should also include a check made out to ACT Student Services with the applicable fees for whichever part of the test you want hand scored.Remember, multiple choice is $50, essay is $40, and it’s $90 for both. Mail everything to this address: ACT Student ServicesP.O. Box 414Iowa City, IA 52243-0414 You can also request to be in the room for the hand scoring process for your multiple choice questions (but without access to the test questions) at a location designated by the ACT. If you would like to do this you should mail this request in writing along with everything else, although I would say that unless you are super paranoid about them messing up the scoring again you probably don’t want to bother with it. The ACT says that additional fees apply, but the information they give about it is very vague- you may want to call them to find out more details before you decide to put in a request. The number for ACT Customer Service is 319-337-1270. After you mail your score verification request, you should get a letter back from the ACT in three to five weeks. It will tell you whether your original scores were confirmed or changed due to an error in the original scoring process. If they were changed, you and all your designated colleges will get new score reports free of charge. What's Next? Are you wondering whether you should take the ACT again? Learn how many times you can take the ACT and how to decide whether you should retake it. Are you just unsure of when you should take the ACT? Use this guide to the best test dates to make an informed decision. If you need to go over your mistakes on your last ACT to prepare for the next test date, check out this article for advice on the best way to review. Want to improve your ACT score by 4 points? Check out our best-in-class online ACT prep program. We guarantee your money back if you don't improve your ACT score by 4 points or more. Our program is entirely online, and it customizes your prep program to your strengths and weaknesses. We also have expert instructors who can grade every one of your practice ACT essays, giving feedback on how to improve your score. Check out our 5-day free trial:

Tuesday, March 3, 2020

Solubility Definition in Chemistry

Solubility Definition in Chemistry Solubility is defined as  the maximum quantity of a substance that may be dissolved in another. It is the maximum amount of solute that may be dissolved in a solvent  at equilibrium, which produces a saturated solution. When certain conditions are met, additional solute may be dissolved beyond the equilibrium solubility point, which produces a supersaturated solution. Beyond saturation or supersaturation, adding more solute does not increase the concentration of the solution. Instead, the excess solute starts to precipitate out of solution.​ The process of dissolving is termed dissolution. Solubility is not the same property of matter as the rate of solution, which describes how quickly a solute dissolves in a solvent. Neither is solubility the same as the ability of a substance to dissolve another as a result of a chemical reaction. For example, zinc metal dissolves in hydrochloric acid through a displacement reaction that results in zinc ions in solution and the release of hydrogen gas. Zinc ions are soluble in acid. The reaction is not a matter of the solubility of zinc. In familiar cases, a solute is a solid (e.g., sugar, salt) and a solvent is a liquid (e.g., water, chloroform), but the solute or solvent may be a gas, liquid, or solid. The solvent may either be a pure substance or a mixture. The term insoluble implies a solute is poorly soluble in a solvent. In very few cases is it true no solute dissolves. Generally, an insoluble solute still dissolves a little. While there is no hard-and-fast limit that defines a substance as insoluble, its common to apply a threshold where a solute is insoluble is less than 0.1 gram dissolves per 100 milliliters of solvent. Miscibility and Solubility If a substance is soluble at all proportions in a specific solvent, it is called miscible in it or possesses the property called miscibility. For example, ethanol and water are completely miscible with each other. On the other hand, oil and water do not mix or dissolve in each other. Oil and water are considered to be immiscible. Solubility in Action How a solute dissolves depends on the types of chemical bonds in the solute and solvent. For example, when ethanol dissolves in water, it maintains its molecular identity as ethanol, but new hydrogen bonds form between ethanol and water molecules. For this reason, mixing ethanol and water produces a solution with a smaller volume than you would get from adding together the starting volumes of ethanol and water. When sodium chloride (NaCl) or other ionic compound dissolves in water, the compound dissociates into its ions. The ions become solvated or surrounded by a layer of water molecules. Solubility involves dynamic equilibrium, involving opposing processes of precipitation and dissolution. Equilibrium is reached when these processes occur at a constant rate. Units of Solubility Solubility charts and tables list the solubility of various compounds, solvents, temperature, and other conditions. The IUPAC defines solubility in terms of a proportion of solute to solvent. Allowable units of concentration include molarity, molality, mass per volume, mole ratio, mole fraction, and so on. Factors That Affect Solubility Solubility may be influenced by the presence of other chemical species in a solution, the phases of the solute and solvent, temperature, pressure, solute particle size, and polarity.

Sunday, February 16, 2020

Purposes of Criminal Sentencing Essay Example | Topics and Well Written Essays - 750 words

Purposes of Criminal Sentencing - Essay Example Moral philosophers take into consideration the goals of punishment, the values promoted, and its purpose (Purpose of, 2004). While sociologists are concerned with â€Å"what punishment is actually intended for, and the nature of penal systems† (Hudson, 1996, as cited in Purpose of, 2004, p. 105), criminologists concentrate on the penalties for offenses and the policy measures pertinent to the punishment (Purpose of, 2004). Previous penal theories leaned more on retribution that put the moral blame on the offender without regard to future reformation of conduct of the offender (Hudson 1996, as cited in Purpose of, 2004). While punishment may be to prevent crime to some and to punish for others (Hudson, 1963, as cited in Purpose of, 2004), the court balances these factors in imposing a punishment (Purpose of, 2004). ... Although the present system in the US has shifted to reformation of the convict, the justification for sanction based on vengeance still remains (Barnes, 1999). The incarcerated convict can also be deterred from the commission of the same act or any other crime if rehabilitated or incapacitated (Barnes, 1999). The two primary theories that dominate criminal punishment are utilitarianism and retribution (Purpose of, 2004). Utilitarianism expounds that laws should provide maximum happiness for society, and since crime and punishment are not consistent with happiness, they should be placed at the minimum level (Punishment, 2011). Thus, under this theory, the infliction of punishment is only that which can prevent commission of crimes in the future (Punishment, 2011). The traditional model in criminal theory is that of deterrence, which is considered a sub-category (Barnes, 1999) or a derivative (Purpose of, 2004) of the utilitarian theory. According to the utilitarian view, punishment i s justifiable if it promotes the interest of society, and maintains social order (Rawls, 1955, as cited in Barnes, 1999). The concept of deterrence posits that apprehension and punishment of a criminal informs society that an act is punishable, and thus deters members of society from committing it (Barnes, 1999). General deterrence focuses on the total criminal behavior, as opposed to specific deterrence which targets individual criminals (Barnes, 1999). As a general deterrent, there must be an existing crime and punishment in order to deter others from committing the same (Barnes, 1999). This follows the view that a threat of being punished would deter individuals

Sunday, February 2, 2020

Marketing DB Coursework Example | Topics and Well Written Essays - 500 words

Marketing DB - Coursework Example The reason to move ahead is indeed the atmosphere that one is talking about here. The shopping experience at a retail store becomes more satisfying when the aura and aromas get manifested in the most proper sense. This means that this experience gets better if the aura and aromas are highlighted in a positive fashion – one that suggests immense room for a better retail experience for the end consumer. If the consumers are given a smell that they would like to feel good about, they will definitely visit this retail store (Frazier, 1996). Similarly, if they are welcomed by an activity which is indeed a hallmark of the retail chain, they shall do every effort to be there and thus finish their joyride as well as accomplish their shopping mission. The need is to understand what the consumers want and how they are going to achieve what they have in mind. This suggests that the retail experience needs to be defined and later on re-defined to have a cumulative stance so that the consumers are always at a benefit. The vertical management system is a channel arrangement where one of the channel members might own some of the others and bring upon them its influence which is available in the wake of better power that comes from bargain, contracts and other requirements. The implications and opportunities of this VMS channel arrangement for my company is that it will aim to better the relationships that exist amongst the channel members and allow them to grow beyond the expected returns. This will enable the channel members to bring their best to the fore and give the best price in terms of bargains and so on. Eventually the consumers’ shopping experiences would become better and they will get the best deals and discounts which are available within the related industry. The retail format that is most appropriate for my company since it is CAD and based on a computer is an online model. This will bring immense

Saturday, January 25, 2020

Importance of Smartphone Security in Business Environment

Importance of Smartphone Security in Business Environment 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and need of smartphone security. 1.1 Aims and objectives Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these can be enforced. Construct smartphone security guide with recommendations for businesses. 1.2 Problem statement The problem is information and financial loss due to information theft or inaccessibility from malicious software, and the detrimental impact this has upon the business. A recent report from Gartner (reference report) indicates that sales of smartphones have grown exponentially and businesses are reaping the benefits gained from smartphones, however their use also creates security risks and opportunities for cybercriminals. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of identity credentials, email, SMS and MMS messages, GPS coordinates, passwords, company documents and connectivity access information to company servers as just some of the examples. Information security has gained significant value within the business domain over the past decade however this value remains subjective (why subjective? And value pertaining to what?). Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed as a standard and are susceptible to (Malware, Viruses, trojans,etc-examples please ;)) the exact same threats as to personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. â€Å"†¦Smartphones are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt As Schmidt states smartphones are pervasive devices, workers typically need training on these devices as they are multifunctional and unless people are aware of the threats these devices pose the consequences can be detrimental on the business. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Smartphones provide businesses with many new opportunities (sweeping statement-what opportunities and is this your opinion/referencing?) however these opportunities provided by smartphones exist not just for business and personal users as the opportunity extends to cybercriminals too. Malware is one of the most common sources of security failures within businesses currently (sweeping statement-most common according to who?), they have the same capabilities as personal computers and are used within business environments in the same manner, however they are typically unsecure and rely solely upon the standard out-of-the-box security features with no antivirus or firewall present. There are many different mobile operating systems for smart mobile devices requiring different security applications. The operating systems and the risks associated will be carefully analysed. The intentions of this paper are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally, insight will be gathered and recommendations made so that businesses can use to foresee and prevent future unnecessary costs and risk. 2.0 Literature review The focus of the subject proposed for this project is a very real-world business and information technology problem. Smartphone security is a recognisable potential problem for both individuals and businesses as most smartphone users including businesses and educational establishments do not have any specific policies in place to safeguard from smartphone security related issues. Because smartphone security is still in its infancy, it will be a challenge to source accurate and relevant information from authoritative sources such as ‘Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. For the project a survey will be proposed in order to gain knowledge for understanding how aware users are for the need of smartphone security. This survey will target as many participants as possible in order to gather appropriate primary evidence. Interviews will be conducted with professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff to ascertain levels of security training, public security literature and knowledge. Authoritative information sources will be used to gain technical information directly from manufactures, websites and retail outlets such as Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms. Only technical information will be used from these sources as it is in manufacturers interests to sell their products Analysis of the survey will be done using statistical analysis tools including IBMs ‘SPSS, ‘SPSS Text Analysis software and more modern statistical analysis web-based techniques such as MarketSight. MarketSight is a hosted research data reporting environment accessible by the internet and only available through the internet browser Microsoft explorer whereas SPSS is software directly installed onto a computer. ‘Malware: the new legal risk the paper written by Verine Etsebeth in 2007 has invaluable source material for this project. Acquired from Emerald Insight, it is very suitable to this project as it highlights the threat of malware and risks posed to businesses. It is well written and authoritative however Emerald specified it was unique as no such document has been published previously. The majority of sources used by Etsebeth are from Harley, D; Slade, R and Gattiker, U. Etsebeth references Viruses Revealed (McGraw-Hill, New York, NY 2001) This source is recognised and trusted within the industry as a whole and is considered to be authoritative and well-documented on its own merit. This paper focuses on the legal and professional implications of malware on companies in South Africa Etsebeths home town. This paper is very suitable for this project as it is a very well written and authoritative document, the majority of sources used by Etsebeth are from Harley, D., Slade, R. and Gattiker, U. (2001) Viruses Revealed, McGraw-Hill, New York, NY. The source used by Etsebeth ‘Viruses Revealed as a well-documented authoritative document published by McGraw-Hill, a recognized trusted source. Etsebeth is a senior lecturer in the Faculty of law specialising in the areas of law and information security. Although Etsebeths paper ‘Malware: the new legal risk is highly suitable in terms of qualitative information, it lacks suitable geographic law for the scope of my project. I will use the information provided by Etsebeth for Malware, as this information is not geographically bound, and analyse the legal implications after comparing them to UK law. Etsebth highlights that companies are reluctant to report cybercrimes as it has negative implications on the companys reputation this correlates to my hypothesis. ‘Understanding the spreading patterns of mobile phone viruses by Pu Wang, Marta Gonzalez, Cesar Hidalgo and Albert-laszlo Barabasi is a technical journal based on mobile phone virus modelling and the understanding of spreading patterns. The journal was published in 2009 and investigates various mobile platforms relating to my assignment however the document is a highly technical report based on the mathematics of virus spreading patterns, I find this report to be highly enlightening however due to the technical awareness of the target reader of my assignment I believe this report to be too technical and out of scope. Authoritative information directly from manufactures websites and retail outlets will be used including Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms as this will allow me to access accurate and current reliable information directly. Secondary information sources will be avoided where possible such as blogs and review websites for direct smartphone technical information as these types of resources may facilitate in providing inaccurate facts. Local mobile phone retail outlets such as Orange, Vodaphone, Phones4u, The Carphone Warehouse, O2 and T-Mobile will provide me with valuable information on device security awareness. I will enquire on staff security training and in-house company security literature currently available to public and business consumers as this will affect the average smartphone users security awareness. After investigation smartphone security I established that some research in this area had been done already by Goode Intelligence a UK company based in London. ‘Goode Intelligence is a company that provide strategic research and analysis that specialises in information security. Founded in 2007, Goode Intelligence has provided clients globally with statistical information from evidence accumulated from surveys in the field of information security. Goode Intelligence is viewed as an authoritative market leader of information security consumer information. 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. The Survey will allow me access information on how smartphone users actually use their device, how important they view the information stored on the device and users perception of the need for security 3.0 Research methods 3.1 Hypothesis ‘Businesses are not aware that they are at risk of information and financial loss or theft due to malware infections on smartphone devices. Information Technology consultants have recognised the gap in security for mobile devices, however it was soon realised that the physical security of the device was not the real issue, as the need for smartphone security awareness within businesses was a far greater concern. Experience establishes that the best form of security is the awareness for the need of security and why by the individuals who use the technology. Smartphone malware is not seen as of great importance to IT professionals, business managers or general consumers. A majority of smartphone users use their devices for both business and personal use and a large share of smartphone users will be using their personal smartphone for work related activities. The assumption is based that most individuals would know what information they deemed as confidential, more specifically, what information would they not like others to access to include such things as calendar, contacts, photos, emails and files. IT professionals should be the most aware group of smartphone malware risk, as their experience and technological awareness should allow them to be more technologically security aware. Antivirus used on personal computers is well known to hinder system performance and conflict with some applications and other software, The hypothesis is that antivirus products will consume more system resources then current smartphones can afford to offer and require more power from the device ultimately reducing the battery life and impacting negatively on overall system performance, rendering the device unusable by the average user. The perception of products such as the iPhone are viewed as secure out-of-the-box along with Blackberry smartphones as they are mostly touted by mobile phone shop staff as business orientated secure devices. 3.2 Methodology The project will be implemented using a triangulated, positivistic methodological approach. The particular technique chosen this will provide a balanced view of the subject area. It will incorporate both quantitative and qualitative primary research methods as reffered to by Bryman as multi-strategy research (Bryman, 2006). The scope of this project will mostly be Quantitative based research as indicted in Fig 1 below. Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. The Initial research will be conducted using primary research in the form of a cross-sectional survey questionnaire with closed questioning, interviews with professionals in the field of smartphone related security such as police personnel, security advisors and mobile phone shop staff will also be conducted to gain knowledge of their awareness of smartphone security and what advice they provide. The survey will be available to respondents in paper form where needed however the survey respondents targeted will mostly be from the internet so it is required that the survey be electronically hosted. The web-based survey distribution method selected is ‘Survey Monkey. The main motivations for selecting ‘Survey Monkey are reputation, administration features, ease of access and user layout familiarity. The survey will be designed to be concise and simple to maximise the amount of respondents in order to gain quality information. The target survey population will represent business managers, IT professionals as well as individuals who use their smartphone for personal use to establish users who admit to using their smartphone for both business and personal as opposed to personal use only. This is suggested by Baxter as an important step in defining who should be included and excluded from participating in the survey (Baxter, L. Babbie, E, 2004). The users have been targeted as the project will establish not only the perception of smartphone security but also what smartphone policies and procedures are currently in place and how aware users are of these. Research indicates that an ideal resource for the proposed target users is through a popular internet based technological social news website named ‘Reddit. ‘Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average ‘Redditors are male between the age of 18 to 44, are well educated and browses ‘Reddit either from work or home, suggesting that the majority of ‘Redditors are working professionals in the technology field.This suggest that the average ‘Reddit user is technologically aware (Alexa, 2010), suggesting that ‘Reddit would suit the proposed target survey participant. The proposed project will be delivered using an analytical in-depth research structure. This project structure has been selected as it will primarily be research based on the current business problem as previously stated. The intentions are to analyse the problem, understand how aware people are of the issue and propose possible solutions, One method of analysis proposed is the conceptual method, as described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with optimal recommendation and the benefits this would provide. ‘SPSS is a well-established statistical analysis application first released in 1968. Randomised questions, Marketsight. Survey design 4.0 Results 4.1 Presentation and description of results Who took part? The survey was conducted to establish the awareness of information security and the need for smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants (Fig. 2). The survey itself was open for one month during February and March 2011. The results indicated in Figure 2 that a majority share of survey participants, with 82 per cent being male and 18 per cent female confirms my survey target gender. When asked, both genders averaged at age 26 (Fig. 3) as denoted in Figure 3, again confirming my target survey demographic groups. When asked 53 per cent of respondents reported they had used their smartphone solely for personal use, opposed to 45 per cent of partakers that reported they used their smartphone for both business and personal use, with 2 per cent reporting to use a smartphone solely for business use only as shown in Fig. 4 combining a total of 47 per cent. 25 per cent of respondents had only been using smartphones for the past six months, 17 per cent were aware they had been using them for at least a year and a majority percentage of 59 per cent had been using smartphones for more than one year seen in Figure 5. Only 12 per cent of respondents opted to use the ‘pay as you go payment facilities as opposed to the greater majority of 88 per cent that have contracts shown in Figure 6 below. 87 per cent of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13 per cent that did as highlighted in Figure 7. SMARTPHONE In answer to the question â€Å"What type of smartphone do you currently use?† 34 per cent of respondents said they used an Apple IPhone, 58 per cent reported to use Android smartphones, 13 per cent used Blackberries and 6 per cent of respondents had Symbian smartphones (Fig. 8). 87 per cent of respondents had used calendar functions, 94 per cent of respondents used email, 86 per cent of used games, 87 per cent of respondents used GPS features, 74 per cent of respondents used instant messaging, 52 per cent of respondents used internet banking facilities, 66 per cent of respondents used multimedia messaging service (MMS), 94 per cent of respondents used the short messaging service (SMS) feature and 78 per cent (Fig. 9) of respondents admitted to using social networking sites on their smartphone. 93 per cent of survey partakers used 3G for mobile data communication, 59 per cent of respondents used ‘Bluetooth technology, only 4 per cent of had used infrared line of sight technology, however 75 per cent of respondents admitted to connecting via universal serial bus (USB) and 94 per cent of participators had used wireless for mobile data communication shown in Figure 10. Total of 757 participators answered this question and 1 partaker chose to skip the question. From a total of 758 respondents, 63 per cent (476) valued the physical smartphone above the 37 per cent (282) whom valued the information more. Figure 12 shows 62 per cent of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34 per cent reported they did read the licence agreements and permissions. 4 per cent of respondents believed that this question was not applicable to them for their smartphone use. The awareness for the need of personal computer security is apparent as 81 per cent of responders were aware for the need of security software for personal computers as opposed to the 19 per cent who were not aware. 94 per cent participants have connected their smartphone to a personal computer (PC), 6 per cent stated they had not ever connected to a PC. All 758 respondents answered this question. Figure (XXX) shows that survey respondents considered smartphone security as ‘beneficial but not essential as the majority answer with 64 per cent , 21 per cent (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15 per cent (114) whom considered smartphone security software as absolutely essential. 95 per cent of respondents were aware of ‘Adware, 27 per cent had known about ‘Badware, 25 per cent of respondents were aware of ‘Crimeware, 69 per cent had previous knowledge of ‘Rootkits, ‘Trojans 95 per cent,, ‘Spyware 95 per cent, ‘and ‘Worm 90 per cent were the most commonly aware terms of malware from the malicious software list, the majority being ‘Virus with 97 per cent of respondents being aware of this type of malware. 731 respondents answered this question. 96 per cent of respondents stated that they owned the smartphone, only 4 per cent of respondents had employer owned smartphones. All partakers responded to this question. Out of the 758 respondents, 15 per cent were aware of policies within their place of business, with the majority of respondents 41 per cent unaware of any workplace policies or procedures particularly orientated toward smartphones. 44 per cent responded that the question was not applicable to them. All participants answered this question. It is interesting to find that only 15 per cent stated they were aware of specific workplace policies and procedures specifically for mobile phones and 40 per cent were aware there were no mobile phone policies and procedures. A majority of 92 per cent (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8 per cent (59) respondents agreed they had received adequate security advice. 4.2 Discussion and interpretation of survey results Analysing the results of the survey shows the majority of smartphone users to be Android users peaking in the 20 to 24 age bracket, this would indicate that an IT professionals choice of smartphone is Android as indicated in Figure 3 below. Smartphone survey contributors within the 20 to 24 age group were then further examined to indicate what purpose is intended when using the devices, examining the results shows clearly that a majority of survey respondents reported they viewed their smartphone use as personal use, however disturbingly over half the users in the same age group admitted to using their smartphone for both personal use and business use as shown in Figure 4. Female respondents preferred the features provided by iPhones however also as opposed to male smartphone users who clearly preferred the Android platform over all others as seen in Figure (XXX). Examining users perception for the need of smartphone security against those users whom did or did not have antivirus shows that the awareness for the need of security correlates to users whom did indeed have smartphone security measures in place with nearly half of users who responded ‘Absolutely essential to the question ‘How necessary do you see the need for smartphone security software as shown in Figure (XXX). However the overall amount of smartphone users with antivirus or other security is disturbingly low given the malware threats currently available. The results also show us that a large majority of IT professionals do view smartphone security as beneficial however not essential. Android users are the most security aware demographic as demonstrated in Figure (XXX) above. This indicates that users are not aware of the threats posed by malware and view the need for smartphone system performance greater than the need for security. Business users have been defined as respondents who confirmed they used their smartphone for business only and users who reported they used their smartphone devices for both business and personal use. Smartphones have many features of value to employees as shown in Figure (XXX) Below, Email, Calendar, GPS and SMS features were shown to be the most used features all of which are viewed to aid employee productivity. However features such as games and social networking which negatively affect employee productivity were also shown to be frequently used, suggesting that smartphones can have negative effects on employee productivity. Figure (XXX) also shows us that over half of business users reported to use internet banking facilities from their smartphones. After finding out what smartphone features business users were most interested in I studied how aware business users were of security permissions and licence agreements prompts when installing new applications on their smartphones. The pie chart below is a representation of business user survey respondents awareness of how essential smartphone application installation security prompts are in regards to new application installations. Figure (XXX) shows us that 60 per cent of all business users admitted that they did not pay attention to licence agreements and permission prompts when installing new applications. The distinction between smartphones and personal computers is becoming increasingly marginal. Personal computers for example do not have built in billing systems and unless connected to the internet are static devices accessible via a local area network or through direct contact. Smartphones have an integral billing system are completely mobile and have multiple connectivity methods. When business user survey partakers were asked if they used any security applications such as antivirus, an overwhelming majority responded that they did not use any security products. This confirms part of my hypothesis that business users do not perceive smartphone security as a real threat. Discovering that the majority of business users used internet banking facilities for either personal banking or business banking and 9 out of 10 business smartphones had no security products installed it was elementary to understand if business users were aware of smartphone malware threats. The line graph in Figure (XXX) indicates that over 90 per cent of business users are aware of malware threats such as Adware, Spyware, Trojans, Viruss and Worms however business users were all least aware of malware threats such as Crimeware as indicated in Figure (XXX) Survey respondents who reported they used their smartphone for personal use only were excluded from the following analysis.7 out of 10 business users confirmed they were not aware of any specific smartphone security policies at work (Figure (XXX) The awareness of security for iPhone smartphones is low as users perception of Apple and Mac OS is that it is impervious to malware infection. Research shows that iPhone users have the least amount of antivirus installed on devices. As discussed earlier, users are completely reliant on Apple to vet all applications for malicious code, whereas Android and Symbian applications are open source so users may inspect the contents for malware. secure smartphone model, least security aware group Android users are the most security aware demographic group as the typical android user is conscious that malicious software exists and the android community are able to vet applications themselves. Android users were also the highest security aware group with the highest percentage of antivirus products per smartphone. Virtual environments, least secure smartphone perception Blackberry smartphones were the most secure devices in regards to email, network connectivity however it was found that application signatures can be purchased by anyone for a small fee thus rendering the security of the device minimal. Very secure aspects, not as secure overall Symbian smartphones are found to be the most current common target for malware developers. Low security Windows phone 7 is the newest platform on the smartphone market and only time will tell how secure the device is. Awareness and concern 5.0 Smartphones Private and confidential data from lost or stolen mobile devices such as laptops, USB pen drives and computer storage drives has gained negative exposure within the media recently however one of the largest growing threats to corporate information comes from unsecure smartphones. To understand this statement it is important to appreciate the history of the smartphone to recognise why smartphones pose such a threat in todays business environment. A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the ‘DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time of battery weight (Motorola, 2009) and because the battery duration was limited to last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. ‘According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting (Intel, 2005). Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term ‘Feature phone. Feature phones are more advanced technologically than mobile phones however now Smartphones currently reside in the top tier of mobile communication technology. The term ‘smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone f

Friday, January 17, 2020

Concept and Nature Essay

1. Introduction Chapter 1. Concept- a notion or statement of an idea 2. 1 A concept is a fundamental category of existence. 2. 2 Ð ¡oncepts as mandated by a particular mental theory about the state of the world. 2. 3 A concept is a common feature or characteristic 2. 4 The notion of sense as identical to the notion of concept 1. A general idea derived or inferred from specific instances or occurrences. 2. Something formed in the mind; a thought or notion. See Synonyms at idea. 3. A scheme; a plan: â€Å"began searching for an agency to handle a new restaurant concept†(ADWEEK). 1. an idea, esp an abstract idea the concepts of biology 2. (Philosophy) Philosophy a general idea or notion that corresponds to some class of entities and that consists of the characteristic or essential features of the class 3. (Philosophy) Philosophy a. the conjunction of all the characteristic features of something b. a theoretical construct within some theory c. a directly intuited object of thought d. the meaning of a predicate 4. (Engineering / Automotive Engineering) (modifier) (of a product, esp a car) created as an exercise to demonstrate the technical skills and imagination of the designers, and not intended for mass production or sale [from Latin conceptum something received or conceived, from concipere to take in, conceive] A notion or statement of an idea, expressing how something might be done or accomplished, that may lead to an accepted procedure. concept noun idea, view, image, theory, impression, notion, conception, hypothesis, abstraction,conceptualization She added that the concept of arranged marriages is misunderstood in the west. World English Dictionary concept (? k? ns? pt) | | — n| 1. | idea, especially an abstract idea: the concepts of biology| 2. | philosophy a general idea or notion that corresponds to some classof entities and hat consists of the characteristic or essentialfeatures of the class| 3. | . philosophy| | a. the conjunction of all the characteristic features of something| | b. a theoretical construct within some theory| | c. a directly intuited object of thought| | d. the meaning of a predicate| 4.| ( modifier ) (of a product, esp a car) created as an exercise todemonstrate the technical skills and imagination of the designers,and not intended for mass production or sale| | [C16: from Latin conceptum something received or conceived, fromconcipere to take in, conceive ] A. In general usage the term mainly denotes ‘idea’ or ‘notion’. It is envisaged as an abstract or psychological thing presupposing conscious minds which at least potentially ‘have’ the concept, i. e. , understand it, operate with it, apply it, etc. In philosophy and the social sciences (and other sciences too) concepts enter as (a) the most general tools of inquiry as such and as (b) the content or object of some specific inquiries, notably in comparative studies. What follows refers principally to (a) rather than (b). The nature of concepts, and their relation to the things ‘of which they are the concepts’, and to the minds which use or contemplate them, are among the most hotly disputed subject in philosophy. The present definition is not intended to prejudge or settle any of these issues, even if limitations of space make it appear to do so. B. Defined as an aspect of thought, a concept is a kind of unit in terms of which one thinks; a unit smaller than a judgement, proposition, or theory, but one which necessarily enters into these. In an assertion, something is predicated of a concept, and the predicate itself can generally be re-described as a concept. At the same time, however, the concept is by no means an ultimate or indivisible unit, for concepts can be augmented or diminished by addition or subtraction of some feature. (For instance, one may say that someone’s concept of social class does, or fails to, include the notion of differences in material rewards. ) Moreover, while concepts occur within assertions or theories and are thus distinct from them, a proposition or theory or thesis as a whole can in turn be referred to as a further concept. For instance, R. Firth writes that ‘some of Dr. Leach’s concepts are of a special order†¦I refer to his thesis that seeking for power is the basis of social choice’ (Foreword to E. R. Leach, Political Systems of Highland Burma, London: G. Bell, 1954, p. vii). C. Concepts correspond to or ‘are the meaning of’ all meaningful words, with certain qualifications: (a) only one concept corresponds to two or more words with the same meaning; (b) there is a tendency to speak of concepts only with regard to words which do, or at least can, refer either to something that can exist or be imagined or to an operation that can be performed, and not in connection with words whose role is grammatical rather than designative (for instance, one may speak of the concept of sovereignty, of infinity, of addition, but not of the concept of ‘and’ – though one must add that the drawing of the lines beetween these kinds of meaning is difficult, unsettled, and controversial part of philosophy: (c) there is a tendency to speak of concepts in connection with general rather than singular terms (one is unlikely to speak of a ‘concpet of John’ or of a ‘concpet of London’; in those cases the term ‘conception’ is more likely to be used. There are, however, exceptions, e. g. , ‘the concept of God’). The fact that concepts may be seen as the meanings of terms should not lead one to suppose that concepts are in some narrow sense linguistic entities: although concepts may be defined in terms of the rules governing the use of the words said to designate them, those rules determine (a) what things in the world are classed together (as ‘falling’ under the same concept’), (b) what features are grouped together (as ‘being various characteristics of the same thing’), (c) what operations of measurement, classification, discrimination, etc. , are performed by the man ‘using the concept’, and so on. D. Discussions of concepts in the social sciences tend to be a matter of the choice of terms and, more importantly, of their definitions. One may talk both of discovering and of inventing concepts; also of changing and developing concepts. In as far as given theories require certain concepts, and in as far as concepts can be said to incorporate theories, there is no sharp line between choice of theories and choice of concepts. Nevertheless, whole theories are thought of primarily as true or false, concepts are more naturally described as applicable or inapplicable, valid or invalid, useful or useless. Taken from A Dictionary of the Social Sciences eds. J. Gould and W. Kolb, Free Press, 1964. Concept From Wikipedia, the free encyclopedia In metaphysics, and especially ontology, a concept is a fundamental category of existence. In contemporary philosophy, there are at least three prevailing ways to understand what a concept is:[1] Concepts as mental representations, where concepts are entities that exist in the brain. Concepts as abilities, where concepts are abilities peculiar to cognitive agents. Concepts as abstract objects, where objects are the constituents of propositions that mediate between thought, language, and referents. Concepts were born out of the rejection of some or all of the classical theory,[4] it seems appropriate to give an account of what might be wrong with this theory. In the 20th century, philosophers such as Rosch and Wittgenstein argued against the classical theory. There are six primary arguments[4] summarized as follows: It seems that there simply are no definitions – especially those based in sensory primitive concepts. [4] It seems as though there can be cases where our ignorance or error about a class means that we either don’t know the definition of a concept, or have incorrect notions about what a definition of a particular concept might entail. [4] Quine’s argument against analyticity in Two Dogmas of Empiricism also holds as an argument against definitions. [4] Some concepts have fuzzy membership. There are items for which it is vague whether or not they fall into (or out of) a particular referent class. This is not possible in the classical theory as everything has equal and full membership. [4] Rosch found typicality effects which cannot be explained by the classical theory of concepts, these sparked the prototype theory. [4] See below. Psychological experiments show no evidence for our using concepts as strict definitions. [4] Prototype theory Main article: Prototype theory Prototype theory came out of problems with the classical view of conceptual structure. [1] Prototype theory says that concepts specify properties that members of a class tend to possess, rather than must possess. [4] Wittgenstein, Rosch, Mervis, Berlin, Anglin and Posner are a few of the key proponents and creators of this theory. [4][5] Wittgenstein describes the relationship between members of a class as family resemblances. There are not necessarily any necessary conditions for membership, a dog can still be a dog with only three legs. [3] This view is particularly supported by psychological experimental evidence for prototypicality effects. [3] Participants willingly and consistently rate objects in categories like ‘vegetable’ or ‘furniture’ as more or less typical of that class. [3][5] It seems that our categories are fuzzy psychologically, and so this structure has explanatory power. [3] We can judge an item’s membership to the referent class of a concept by comparing it to the typical member – the most central member of the concept. If it is similar enough in the relevant ways, it will be cognitively admitted as a member of the relevant class of entities. [3] Rosch suggests that every category is represented by a central exemplar which embodies all or the maximum possible number of features of a given category. [3] Theory-theory Theory-theory is a reaction to the previous two theories and develops them further. [3] This theory postulates that categorization by concepts is something like scientific theorizing. [1] Concepts are not learned in isolation, but rather are learned as a part of our experiences with the world around us. [3] In this sense, concepts’ structure relies on their relationships to other concepts as mandated by a particular mental theory about the state of the world. [4] How this is supposed to work is a little less clear than in the previous two theories, but is still a prominent and notable theory. [4] This is supposed to explain some of the issues of ignorance and error that come up in prototype and classical theories as concepts that are structured around each other seem to account for errors such as whale as a fish (this misconception came from an incorrect theory about what a whale is like, combining with our theory of what a fish is). [4] When we learn that a whale is not a fish, we are recognizing that whales don’t in fact fit the theory we had about what makes something a fish. In this sense, the Theory-Theory of concepts is responding to some of the issues of prototype theory and classic theory. [4] Issues in concept theory A priori concepts Main articles: A priori and a posteriori and Category (Kant) Kant declared that human minds possess pure or a priori concepts. Instead of being abstracted from individual perceptions, like empirical concepts, they originate in the mind itself. He called these concepts categories, in the sense of the word that means predicate, attribute, characteristic, or quality. But these pure categories are predicates of things in general, not of a particular thing. According to Kant, there are 12 categories that constitute the understanding of phenomenal objects. Each category is that one predicate which is common to multiple empirical concepts. In order to explain how an a priori concept can relate to individual phenomena, in a manner analogous to an a posteriori concept, Kant employed the technical concept of the schema. Immanuel Kant held that the account of the concept as an abstraction of experience is only partly correct. He called those concepts that result from abstraction â€Å"a posteriori concepts† (meaning concepts that arise out of experience). An empirical or an a posteriori concept is a general representation (Vorstellung) or non-specific thought of that which is common to several specific perceived objects (Logic, I, 1. ,  §1, Note 1) A concept is a common feature or characteristic. Kant investigated the way that empirical a posteriori concepts are created. The logical acts of the understanding by which concepts are generated as to their form are: comparison, i. e. , the likening of mental images to one another in relation to the unity of consciousness; reflection, i. e. , the going back over different mental images, how they can be comprehended in one consciousness; and finally abstraction or the segregation of everything else by which the mental images differ †¦ In order to make our mental images into concepts, one must thus be able to compare, reflect, and abstract, for these three logical operations of the understanding are essential and general conditions of generating any concept whatever. For example, I see a fir, a willow, and a linden. In firstly comparing these objects, I notice that they are different from one another in respect of trunk, branches, leaves, and the like; further, however, I reflect only on what they have in common, the trunk, the branches, the leaves themselves, and abstract from their size, shape, and so forth; thus I gain a concept of a tree. Embodied content Main article: Embodied cognition In cognitive linguistics, abstract concepts are transformations of concrete concepts derived from embodied experience. The mechanism of transformation is structural mapping, in which properties of two or more source domains are selectively mapped onto a blended space (Fauconnier & Turner, 1995; see conceptual blending). A common class of blends are metaphors. This theory contrasts with the rationalist view that concepts are perceptions (or recollections, in Plato’s term) of an independently existing world of ideas, in that it denies the existence of any such realm. It also contrasts with the empiricist view that concepts are abstract generalizations of individual experiences, because the contingent and bodily experience is preserved in a concept, and not abstracted away. While the perspective is compatible with Jamesian pragmatism, the notion of the transformation of embodied concepts through structural mapping makes a distinct contribution to the problem of concept formation. [citation needed] Ontology Plato was the starkest proponent of the realist thesis of universal concepts. By his view, concepts (and ideas in general) are innate ideas that were instantiations of a transcendental world of pure forms that lay behind the veil of the physical world. In this way, universals were explained as transcendent objects. Needless to say this form of realism was tied deeply with Plato’s ontological projects. This remark on Plato is not of merely historical interest. For example, the view that numbers are Platonic objects was revived by Kurt Godel as a result of certain puzzles that he took to arise from the phenomenological accounts. Gottlob Frege, founder of the analytic tradition in philosophy, famously argued for the analysis of language in terms of sense and reference. For him, the sense of an expression in language describes a certain state of affairs in the world, namely, the way that some object is presented. Since many commentators view the notion of sense as identical to the notion of concept, and Frege regards senses as the linguistic representations of states of affairs in the world, it seems to follow that we may understand concepts as the manner in which we grasp the world. Accordingly, concepts (as senses) have an ontological status (Morgolis:7) According to Carl Benjamin Boyer, in the introduction to his The History of the Calculus and its Conceptual Development, concepts in calculus do not refer to perceptions. As long as the concepts are useful and mutually compatible, they are accepted on their own. For example, the concepts of the derivative and the integral are not considered to refer to spatial or temporal perceptions of the external world of experience. Neither are they related in any way to mysterious limits in which quantities are on the verge of nascence or evanescence, that is, coming into or going out of existence. The abstract concepts are now considered to be totally autonomous, even though they originated from the process of abstracting or taking away qualities from perceptions until only the common, essential attributes remained. Etymology The term â€Å"concept† is traced back to 1554–60 (Latin conceptum – â€Å"something conceived†), but what is today termed â€Å"the classical theory of concepts† is the theory of Aristotle on the definition of terms. [citation needed] The meaning of â€Å"concept† is explored in mainstream information science, cognitive science, metaphysics, and philosophy of mind. In computer and information science contexts, especially, the term ‘concept’ is often used in unclear or inconsistent ways. When writing on the idea of nature as both stable in meaning and of the exchangeability of nature for other conceptualizations in written works, one should probably define nature in a definite way as to allow for comparisons in meaning. When seeking to define nature, whether it be of a human sort or any other, one must consider the parts to fully understand the whole. Everything must have a nature. If nothing had a nature, would that mean nature as we think of it would cease to exists? Or would we have another name for it? When seeking to define â€Å"nature†, there are a few routes to consider. Does a bear have a personality or a nature? Or both? When a bear frolics and plays, is that personality or nature? When it hibernates, is that personality or nature? For the sake of this argument, we shall say that when a bear happens to be frolicking and playing, he is doing so in a certain style, or way that is unique to that bear that sets him apart from his fellows, but not so much so that it alienates him from all bears. From there, we will assume this is because its personality allows it to. When it hibernates, it is because nature forces it to. Nature therefore is uniform; it has no uniqueness within bear kind. So establishing that a bear has a personality and a nature, what does this mean for criticism? Often in our readings we see references to nature, such as Mother Nature, human nature, the nature of plays and poetry, and so on and so forth. The question then, is what does a critic refer to when he says â€Å"nature†? Is he referring to hibernation? Or has he meant that nature is all-encompassing, referring to all actions of the bear as nature? As we have defined an instance of personality and nature within the inner workings of the bear, likewise must be done within the workings of criticism. In An Essay of Dramatic Poesy John Dryden states that a play â€Å"ought to be, a just and lively image of human nature, representing its passions and humors, and the changes of fortune to which it is subject; for the delight and instruction of mankind. † When he mentions â€Å"human nature† here, he is referring to many things at once. He is connecting the emotions one feels (passion and humors), that could easily be said to be part of an individual’s personality, as well as the commonality we all share in that there are no unique emotions to any one person. No one person has only felt happiness their whole life, nor has anyone not experience happiness at all. Dryden’s mention of â€Å"the changes of fortune† requires the alteration of the definition of â€Å"nature† we have thus far defined. When considering the bear, we didn’t count events in the bear’s life as part of his nature or personality. One can, however, predict what the bear will do in a life-changing event based on what we know of his nature. When it beings to get colder, a bear, as mandated by his bear nature, will forage for food to prepare for hibernation. When winter comes he will find a cave and hibernate. So when Dryden says â€Å"the change of fortune to which it is subject,† it can be assumed he means that human nature will react in a certain and specific and mostly predictable way to changes in the fictional character’s life. This means we can add an element of predictability and stability of actions to the definition of nature, with any variation given to personality. Dryden then turns to the notion of imitation. He speaks of imitating the ancient Greeks, who were imitators of nature. He speaketh: â€Å"Those Ancients have been faithful imitators and wise observers of that nature which is so torn and ill represented in our plays[. ]† This statement leads us to believe that nature is something to be observed and imitated. Therefore if one wanted to correctly portray a day in the life of our bear, he would watch the bear play, fish, sleep, and ect. The artist would then consider all of this as the bear’s nature, and imitate it on the stage or on paper in a story. The same process is therefore used when seeking to observe human nature. The poet, the playwright, the artist and novelist must be vigilant, claims Dryden, when observing so that when it is time to imitate, he can do so accurately. Aristotle, of the aforementioned Ancients, also discussed at great length the importance of the imitation of nature in art in his essay Poetics . Aristotlestates: Speaking generally, the origin of the art of poetry is to be found in two natural causes. For the process of imitation is natural to mankind from childhood on: Man is differentiated from other animals because he is the most imitative of them, and he learns his first lessons through imitation, and we observe that all men find pleasure in imitations. Imitation is considered here by Aristotle to be natural to mankind, even being so bold as to claim only humans learn from imitation. This natural tendency to imitate therefore leads us to find pleasure in observing imitations as well the act of imitation itself. Aristotle then incorporates â€Å"imitation† as a part of human nature, meaning that the action of imitation and the enjoyment of imitation is something all humans participate in, much in the way all bears hibernate in the winter. Aristotle continues by saying: Since imitation is given to us by nature[†¦]men, having been naturally endowed with these gifts from the beginning and then developing them gradually, for the most part, finally created the art of poetry from their early improvisations. Poetry then diverged in the directions of the natural dispositions of the poets. At this point, Aristotle’s notion of â€Å"nature† gets a little vague. First he states that imitation comes to mankind naturally. As he continues, however, he states that imitation is then developed, like a skill not an instinct. This concept evolves further to say that only the likes of poets become masters of imitation. Poets are unique in their ability to portray the observations of imitations they see. This uniqueness removes them from our definition of what is natural and applies to humans as a species, as Aristotle claims earlier. What Aristotle is applying here is another version of nature that is microsphere-ish to an individual, hence personality. Aristotle does not make this distinction what-so-ever. If imitation comes naturally to mankind as a whole, yet poetry only comes naturally to the disposition of poets, what exactly does that mean when defining nature? It means the terms â€Å"nature† and â€Å"naturally† in this passage needs footnotes. Perhaps when looking at this passage in terms of the way the words â€Å"nature† and â€Å"naturally† are used, Aristotle first uses it to refer to a universal characteristic shared by all humans: imitation. When refereeing to the poet, however, the definition changes slightly to refer to only poets, as though they are their own sub-species. An equivalent statement would be â€Å"All bears hibernate, but black bears hibernate the best. † Longinus also had an opinion of nature in his work On The Sublime. A lofty tone, says one, is innate, and does not come by teaching; nature is the only are that can compass it. Works of nature are, they think, made worse and altogether feebler when wizened by the rules of art. But I maintain that this will be found to be otherwise if it be observed that, while nature as a rule is free and independent in matters of passion and elevation, yet is she wont not to act at random and utterly without system. Further, nature is the original and vital underlying principle in all cases, but system can define limits and fitting seasons, and can also contribute the safest rules for use and practice. Longinus starts his argument out by saying what others have been saying: that the ability to write well comes from a persons’ natural talent; one that is born and not cultivated. Moreover, art is less sublime when confined to rules of art. Longinus argues this point, saying that if one truly observes an artist, they will find that while a natural born talent is a key principle, there is a system and structure to what is considered good art that is outside of nature’s control, which is contrary to the believe stated first. Longinus continues his argument by saying: This we may apply to diction, nature occupying the position of good fortune, art that of good counsel. Most important of all, we must remember that the very fact that there are some elements of expression which are in the hands of nature alone, can be learnt from no other sources than art. Longinus argues that ultimately nature is a catalyst for creation but does not play a role when judging if what has been created is worthy enough to be considered art. Yet in the next statement, he gives nature, the credit for the elements of expression that are observed and imitated in art to gain a better understanding of nature itself. When it comes to critiquing art, Dryden’s argument in An Essay of Dramatic Poesy is that in order for a work of art to be art, it must be the closet to actual nature. â€Å"Ancients have been faithful imitators and wise observers of that nature which is so torn and ill represented in our plays; they have handed down to us a perfect resemblance of her; which we, like ill copiers, neglecting to look on, have rendered monstrous, and disfigured. † When plays or writings don’t give an exact replication of nature, or even what is considered human nature, it loses value. It cannot be considered good art. The Greeks gave us examples of what good art is with their philosophies and ideas about nature and human nature. One advantage Dryden mentions his time period has over the Greeks is the advancement of science. He says: Is it not evident, in these last hundred years (when the study of philosophy has been the business of all the virtuosi in Christendom) that almost a new nature has been revealed to us? That more errors of the school have been detected, more useful experiments in philosophy have been made, more noble secrets in optics, medicine, anatomy, astronomy, discovered, than in all those credulous and doting ages from Aristotle to us? O true it is that nothing spreads more fast than science, when rightly and generally cultivated. As far as Dryden is concerned, that while many virtuous men have been focusing on philosophy, the times since Aristotle have changed. The invention of the microscope and the discovery of cells have altered how the natural world is viewed. There is more to everything in nature that meets the eye. He notes that worthy experiments in philosophy have been made, but that the rapid expanse of information generated by science has eclipsed those of philosophy. As there are no such references to science in regards to philosophy in Aristotle’s time, the philosopher of today must make his own way in regards to managing the way sciences has changed our view of nature. But what does science have to do with philosophy and art? The answer lies in the nature of art to reflect and imitate nature. Now that the secrets of optics, medicine, anatomy, and astronomy have been revealed, our human nature takes these secrets in. Philosophy now must contend and compromise with how these advancements fit into the human condition. The â€Å"new nature† must be negotiated with in terms of how it affects our lives. And of course science gives imitators a new genera in which to work. Painters can now paint the surgeon at work, perhaps teaching pupils. Once something becomes a natural experience, including that of science, it is to be imitated by poets. Nature, in its ever shifting meanings, does seem to have one consistent idea contributed to it, despite the technicalities. It can refer to the literal, organic substances that make up the vegetation, animals, and mankind in the world around us. It can also mean the behavior exhibited by said organic beings, such as the hibernation of bears. It has also been used to describe the emotions and other commonalties experienced by humans as a whole. Aristotle and Dryden have made it clear that within mankind there are certain characteristics attributed by nature, such as the observation and imitation of that which is around us. Simply put, it is in our nature to imitate nature. However, this definition of nature is refined when it comes under the consideration of art. While all of mankind takes delight in imitation, nature has endowed the artist, like say the poet, with a more natural and superior sense of imitation. When it comes to critiquing art of any sort, knowledge and a developed set of skills replaces nature according to Longinus. The act of imitating and creating may have natural causes, but the ability to ascribe worth to these creations can only come from a refined sense of what is makes good art, something that is not obtained from nature. In Dryden’s opinion, only the closest of imitations of nature are art. He also relies on the philosophy and insight into human nature of the ancient Greeks to guide what is valuable when it comes to art. Dryden makes the effort to include science in his argument by stating that science has discovered a â€Å"new nature† that will be observed and imitated and philosophized that the Greeks had no knowledge of. Nature, therefore, is still evolving, as will our concept of the many definitions of Nature. The idea of nature is one of the most widely employed in philosophy, and by the same token one of the most ill-defined. Authors such as Aristotle and Descartes relied on the concept of nature to explain the fundamental tenets of their views, without ever attempting to define the concept. Even in contemporary philosophy, the idea is oftentimes employed, in different forms. So, what is nature? Nature and the Essence of a Thing The philosophical tradition that traces back to Aristotle employs the idea of nature to explain that which defines the essence of a thing. One of the most fundamental metaphysical concepts, the essence indicates those properties that define what a thing is. The essence of water, for instance, will be its molecular structure, the essence of a species, its ancestral history; the essence of a human, its self-consciousness or its soul. Within the Aristotelian traditions, hence, to act in accordance with nature means to take into account the real definition of each thing when dealing with it. The Natural World At times the idea of nature is instead used to refer to anything that exists in the universe as part of the physical world. In this sense, the idea embraces anything that falls under the study of the natural sciences, from physics to biology to environmental studies. Natural vs. Artificial â€Å"Natural† is often used also to refer to a process which occurs spontaneously as opposed to one that occurs as the result of the deliberation of a being. Thus, a plant grows naturally when its growth was not planned by a rational agent; it grows otherwise artificially. An apple, would hence be an artificial product, under this understanding of the idea of nature, although most would agree that an apple is a product of nature (that is, a part of the natural world, that which is studied by natural scientists). Nature vs. Nurture Related to the spontaneity vs. artificiality divide is the idea of nature as opposed to nurture.