Sunday, January 26, 2020

The History Of Acid Throwing Criminology Essay

The History Of Acid Throwing Criminology Essay It is defined as the act of throwing acid onto the body of a person with the objective of injuring or disfiguring out of jealousy or revenge. Perpetrators of these attacks throw acid at their victims, usually at their faces, burning them, and damaging skin tissue, often exposing and sometimes dissolving the bones. The long term consequences of these attacks include blindness and permanent scarring of the face and body. These attacks are most common in Cambodia, Afghanistan, India, Bangladesh, and Pakistan and other nearby countries. Globally, at least 1500 people in 20 countries are attacked in this way yearly, 80% of whom are female and somewhere between 40% and 70% under 18 years of age. ATTACKS IN SOUTH ASIA In South Asia, acid throwing attacks have been used as a form of revenge for refusal of sexual advances, proposals of marriage and demands for dowry. Scholars Taru Bahl and M.H. Syed say that land disputes are another leading cause. AFGHANISTAN In Afghanistan in November 2008, extremists subjected schoolgirls to acid attacks for attending school. Attacks or threats of attacks on women who failed to wear hijab or were otherwise immodestly dressed have been reported in Afghanistan. BANGLADESH In Bangladesh, where such attacks are relatively common, they are mostly a form of domestic violence. The Acid Survivors Foundation counted 91 attacks in Bangladesh in 2011. The chemical agents most commonly used to commit these attacks are hydrochloric acid and sulfuric acid. According to Mridula Bandyopadhyay and Mahmuda Rahman Khan, it is a form of violence primarily targeted at women. They describe it as a relatively recent form of violence, with the earliest record in Bangladesh from 1983. The scholar Afroza Anwary points out that acid violence occurs not only in Bangladesh but also in Pakistan, China, and Ethiopia and has occurred historically in Europe. CAMBODIA In Cambodia, it was reported that these attacks were mostly carried out by wives against their husbands lovers. GAZA In 2006 a group in Gaza calling itself Just Swords of Islam claimed to have thrown acid at a young woman who was dressed immodestly, and warned other women to wear the hijab. INDIA The Thomas Reuters Foundation survey says that India is the fourth most dangerous place in the world for women to live in as women belonging to any class, caste or creed and religion can be victims of this cruel form of violence and disfigurement, a premeditated crime intended to kill or maim her permanently and act as a lesson to put her in her place. In India, acid attacks on women who dared to refuse a mans proposal of marriage or asked for a divorce are a form of revenge. Acid is cheap and easily available and is the quickest way to destroy a womans life. The numbers of acid attacks have been rising in India and there have been 68 reported acid attacks in the state of Karnataka since 1999. Most of the female victims suffer more because of police apathy in dealing with cases of harassment as that of a safety issue as they refused to register a police case despite the victim being attacked thrice before meriting police aid after an acid attack. One such incident would be Sonali Muk herjees case where the perpetrators were granted bail after being sentenced to nine years of Jail. Thereafter, when her family approached High Court, all the legislators, and MPs in search of justice, all she got in return was assurances and nothing else. The perpetrators got away scot-free. Indian acid attack survivor Shirin Juwaley founded Palash Foundation to help other survivors with psycho-social rehabilitation. She also spearheads research into social norms of beauty, speaks publicly, and blogs regularly at Do I Look Normal? In 2011, the principal of an Indian college refused to have Juwaley speak at her school for fear that Juwaleys story of being attacked by her husband would make students become scared of marriage. Tom ONeill of National Geographic reported that acid throwing is also used to enforce the caste system in modern India. PAKISTAN According to New York Times reporter Nicholas D. Kristof, acid attacks are at an all time high in Pakistan and increasing every year. The Pakistani attacks he describes are typically the work of husbands against their wives who have dishonored them. According to another New York Times article, in 2011 there have been counted 150 acid attacks, after 65 in 2010. LEGISLATION In 2002, Bangladesh introduced the death penalty for throwing acid and laws strictly controlling the sale, use, storage, and international trade of acids. The acids are used in traditional trades carving marble nameplates, conch bangles, goldsmiths, tanneries, and other industries, which have largely failed to comply with the legislation, derided by Salma Ali of the Bangladesh National Women Lawyers Association as a dead law. Under the Qisas law of Pakistan, the perpetrator may suffer the same fate as the victim, and may be punished by having drops of acid placed in his/her eyes. This law is not binding and is rarely enforced according to a New York Times report. According to Afshin Molavi, in the early years of the revolution, and following the mandating of the covering of hair by women in Iran, some woman were threatened with an acid attack by the Islamic vigilantes for wearing a Hijab. Today, Iran has had several laws against acid attacks which is treated as a capital offense, and sentenced an attacker to be blinded in 2008. However, as of July 31, 2011, Ameneh Bahrami pardoned her attacker, thereby absolving Majid Movahedi of his crime and halting the retributive justice of Qisas. Lower House of Parliament in Pakistan unanimously passed the Acid Control and Acid Crime Prevention Bill On May 10, 2011. As punishment, according to the bill individuals held responsible for acid throwing face harsh fines and life in prison. Over the past few years, acid throwing has been recognized by many countries as one of the latest and most excruciating forms of violence committed against women. STATISTICS Acid violence remains under-reported but scores of women are victimized by this brutal act in South Asia every year. The United Nations defines violence against women as any act of gender-based violence that results in physical, sexual or mental harm or suffering to women. Throwing acid on a woman is by far the cruelest form of abusing a person, leaving the individual paralyzed and psychologically unable to face society confidently again. An acid attack is a deliberate act of throwing acid on a victim, mostly women, usually on the face that causes severe pain, permanent disfigurement, subsequent infections and often blindness in one or both eyes. The chemical agents most commonly used to commit these attacks are hydrochloric and sulfuric acid. The attacker commits acid attacks for a number of reasons, including revenge for refusal of a marriage proposal or other romantic or sexual advances; land disputes; perceived dishonor; and jealousy. Valerie Khan, Director, Acid Survivors Foundation (ASF) says, 60 % of these attacks occur as the epitome of an already existing cycle of violence. While acid attacks are most prevalent in Bangladesh, Cambodia, India and Pakistan, they have also been widely reported in Afghanistan and in parts of Africa and Europe. In Pakistan, approximately only 30% of acid cases are reported. Exact statistics on acid attacks in Pakistan are not available but roughly around 200 acid attacks take place in Pakistan every year; at least 9000 acid attacks were reported between 1994 and 2011, according to data compiled by the Progressive Womens Association (PWA). A weak judicial system and lack of support from the police is partly to be blamed for the under reporting of such cases. Another major reason is that the victims families reach out of court settlements due to financial pressure, which prevents the compilation of any official statistics. Acid attacks, a leading act of domestic violence, are common for a number of reasons. Acid is readily available not only in major cities but also in small towns across rural areas, costing less than Rs 100 a liter and is often used for household cleaning or for cotton processing in rural areas. Shopkeepers are unaware of any regulatory requirement concerning the sales and anyone can purchase an unlimited amount without question. An important precaution, one that many are unaware of, is that the victims of acid burn should quickly douse themselves with water, for at least 30 minutes as it is important to neutralize the severity of the acid as quickly as possible. Given the limited medical care facilities available in Pakistan, this might be the victims only chance to reduce the severity of the attack. In other South Asian countries, the government has also taken a proactive approach to the crime. In 2002, Bangladesh introduced the death penalty for throwing acid and implemented laws strictly controlling the sales of acids. In 2011, Pakistan passed a law in the form of Acid Control and Acid Crime Prevention Bill that established tougher penalties for an acid-attack conviction 14 years to life behind bars and a fine of up to $11,000. But womens rights activists are demanding greater regulation of the sale and distribution of acid to prevent these attacks. Better rehabilitation services are also crucial for victims so they can rebuild their lives. After an attack, the victim faces physical challenges, which require long-term surgical treatment, as well as psychological challenges, which demand in-depth counseling from psychologists at each stage of physical recovery Reports of acid burn cases are alarmingly on the rise but legislation to counter this remains wanting. Many hope that Sharmeen Obaid-Chinoys Oscar winning film, Saving Face, exploring acid-attacks, will bring the much needed pressure to transform the Acid Control and Acid Crime Prevention Bill into action. Every year, scores of Pakistani women are disfigured in acid attacks, usually at the hands of husbands or relatives. The attacks, often brought on by fits of jealousy or rage, go largely ignored and are rarely prosecuted. Only in the last decade, has the media increased coverage of such social issues. The use of acid as a weapon has deep roots in Pakistani society. Short of murder, an acid attack is the most devastating form of aggression, transforming the victim into a figure of horror and an outcast. If this is not the time to do something about this atrocious act of violence, then one wonders if there ever will be a right time. VICTIMS AND TREATMENT Brutality of the damage depends on the concentration of the acid and the period of time before the acid is thoroughly washed off with water or neutralized with a neutralizing agent. The acid can rapidly eat away skin, the layer of fat beneath the skin, and in some cases even the underlying bone. Eyelids and lips may be completely destroyed, the nose and ears severely damaged. According to the Acid Survivors Foundation in Pakistan, there is a high survival rate amongst victims of acid attacks. Consequently the victim is faced with physical challenges, which require long term surgical treatment, as well as psychological challenges, which require in-depth intervention from psychologists and counselors at each stage of physical recovery. In Bangladesh, the Acid Survivors Foundation, Nairpokkho, Action Aid, and the Bangladesh Rural Advancement Committees Community Empowerment Strengthening Local Institutions Programmed assist survivors in Bangladesh. The Acid Survivors Foundation in Pakistan operates in Islamabad offering medical, psychological and rehabilitation support. The Acid Survivors Foundation in Uganda operates in Kampala and also provides counseling and rehabilitation treatment to victims of acid attacks, as well as their families if need be. Additionally in Cambodia, LICADHO, the Association of the Blind in Cambodia and the Cambodian Acid Survivors Charity all assist survivors of acid attacks. The Acid Survivors Trust International provides specialist support to its sister organizations in Africa and Asia through its specialist team who work across the organizations transferring medical, psychological and social rehabilitation skills whilst supporting knowledge sharing and best practice. CONCLUSIONS An acid attack involves the premeditated throwing of acid on a victim, usually on her face. In addition to causing psychological trauma, acid attacks result in severe pain, permanent disfigurement, subsequent infections, and often blindness in one or both eyes. Perpetrators commit acid attacks for a number of reasons, including revenge for refusal of a marriage proposal or other romantic or sexual advances; land disputes; perceived dishonor; and jealousy. While acid attacks are most prevalent in Bangladesh, Cambodia, India and Pakistan, they have also been reported in Afghanistan and in parts of Africa and Europe. Experts attribute the prevalence of the practice in part to the easy availability of acids.

Saturday, January 18, 2020

Argument For School Uniform Essay

School uniform is an integral part of school life. School uniform should not be banned, because of finances. Our financial circumstances can have great affect, and more often than not, those with less money and therefore less desirable clothes are frequently subjected to various forms of prejudice and discrimination, exclusion and even ostracism, especially in schools. Wearing less expensive less fashionable clothes, different clothing from everyone else creates division, which school uniform can avoid. To be set apart and look different, in any way from everybody else almost certainly makes people targets for bullying, especially in schools. Young children who do not know the effect of bullying will always pick on the child who does not look the same as them, which could be very traumatic for the child who is on the receiving end. Exclusion is just one result of wearing different clothes and therefore looking different. Having a school uniform will mean that everyone looks the same, and as a result it will prevent all of the aforementioned possibilities from happening. In addition, a sense of common identity is very important to any type of organisation, and the fact that this is especially true in schools cannot be stressed enough. It creates a better, happier working atmosphere and working environment, and introduces harmony into a group. Looking the same by wearing a uniform and thus gaining a feeling of belonging to a set ‘society’, encourages better relationships and friendships. Without uniform, a large split can occur between groups of people who look different from each other. Not having a uniform would mean that some people are noticeably â€Å"not in† the group but are â€Å"outsiders†. People use uniform as a way of showing everyone else that they are a formed group, separate from another group. A uniform for everyone would avoid this. Furthermore, school uniform is important for identifying the school, either  for criticism or for praise. Praise will show how well the school is doing in many different aspects and will allow teachers to see their success. Criticism too is just as important and necessary as praise because it allows things to improve. Constructive criticism is helpful in improving matters in most situations. Also, because school uniform allows you to easily identify someone as a student of a specific school, if someone from another school physically or verbally abuses you, you would be able to take the situation into your own hands if you knew where to find them, and contact the headmaster or mistress of the school and inform them of their pupils’ behaviour. Similarly, another point is safety on school trips. Since school uniform is a practical method of identification it is good for safety on school trips. If a student goes missing on a school trip, their uniform would guarantee they could be easily seen as a pupil who attends their particular school and found. In conclusion, I feel that school uniform should not be banned, no matter what. Although there are many arguments and opposing views that are of the opinion that school uniform is not a good idea, they are definitely not strong enough to convince me so that I alter my opinion. Uniform not only avoids unnecessary and sometimes harmful situations from happening (such as bullying and discrimination), but also encourages smartness so that pupils do not turn up at school wearing inappropriate clothing. It is an extremely important part of school.

Friday, January 10, 2020

Information Systems in Business Essay

List of the databases in which data about you exists †¢Flat- file data bases. The flat file databases are used to store small amounts of data that is required to be edited by the hand. They are made up of files strings that combine one or more files and they are effective in storing simple data lists but they become complex if the data structures are replicated. Flat file databases require a simple approach to the methods of storing data, therefore if complex data types are stored, the file become unreadable for the individual using the data bases. Many companies use the flat file data bases in storing their data since they are easily assessed and edited (Matthias, 2003). †¢Server databases The server databases uses the Internet and it is easily accessed by the clients at any time, for instance, 24 hours, one week. The clients are able to access the websites in order to retrieve the data. Server databases are applicable to many companies that require to make applications and communications on data issues anywhere in the world. Server databases have a special feature that allows the clients to provide specific data requests from the database and then it is the responsibility of the database to perform the function (Matthias, 2003). †¢Relational databases An example of a rational database includes the SQL server databases. These types of databases uses a logical formulation in the processes that they store data. For instance presentation of tables in data storing where by each field is described by a certain character. The realtions in the databases are described when the characters are linked with one another. many companies uses the relational data,bases since they are effective when they are designed propely and therfre resulting to clear data analysis without any duplication (Bing, 2011). ii): Make a list of the databases in which data about you exists. How is the data in each database captured, updated and how often? What data privacy concerns do you have? Explain briefly. Data sources are defined by their portability mechanisms and the independent approaches that enhances the connection of the databases. There are different types of data sources and they are introduced to define a certain database. An application can be used to define different types of database by changing the components of the data source. There are three different types of data sources, managed data sources,native data source and operational data sources (Pang,2001). †¢Managed data sources Managed data sources define the approaches used in error handling mechanisms, connections pooling as well as global transaction management. Since they are applicable on global transactions they are usually updated on daily basis. A managed data source in a data warehouse provides all the implementation mechanisms and interfaces that are issued in the data source. The warehouse can be able to use the managed data source in the participation of global transactions (Pang,2001). †¢Native data sources Native data sources are significant in the warehouse interface and are provided by the vendor’s sich as oracle. The native data source are different from the managed data source since the connections cannot be retrieved in global transaction. They are updated with several approaches depending on the information to be retrieved. Operational data sources All operational data sources applicable in a warehouse are used in the management of data in different sectors. The data sources are retrieved through the application of connections that enhance the operational process of data retrieving and enhancement effective. In a datawarehouse basis, information of data is retrieved from more than one ideal source therefore the application of the operational data source defines different strategies of connection to effectively define a certain data. ii): Using your company of choice example from above, explain the type of decision support that thecompany can benefit from implementation of a data warehouse. Within this context, what would bethe role of data mining? Decision support systems are important computerized information that enhances the strategies that are used in decision making (Power, 2002). The decision makers are able to use the networking communication technology, data information and other models to enhance the approach of decision making. Decision support systems are significant in the company since they provide information on graphical approaches and include expertise application on artificial intelligence (Power, 2002). BLM Company is entitled to use the communication driven decision support system that has a responsibility in targeting internal patterns. The importance of the communication driven decision support system is to enhance individual collaboration. The technology that is applied in this type of decision support system includes the client services for instance, instant messaging. Role of data mining †¢analyzing Data mining softwares are important in analyzing data from different perspectives (Bing, 2011). It analyses, categories,summaries and indicates the relationship that occurs in a given data. Data mining procedures are effective since they analyses the total components that the user wants prefers effectively. †¢Determination of valuable information Data mining is defined as the processes that are used by data software to analyses, summaries useful content. Data mining provides all the knowledge that is required to uncover certain figures related with information retrieval for several applications. In such cases, cross tabulation information, decision trees applications can assist in the retrieving of certain valuable information. QUESTION 2: Enterprise Content Management (ECM) helps companies to capture, organize and analyze particularly unstructured content to deliver better business. ECM technologies cover a broad set of capabilities. With the help of examples name and briefly explain three of such capabilities. †¢Document management capability Every department in an organization is conversant with document management capabilities. The role of ECM In most of the organization is to assist the organization on the approaches associated with document management through the introduction of policies that requires documentation cycle. ECM applies centralized methods repositories that enhance the mechanisms of discovering the information effectively and therefore the set policies enable tracking of information in the organization through the application of bar codes and labels(Handy, 2009). The centralized mechanisms have ensured that storage and protection of informations against any unauthorized use, hence they offer security on information. Record management capabilities Record management capabilities has been known as a secondary task, strategies that are associated with this capability include, the requirements on clear records assignments within the departments. Record management capabilities ensure that records are well updated in the organization to ensure that the organization maximizes transparency. The record management capabilities provides the managers with an opportunity to set up the records according to the organizations filing plans. †¢Web content management capabilities The development of web content management capabilities ensures that the organization is able to communicate effectively with employees and customers. Web content management capabilities ensures that the organizations is in a position to manage different sectors for instance multilingual Internet sites and mobile services while it ensures that these sectors are effectively updated. Summary of the findings IBM is a worldwide known company that applies the enterprise content management with software application. They provide semantic data management software within the organization. Question 3 Write the lecture summary relating to Week 9 – Topic: Data Warehouse and Data Mining data warehouse Companies are entitled with different sorts of information. The traditional methods of data storage include, invoices, sales and distribution were developed by many companies and it was a hard task that required a lot of computing producing biased and inaccurate information. With the recent innovations of technology and information systems data management and warehousing has become an easy process (Michael, 2009). The effective use of Data warehousing provides an approach of combining all the information that is required by the company. Data warehousing includes the application of all the companies data storage and the retrieving of any information is made easy. Data warehousing is made effectively through the strategies that are associated with the retrieving of information for instance, the selection process of a certain area to retrieve the data, keying of individual as the subject matter and any data information is retrieved and the group team of the organization develops extraction programs. Data warehousing is applicable in coordination of information and copying of data within the organization and outside the organization(Michael, 2009). Trusting data sources. Data warehouse is subjected with different departments with a large number of data sources from the external departments. An organization can lack the control on the quality retrieval of data into the data warehouse, and sometimes it can be a difficult process to access how the data is refreshed. The data sources used by the organization are diverse; therefore there is the need to determine strategies that can be applied in trusting data sources. Tools The tools include the simple reporting query tools which are used to tell us what has happened. On-line analytical processing gives a reason of the happenings †¢executive information system extracts information on the users who want to mess with the data warehouse †¢ data mining processes includes the all the statistical techniques that are advanced with intellectual research properties. Data mining components include, cross z softwares and the IBM . The architecture- centralised or distributed. If the data is termed as centralized then it means that only one database is applicable to a specific hardware for the access of all users. QUESTION 4 Features and tools in face book The features and tools in facebook have different importances on the representation of the companies, public figures, bands. They are the key tools of the entities and they include pages and the profile subscribers. †¢The pages Pages are used to represent company’s public figures, bands. The pages can be applicable to †¢Profiles with subscribe Profiles with subscribe consists of the strategies that an individual uses to subscribe to another person. In this case the profile with subscribes are used by multiple individuals and they include, news feed, find friends Entity attribute value model(EAV) Entity attribute value model is a data model that is used to define entity where by the parameters and properties are used to explain them. The number that is used to describe each entity is relatively modest. This model is also known as the space matrix model. Structure of an EAV table The data that is represented is defined in a spacious approach that is capable of storing the entire space matrix that is composed of occupied values. In the EAV model each parameter and property describes the entire entity and each row that is represented. In EAV model, it stores a single component. The EAV tables are also described as long and skinny in which the long strategies describe a specific number of rows while the skinny description defines the number of the columns (Michael, 2009). Data in EAV table is recorded and retrieved in three columns, entity, the parameters and the values. The entity colum defines the item description and the parameter column defines the attribute characters for instance, name, and ID and the value define the attributes.

Thursday, January 2, 2020

Phi2010 Philosophy Research Project. Madison Lee. Free

PHI2010 Philosophy Research Project Madison Lee Free Will, Kevin Timpe As humans, free will is something we commonly assume we have. When evaluating what free will is, we become less certain. David Hume calls it â€Å"the most contentious question of metaphysics.† In simplistic terms, free will is having the ability to determine your own plan of action. There is a relationship between free will and freedom of action and causal determinism that must be evaluated to have a complete understanding of free will. There are compatibilist views that believe in free will and incompatibilist views that imply there is no free will. Free will is also related to both theological determinism and logical determinism. Section 1 †¢ David Hume- â€Å"free will is†¦show more content†¦Section 2 †¢ Faculties Model of the Will -Plato and Aristotle origin -An agent that is free has possession of certain powers or capacities such as growth, reproduction, intellection, and volition -Intellect- rational faculty, power of cognition; evaluates whether an action is â€Å"good or bad† -Having an intellect= having a will -Will- volitional faculty, an appetite for the good; cannot pursue an option that the intellect presents as good in no way; also able to command other faculties such as telling the body to move or the intellect to evaluate something †¢ Hierarchical Model of the Will -Harry Frankfurt, Ekstrom, Fischer, Kane, Pereboom, van Inwagen -Contemporary account, aka â€Å"structuralist† or â€Å"mesh† -Agents have various levels of desires and volitions -Two types of desire: â€Å"first order†- the desire to do an action; example: wanting to exercise; â€Å"second order†- desiring to be a certain type of person that does an action and has those desires; example: wanting to be a person who exercises regularly -Conflicting desires results in making it impossible to satisfy all desires -Volition- a motive that propels the agent to action; first and second order volitions like desires -To have free will, one must have the correct â€Å"mesh† between various orders of desires †¢ Reasons-Responsive View of the Will -A certain level of sensitivity to reasoning must be