Tuesday, January 28, 2020

Responsibility Project Essay Example for Free

Responsibility Project Essay â€Å"If there was a red pill and you could take it, and there would be no side effects and your disability would be gone. Would to take it?† (Liberty Mutual’s The Responsibility Project, 2012). Anjali Forber-Pratt is paralyzed from childhood. She conquered issues uncommon to most able-bodied individuals such as social pressures, critical personal decisions, and relationships between legal and ethical issues, but she could win gold at the Paralympics. Organizations such as the Paralympics, and the University of Illinois, have overcome the issues of culture and precedence to do what is ethical right. They create strong influence over societies thoughts and provide experiences to those who may not otherwise have access to them. The responsibility and ethical culture of these organizations shows how beneficial changes to attitude and tradition can be. Issue Importance Losing mobility in society is challenging, but overcoming those challenges can be accomplished. Anjali Forber-Pratt had a dream to race in a wheelchair in the Olympics, she achieved that goal and won. Taking what you were giving and make the most of it is exactly what she did. She inspires people everyday to never give up and that they can do anything they set their heart on. Her parents were criticized based on the ethical perspectives of others for the way they treated her as a child. When she fell out of her chair, her mother would not pick her up. Instead she would encourage Anjali to pick herself up because one day her mother will not be there. Her mother was strong and wanted her to have the best life, teaching independence over dependence was the way to ensure Anjali could live a normal life. Anjali gave herself to her dream of racing, trying to push herself to become better against the external pressures at odds with disabled people in societies. External Social Pressures External pressures for anyone can bend everything we believe in or stand for. Within organizations, culture can be stronger when widely accepted by a group; it can withstand higher external pressures. As demonstrated by Citicorp, an organization could build a culture strong enough to withstand external pressures such as national cultural beliefs (Trevià ±o Nelson, 2007). For Anjali, a Paralympics world record holder, external pressures that had affected her life in immeasurable ways and fortunately drove her into organizations that had already built strong cultures of support and acceptance for disabled individuals. The University of Illinois is the original leader in driving the needs of organizational culture changes regarding how people with disabilities are assisted and treated in an academic atmosphere. There are not many years between the time our society viewed the disabled as incapable of normal life and the current view that they are no less capable than those without disabilities. Organizations like the University of Illinois and the Paralympics have provided an external pressure to many other organizations to change their culture out of the shared responsibility we have to each other, whether disabled or not. External pressures can drive positive or negative changes. In the case of Anjali and other disabled individuals the shift in our culture over the last 20 years has been in support of the responsibility we have to create equal access to life and the joys in it that most of us experience. Relevant to Organizational and Personal Decisions The decisions involved with disabilities and the changes in both organizational and personal areas are both areas that an organization and individuals must be responsible for. For instance, in an organizational environment, being responsible for making handicapped accessible areas is something mandated in most, if not all areas of the United States. An example of this would be making sure that there is a way into a building primarily accessed via stairs. Making the decision to uphold this rule is a sign of upholding the responsibility to making areas otherwise inaccessible to handicapped individuals an accessible area. Within personal decisions, it is an individual’s responsibility to notify the proper individuals if a rule or law is not being upheld to allow access to handicapped individuals. Relationship between Legal and Ethical Issues The ethical and legal relationship of citizens with disabilities has not always been equal. As stated above, until recent years the rights and advocacy for people with disabilities simply did not exist. The legal rights and privileges of such people have slowly caught up with the ethical. It is ethical for a modernized country, like the United States, to allow Americans with disabilities to live as normal a life as possible. These people deserve the ability to live a normal life within the realm of possibility. In the short film, Anjali proves that it is possible for those with disabilities to reach and achieve their own dreams. As far as her everyday life is concerned, it can be ideal for many to drive, go to college, and even live alone. The legal ramifications of allowing such dreams to occur have slowly matured over the last few decades. With legal acts concerning the ADA, and others, many new buildings and government or state run facilities have an obligation to be accessible to citizens with disabilities. Perhaps the greatest of feats is finally convincing the public that just because a person has a disability does not mean they are not capable of doing great things. It is and can be a great feeling, to know that the judicial side of government has a firm statement on the well being of those disabled. In turn, America has taken one more step in forging a long-lasting ethical/legal bond for some truly amazing people. Anjali said â€Å"No† to taking the little red pill. Ethical principle affects our daily lives and who we become today. Anjali chose a different path, overcoming the obstacles handicap people face. She conquered issues such as social pressures, critical personal decisions, and relationships between legal and ethical issues. She won gold at the Paralympics inspiring thousands of people. References Liberty Mutual’s The Responsibility Project (2012, September 11). Responsibility Sports: Anjali [Video file]. Retrieved from http://responsibility-project.libertymutual.com website: http://responsibility-project.libertymutual.com/films/responsibility-sports-anjali#fbid=r7MA1ox2-ul Trevià ±o, L. K., Nelson, K. A. (2007). Managing Business Ethics. Straight Talk About How To Do It Right (4th ed.). Retrieved from The University of Phoenix eBook Collection database.

Monday, January 20, 2020

Freedom of Speech and Expression and Responsibility -- Argumentative P

Freedom of Speech and Responsibility       No matter how fervently someone believes in the justice of his cause, suppression of the free exchange of ideas is failure at best or downright wrong. The power or might behind an idea does not make the idea right. Many powerful people throughout history have been wrong. Few people, if any, would judge "Mr. Smith Goes to Washington" to be subversive or wrong. In 1939 Ambassador Kennedy was so caught up in the fears of the times that he was willing to use the power of his money to protect the world against a film. When people are caught up in the movements of their time, all people must be extra zealous to guard and encourage freedom of expression. Otherwise, a mob mentality reigns, and people rush to do things that are not thought out and often regretted later.    The founders of our country knew from experience how important free expression of ideas is. Many of them, along with popular demand, insisted that the Constitution immediately be amended by the Bill of Rights. The first article of the Bill of Rights guarantees freedom of expression:    Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.    Without freedom of expression, no people are truly free. Sometimes a person will hide repression by telling people under his authority that they are free to believe anything they want--they just can't voice their beliefs. They are free to think anything, but aren't allowed to say what is on their minds.    What are some examples of this men... ...19. "House Passes Free Speech Exception."   7 Feb. 1998.   <http://www.scimitar.com/revolution/express/flag.html>   (17 March 1998). LaMarche Gara.   "Hate Speech Should Not Be Outlawed."   Civil Liberties: Opposing Viewpoints. Ed.   Charles P. Cozic.   San Diego:   Greenhaven Press, 1994.   90-95. Otto, Jean.   "Freedom of Expression Should Not Be Restricted."   Civil Liberties: Opposing Viewpoints. Ed.   Charles P. Cozic.   San Diego:   Greenhaven Press, 1994.   79-84. Rupke, Roxanne.   "Zeeland students to recommend T-shirt rules."   Herald Sentinel.   25 March 1998:   A1, A5. Showers, Robert H.   "Pornography Sould Be Prohibited."   Civil Liberties: Opposing Viewpoints. Ed.   Charles P. Cozic.   San Diego:   Greenhaven Press, 1994.   96-102. "T-shirt ban: Pepsi shirt gets him in trouble on Coke Day at Greenbrier High."   Herald Sentinel.   26 March 1998:   A1.

Sunday, January 12, 2020

Mayon: the Origin Essay

Her unsullied splendor cannot be denied. The sight of her can take one’s breath away. She is simply radiant as she stands tall and grand in the horizon. She is truly a one of a kind beauty that captivates anyone who pays her a visit. You have to be visually challenged to miss her brilliance. When she sleeps, she’s as gentle as a baby but when she stirs, she could easily strike horror among the hearts of men. She is loved for her beauty and tranquillity and spurned for her sometimes deadly and devastating aspect. This beauty is none other but the majestic Mt. Mayon which is located in the province of Albay in the Bicol region. It is known around the globe for its flawless cone shape. In some ways, she is like a shy maiden who likes to hide, using the clouds above her like a veil. Legendary Origin The legend of Mt. Mayon goes around the tragic love story of a beautiful young heroine named Daragang Magayon and a dauntless warrior. The legend has been narrated and passed on from generation to generation by the people of Albay. The legend has become a part of the lives of the people living in Daraga, Albay because Mt. Mayon plays an integral part in their beliefs, cultural practices and festivities. In fact, there’s an annual festival called Magayon Festival which is celebrated every month of May. The festival relives the legend of Mount Mayon. Different versions of the origin of the majestic Mayon Volcano have risen because of the oral tradition of telling stories and handing them down to the next line of descent. First version The legend is about the story of a beautiful lady named Daragang Magayon who lives in Kabikolan before the separation of the Philippines to mainland Asia. At that time, a maiden could not marry a man who lived outside the Kabikolan. Daragang Magayon rejected a native suitor named Paratuga. He was rich but selfish. She confessed to her father, Tiong Makusog, who also happened to be the chief of the village that she had fallen in love with a stranger named Panganoron, who saved her from drowning. Her father loved her so much and told her that he would find a way to fulfil the longing of her heart. The manipulative Paratuga decided to kidnap Tiong Makusog to force Daragang Magayon to marry him. The lovely maiden did not have a choice but to agree to the kidnapper’s demand. When Panganoron found out about the deceit, he attacked the village of Paratuga. As soon as he arrived at the wedding ceremony, Daragang Magayon hurried to his side but she was hit by a stray arrow. As Panganoron lifted the fallen maiden, he was attacked from behind. The lovers died in that unfortunate event. Tiong Makusog buried his daughter together with all her earthly possessions that Paratuga had bestowed on her as wedding gifts such as gold and precious stones. To everyone’s surprise, the burial ground began to rise a week after the burial. There were always white clouds hovering on top of the mound. The mound grew bigger and bigger as time passed. The legend goes on that the angry spirit of Paratuga sometimes attempts to unearth the grave of Daragang Magayon to get back the gold and precious stones that he gave her, which causes tremors and volcanic eruptions. He never succeeds in his quest and always ends up getting rocks and lava from the volcano. The cloud that hovers over the volcano is said to be the spirit of Panganoron who still weeps over the loss of his love. His tears fall to the earth as raindrops. Second version There lived a man named Magayon who had a beautiful princess as a niece. He was tremendously protective of her and never allowed a man to come close enough to ask her hand. One day, a brave warrior arrived and became attracted to the princess’ beauty. He asked the aid of the wind to help him pass through the royal chamber so he could lure the princess to elope with him. When the lovers left, Magayon followed them. The princess and the warrior asked the help of the Gods to save them. Suddenly a landslide occurred and buried Magayon. According to the legend, the eruption of Mt. Mayon is brought about by the anger of Magayon. Third version The third version of the legend is told by Laura Agpay, a native of Bicol. There was once a princess named Daragang Magayon. She lived in Bicol where her family reigned supreme over the entire place. She was known for her unrivalled beauty. Many warriors, princes and datus would travel from different areas of the country in the hope of getting her hand in marriage. Magayon did not like any of the royalties who were presented to her because her heart has already been captured by a warrior and prince named Handiong. Unfortunately, Handiong hailed from the rival tribe, the enemy of Magayon tribe. Magayon and Handiong suffered tremendously from their tribes’ attempts to separate them. When they could not stand being apart anymore, they fled, which resulted to a blood bath between the two enemy tribes. The young lovers could not accept the pain and torment of the events that followed. The two decided to end their lives. Even in death, the tribes separated the young couple. After several months, the Magayon tribe noticed a volcano growing in the spot where Magayon was buried. They named the volcano â€Å"Bulkang Magayon† depicting its perfect shape just like their beautiful Daragang Magayon.

Saturday, January 4, 2020

The Threat Of Cyber Attacks - 1127 Words

In respect of the threat of further cyber-attacks, the organisation could apply software patches as and when they become available, rather than periodically. One consequence of this action could be increased downtime to clinical systems whilst patches are applied, which could affect patient care. The organisation could also look to provide staff training on IT security risks. Subsequently this could increase staff awareness and equip them with the relevant knowledge to deal with such issues. Finally, the organisation could implement Critical CareCERT alerts (NHS Digital, 2017) to alert the organisation when new threats arise. One consequence of this, could be that alerts are not acknowledged if the system is offline. c) Distributing†¦show more content†¦All health boards in Wales, except one, use the WRIS system. I have recently been working with Abertawe Bro Morgannwg (ABM), to look at getting them on board. ABM have used a third party software for the past twenty years; joining the rest of Wales would mean that the WRIS would be the national solution for Radiology. My recent work with ABM has involved providing demos of the WRIS application to senior NHS clinicians, managers and potential users. During these demos I have highlighted the benefits of the application in order to gain supporters, an element of the Coalition building competency, by Carnall (1999). One of the challenges I have faced during this exercise has been dealing with the users’ expectations. I have learnt that the third party software used in ABM offers different functionality to that of WRIS. Therefore, I have had to identify other means that the WRIS application can provide the same functionality and produce the same outcomes, through using different work processes. Another aspect of the Coalition building competency; bargain and establish networks of support (Carnall, 1999). Alongside this project, I am also responsible for a team of six analysts, and part of my responsibility is to delegate tasks, and manage the team’s workload. The AMBShow MoreRelatedCyber Threats And Cyber Attacks Essay946 Words   |  4 PagesAccording to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutionsRead MoreThe Threat Of Cyber Attacks943 Words   |  4 PagesCyber-attacks are constantly becoming a critical issue for government systems and for businesses around the world. In fact, the cyber challenges that we see today play a huge politica l factor for government sectors. The U.S is constantly facing these cyber security threats that jeopardize America’s critical infrastructure and the freedoms that many Americans express online (Bucci, S., Rosenzweig, P., Inserra, D. 2013). These challenges that are taking a political factor can also be seen in otherRead MoreThreats of a Cyber Attack811 Words   |  3 PagesIntroduction Cyber threats are currently of large enough significance to enough to constitute a full blown national security priority in the West and the United States. In fact, we may be at zero hour. In order to better understand the challenges that cyber infrastructures are facing, it is necessary to understand the level of the threat that is posed, where the potential threats may emanate from, the techniques which help in identifying emerging cyber security threats posed by those who perpetrateRead MoreCyber Attacks : The Threat Of Cyberterrorism2809 Words   |  12 PagesHacking to Peace: The Threat of Cyberterrorism Computer systems have become essential to the way of life that exists in the United States and other Western nations. However, America’s dependency on computers results in the nation being vulnerable to cyber-attacks. This paper will discuss cyber threats to American security as they pertain to the nation’s government, military, businesses, and infrastructure. Such threats include possible acts of cyber terrorism, as well as espionage and informationRead MoreCyber Attack And Cyber Attacks Essay1656 Words   |  7 Pagestoday fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all s ystems connected to cyber networks fail to workRead MoreCyber Terrorism1716 Words   |  7 Pagesbombing of a Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites suffered a denial of service attack. Most recently, it was suspected that Bank of America was the victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim.   Cyber terror attacks pose a threat against the national security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand theRead MoreInformation Is A Source Of Power In International Relations.967 Words   |  4 Pagesany state places enough importance on a resource of power, that resource becomes a target. An attack on informational structures of a state are cyber-attacks or â€Å"the use of computational technologies in cyberspace for malevolent and destructive purposes in order to impact, change, or modify diplomatic and military interactions between entities† Cyber-attacks are increasingly becoming daily security threats in both private and public sectors of a state. In 2016, 64% of Americans stated they have anRead MoreCyber Security Is A Growing Concern For Governments Around The World1296 Words   |  6 PagesGlobal Cooperation for Cyber Security Cyber Security is a growing concern for governments around the world. Cyber-attacks pose a direct threat to the security of the nations’ critical infrastructures and Information Technologies (IT) as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the threat of potentially disastrous cyber-attacks, nations’ policy makersRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 Pagesperson over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of it. The United States created the Department of Homeland Security as a result of the 9/11 attacks. This was an effort to prevent future terrorist attacks on our nation. Along with that department, laws have been enacted, such as the USA PATRIOT Act. This law was introduced and passed to pro vide Federal, State, and local law enforcement agencies with better resources toRead MoreNuclear Facilities Are Among The Most Highly Secured Infrastructure1592 Words   |  7 Pagesnew digital systems throughout different facilities. In order to lower the risks of physical and cyber-attacks, nuclear facilities are adopting strict protection policy and practices. Despite the implementation of these safety measures, digital instruments and computer-based systems associated with physical protection system and control system inside the facilities can still be exposed to more cyber vulnerabilities. The dependency on digital system can endanger cybersecurity and the physical security