Thursday, October 31, 2019

Child Poverty in Canada Essay Example | Topics and Well Written Essays - 1500 words

Child Poverty in Canada - Essay Example However in my opinion, effective and consistent implementation will surely depend on the other economic parameters like inflation, GDP etc. Hence economic policies to improve these parameters are also significant in addressing the problem of child poverty. Ottawa lacks plan to fight child poverty, coalition says ---- The Star Summary Monsebraaten (2011) in his article presents the stagnant nature of the children living below poverty in Canada. The article refers Campaign 2000 a coalition devoted to eradicating the same problem that over 1989 to 2009 the progress of the Canadian government to abolish poverty is far from satisfactory. This becomes evident from the fact that in 1989 the poverty rate was 11.9% and that in 2009 was 11.9%. Again this meager improvement was not always uniform and rather subject to business cycle fluctuations. In sharp contrast the nation has experienced staggering and almost uniform growth rate for the past 11 years that proceeded the year 2009. A growing i nequality in terms of income distribution in Canadian economy was first time noticed in the Campaign 2000’s first ever report published long back in 2001. Not only the gap between haves and have not has widened over the year; the middle income group was not spared at all and has to devote more and more hours to work to keep their standard of living at the same level. Despite the governments’ extensive effort to fight back poverty that reflected through two reports from the Senate and the House of Commons Committee in recent times; the pivotal point seems to be misjudged. The strong correlation between economic growth of the country and reducing poverty level that is apparently obvious through high level of employment creation seems to overlook an important social factor.... Monsebraaten (2011) in his article presents the stagnant nature of the children living below poverty in Canada. The article refers Campaign 2000 a coalition devoted to eradicating the same problem that over 1989 to 2009 the progress of the Canadian government to abolish poverty is far from satisfactory. This becomes evident from the fact that in 1989 the poverty rate was 11.9% and that in 2009 was 11.9%. Again this meager improvement was not always uniform and rather subject to business cycle fluctuations. In sharp contrast the nation has experienced staggering and almost uniform growth rate for the past 11 years that proceeded the year 2009. A growing inequality in terms of income distribution in Canadian economy was first time noticed in the Campaign 2000’s first ever report published long back in 2001. Not only the gap between haves and have not has widened over the year; the middle income group was not spared at all and has to devote more and more hours to work to keep the ir standard of living at the same level. Despite the governments’ extensive effort to fight back poverty that reflected through two reports from the Senate and the House of Commons Committee in recent times; the pivotal point seems to be misjudged. The strong correlation between economic growth of the country and reducing poverty level that is apparently obvious through high level of employment creation seems to overlook an important social factor. This factor gets revealed through the life of Becky McFarlene.  

Tuesday, October 29, 2019

The multicultural Effect Essay Example | Topics and Well Written Essays - 1500 words

The multicultural Effect - Essay Example (Silko 1996, 43) These words f Leslie Marmon Silko describe aptly what this ReVision issue is about: storytelling. Indigenous conversations. Recovering indigenous conversations. Remembering stories. Putting them back together. Cherishing the fragments we find. Exchanging stories. Finding ways to bring the immediacy and presence f the stories told in front f a group f people onto paper and between journal covers. Sharing stories between groups f people, Sami siidat, German Sippen--communities (some f these groupings are now called cultures, or societies, or nations, or tribes). The primary focus f the contributions is not agreement or disagreement with Eurocentered views on narrative knowing. Instead the articles, taken together, walk their own path, affirming an ancient way f being present to knowing. That is all. This issue is an invitation to remember that practice and to participate in it--today--with all that that might mean in our contemporary situation. Within the Eurocentered context, the concern would be with the defense, explication, placement, or support f narrative knowing within the edifice that Eurocentered thinking tries to maintain, even as it crumbles and disintegrates at the external and internal margins. Much f what has been written about narrative knowing presents such amendments, usually framed as advances. Progress f thinking. A contribution on the evolutionary trajectory. This is the stage set by Eurocentered thinking for the justification and defense f narrative knowing. That stage matters not in an indigenous or a remembered indigenous context. The stakes are much higher. There are many more criteria. They are in the landscape. In the ancestry. In history. In what is commonly called myth. In gossip. In the narrative plot provided by the stars. In the remembrance f the pain f what people have done to each other and are doing to each other. Individuals all. In the rejoicing about the beautiful things people have done. Because these kinds f criteria elude Eurocentered thinking to a large extent, they cannot--and should not--be justified in that context. Pressures for such justification arise from the need to the maintain the social construction f whiteness. Though it may seem extraordinary to the Eurocentered mind, in the indigenous context, one fact stands out as a simple truth that native people live by: "Whether we know the stories or not, the stories know about us" (Silko 1996, 150). We may not remember our ancestry or honor it, but the ancestors remember us. There is hope in this. Storytelling is allowing completeness in a nutshell: hologrammatically. Here we don't find philosophy apart from the cycles f the seasons--yet we find science. Here we don't find agriculture separate from the local narratives--yet we find astronomy and agroastronomy. Here we don't find navigation apart from star and weather lore--yet we find nautical science. In the narrative universe f these worlds, story is not an individualistic or existential project. It is the survival f the self woven inside, outside, and in between through precise presence. There is no possibility f standing apart or objectifying or dissociating. What an advance to remember such pr actices. The current issue started out with a different design in mind: I was in the process f inviting several authors and informing them to assume the importance and validity f narrative knowi

Sunday, October 27, 2019

Passive Reconnaissance Website Analysis

Passive Reconnaissance Website Analysis Assignment: Reconnaissance Paper Student Name: Soumil Deshpande Executive Summary In this assignment, passive reconnaissance was performed on The Weather Channels website i.e. www.weather.com and important results have been obtained regarding the organizations online behavior. In this passive reconnaissance attack we have discovered all the domain name and the corresponding IP addresses of the hosts, domain names, servers, reverse DNS, the webhost name and the location of the server. Furthermore, we have also discovered and analyzed many files such as .doc, .pdf, .xls from online public sources which in return gave us valuable information about the organization such as the username of few employees who have created those files, the software that was used to create those files, date of creation, date of edit, what server it was uploaded to, the operating system in use etc. It also provided us with the folder paths where the files were preset on the host servers. This information is very valuable to an attacker who is performing a reconnaissance attack as it gives o ut a lot of critical information about the internet footprint of the organization and this data was easily available to the attacker via all public sources using passive reconnaissance. To avoid this, we must make sure that we keep a track of all the public information which is readily available on the internet such as DNS lookups, WHOIS information and all the public files hosted and make sure that no valuable information can be extracted by an attacker which in turn could prove harmful for the organization if an attack was conducted on the organization in the future. Introduction to the organization The Weather Channel is an American cable and satellite television channel by NBC Universal. It is also a desktop, mobile app and satellite radio channel. Headquarters of the company is located in Atlanta, Georgia. This organization mainly provides weather related news and analysis which include 24-hour weather forecast and radar imagery. This company was chosen by me for this assignment because this company has a global presence and a very well wide spread and retrievable online footprint. It has servers all around the world which would give me many different points of opportunities for reconnaissance. And as their main function is far away from security I would assume that not a very high level of resources is spent on information security of all the online assists, domains, hosts and websites. Tools and Methods used to obtain data for passive reconnaissance Following are the tools used for conducting passive reconnaissance with the explanation of their working: FOCA (Fingerprint Organizations with Collected Archives) (FOCA n.d.) FOCA is an easy to use GUI tool made for windows whose main purpose is to extract metadata from the given website. FOCA automates the process of finding and downloading all the public documents of various format from the website, analyzing them and presenting the analyzed information in a human readable format on the FOCA windows GUI. The documents which are downloaded from the organizations website are searched by various methods including search engines like Google, Bing, Exalead etc. We can also add local files which we have acquired from other processes in the FOCA GUI for analysis and metadata extraction. An impressive feature of FOCA is that we can analyze the URL and the file without even downloading it. FOCA is capable of downloading and analyzing various types of documents ranging from Microsoft Office files to uncommon adobe files or other custom formats. After all the metadata is extracted from the files, FOCA matches similar information like documents created by the same group, Usernames of the owners of the documents and can even create a network map based on the metadata that was analyzed from all the public sources available on the internet. FOCA also includes a server discovery mode which automatically searches for the organization servers using recursively interconnected routines. Techniques such as Web Search, DNS Search, IP resolution, PTR Scanning, Bing IP, Common Names, DNS Prediction and Robtex are used in the process of server discovery in FOCA. Other features of FOCA include Network Analysis, DNS Spoofing, Search for common files, Proxies search, Technology identification, Fingerprinting, Leaks, Backups search, Error forcing and open directory searches. Google Search (Search engines reconnaissance The magic weapons n.d.) Search tools are very powerful weapons for an attacker for conducting passive reconnaissance on an organization. Using Google search as a reconnaissance tools is 100% legal and this process does not involve accessing unauthorized data or files. Reconnaissance using google is done by using special search queries which are constructed by search modifiers and search operators. Search modifiers are symbols such as + (Requires to match the term exactly), (Show all results excluding that match this term), * (Wildcard entry) and (Searching for a specific text, word or a phrase). Search operator includes keywords in the search queries such as: Allintext à ¯Ã†â€™Ã‚   Restricts search to contain all the query terms which you have specified. Allintitle à ¯Ã†â€™Ã‚   Restricts search to contain all the titles which have the specified text Allinurl à ¯Ã†â€™Ã‚   Restricts search to contain all the url specified. Filetype à ¯Ã†â€™Ã‚   Returns the search results which have a file which is specified by the user. For e.g. [document filetype:doc] will return all the documents with the file extension of .doc. Site à ¯Ã†â€™Ã‚   Google will restrict the search to the particular site or domain. Using the above search modifiers and operators we can construct a special query. For e.g. we can construct a query to get all the doc files from www.example.com as site:www.example.com filetype:doc. From google search alone we can obtain important information like Staff lists and positions, Contact information, Technical skill, helpdesk FAQs, Security policies etc. DNSDumpster.com DNSDumpster is an online service that enables us to scan a particular website to return valuable information like all the DNS records of the website, all the hosts, domains, IPs, location and reverse DNS addresses. It also gives a graphical representation of the network map of the organization by the previously described data. We can even export all this information from the website to an excel spreadsheet to further analyze the data. WHOIS and TRACEROUTE WHOIS is a query and response protocol used to retrieve internet resources like domain names, IP address, owner information, webhost contact information etc. Traceroute is a windows command which records the route through the web space or the internet from your computer to the destination address. PassiveRecon Mozilla Add-on (PassiveRecon n.d.) This very powerful Mozilla add-on combines various passive reconnaissance tools such as IP tracing, WHOIS, google search queries etc. into one single add-on which can use to perform a passive reconnaissance attack with a click of a button. Recon-ng (recon-ng n.d.) Recon-ng is a powerful tool made by the programmer LaNMaSteR53 which is a full-featured web based reconnaissance framework which is written in python. There is an inbuild module known as reconnaissance which is used for conducting all the passive reconnaissance on the website or web server. It gathers data such as IP information, domain names, hosts, location, related domains and other valuable information about the organization. It is a Linux tools and works with most of the new Linux distributions such as kali or Ubuntu. SamSpade (SamSpade n.d.) SamSpade is a windows tools which is famously used for passive reconnaissance. This tools is used to query important functions such as Zone transfer, SMTP relay check, Scan Addresses, Crawl Website, Browse Web, Fast and slow traceroutes, decode URL, parse email headers etc. NetCraft (netcraft n.d.) NetCraft is a United Kingdom based company which tracks almost all websites. Using this tool, we can obtain all the domains, site report with information like registrar information, location, DNS admin email address, hosting company, netblock owner etc. It also enables us to look at the hosting history with the name and version of the webserver and display what web technologies have been used on the website. Information found after reconnaissance DNS Hosts By using various reconnaissance tools ass mentioned above, we have gathered over 100 DNS hostnames for the website weather.com with additional information like IP addresses, reverse DNS, Netblock owner, country and webserver. The entire table of the gathered information is listed at the bottom of this document in a segregated tabular format for easy understanding. A network map has also been created from the above gathered DNS information and has been listed at the end of this document as well. We have also obtained the technologies used on the client side of the weather.com website. These technologies include jQuery, Google Hosted libraries, AJAX, Angular JS and Modernizr. Extracted Files and Metadata Using FOCA as well as google search queries, files were downloaded and analyzed from the weather.com server and host to reveal information about the organization like System Users, System paths, Software used and Clients connected to the server. Following are the list of user information which has been extracted from the metadata of the files gathered. Kerry McCord Maynard Linda iMarc Fatima Jantasri David Tufts Linda Maynard Neal Stein Following are the list of software used to create, modify these files or used in the organization in general. This data was extracted from over 159 documents which were gathered using FOCA and google search tools. Following are the Clients, Servers and Domains of weather.com gathered from server searching and analyzing file metadata. How the gathered information can be used by the attacker. The above-mentioned information although publicly available is very useful for an attacker to orchestrate an attack on the website. With all the information, such as DNS hostname, IP address, Reverse DNS, Hosting server etc. the attacker can further use active reconnaissance techniques on them to gather even more valuable information like the traffic on a particular server, capacity of a particular server, insecure protocols on the domain, SQL injection into form fields, DDoS attack on a particular sever etc. By recognizing a weak link in the network architecture of the organization, an attacker can find a way to enter into locations which was hidden from the public. By doing this the attacker can gain access to much more valuable information and further construct a stronger attack. With all the DNS address, available, the attacker can run an active penetration test on these webserver and IP addresses to find out different vulnerabilities which can be exploited in the future. Serves with a large amount of network loads can be DDoSed to crash the organization website. User information was also gathered in this passive reconnaissance process which can be used to gain more knowledge about the people working in the organization and can be used for various social engineering attacks. These particular users can be targeted by email which could in turn compromise the systems they are in charge of. We now also know the software used in the organization and their version number. We can find out the vulnerabilities on that particular software and use that with social engineering to exploit a target system on the organization. By using all the information gathered by this passive reconnaissance process, the attacker is exposed to a lot of avenues on which he can further dive deep into using active reconnaissance or penetration testing methods. Suggested Controls We have to keep in mind that it is essential for a business to release public documents online. Thus, we have to make sure that these public documents do not give out any valuable information in the form of metadata or even the actual content of the document. These documents should be analyzed internally by the information security team before uploading them to the public website. We can even use a tool to locally extract and remove all the metadata from the file before we upload them to the website. We must also take active actions to harden the perimeter of our network. We must understand the devices that run on our network and update them with up to date security patches and releases. We should only release vague and general information to the public regarding domain names and registrar information. We should also disable and remove all those devices, web servers, users, accounts, domains which are not in use. We should also conduct penetration testing on our web servers and web sites periodically to further harden our network. We should also use NAT for as much of the network as possible. This helps to block OS fingerprinting and port scanning issues which are the main part of the active reconnaissance techniques. We should add a stateful firewall on the network perimeter to prevent any intrusion. We should also have a IDPS system to monitor the traffic on each web server and log the actions or report the actions. Tables and Diagrams DNS hostnames, IP addresses, Reverse DNS of weather.com Hostname IP Address Reverse DNS dmz.weather.com 65.212.71.220 dmz.weather.com 65.212.71.221 weather.com 23.218.138.47 a23-218-138-47.deploy.static.akamaitechnologies.com adcap0x00.twc.weather.com 65.212.71.199 adcap0x00.twc.weather.com adcap0x01.twc.weather.com 65.212.71.198 adcap0x01.twc.weather.com adserver-es1.weather.com 96.8.82.170 adserver.es1.dc.weather.com adserver-es2.weather.com 96.8.83.170 adserver.es2.dc.weather.com adserver-tc1.weather.com 96.8.84.170 adserver.twc1.dc.weather.com adserver-tc2.weather.com 96.8.85.170 adserver.twc2.dc.weather.com ash-dc2-named-1.weather.com 96.8.90.1 ash-dc2-named-1.weather.com attpos.weather.com 96.8.82.142 attpos.weather.com attpos.weather.com 96.8.84.142 attpos.weather.com auth.twc1.dc.weather.com 96.8.84.137 auth.twc1.dc.weather.com b.twc1.dc.weather.com 96.8.84.144 b.twc1.dc.weather.com b.twc2.dc.weather.com 96.8.85.144 b.twc2.dc.weather.com backupmediadmz.twc.weather.com 65.212.71.95 backupmediadmz.twc.weather.com betaorigin.weather.com 96.8.84.147 betaorigin.weather.com betatest2.weather.com 96.8.85.103 betatest2.weather.com blogs.twc.weather.com 65.212.71.97 blogs.twc.weather.com builddata.weather.com 96.8.82.54 builddata.weather.com buildds.weather.com 96.8.82.49 builddds.weather.com buildmap.weather.com 96.8.82.56 buildmap.weather.com buildmob.weather.com 96.8.82.50 buildmob.weather.com buildmob2.weather.com 96.8.82.51 buildmob2.weather.com buildorigin.weather.com 96.8.82.53 buildorigin.weather.com buildurs.weather.com 96.8.82.52 buildurs.weather.com buildweb.weather.com 96.8.82.46 buildweb.weather.com buildweb2.weather.com 96.8.82.47 buildweb2.weather.com buildwxii.weather.com 96.8.82.48 buildwxii.weather.com cacheds.twc1.dc.weather.com 96.8.84.141 cacheds.twc1.dc.weather.com cacheds.twc2.dc.weather.com 96.8.85.141 cacheds.twc2.dc.weather.com clustsrv1.twc.weather.com 65.212.71.115 clustsrv1.twc.weather.com clustsrv2.twc.weather.com 65.212.71.116 clustsrv2.twc.weather.com clustsrv3.twc.weather.com 65.212.71.117 clustsrv3.twc.weather.com clustsrv4.twc.weather.com 65.212.71.121 clustsrv4.twc.weather.com clustsrv5.twc.weather.com 65.212.71.122 clustsrv5.twc.weather.com connect.twc.weather.com 65.212.71.136 connect.twc.weather.com dmzdc02.dmz.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmzdc02.twc.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmz.weather.com 65.212.71.223 dmzdc02.twc.weather.com dmzdc03.dmz.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmzdc03.twc.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmz.weather.com 65.212.71.222 dmzdc03.twc.weather.com dmzswitch10.twc.weather.com 65.212.71.10 dmzswitch10.twc.weather.com dmzswitch11.twc.weather.com 65.212.71.11 dmzswitch11.twc.weather.com dmzswitch12.twc.weather.com 65.212.71.12 dmzswitch12.twc.weather.com dmzswitch13.twc.weather.com 65.212.71.13 dmzswitch13.twc.weather.com dmzswitch14.twc.weather.com 65.212.71.14 dmzswitch14.twc.weather.com dns1.weather.com 96.8.82.15 dns2.weather.com dns2.weather.com 96.8.82.15 dns2.weather.com dns3.weather.com 96.8.84.15 dns3.weather.com dsp-db.twc.weather.com 65.212.71.119 dsp-db.twc.weather.com dsq-db.twc.weather.com 65.212.71.99 dsq-db.twc.weather.com dualg.twc.weather.com 65.202.103.100 dualg.twc.weather.com articles.weather.com 52.200.156.65 ec2-52-200-156-65.compute-1.amazonaws.com chef.dev.web.weather.com 54.208.182.48 ec2-54-208-182-48.compute-1.amazonaws.com apistatus.weather.com 54.236.78.100 ec2-54-236-78-100.compute-1.amazonaws.com checkout.developer.weather.com 54.69.68.23 ec2-54-69-68-23.us-west-2.compute.amazonaws.com f5.twc.weather.com 65.212.71.140 f5.twc.weather.com f5lab.dmz.weather.com 65.212.71.66 f5lab.dmz.weather.com f5vpn-lab.dmz.weather.com 65.212.71.65 f5vpn-lab.dmz.weather.com faspex0b00.twc.weather.com 65.212.71.48 faspex0b00.twc.weather.com faspex0b01.twc.weather.com 65.212.71.49 faspex0b01.twc.weather.com ftp.twc.weather.com 65.212.71.113 ftp.twc.weather.com ftp1.twc.weather.com 65.212.71.108 ftp1.twc.weather.com ftp2.twc.weather.com 65.212.71.109 ftp2.twc.weather.com giporigin.twc1.dc.weather.com 96.8.84.166 giporigin.twc1.dc.weather.com giporigin.twc2.dc.weather.com 96.8.85.166 giporigin.twc2.dc.weather.com gwdmz.twc.weather.com 65.212.71.1 gwdmz.twc.weather.com hide135.twc.weather.com 96.8.88.135 hide135.twc.weather.com hide136.twc.weather.com 65.202.103.136 hide136.twc.weather.com hide139.twc.weather.com 65.202.103.139 hide139.twc.weather.com hide166.twc.weather.com 65.202.103.166 hide166.twc.weather.com hide167.twc.weather.com 65.202.103.167 hide167.twc.weather.com hide19.twc.weather.com 65.202.103.19 hide19.twc.weather.com hide20.twc.weather.com 65.202.103.20 hide20.twc.weather.com hide206.twc.weather.com 65.202.103.206 hide206.twc.weather.com hide207.twc.weather.com 65.202.103.207 hide207.twc.weather.com hide208.twc.weather.com 65.202.103.208 hide208.twc.weather.com hide209.twc.weather.com 65.202.103.209 hide209.twc.weather.com hide21.twc.weather.com 96.8.88.21 hide21.twc.weather.com hide22.twc.weather.com 96.8.88.22 hide22.twc.weather.com hide23.twc.weather.com 96.8.88.23 hide23.twc.weather.com hide24.twc.weather.com 96.8.88.24 hide24.twc.weather.com hide25.twc.weather.com 96.8.88.25 hide25.twc.weather.com hide250.twc.weather.com 96.8.88.250 hide250.twc.weather.com hide26.twc.weather.com 96.8.88.26 hide26.twc.weather.com hide27.twc.weather.com 96.8.88.27 hide27.twc.weather.com hide28.twc.weather.com 96.8.88.28 hide28.twc.weather.com hide29.twc.weather.com 65.202.103.29 hide29.twc.weather.com hide30.twc.weather.com 65.202.103.30 hide30.twc.weather.com hide31.twc.weather.com 65.202.103.31 hide31.twc.weather.com hide35.twc.weather.com 65.202.103.35 hide35.twc.weather.com iasq-app.twc.weather.com 65.212.71.98 iasq-app.twc.weather.com ibp-db.twc.weather.com 65.212.71.118 ibp-db.twc.weather.com imwxsecure.twc1.dc.weather.com 96.8.84.159 imwxsecure.twc1.dc.weather.com imwxsecure.twc2.dc.weather.com 96.8.85.159 imwxsecure.twc2.dc.weather.com careers.twc.weather.com 65.212.71.129 przrecruit01.dmz.weather.com bes.twc.weather.com 65.212.71.224 przsccmdp01.dmz.weather.com grid.weather.com 54.231.49.82 s3-website-us-east-1.amazonaws.com Network Map for weather.com n.d. FOCA. https://www.elevenpaths.com/labstools/foca/index.html. n.d. netcraft. https://www.netcraft.com/. n.d. PassiveRecon. https://addons.mozilla.org/en-US/firefox/addon/passiverecon/. n.d. recon-ng. https://bitbucket.org/LaNMaSteR53/recon-ng. n.d. SamSpade. https://www.sans.org/reading-room/whitepapers/tools/sam-spade-934. n.d. Search engines reconnaissance The magic weapons. http://securityaffairs.co/wordpress/19570/hacking/search-engines-reconnaissance-magic-weapons.html.

Friday, October 25, 2019

Inflation and Its Effects on Investment Essay -- Finance Financial Eco

Inflation and Its Effects on Investment For world economic markets, inflation is a fairly new experience as for much of the pre-twentieth century there had been little upward pressure on prices due to gold and other metallic standards. These backed currencies limited governments’ abilities to create new money. So at the end of the gold standard strong political pressures often caused governments to issue more money increasing the money supply and therefor the price level. Inflation reflects a situation where the demand for goods and services exceeds their supply in the economy(Hall, 1982). Its causes could be triggered by the private sector and the government spending more than their revenues, or by shortfalls in output. Price increases could also be triggered by increases in costs of production. For instance increases in prices of imported raw materials will cause inflation if not managed. Whatever the initial cause, inflation will not persist unless accompanied by sustained increase in money supply. In this sense, inflation is a monetary phenomenon. But what effect does inflation have on the economy and on investment in particular? Inflation causes many distortions in the economy. It hurts people who are retired and living on a fixed income. When prices rise these consumers cannot buy as much as they could previously. This discourages savings due to the fact that the money is worth more presently than in the future. This expectation reduces economic growth because the economy needs a certain level of savings to finance investments which boosts economic growth. Also, inflation makes it harder for businesses to plan for the future. It is very difficult to decide how much to produce, because businesses can... ...hem to make financial decisions. If people cannot trust money then they are less likely to engage in business relationships. This results in lower investment, production and less socially positive interactions. Among other effects, people may start to attempt to trade by other, less efficient, means in order to avoid the unpredictable price levels due to inflation. Bibliography Blume, Marshall. Inflation and Capital Markets. Ballinger, Cambridge, 1978. Hall, Robert ed. Inflation, Causes and Effects. University of Chicago Press, Chicago, 1982. Hellerstein, Rebecca. â€Å"The Impact of Inflation,† Regional Review, Winter 1997, Vol. 7, No. 1. Massimo, Caruso. â€Å"Investment and the Persistence of Price Uncertainty,† Research in economics, Vol. 55, June 2001. Morley, Samuel. The economics of Inflation. Dryden Press, Hinsdale, Ill., 1971.

Thursday, October 24, 2019

London Business School Essay Topic Analysis Essay

London Business School Essay Topic Analysis 2012-2013With the exception of a few minor wording changes, four of London Business School’s essay topics for the 2012-2013 admissions season have remained essentially the same as last year’s prompts. Meanwhile, the school has reintroduced a career goals essay that was last seen on the 2009-2010 application, in addition to completely revamping their sixth essay question. Overall, LBS has maintained its trend of placing a marked emphasis on learning about the specific details of an applicant’s future involvement on campus and contribution to the school community. From this, one can extrapolate that LBS may be interested in candidates who have spoken to students and learned a good deal about the program to better understand how and where they might fit. Question 1: In what role or sector do you see yourself working immediately after graduation? Why? How will your past and present experiences help you achieve this? How will the London Business School MBA Programme contribute to this goal? (500 words) Question 2: Where do you see your career progressing five years after graduation and what is your longer term career vision? (200 words) As in previous years, LBS has divided the typical career goals essay into two discrete questions. Though the first question more closely resembles Question 1 from the 2009-2010 application than to that of last year’s, the school’s two-part approach to learning about applicants’ career goals still underlines the importance of having both a short- and long-term career plan in the MBA admissions process. While the compartmentalization of the short- and long-term discussions might make it a bit more difficult to adapt content written for applications to other schools, it does signal the extent to which the adcom wants to hear about each of the topics raised. Developing one’s long-term goal discussion over 200 words, with a starting point at the five-year mark, could be a great opportunity for applicants who often cover this topic in a single sentence to meet the word limit in their essays for other schools. Although the first question no longer specifically asks applicants why now is the best time for them to attend business school, a brief discussion of the timing of your application could still be useful in proving to the adcom that you are making a well-informed decision. Question 3: Give a specific example of when you have had to test your leadership and / or team working skills either professionally, or outside of work. What role will you play in your first  year study group? (300 words) For another year in a row, LBS is asking applicants to discuss an experience in which they faced challenges to their leadership and teamwork skills. Given that the adcom has stated that this topic does not have to come from one’s pro fessional experience, applicants should feel free to use this essay as an opportunity to showcase their involvement in an outside activity. After clearly outlining the situation, it’s crucial that applicants explain how they persevered through the challenge, as doing so shows one’s maturity and ability to overcome obstacles. It would therefore make sense to end this essay by explaining the strategies you’ve subsequently developed to navigate difficult situations, and discussing how you can apply these processes to future work at LBS. Note that the question about LBS study groups offers applicants a great chance to showcase their familiarity with the program and prove that they’ve done their homework, as well as demonstrate that they’ve thought through the contribution they would make and the strengths they could bring to the program. With only 300 words allotted for this essay, applicants will need to be highly efficient with their writing to ensure that they can respond to each component of the prompt. Question 4: Student involvement is an extremely important part of the London MBA experience and this is reflected in the character of students on campus. What type of student club or campus community events will you be involved with and why? How will you contribute? (300 words) This question, which has appeared in similar forms on the LBS application for several years, asks candidates to broadly discuss the clubs and events in which they would like to participate. This framing gives candidates a wide berth to discuss how their interests and experiences to date would translate to contributions on several fronts. As with any essay of this sort, it would be ideal to link the clubs and events you cite to established interests or elements of your career goals, as these will help the admissions committee readily see how you are poised to make a contribution. Taking the time to learn about the school’s special programs and extracurricular activities—whether through a visit to campus, conversation with alumni, or reading the Clear Admit Guide to London Business School—will pay dividends here. Question 5: London Business School offers a truly global and diverse experience. Describe any significant experiences outside of your home country or culture. What did you gain and  how will your experience contribute to the School? (150 words) Another carryover from last year’s application, this question allows applicants the opportunity to showcase their international experience, both professionally and personally, and is designed to gauge the applicant’s ability to navigate unfamiliar terrain and resolve cross-cultural issues. In order to answer both components of this question, we suggest that applicants quickly outline important experience abroad, and then focus on providing detail about the lessons and skills gained from these situations, as well as how the experiences would help the applicant benefit from and contribute to LBS. Based on the first sentence of this prompt, it will be important for applicants to show that not only can they contribute to the diversity at LBS, but also that they will thrive as a member of the diverse student body. Considering that the adcom has shortened this essay to just 150 words, applicants will need to be direct and concise to ensure that they can cover each aspect of the essay question. Question 6: Give an example of a person who, in your opinion, has made a profound impact on the way the world does business. How will this person influence your contribution to your MBA Programme at London Business School? (300 words) This question is a new addition to the LBS application, and gives applicants a chance to showcase their understanding of the business world and the types of people who create change. When selecting someone to write about, applicants should think about a variety of options—while popular figures might jump most readily to mind, you might consider slightly less well known individuals to help distinguish your application. Regardless of the person you choose, the key to this essay is to keep the focus on you and your candidacy by explaining how you think the person has influenced the business world and the lessons you have drawn from the person’s actions.

Wednesday, October 23, 2019

Introduction To Ethics Essay

Ethics is the study of the nature of moral virtues and evaluates human actions. Ethics come from agreements between people, duty considerations and considerations of the consequences of various actions we involve ourselves into. Philosophical ethics is the study of morality through rational means guided in human well-being. The three subsections of philosophical ethics are; normative ethics-is the study of moral standards that makes us judge our actions as wring or wrong or good from bad. Meta-ethics – is concerned with the meaning of ethical judgments that is responsible for the truth and validity of our actions. Meta-ethics assists us determine whether an opinion can be applied to any situation at present or in future. It asks questions such as; what’s the meaning of ethical terms such as good and right, the motives for acting ethically, the nature of moral reason. Applied Ethics – is the application of moral philosophy to real-life situations that have been investigated in normative ethics and judged on the lessons of meta-ethics. According to Paul Newall article moral philosophy is divided into branches; meta-ethics and normative ethics. The two have some differences according to how they are applied in the day to day real–life situations. Normative ethics is concerned with ethical questions that guide us in all what we do on a daily such as â€Å"What has value? † and â€Å"What are our moral obligations? † such questions give us our character and personality. Meta-ethics on its side is concerned with philosophical questions about ethics such as â€Å"What is value? † and â€Å"What can make it the case that we ought to do something? †. A personal ethical situation I experienced involved my neighbor who was caught stealing neighbor at the market place. Since police officers were not around to arrest him the mob took the chance to bit and stone him in protest. Being a person I had known over a period of time, I felt ethically right to save his live from the swelling mob. At first, I had to stop the mob from biting and stoning him, through dialogue. But my greatest fear was that the mob may turn and direct their anger towards me because I was protecting to protect a criminal who has been terrorizing them, but this did not happen since the crowd listened and accepted my request. In my opinion, it was ethically wrong for my neighbor to steal what others had ethically through struggle and hard work. He thus deserved to be punished, but the way the mob chose to punish the offender was totally unethical since the federal laws and regulations that govern the state should be followed in such a case. Being a quite tricky situation, I requested the mob first to stop any further biting and stoning and took the chance to dialogue and discuss with them other possible ways of punishing the offender such as taking him to the law officers. The mob seemed not to reason ethically at first because the police had in many cases fallen short of providing adequate security and the residents had no trust in them anymore. When I finally won them, I narrowed further to the issue of acting contrary to the state laws and the implications of their actions and even explained to them that the offender has right to live. The reason for this approach was that the mob seemed to have no moral standards and obligations to judge between good and bad. In many occasion, the mob makes wrong decisions but evaluates their action after an ffence has been committed, in this case the death of my neighbor. In my opinion their action was bad and could not be justified ethically, philosophically the mob morality was not rational and was not grounded in the notion of human happiness for both the accused ad the accusers. According to Newall’s explanation of normative ethics, several ethical questions must be questioned by all the participants in the whole process. First, my neighbor should have analyzed whether his decision to steal had any moral obligation and any value. Such a personal question should have stopped him from making the decision to steal. His morals could have been provoked and changed of mind taking a decision to engage in a more productive activity rather than stealing. The mob as well should have questioned their morals before choosing their action. By stoning to kill it implies that their morals were all wrong because it is moral wrong to hurt anyone. The law is very clear and precise on what should be done in such a case, but because they never followed the law; their moral values are as well questionable. My action was guided by the value of life and that no one is supposed to take the law into their own hands by causing bodily harm to anybody. My moral obligation was to safe my neighbor because if I watched him stoned to death, my moral conscience and quit would haunt me because I should have acted to save him. In conclusion, all our actions and decisions should be guided by our morals values and that normative ethics must always prevail in any action. We are supposed to fully evaluate our actions and be ready to face the consequences of our actions.