Wednesday, November 27, 2019

Relationship between Sleep and Depression in Adolescence

Abstract Recent studies suggest a decreasing duration of sleep in different parts of the world. In fact, the number of sleep hours per person has increased since 1960s, with people concentrating on work and reducing the amount of time they spend sleeping. While this pattern has improved household and national economies, it has been associated with health problems.Advertising We will write a custom essay sample on Relationship between Sleep and Depression in Adolescence specifically for you for only $16.05 $11/page Learn More Mental and emotional depression, cardiovascular diseases, stroke, coronary diseases and other health issues have been linked with lack of enough sleep. In adolescents, sleep is needed for proper brain maturation. However, adolescents, especially in school years, do not get enough sleep. As such, it has been linked to emotional and mental depression. The aim of this research was to determine the relationship between depression and sle ep. With quantitative approach, the study used 98 students as participants. They were asked to provide answers to questions in Pittsburg Sleep Quality Index (PSQI) and Center for Epidemiology Depression Scale (CES-D) questionnaires. Using SPSS for data analysis, the results indicate the presence of a correlation between elements of depression and sleep duration and quality. Introduction Background In psychological view, depression is the prolonged feeling of hopelessness and sadness, prolonged condition of impaired thinking, biased processing of memory, unpleasant dreams and distortion of self-appraisals (Turek, 2005). For sometime, research has indicated the existence of a strong link between sleep and depression in humans(Cappuccio, Cooper, D’Ella, Strazzulo Miller, 2011). For instance, when individuals get depression, they tend to sleep too much or too little. In most cases, lack of sleep has strongly been linked with depression (Gangwisch, Babiss, Malaspina, Turner, et a l., 2010). Review of literature According to Matricciani, Olds and Petkov (2012), depression is a serious psychological disorder that affects millions of people throughout the world. In particular, depression is common in adolescents and young adults. According to Patel and Hu (2008), adolescents who suffer from depression are known to have abnormal sleeping patterns, with the largest number reporting to stay awake over long time.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Existing research indicate that sleep is an essential requirement for brain growth and maturation during childhood and adolescents. According to Dahl and Lewin (2002), the increased rate of brain maturation during adolescent years requires adequate sleep per day. According to Wolfson and Carskadon (2008), the average sleep duration varies between individuals in adolescents and those in late childhood, but the optimal sleep ti me in both groups is about 8 to 10 hours (Feinberg Campbell, 2010). Despite this, studies have increasingly shown that adolescents do not get enough sleep per day, especially during their school years (Warner, Murray Meyer, 2008). In a 2006 report, the National Sleep Foundation reports that less than 20% of adolescents get the physiologically required sleep time (about 9 hours) (Gradisar, Gardner Dohnt, 2011). In addition, the report shows that more than half of adolescents indicated that they usually slept for less than 8 hours per night during their school days (Matricciani, Blunden, Rigney, Williams Olds, 2013). According to Blixter (2009), some complex and multifactorial mechanisms drive and control sleep cycle in humans. Blixter (2009) argues that the subjective duration of sleep in humans has declined over the last 5 decades, with the modern society suffering from a widespread suboptimal sleep duration and poor quality of sleep (Hagenauer, Perryman, Lee Carskadon, 2009). However, Mattricciani, Olds and Petkov (2012) have argued that the decline in sleep duration started more than 100 years ago, predisposing children and adolescents to a number of psychological problems. Whichever the case, it is a fact that there has been an increase in the rate of reduction in sleep duration since the industrial revolution (Bin, Marshall Glozier, 2012). Accordingly, there is an urgent need to study and understand the complex mechanisms involved in sleep regulation and sleep duration in order to develop a better way of identifying individuals at high risk of developing depression (Van Dongen, Maislin, Mullington Dinges, 2003). Although psychological studies have shown that adolescents are able to compensate for sleep loss during the school week on weekends, the findings are not satisfactory to imply that adolescents in the modern world do not suffer from depression caused by lack of sleep (Sun Bin, Marshall Glozier, 2012).Advertising We will write a custom e ssay sample on Relationship between Sleep and Depression in Adolescence specifically for you for only $16.05 $11/page Learn More Study problem Depression in adolescents has been linked to sleep deprivation and insomnia (O’Brien Mindell, 2005). In addition, studies have suggested that depression leads to reduced duration of sleep and irregular schedules for sleeping (Kripke, Garfinkel, Wingard, Klauber Marler, 2002). In turn, sleep loss has been shown to cause depression among the adolescents (Feinberg, 2013). This is a clear indication of a sophisticated nature of the relationship between lack of sleep and depression (Carskadon Acebo, 2002). This nature has created a problem in research than needs further investigation. Purpose The purpose of this research was to determine the relationship between sleep (and lack of sleep) and depression in adolescents. Aims To describe the link between sleep and depression in humans To describe how lack of sleep and insomnia in adolescents lead to depression Hypothesis This study hypothesizes that a strong link between depression and sleep exists in humans, where adolescents with insomnia and reduced sleeping durations are likely to suffer from depression. Methods Study design This study was a quantitative study that sought to describe the relationship between sleep and depression in adolescents. Participants were drawn from students in a college, whose ages ranged between 19 and 25 years. This means that the study focused on sleep deprivation and depression among late adolescents and early adults. Participants Some 98 subjects were recruited for the study- 28 subjects (28.6%) were males and the rest 70 (71.4%) were females. To be included in the study, a subject was a student in the selected college and be aged between 18 and 25 years. In addition, a person was not supposed to have a history of mental problems. Finally, subjects were supposed to belong to either of the two genders (male, M, or female, F), which means that transgendered (TG) individuals were excluded from the study.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Materials and apparatus Data collection was done with questionnaires All the 64 participants were asked to finish two sets of standard questionnaires- the Pittsburg Sleep Quality Index (PSQI) and the Center for Epidemiology Depression Scale (CES-D). Procedure The data collection was done in two weeks, after which the data analysis begun. With PSQI, each participant was asked to provide honest information regarding his or her sleep behaviour. The purpose was to gain information on an individual’s average sleep time, possible sleeping problems and possible effects of sleep deprivation on work, study and leisure (Babson, Trainor, Feldner Blumenthal, 2010). With CES-D, participants were asked to provide information concerning their feelings towards certain things during the day as a way of describing the presence (and degree) of depression in individuals (Jackson, Stough, Howard, Spong, et al., 2011). Data analysis Data analysis was done with specific statistical tools- SPSS and lab data. With these tools, the aim is to develop the relationship between sleep and depression in the subjects (Szklo-Coxe, Peppard, Finn et al., 2010). Graphs and correctional charts were developed using SPSS tool to describe the relationship. In this case, the study depended on Person Correlation Scale to determine the association between sleep duration and depression in the subjects. Standard deviation, mean and range values are essential in describing the statistical aspects of sleep duration in PSQI data. The analyzed data was done within the statistical limits provided along with the statistical tools used. As such, the researcher expected any error associated with the capacity of the two statistical tools to affect the data outcomes. Results With SPSS, a number of statistical evidence was indicated to support the existence of a relationship between sleep duration and depressed moods in the subjects. First, the validity of the returned questionnaires was excellent, with the SPSS results indicating a 100.0 per cent rate of validity. This means that all the 98 participants were able to return a complete set of duly filled in questionnaires. Secondly, the SPSS analysis of depression in the participants using PANAS questionnaires indicated that the mean of the number of participants reporting Positive Affect was 33.34 and a standard deviation of 5.740. On the other hand, a mean of 20.70 of the total number of participants (N=98) reported a Negative Affect. Sleep duration reported by all the participants ranged between 5 and 12 hours and had a mean of 7.633 and a standard deviation of 1.1500. In addition, SPSS returned a mean value of.88 and a standard deviation of.763 for SLPQUAL. The total PSQI had a mean of 6.29 and a standard deviation of 2.528. SPSS Output Descriptive Statistics N Range Minimum Maximum Mean Std. Deviation Age 98 29 19 48 22.08 4.181 Positive Affect 98 29 19 48 33.34 5.740 Negative Affect 98 27 10 37 20.70 6.196 DURAT 98 7 .0 5.0 12.0 7.633 1.1500 SLPQUAL 98 3 0 3 .88 .763 TotPSQI 98 14 1 15 6.29 2.528 Valid N (listwise) 98 Figure 1: SPSS output showing the range, mean and standard deviation of various aspects of sleep and depression The study also sought to determine the relationship between depressions and sleep duration in both genders. In addition, it was necessary to determine a comparison of the two genders in terms of the relationship between the two variables. In this case, the SPSS results indicated that female participants had a mean range of 22.07 and a standard deviation of 4.305. On the other hand, male participants had a mean value of 22.11 and a standard deviation of 3.928. Gender Statistic Std. Error Age 1 Mean 22.07 .515 Std. Deviation 4.305 Minimum 19 Maximum 48 2 Mean 22.11 .742 Std. Deviation 3.928 Minimum 19 Maximum 36 Figure 2: SPSS output table showing descriptive per gender the correlation of sleep duration and aspects of depression were considered with Pearson correlation toll using SPSS. For instance, the correlation between Negative Affect and Duration (sleep) returned a 2-tailed degree of significance of.948 and a Pearson correlation value of -.007 for the 98 participants. Similarly, the correlation between Negative Affect and SLPQUAL returned a 2-tailed value for degree of significance of.365 and a Pearson correlation value of 0.93. Correlations Negative Affect DURAT Negative Affect Pearson Correlation 1 -.007 Sig. (2-tailed) .948 N 98 98 DURAT Pearson Correlation -.007 1 Sig. (2-tailed) .948 N 98 98 Figure 3: Correlation between Negative Affect and sleep Duration Correlations Negative Affect SLPQUAL Negative Affect Pearson Correlation 1 .093 Sig. (2-tailed) .365 N 98 98 SLPQUAL Pearson Correlation .093 1 Sig. (2-tailed) .365 N 98 98 Figure 4: correlation between Negative Affect and Sleep quality Correlations Negative Affect TotPSQI Negative Affect Pea rson Correlation 1 .207* Sig. (2-tailed) .040 N 98 98 TotPSQI Pearson Correlation .207* 1 Sig. (2-tailed) .040 N 98 98 *. Correlation is significant at the 0.05 level (2-tailed). Figure 5: correlation between Negative Affect and Total PSQI Conclusion To derive an analysis and conclusion from the data results, it is necessary to determine the statistical facts of the SPSS tool that was used in the study. First, for a correlation to be perfect positive, the Pearson’s r must be positive and vice versa. In addition, Pearson’s r is symmetric, meaning that the correlation between â€Å"a† and â€Å"b† is equal to the correlation between â€Å"b† and â€Å"a†. Thirdly, the correlation is a bivariate correlation coefficient, which assumes that the relationship between the two variables is always linear. With this in mind, it is possible to evaluate the relationship between various aspects of sleep with aspects of depression as used in this research. First, the relationship between Negative Affect and sleep Duration is negative, which means that the longer the duration of sleep, the lower the possibility of giving a negative feeling of an issue. Secondly, the Pearson correlation between Negative Affect and sleep quality is positive, which gives a positive relationship between the two variables. The relationship between Positive Affect and sleep duration is positive, which implies that the longer the duration of sleep time, the larger the possibility of having a positive attitude towards some issue. The relationship between â€Å"Sleep Qual† and positive Affect is negative, which is the opposite of the relationship between â€Å"Sleep Qual† and Negative Affect. From the results, it is clear that there exists a relationship between sleep duration and depression. For instance, the probability of reporting a positive attitude towards an issue increases with an increase in the duration of time of sleep . On the other hand, the probability of a student giving a negative attitude towards a given issue increases with the decreased in the duration of sleep time. Therefore, we conclude that decrease in the duration of time spent on sleep increases the rate of depression in adolescents and early adults. These results studies have suggested that depression leads to reduced duration of sleep and irregular schedules for sleeping. Therefore, the study confirms the hypothesis that that a strong link between depression and sleep exists in humans, where adolescents with insomnia and reduced sleeping durations are likely to suffer from depression. References Babson, K. A., Trainor, C. D., Feldner, M. T., Blumenthal, H. (2010). A test of the effects of acute sleep deprivation on general and specific self-reported anxiety and depressive symptom: an experimental extension. Journal of Behavior Therapy and Experimental Psychiatry, 41(3), 297-303. Blixter, E. (2009). Sleep and society: an epidemiolo gical perspective. Sleep Medicine, 10, S3-6. Cappuccio, FP, Cooper, D., D’Elia, L., Strazzullo, P., Miller, M. A. (2011). Sleep duration predicts cardiovascular outcomes: a systematic review and meta-analysis of prospective studies. European Heart Journal, 32(12), 1484-1492. Carskadon, M. A., Acebo, C. (2002). Regulation of sleepiness in adolescents: update, insights, and speculation. Sleep, 25(6), 606-614. Dahl, R. E., Lewin, D. S. (2002). Pathways to adolescent health: sleep regulation and behavior. J Adolesc Health, 31(3), 175–184. Feinberg, I. (2013). Recommended sleep durations for children and adolescents: the dearth of empirical evidence. Sleep, 36(4), 461-462. Feinberg, I., Campbell, I. G. (2010). Sleep EEG changes during adolescence: an index of a fundamental brain reorganization. Brain and Cognition, 72(1), 56-65. Gangwisch, J. E., Babiss, L.A., Malaspina, D., Turner, J.B., Zammit, G. K. Posner, K. (2010). Earlier parental set bedtimes as a protective fa ctor against depression and suicidal ideation. Sleep, 33(1), 97-106. Gradisar, M., Gardner, G., Dohnt, H. (2011). Recent worldwide sleep patterns and problems during adolescence: a review and meta-analysis of age region and sleep. Sleep Medicine, 12(2), 110-118. Hagenauer, M. H., Perryman, J. I., Lee, T. M. Carskadon, M. A. (2009). Adolescent changes in the homeostatic and circadian regulation of sleep. Developmental Neuroscience, 31(4), 276-284. Jackson, M. L., Stough, C., Howard, M. E., Spong, J., Downey, L. A., Thompson, B. (2011). The contribution of fatigue and sleepiness to depression in patients attending the sleep laboratory for evaluation of obstructive sleep apnea. Sleep and Breathing 15(3), 439-445. Kripke, D. F., Garfinkel, L., Wingard, D. L., Klauber, M. R., Marler, M.R. (2002). Mortality associated with sleep duration and insomnia. Archives of General Psychiatry, 59(2), 131-136. Matricciani, L., Blunden, S., Tigney, G., Williams, M.T., Olds, T.S. (2013). Childrenà ¢â‚¬â„¢s sleep needs: is there sufficient evidence to recommend optimal sleep for children? Sleep, 36(4), 527-534. Matricciani, L., Olds, T., Petkov, J. (2012). In search of lost sleep: secular trends in the sleep time of school-aged children and adolescents. Sleep Medicine Reviews, 16(3), 203-211 O’Brien, E. M., Mindell, J. A. (2005). Sleep and risk-taking behavior in adolescents. Behav Sleep Med, 3(3), 113–133. Patel, S. R., Hu, F.B. (2008). Short sleep duration and weight gain: a systematic review. Obesity, 16(3), 643-653. Sun Bin, Y., Marshall, N. S., Glozier, N. (2012). Secular trends in adult sleep duration: a systematic review. Sleep Medicine Reviews, 16(3), 223-230. Szklo-Coxe, T., Peppard, P. E., Finn, L. A., Benca, R. M. (2010). Prospective associations of insomnia markers and symptoms with depression. American Journal of Epidemiology, 171(6), 709-720. Turek, F. (2005). The prevailing culture of sleepiness. Sleep, 28(7), 798-799. Van Dongen, H. A., Maisl in, G., Mullington, J. M. Dinges, D. F. (2003). The cumulative cost of additional wakefulness: Dose-response effects on neurobehavioral functions and sleep physiology from chronic sleep restriction and total sleep deprivation. Sleep, 26(2), 117-126. Warner, S., Murray, G., Meyer, D. (2008). Holiday and school-term sleep patterns of Australian adolescents. J Adolesc, 31(5), 595–608. Wolfson, A. R., Carskadon, M. A. (2008). Sleep schedules and daytime functioning in adolescents. Child Dev. 69(4), 875–887. This essay on Relationship between Sleep and Depression in Adolescence was written and submitted by user Davian Reed to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Downloading Music essays

Downloading Music essays Downloading Music: Useful or Harmful? Napster, the original creator of free music shareware over the internet, developed a concept that changed the music industry and the consumption of music forever. Napster enabled users to download music from a certain artist in order for them to hear what the artist sounded like before purchasing the entire compact disc. However, people who downloaded a particular artists entire CD so they would not have to buy it abused this revolutionary concept. While this was not Napster's wish, there was very little they could do to monitor it. The music industry quickly discovered Napster's free distribution of copyrighted material and took them to court. While Napster fought for the relatively new way to obtain music over the internet, the music industry countered them claiming it was wrong to give away music for free and would inevitably cut into the entire music industries profits. How often does a person buy an entire CD just for one song? What is the harm of downloading just one song? Does downloading only one song from a CD even hurt the music industrys profits? These are the types of questions answered in Downloading Music: Who Gets Hurt? by Carlton Vogt, a columnist for the InfoWorld website, written on May 4, 2001. Vogt believes he holds a neutral position in the Napster debate due to "never purchasing music or downloading it off the internet." However, his article seems to support the Napster concept. Vogt states that Napster can actually benefit artists. Due to the fact that users can hear the song, decide if they like it, and then recommend it to friends or buy the artist's next CD themselves. Therefore, furthering album sales. This would not be possible without somehow first being introduced to an artist. Vogt deems that not purchasing a CD in a store because you are unfamiliar with the artist actually ...

Thursday, November 21, 2019

It Week8 Assignment Example | Topics and Well Written Essays - 500 words

It Week8 - Assignment Example However, the old network, IPv4, cannot be done away with until the transition period is complete (Venkata et al., 2012). The benefits that IPv6 offers surpass the limitations that IPv4 has. For instance, the new IPv6 makes it possible to have a plethora of IP addresses as opposed to IPv4. The burgeoning protocol has 128 bit addresses as compared to IPv4, which only has 32 bit addresses. The bit addresses that IPv6 uses enable the availability of numerous IP addresses. In addition to this, IPv6 eradicates the need for network address translation (NAT) which is present in IPv4 resulting in better peer-peer networks connectivity. Further, IPv4 presents security issues, which IPv6 eliminates as it promotes interoperability between myriad implementations (Venkata et al., 2012). Venkata, P., Reddy, P., Mohammed, K., Ali, I., Sandeep, B., & Ravi, T. (2012). Importance and benefits of IPV6 over IPV4†¯: a study. International Journal of Scientific and Research Publications, 2(12), 1-2. Data Definition Language (DDL) refers to statements that define the schema or database structure. For instance, CREATE – creates objects, ALTER – alters the database structure, DROP – deletes objects, COMMENT – adds comments to the dictionary of date, and RENAME – Renames database objects. DML refers to Data Manipulation Language, which are simply statements that manage data within schematic objects. For instance, SELECT – helps in retrieving data, UPDATE – updates data already present in a table, and CALL – Calls Java or PL/SQL. Data Control Language (DCL) includes commands such as GRANT. It mostly deals with permissions, rights, and additional controls of the database. SQL Server 2012 relies on the above SQL commands for interaction. Transact-SQL presents as central in sending and receiving communication with the SQL server (Microsoft, 2006). Distributed File System (DFS) enables administrators to make a group of shared

Wednesday, November 20, 2019

Summary and reflection Essay Example | Topics and Well Written Essays - 250 words

Summary and reflection - Essay Example Even though the topic of the film was a contentious one, I found the movie to be insightful because I never considered some things to be racist. The most common one of these is when the white police officer manhandles a black woman on the pretext of possible drug use. There are many things in our daily lives that we do not recognize as being racist, even though many times they are. I most identified with Cameron, the husband of the black woman who was strip-searched, because he had to face a difficult dilemma. On the one hand, he could have prevented the police officer from assaulting his wife. The likely outcome would have been that he would be arrested. But, what he actually did was nothing at all. I would have done the same as him because police officers have the authority to do anything that they want because they are the law. I think that the director could have focused less on the divisions between white and black people because there are also many other cultures that can be racist. The characters in the movie were very stereotypical and I do not think that this helps ongoing racial

Sunday, November 17, 2019

Negative mass media influence Essay Example | Topics and Well Written Essays - 1500 words

Negative mass media influence - Essay Example The more mass media resources we have, the more needed information we can receive. New resources of mass media appear every day and the old ones are developing to help us receive important information any time we need. On the other hand, the negative influence of mass media is obvious as the promotion of violence takes place very often. Such a promotion prevents people from normal development and influences negatively the individuals’ behavior in the society. Now mass media imposes a great influence on people. Actually, we can’t hide from this influence as mass media penetrates all the areas of life. Furthermore, the development of the modern culture is closely connected to mass media because the role of mass media in the formation of people’s views is very important. In this view the impact of mass media may be very negative as we can see much violence on TV or in newspapers (Bagdikian, 2000). The influence of mass media on people is increasing and the number of negative consequences of this influence is also growing dramatically. It is no need to mention that violence damages psychological development of people as the cruelty people see in films or read about in newspapers causes aggressiveness. In any case the violence in media negatively influences the development of children and spoils our future generations.... TV producers, network executives, motion picture companies and others in the media deny any impact of their programs on the attitudes and actions of youth† (Effects of Mass Media on Young Generation). When people frequently meet violence in media, they get used to it. It happens inevitably and the process is gradually affecting people’s psychology. Slowly but surely violence becomes something like everyday issue, people start to perceive it as something normal at the same time as violence certainly represents an abnormal and awful phenomenon. It causes aggressive behavior that is also already treated as a norm by many people in the modern society (Josephson, 1995). The main problem is that mass media contributes to positive perception of violent acts that is absolutely unacceptable. Jarred explains: â€Å"There are those who believe that violent programs contribute less to violence in society than do other recognized elements. The media in general has been identified as portraying lifestyles that are beyond the means of many people, particularly for those who are unemployed. Such lifestyle portrayals are seen by some as being more likely to encourage violence and crime than violent television programming by encouraging materialistic attitudes and a reduced intolerance to delays in attaining a desired lifestyle. Even media coverage of unemployment and homelessness is viewed as engendering feelings of hopelessness and bitterness that can result in anti-social behaviour† (Jarred, 2001, p.28) There is such a term as â€Å"happy violence† that was generated as a result of violence promotion. Such violence seems to be humorous and funny and this results in increasing of number of violent acts in real life. Under the influence people can’t control their

Friday, November 15, 2019

Impact of IT on Bank Performance

Impact of IT on Bank Performance IMPACT OF INTERNET TECHNOLOGY ON BANKS PERFORMANCE AND CUSTOMERS SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, its employees and the customers. More importantly, efforts were also made to research into various risks associated with this technology such as hacking, spam-email, phishing, identity theft or frauds and many others. After critical look at this technology and its associated risks especially the identity theft, two sets of solutions were recommended. The first set solutions addressed physical access control while the second aspect deal with authentication through the process of fingerprint and voice recognition. 1.0 INTRODUCTION This project is trying to evaluate the impact of Internet technology on banks performance and customers satisfaction. Banking industry is the bedrock of economy, the state of Banks will dictate the state of economy. If it stables, so will the economy. The present global economy recession attests to this statement. Technology innovation like Internet is groundbreaking in banking system. Transactions worth of billions of dollars take place in seconds in the electronic circuit throughout the globe (Castells, 2001). The banking and financial industry is transforming itself in unpredictable ways (Crane and Bodies 1996). Prior to the rocket of technology in banking sector, the function of the branch was very unlike the function of present branch. Earlier before the 1970s, the structure of the branch and functions were similar to one and other. Product offerings were equally the same and branches were only avenue for customers to make bank transactions. Majority of these banks were only rel ying on one or two branches but with many staff and cashiers. Customers were subjected to long distant travelling before they could carry out banking transactions. Face to face traditional banking was only means to process bank loan, make lodgements and withdrawals and customers were subjected to long queue in the banking hall. But the increase in the level of banking technology made the banks started a process of metamorphose that proceed till the end of the 20th century. As part of process, many channels of distributions were introduced. Among these channels are Automated Teller Machine (ATM), Internet banking, Telephone banking, call-centre, electronic funds transfer, wireless banking, and voice messaging systems, videoconferencing and many others. Rapid growth and development in internet technology over the last four decades have great impact on organisations. The impact was highly noticeable in area of services, products offering and business processes. Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks have opportunities to perform better than their rivals. Banks through the innovation of internet technology were able to provide better and cheaper services than traditional system of branch banking. Apart from these, level of banking transactions were equally increased, Convenience and twenty four hours banking services were also witnessed in banking system. More importantly, the level of communication within and outside the banking environment were equally improved, access to the right information and high quality of services were not comp romised. The banking environment became more friendly and flexible. Information that can only available through the means of technology became an important aspect of the banking. Many people argued that it was advance in technology of 1990s that made it possible to develop those channel of distributions and system that allowed the banks to render an unprecedented high quality services. In final analysis, this research work assess an aspect of banking that is lacking in Traditional Bank an online banking and its impact on customer satisfaction and banks performance. 1.1 AIM AND OBJECTIVES The research on Internet technology in banking and acceptance of modern banking by customers have been viewed in different perspectives but few aspects of this topic are left with little exploratory. There is little research on the effects of Internet technology on banks profitability and customers satisfaction. Many researchers did not fully agree that Internet technology has immensely affected the profitability level of the banks. The rationale behind this is to offer a better understanding on how internet banking is evolving. This study intends to achieve the following objectives: 1. Research the problem of identity theft and card authorisation 2. Evaluate the problem concerning lost revenue 3. Research the other work done in this area. 4. Proffer solution to the problem of identity theft and card authorisation. 5. Implementing solutions and the cost benefits 1.2 CONTEXT OF THE STUDY Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks having opportunities to perform better than their rivals. This research work is focusing on two important key elements which are: 1) Impact of internet technology on Bank and its customers and; 2) Associated risks with internet technology with more emphasis on identity theft 1.3 EXPECTED CONTRIBUTION TO KNOWLEDGE The expected contributions to knowledge of this research work are to identify various theft and card authorisation, evaluate the problem concerning lost revenue and proffer solution to the problems. 2.0 LITERATURE REVIEW It is my intention to survey literature review to reveal the level of knowledge and understanding of people about identity theft. A number of text books, articles and journals internet search are used for this purpose. Among these are: a) 50 ways to protect your identity and your credit card Steve weisman The book is well written very relevant to the study and well referenced. Various types of identity thefts were discussed. It also explains that the motive behind identity theft could be for financial gain, revenge or malicious intent. The book goes further to suggest some protection rules such as only the credit cards that needed should be carried in the wallet, the practice of online account statement should be stick to, personal information should not be given on phone to unknown persons, shredding documents that containing personal detail after use and so on. But these protection rules only addressed offline identity theft, the issue of online identity theft or frauds which common to credit cards were not addressed at all. b) Business Information system (Technology, Development Management) Paul, et al The book looks at the issues of identity theft, brand abuse and costs of identity theft. The three issues discussed are equally paramount important to this research. The book is good for academic and well referenced. According to the book, â€Å"the term brand abuse is used to cover a wide range of activities, ranging from sale of counterfeit goods, for example software applications, to exploiting a well known brand name for commercial gain. It was further stated that with regards to identity theft, CIFAS(www.cifas.org), a UK-base fraud prevention service, report that there were 80,000 cases of identity theft in the UK in 2006.The coated in the companys web site showed that identity fraud cost UK economy  £1.5b in 2005 and generates a revenue of  £10m each day for fraudsters. c) Identity theft literature review- Graeme, R.N Megan M.M It is a well written article and equally well referenced. In this article, the authors focused on two important issues, the first one is the cost of identity theft while the second one focuses on the issue of legislations. The two issues discussed are very relevant to this research. The authors look at various identity legislations passed to control the crimes of identity. (www.house.gov/apps/list/press/ca29schiff/062304idThef2.html). d) Enquiry in to the credit card fraud in E- payment- Jithendra, D. Laxman, G In this article the authors look at credit card Hacking and types of credit card frauds. This article is not well referenced and authors failed to proffer adequate solutions at end of the discussion. In my opinion, the article is much related to this research work but the sources of documents used to write the article cannot be easily traced because it is not properly referenced. However, it is very helpful reading in understanding the background of the topic. e) Identity theft and credit card fraud Sarah P. Miller Sarah Millers article examines the various tactics the fraudsters use to commit credit card fraud. Some of these tactics are; opening a new credit accounts, existed accounts hijacking, skimming tactic among the other. The article also looks at various ways of protections against credit card fraud and come up with some of security measures to guard against credit card fraud in our society. The article is appropriately written and very useful for this research. The source of the article is also quoted as http://EzinArticles.com/?expert=sarahp.miller . f) Improving response time of authorization process of credit card system- Humid, siti Hafizan Ab It is a journal of computer science published in February 1 2008. The journal discusses the issue of credit card authorization process. It also explains the pitfalls and benefits of credit card authorization. The journal is very briefs about the topic but all the salient points are well discussed. It gives a website as the only source but fail to give other reference. It is very pertinent to mention that the journal would have been a great assistant to the realisation of the objectives of this research work if it has been properly referenced but the beauty of this journal is that it serves as basis of understanding of the topic. g) 7 precautions that minimize the Risk of identity theft Jesse Whitehead In this article, Jesse looks at financial costs of identity theft and estimated it to be $50 billion. He further explains that researchers are yet to discover a precaution that is hundred percent guaranties against the risk of identity theft. In final analysis, Jesse recommends the following precautions to reduce the threat of identity theft in our society. One, he recommends that social security number should not be disclosed to anybody unless otherwise require by law. Secondly, it was also suggested that social security number should not be carried all about. Shredding all important documents immediate after use is strongly recommended and more emphasis should be placed on e- statements from our banks and credit issuers. It was also suggested that a strong password and pin should be created and printing of Driver licence number on our checks should be highly discouraged. The author gives this website as the source of article http://EzinArticle.com/?expert=jessewhitehead but no other reference available. It is very relevant to this project as important aspect of the topic is being discussed. 2.1 DEFINITION OF INTERNET According to Paul et al, â€Å"internet refers to the physical network that links computers across the globe†. From this definition, the interconnectivity of many computer devices all over the globe is done through the world-wide computer network known as internet. These computer devices store and transmit information like World Wide Web and electronic mail (e-mail) messages. There are other devices like mobile computer, pagers, web TVs that are connected to the internet. All these devices are revered to as host or end system. Both electronic mail and world -wide web are network application programs that run on host or end system. Like other internet units, end system run protocols that regulate the sending and receiving of information in the internet domain. Internet has two major protocols popularly called TCP (Transmission control protocol) and IP (internet protocol). Communication links like coaxial cable, copper wire, fibber optics or radio spectrum link end systems together. Data transmission rate of all these links are not the same. This transmission rate is known as bandwidth and is measure in bit or second. End systems are indirectly join to one and other vial routers and a router receives information from the incoming communication links and send it to its outgoing communication links. The IP defines the format of receiving and sending information between the routers and end systems. The path on which information is transmitted is called route or path. The internet then utilises packet switching which gives room for multiple communicating end systems to share a path of a path simultaneously. Connection of network to the internet needs to follow specific name and address and it must be run on the IP protocol. The arrangement of interconnection of the internet is from bottom to top. End systems is connected to local internet service providers by means of access network and this access network is refers to as local area network (LAW) or phone based access network. The local internet service providers are then connected to regional internet service providers. The regional internet providers will also connected to national and international internet service providers. This type of internet is called public internet. There are other private networks that cannot be accessed by public. It can only be accessed within the organisations and refer to as intranet. It also makes use of the same internet technology that public internet is using. Another way of defining Internet is to look at its infrastructural that offers services to distributed application. Internet provides opportunity to distribute application on its end systems to share data with each other. The application could be inform of e-mail, file transfer, remote login, and world-wide web and so on. Web can be ran over network apart from the internet but this does not suggest that web is a separate network, instead it is one of the distribute applications that make use of services offer by the internet. Both connection-oriented services and connectionless services are two services offer by internet to the distributed application. 2.2 GROWTH OF INTERNET Internet and computer networks began early 1960s. During this period, telephone was commonly employed as means of communication. This telephone network utilises circuit switching to transmit information from a sender to receiver and since then, internet continue to grow from strength to strength. There are a number of factors that contributing to this development. Financial analysts observe that costs, competition, demographic issues and customer service are the major considerations that make bankers to constantly review their internet bank strategies. It is the belief of these analysts that demand for internet banking products and services will continue to increase. But the major task facing banks now is how to ensure that the benefits of internet banking outweigh its costs and the risks. The strategies adopted by each bank to increase its market share and cost reduction vary from one bank to another. Internet is a platform through which customers access accounts and general informa tion. It gives customers information about various products and services offer by the bank. 2.3 RISKS OF INTERNET SERVICE There are a number of internet threats around business world today. The threat continue to increase as internet become more acceptable means of conducting online business transactions. As banks so heavily rely on internet to reduce costs, so also they become more prone to some risks. Few examples of these risks are as followings: a) Hacking Hacking involves attempting to gain unauthorised access to a computer system, usually across a network. Hackers only need limited programming knowledge to wreak large amount of havoc. The fact that billions of bits of information can be transmitted in bulk over the public telephone network has made it difficult to trace hackers, who can make repeated attempts to invade bank system. For instant, much damage could be done if people gain authorised access to banks network service. Hacker may gain access to banks internal network for two major reasons. It could be for monetary benefit which usually associated with identity theft where personal information as well as credit card details is obtained to perpetrate fraud. It could also come inform of malicious intent ranging from deletion of file, deliberate introduction of computer viruses into a system or forwarding vital organisations information to rival. Counter measure like dial-back security can be used to prevent this problem. It ope rates by requiring the customer wanting access to the network to dial into it identity themselves first. The system then dials the customer back on their authorised number before allowing them access. Also, system can have firewall to prevent unauthorised access into bank system. Firewall software is use to monitor and control all incoming and outgoing traffic to deny intruders gaining access to the information system. b) Malicious Code Malicious code like worms, Trojan horse program and viruses are written to penetrate a system in order to have access to confidential information or disrupting the bank network. Through the help of the code, Fraudster can enter the network of a bank without its knowledge and valuable information can be stolen in the process. This stolen information can be used to commit identity theft or fraud. This code attacks are very delicate in that they can replicate and spread themselves without human intervention. c) Intrusion This is a process through which an intruder has access to bank network. Usually, the intruders are employees of the bank who have gained access to the authentication information of a bank customer. Intruder could also be an external person who has acquires some skills to get the authentication information of the bank customer. When internal or external intruders have unauthorised access to bank network, vital information about customers can be obtained and later use to perpetrate frauds or commit crimes. To guard against this ugly incident, bank must restrict its employees to some areas of its network. d) Denial of services Banks nowadays rely on internet for effective communication within and outside organisations. In the process of communication, the bank is subjected to the risk of denial of services. Communication channels of the bank can be blocked, web page may be changed or the system employ to process online business transaction may be attacked. A denial of service attack is associated with an attempt by attacker to prevent legitimate users of a service from using that service. The situation forces the bank to close down services until everything return to normal. This kind of criminal activity was hardly experience until 1999 when the crime became cankerworms in our business environments. The effect of this criminal activity is very great most especially when bank so heavily depend on the internet for online business transactions. Huge amount of money could be lost to the fraudster through the attack. Attack on Amazon and Yahoo servers in the year 2000 was a good example. The servers of Yahoo w as engulfed with series of attacks and â€Å"The attack was estimated as costing  £ 300,000 in the lost advertising revenue alone† (Financial Time of November 17, 2000). Another popular of denial of service attack was witnessed in 2004. During this time, a group of fraudsters from Russian embarked on a number of denials of service attack on UK bookmaker. The attackers demanded for certain amount of money before they could stop the attack, but the organisation in question (bookmaker) was not ready to give them any money at that time leading to a great losses of about forty million pound. The effect was very terrible on financial position of the company that very year. e) Brand Abuse It involves sale of counterfeit goods like software application to exploit a well recognised brand name for commercial benefit. Fraudster can imbedded the name of reputable organisation into a bogus web page just to portrait the page as high rank one. People that search for this reputable organisation can be routed to the false web page where the counterfeit goods are sold. A lot of people have intention of buying genuine products and services but end up in buying counterfeit one through the brand abuse. The effect of this is that people pay high price for less quality goods and services. The brand abuse practice costs most UK organisations huge amount of money and cost continue to increase year in year out. People also are no longer sure that the goods and services buy over web pages are actually genuine one. Many people have been victims of counterfeit unknowingly but thinking that they have bought the original goods and services they intend to buy even at exorbitant price. f) Credit Card Fraud The use of credit card online has become a global phenomenal. This card is being use all over the world to make payment for goods or services purchase on internet, retail shops or restaurants. The proliferation use of credit card online makes the users expose to various forms of risks. The risk could be in form of using peoples personal information to open new accounts, hijacking existing accounts. g) Opening of new account After important details like name, date of birth, social security number is obtained, the fraudster can pretend to be another person in order to create new lines of credits. The victims name can be used to secure credit cards and it may not be known to victim that someone has taken credit card on his or her name. Some people in many cases get to know when they receive calls from debt collectors or when they apply for loan and it is not granted due to bad credit rating. Many people have been forced to pay debt they didnt actually own through this process. h) Hijacking account Hijacking existing account is another method use to commit credit card fraud. Existing account can be hijacked by altering important details of the victims such as personal identification number, passwords, billing or mailing address. The purpose of this is to take perfect control of someones account illegally. The original owner of the account may find it hard to regain the control of the account. Even if they regain the control, fraudsters might have wreck serious havoc on financial reputation of the original owner of the account. It takes victims some time and money before they could clear their names from this mess. i) Skimming It is very common in the restaurants, stores or automated Teller machine. Skimming is done through the use of palm-sized card -reading devices. This device is capable of swiping credit card information. It is very delicate in that it may not be noticed until the victims witness unsolicited charges on the statement account of their credit cards. Many of these devices can be planted into Automated Teller machine slots or strategic locations that are not visible to the people. The aim and objective of doing this is to illegally capture important details of targeted victims. The details collected through this method can be used to perpetrate frauds on customers accounts or use to commit crime in the name of the victims. j) Phishing Phishing is another method that thieves use to lure people to supply their personal information through false e-mail and web sites. Customers may receive bogus electronic mail through a web site telling them to update their details. The web site may look like that of normal bank they use to visit. But when they access this web site, their account numbers and passwords will be demanded for. Both password and account number are collected through this method and later use to siphon money from customers accounts or credit cards. Barclays Bank and some highly reputable organisations were a victim of the crime in 2003.This method of stealing is hardly to detect because the e-mail and web site are made so similar to that of original banks. The only preventive measure is for the banks to educate their customers to ignore such e-mail whenever they receive it. Although this will not totally wipe out the crime because many online customers will still respond to such e-mail but additional measur e like authentication which involves adding an extra field to a record with the contents of this field derived from the remainder of the record by applying an algorithm that has previously been agreed between the bank and customers will go a long way in countering this crime. Multiple passwords can also be employed to counter the problem. Furthermore, there are many more of internet threats around but this research work will focus majorly on identity theft and card authorisation. 2.4 IDENTITY THEFT According to available information, identity theft and identity fraud are not new crimes. Both have been in existent for a while and continue to be among the fastest growing crimes in the UK. These two crimes can be perpetrated without a thief even burgling into your home or have physical contact with your computer system. The problem is likely to get even worse because of economy recession that grips all the nations. Information gathered from banks reveal that insurance fraud is increase by 17% and identity fraud seems to be following the same pattern. If bank customer identity is compromised he or she may find it hard to have good access to a loan, credit card or mortgage until everything is resolved. We are all victims of these crimes. We eventually pay highest prices in shops, highest interest rate on mortgages and higher premium on our insurance policies for no other reasons than this problem of fraud. Government and corporate individual organisations have been making frantic efforts to reduce these crimes. But in spite of all these efforts, the rate of identity theft and identity fraud are yet to reduce and number of victims of these crimes are also increasing on alarming rate. According to (UK payments, the UK trade association for payments, 2008) card fraud losses total  £609.9m, online banking fraud losses  £52.5m and cheque fraud losses  £41.9m. Furthermore, of identity fraud in 2007 was quoted to be 65,043 according to CIFAS, the UKs fraud prevention service. The 2003 survey of Federal Trade Commission (FTC) indicated that about 3.25 million Americans had lodged complaints that their personal detail was illegitimately used to get credit cards, obtain loans, rent apartment, and enjoy medical facility and some time use to commit crimes. Also, more than 5 million Americans were victims of credit card frauds where personal detail was used to obtain lines of credit and twent y five million plus have been victim of identity theft. WHAT ARE IDENTITY THEFT AND IDENTITY FRAUD THEN? Identity Theft is situation where by an individuals personal information or confidential detail is steal by another person without their knowledge. But Identity fraud is committed when thieves use this information to secure credit, goods or other services in the name of targeted victim without his or her knowledge. Another definition describe identity theft as â€Å"anyone who knowingly transfers or uses, without lawful authority, any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual with the intent to commit or aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law† (1998 identity Theft Act, U.S public Law 105-318). 2.5 REASON FOR IDENTITY THEFT FRAUD Reports so far on various form of identity thefts indicated that fraudsters commit identity theft for a number of reasons. But the most common one are: a) Concealment Many people commit identity theft simply because they want to cover their past criminal records. Some people in the past have committed one crime or the other and want to cover them to avoid arrest. A very good example of this scenario was that of September eleven terrorist. â€Å"All 19 of the September 11th terrorist were involved in identity theft in some way† (Willox and Regan 2002) many people were wrongly arrested because their identities have been stolen. Also, a number of people commit identity theft because they want to hide their bad financial records which denied them access to essential banks products or services such as bank loans, mortgage, account opening or credit card. In some situations, identity theft can be committed to avoid payment of existing debts. These type of people may want to enjoy normal life again and the only way they can achieve this is to masquerade themselves under the identity of another person. The effects of these criminal activities are t hat warrant arrest and prosecution may be issued in the name of victim customer. b) Financial benefit Investigation conducted from various banks indicated that many fraud cases reported in the recent past revealed that people committing identity theft for financial gain. In some cases, thieves steal personal information of innocent persons to open a line of credit cards accounts. Along the line many goods and services can be purchased in the name of targeted victims. In the same manner, details of another person can be used to secure loan from bank and account abandon later after fraudsters might have make a lot of money from the accounts of victims. A friend narrated his experience where fraudster obtained his personal details to secure a loan of about  £10.000 from a commercial bank without his knowledge. The fraud discovered some months later when he received a letter from the bank that sum of  £10.000 plus accrued interest is due for payment in his account. The fraudsters have used his identity to have illegitimate financial gain. The case took him some legal battles and time before he could exonerate himself from this mess. c) Revenge Many banks have witnessed identity theft through the activities of their employees. Some employees of bank may collude with fraudsters to steal details of customers as retaliation to the termination of their appointments or the bad treatments they received from their employers. In this process, valuable banks information may be sold to competitors leading the bank to various litigations and financial lost. Also the reputation of the bank may be seriously damaged. The effect of this is decline in profits and low patronage of the customers. 2.6 TYPE OF IDENTITY THEFT Many Bank customers have been victims of identity theft by one way or the other and type of identity will largely depend on the definition giving to it. But the most prominent one is credit card. Information available reveals that credit card fraud on internet has been seriously increase due to the opportunity offered by new improved internet technology. Apart from credit card fraud, there are other types of identity theft such as extortion, phishing, financial scam, avoiding arrest, organized identity theft and many others. a) Extortion Fraudsters have many ways of extorting money from banks and customers but the two common one are cyber squatting and the threat of leaking customers information. Cyber- squatting, this method of extortion related to registering a bogus internet domain to

Tuesday, November 12, 2019

Japanese Occupation Affect Nationalism in Indonesia

Assess the impact of the Japanese Occupation on nationalism in Indonesia â€Å"Nationalism† is generally defined as the increasing desire in people to determine their identity, existence and destiny for themselves. For the Netherland Indies, nationalism movement can be traced back to around 1900, which finally led and gave rise to a new nation, Indonesia. Nonetheless, it is important to acknowledge that nationalism movement existed prior to the Japanese occupation and therefore should not be consider a turning point that altered the entire landscape of nationalist movement in Indonesia.In addition, the Japanese’s brutality and cruelty could have potentially hindered the progress of nationalism, as they were primary driven by their self-interest in war efforts. This paper will attempt to argue how the Japanese Occupation acts as a catalyst that sped up nationalist movement led by pre-war nationalist leaders in Indonesia, eventually paving the way for its independence. In the initial stage of the occupation, the Japanese was determined to exploit the resources and not make any political concessions to Indonesian nationalism.The first attempt at such mass propaganda without major Indonesian nationalist leaders turned out to be a comprehensive failure. From its launch in March 1942, the Triple A movement that consist of the slogan that Japan as the leader of Asia, the protector of Asia, and the light of Asia, did not gather much support from the local. In general, the Triple A movement did not achieve its objective as few Indonesian Nationalist leaders were involved and the propaganda was too heavy-handed even in those days of early occupation for the locals to take it seriously.Therefore, it was only because the Japanese needed the help of the locals to aid war efforts that led them to give political concessions to nationalist leaders. Having failed to get anywhere by making no concession to nationalism and with increasing new doubts among the Japane se about the outcome of the war, the Putera — Centre of People’s Power (Pusat Tenaga Rakjat) was formed in March 1943. The Japanese selected nationalist leaders who had been imprisoned or ignored by the Dutch.They were resigned to the fact if they were to rally the masses of Java, the Japanese would have to use the leading figures of pre-war nationalist movement such as Sukarno and Hatta. The Japanese implementation of a simplified Malay language, Bahasa Indonesia, to replace the 250 languages and dialects used in the Netherland Indies it became the main lingua franca which significant in fostering a common national identityWhen they first took control of Indonesia, the Japanese decided to ban the use of Dutch language with immediate effect.Throughout the country, the locals started to see themselves as true modern nations rather than a mixture of rival religions, languages, cultures and races. This greatly galvanise nationalist effort, as it was easier to reach out to masses comparer to before under the Dutch rule. Under the Japanese Occupation, political boards were formed and nationalism was encouraged by the new regime as the Japanese mobilized the whole population for the war effort. The Japanese utilized Sukarno, along with the other nationalists, in order to unite the Japanese and Indonesian causes.While the Japanese military authorities were wary of giving Indonesians too much license, they recognize that they could not maintain their position by force alone. Hence, The Japanese give positions of responsibility to nationalist leaders like Sukarno and Hatta who had previously been imprisoned by the Dutch, and afforded the nationalist movement new scope for development (Vickers, 2005). Even though the original intention behind this move was to achieve Japanese war aims, such opportunity was never allowed under the Dutch Colonial rule.Therefore, Sukarno who was enlisted by the Japanese to help them govern the country seized every opportunity to educate the masses and indoctrinate nationalist consciousness into the masses. Sukarno was a crucial figure that contributed to the rise of nationalism in Indonesia. His eloquence at political rallies was instrumental in spreading the message of freedom across a diverse Indonesia, galvanizing them to set aside their differences to united and oppose against their colonial masters.This can be reinforced by the account of Hideo Fujiyama, who decided to desert the Japanese Army and remain in Indonesia to fight along side the nationalist army. He was primary motivated by Sukarno as he recalled the reason that inspired him to make the decision was listening to Sukarno’s speech at a mass rally on September 19th, 1945 in Jakarta. He described Sukarno’s speech to be â€Å"so energetic and impressive† which resulted to him â€Å"being moved† and led him to join Indonesia nationalist movement military.Therefore, the Japanese Occupation gave Sukarno the platform to reach out to the masses as his eloquence and inflammatory speeches managed to convince them to participate in his nationalist movements. The Japanese administration gave nationalist’s opportunities to become involved in government in ways that they had never known before under the Dutch rule. These opportunities include the access to experience and connections, which were later proved to be highly effective.In particular, nationalist usually came to control many propaganda activities mounted by Japan, including publication and circulation of newspapers such as Sumatra Sinbu (Sumatra News), radio broadcasts, mass instructions, films and meetings. Under the networking and communication capacities offered by such propaganda bodies as BOMPA (Bodan Oentoek Membantu Pertahanan Asia- Bureau to Assist in the Defence of Asia) in East Sumatra, nationalists were able to develop and spread popular understanding of the idea of Indonesia through the layers of indigenous society.For the first time in decades, the masses, and not just alienated urban activists and intellectuals became continually engaged in political activity and thus, accelerated the fervor of nationalism throughout the country. The Japanese Military also help set up the formation of volunteer army, PETA (Pembela Tanah Air- Defenders of the Homeland) and provided the large number of officers and soldiers with military trainings and weapons. Few Indonesians had been given officer training by the Dutch, and they were always under the Dutch commanders.This military training was instrumental to nationalist movement as it allowed them to be better equipped in the battle with the colonial masters between 1946-1949 when the latter tried to return and reassert their authority. It was not only the military training in PETA, but also the specific ideological training in the institute which emphasis on discipline and loyalty to country that awakened the national consciousness of the young men who enlisted int o the volunteer army.Nonetheless, it is important to acknowledge that the Japanese who set up PETA had their own interest in mind as they were planning to use PETA for costal defence against allied troops. They knew the limitations of PETA, and understood that they were not able to withstand a full-scale allied onslaught. Therefore, PETA was used to delay the enemy’s advance by deploying along the coastline and obstructing an allied landing or harassing the rear wherever the allied troops might come, thus allowing time for the Japanese army to retreat.For that reason, PETA soldiers were distributed throughout the island and were requested to remain in respective region, where they had intimate knowledge of the terrain. At the end of the war in 1959, the Indonesian government had as many as 500,000-armed fighters at its disposal. Therefore, PETA greatly strengthened nationalism efforts and represented potentially the most effective legacy of the Japanese period in both ideolog ical and structural terms. This paved the way for the formation of the nationalist army after the Japanese Occupation to fight against the returning Dutch colonial master.However it is also important to acknowledge that the Japanese Occupation had detrimental effect on nationalism in Indonesia even though they allow political concession for nationalist leaders to reach out to the masses. As the Japanese were primary driven by self-interest, they were not willing to compromise war efforts in order to accommodate nationalist movements. This can be seen in their brutality towards locals, the deliberate fragmentation of Indonesia into three divisions and the Romushua program of forced labour.By splitting Indonesia into three jurisdictions to be controlled by different divisions of Japanese military forces, nationalism in Indonesia was greatly disjointed. The three divisions consist of Java who was controlled by the 16th Army, Sumatra under the 25th Army and the rest under the 2nd Southe rn fleet. These became various political units with tight Japanese control together with separate administration. The notion was to ensure that any nationalist aspiration from Java to the outer islands was strongly discouraged.As a result, political activities tumbled to an all time low as from March 1942, all political activities were disallowed and all existing associations were thus dissolved. This resulted to breaking the unifying development of Batavia as Indonesia’s centre, which the Netherlands had emplaced over the years and thus compromising the idea of Indonesia as a single nation. The Romusha program was a mandatory forced labour implemented by the Japanese to aid them in their war efforts. This initiative destroyed stability and order within Indonesia and greatly hampered nationalist movements.The Romusha normally consists of peasants from the poorer region of Central Java. They were forced by various means to contract themselves to work on military construction p rojects. Many of them were sent away from their homes such as Sumatra, and even away from their countries to Brunei, Siam and eastern islands. The Japanese often treated them with extreme brutality and cruelty. Even after the war, only a small handful out of the estimated 500,000 who were mobilized to work outside their hometown managed to return back home.Amongst these people were ordinary Javanese like Sarmann Praptowidjojo, who were forced to slave on the Burma railway. Originally from Surakarta, he had been a railway worker in Surabaya before being sent to Singapore and then on to Thailand to work on the railway, where he witnessed the destruction of the bridge on River Kwai. He and his fellow Javanese worker saw those around them dying initially at the rate of three a day, den five, then ten. Even though Savramn survived, he joining the thousands who did not return to Java after the war, preferring to marry and live in Bangkok.The Romusha program hinder the progress of national ism movement as almost every echelon of the Indonesia social class was forced to comply by the Japanese to assume responsibility for the program such as organizing recruitment at village level, by propagandizing at higher levels, or simply by doing nothing to obstruct the program. Village chef and district officers in charge of running the program compounded its effect by designating the Romusha service in rural society they dislike or fear. Despite the political concessions given to nationalist leaders, the Japanese treated the locals with great brutality.Apart from the Romusha program, there was a botched biological warfare experiment in 1944 carried out by the Japanese. Between 5000 to 10,000 men from a group of Romushua forced labourers held on the outskirts of Jakarta, awaiting shipment outside Java, died writhing in agony from injection of tetanus. Japanese scientist had prepared the lethal vaccines to see what their effects would be. This further reinforces the idea of Japane se brutality and cruelty towards the local. Therefore, we see how Romusha’s domino effect on the masses greatly hampered nationalist movement in Indonesia.Even though the Japanese provided military training and platforms for nationalist leaders to reach out to the masses, it is too sweeping to label the occupation ‘a turning point’ in the history of nationalism in Indonesia. This is the fact that nationalism movement such as the Indonesian Nation Party (PNI) existed way before World War II, and Japanese occupation merely provided nationalist leader a platform to reach out to the masses and this in turn strengthened the nationalist movements. Nationalist sentiments were already common in the 1930s despite the Dutch colonial master clamping down hard on nationalist leaders.A key moment which highlights the growth of nationalist consciousness came in 1928, when the the All Indonesian Youth Congress proclaimed its pledge, establishing goals of one national identity ( Indoneisan), one country (Indonesia) and one language (Bahasa Indonesia). The emergence of Indonesian Nation Party (PNI), led by the young and rising Sukarno was rapidly becoming one of the most powerful nationalist organization (Vaisutis, 2007). PNI brought all non-communist nationalist groups under its umbrella to unify them as one.Nonetheless, there were limitations on nationalist movement prior to the Japanese Occupation. First, the emphasis on unity for the sake of the struggle meant that almost no attention was devoted to discipline, creative and accommodative thinking about the form and content of the free Indonesian state which nationalist leaders wished to create. Second, the over-emphasis on unity, together with the fiercely competitive and highly personalized world of elite Indonesian politics, effectively meant that no serious efforts were made to build bridges and create political compromises.Thirdly, political leaders of the 1930s used strikes and revolutionary languag e to challenge Dutch rule but they did not have strong enough organizational vehicle to spread their actions. Once there was a problem in their individual nationalist group, there was no longer a sense that one was able to move in and out of various groups and body. People had to give their exclusive loyalties as members of parties. The consequence of this was a splintering of the nationalist effort.Nonetheless, the Dutch recognizes the potential influence and threat to their authority and subsequently jailed Sukarno in 1930. Therefore, we see how nationalism existed way before Japanese occupation, and nationalist leaders eventually seized the opportunity under the Japanese Occupation to spread nationalism throughout the country. In conclusion, this paper argues that Japanese Occupation acts as a catalyst that sped up nationalist movement led by pre-war nationalist leaders such as Sukarno that eventually paving the way for its independence.Prior to the Japanese Occupation, there was subsequent number of problems that hindered nationalist efforts as political parties were full of conflicts and disunited. In addition, the Dutch clamped down hard on radical leaders and would imprisoned or exile them from Indonesia. Therefore, it was due to the Japanese occupation that provided a platform for nationalist leaders to reach out to the masses. In addition, the Japanese provided political concessions and military training which were instrumental in later years with the Dutch.However, it is too myopic to label the Japanese Occupation as a turning point in the history of Indonesia’s nationalism. This is due to the fact that nationalism was already active with the formation of the PNI and other nationalist groups. Also, the Japanese Occupation had the potential to greatly hamper nationalist efforts with own self-interest if not for Sukarno skilful manipulation and eloquence that steer the masses towards his nationalist cause. Thus, this paper will reinforce the sta nd that Japanese Occupation act as a catalyst toward nationalism in Indonesia.

Sunday, November 10, 2019

Chicago Alternative Policing Strategy Essay

â€Å"Community policing is, in essence, a collaboration between the police and the community that identifies and solves community problems† (U. S. Department of Justice, 1994, p. vii). Throughout the years, community policing has become a more popular strategy to help law enforcement officials control and deter crime; however, some areas across the United States has had problems in the past with communities and law enforcement working together to ensure a secure and safe environment. Although it is an officer’s duty to maintain order, keep the peace, and solve problems within the area he or she is patrolling, it is also necessary for the people of the community to come together to help prevent crime. Everyone wants to feel safe in his or her place of dwelling and know that he or she has individuals who will serve and protect the area. Ergo, when problems occur between law enforcement and communities, the citizens develop a stigma against law officials and do not want to help solve or prevent criminal acts. On the other side, when law enforcement officials develop a positive rapport with the community, the citizens are more likely to come forward to help solve crimes or problems that evolve within the neighborhood. Community policing is a necessary program to have within a community and many neighborhoods have adopted these programs. The Chicago Police Department is one city that knew a community-based program was a necessity to solve criminal problems within the neighborhoods of the city. In 1993, the Chicago Police Department implemented the Chicago Alternative Policing Strategy (CAPS), which is a community-based program that helps solves neighborhood crime problems with the collaboration of community members and law enforcement officials. According to Office of Justice Programs (n. d. ), â€Å"The program began in five policing districts but expanded to encompass the entire city of Chicago after a testing phase. Program development included the collaborative efforts of each district’s commanders, senior department executives, and ivilian planners† (para. 4). The underlying goal for CAPS is to solve problems within a community instead of reacting to their symptomatic consequences. This program has a five-step process for police officers to follow to ensure that the community and law enforcement agency works together to control crime. For this program to work effectively, one must identify and prioritize the problem at hand, analyze the situation, organize a plan to handle the problem, implement a strategy, and evaluate the outcome (Office of Justice Programs, n. . ). If the outcome is not effective, changes are set in place to correct the mistake and move forward by working together as a team to solve future problems that may arise. Furthermore, the CAPS program has an assortment of tactics, which include officers who patrol the neighborhoods, community meetings that involve the residents and law enforcement officials, training programs for both parties, city services, and technology to help identify the criminal hot spots in the area (Chicago Police Department, 2008). This program allows the officers to continue to patrol and handle their daily duties as well as work together with the community and other city officials to fight crime in one of the most notorious criminal cities in the United States. The Chicago Police Department works in teams for this program to be effective. One team will concentrate on the community and preventing crime, whereas the other team will handle the lower priority issues as well as respond to calls. The program splits the law enforcement officials into teams, which are beat officers, rapid response officers, and other city agencies. The beat officers patrol a certain area for at least a year, which allows each officer to know the neighborhood as well as the residents. This allows the officers and the residents to form a bond with one another and build trust between both parties, which allows them to work together as a team to monitor, strategize, and solve problems within the community. The rapid response officers assist the beat officers on emergency calls as well as back up the beat officers while they are in their community meetings. Undercover and gang officers help the beat officers on solving crimes and detaining suspects. With the collaboration between the law enforcement teams and the citizens the Chicago Alternative Policing Strategy and proven to be a successful weapon to fight crime. In addition, the success that has come from the implementation of the Chicago Alternative Policing Strategy only hows that in the future it will become more successful. This program has helped improve the residents’ confidence that the police are there to help combat crime, to ensure the community is a safe place to live as well as a reduction in major crimes. â€Å"Evaluations of the alternative policing strategy in Chicago show that from 1993 to 2002, the fear of crime went down by 20% among groups most fearful of crime and victimization† (University of Ottawa, n. d. , p. 1). This is only one benefit that has come about from this program, so with the bond between law enforcement and residents of the communities becoming stronger daily, this program has a bright future on helping prevent and deter crime. Although many neighborhoods adopt community-policing programs, not all are successful in controlling crime. Some communities adopt these programs believing that it will evolve into a successful program were police and residents work together; however, not all programs are effective. For a program to be successful, each party, such as law enforcement officials and residents must work collaboratively through the entire process, which is to identify, implement, and resolve the issues at hand (Chicago Police Department, 2008). Community-based programs are constantly developing throughout the nation and with communities, adopting programs like the Chicago Alternative Program Strategy, community policing has the potential to be successful in any city or state.

Friday, November 8, 2019

Treaty Of Versailles Essays - Treaty Of Versailles, Interwar Period

Treaty Of Versailles Essays - Treaty Of Versailles, Interwar Period Treaty Of Versailles The Treaty of Versailles was intended to be a peace agreement between the Allies and the Germans instead it created political and economic chaos in Germany. By the end of the first World War, Germany had surrendered and signed a peace agreement. The task of forming a peace agreement was now in the hands of the Allies. In December of 1918, the Allies met in Versailles to start on the peace settlement. The main countries and their representatives were: The United States, Woodrow Wilson; Great Britain, David Lloyd George; and France, George Clemenceau. It had seemed that making peace agreement would be easy. Once they started, the Allies began having different ideas about the wording of the Treaty of Versailles. The Allies found themselves in another battle. The Peace Treaty of Versailles represented the results of hostility and revenge and opened the door for a dictator and World War II. When World War I began there was no question that the United States would remain neutral. The United States, President Woodrow Wilson didn't want to enter the European War or any other war for that matter. (Watt, 439) As the war continued, it became obvious that the United States would no longer sit on the sidelines. German submarines had sunk American tankers and the British liner, Lusitania, killing almost twelve hundred people, including 128 Americans.(Watt, 400) This convinced Wilson to enter World War I, on the allied side. As the war continued, Wilson outlined his peace program, which was based on fourteen main points. Wilson was more interested in peace than capturing German colonies. As the Allies began discussions of the peace treaty, the European allies rejected Wilson's ideas and reasoning. Soon the allies were seeking revenge and Germany was to be hurt economically and socially by its enemies. Britain and Germany were always rivals. Before the war, Germany challenged Britain's famous powerful and unstoppable navy by increasing the amount of money spent on their navy. Britain paid thirty-six percent of the debt incurred by the allies and seventeen percent of the war's total casualties. After the war, Britain faced tough economic problems. Their exports were at an all time low due to outdated factories, high tariffs, and competition from other countries. Britain suffered from high unemployment, which affected the well being of the country. The Treaty of Versailles would provide an opportunity to seek revenge for their losses. They also wanted German colonies in Africa. As Britain, France had a rivalry with Germany but the French's ill feelings were even more intensive. Nationalism created tensions between France and Germany. The French resented their defeat in the Franco - Prussian War and wanted revenge. France was determined to take Alsace Lorraine. This gave the French the motivation of increasing their military strength and ultimately, destroying their life-long enemies. After the war, France suffered terribly, economically. Inflation and a deflated French Franc encouraged the French to take advantage of the peace settlement. France wanted revenge as well as security against any future German attack. France also wanted a huge amount of reparations, and the return of Alsace Lorraine. All the leaders had different opinions and motives regarding the Treaty of Versailles. Coming to an understanding was difficult. The Treaty had to be revised several times before the final copy was signed on January 18, 1919. There was scarcely a section of the treaty which was not attacked, just as there was scarcely a section of the treaty which was not attacked.(Watt, 110) The German's did not want to agree to such harsh terms. France and Britain wanted revenge on Germany but wanted each other's benefits. Clemenceau pointed out that the British were making no effort to placate the Germans at the expense of British interests. They offered no proposals to reduce the number of German ships to be handed over, or to return Germany's colonies, or to restore the German Navy, or to remove the restrictions on Germany's overseas trade. Instead, it was always at the expense of French interest that concessions were to be made. Wilson thought both France and Britain were being too mean and unr easonable. The allies used Wilson's Fourteen Points program to convince Germany to sign an armistice. However, once

Wednesday, November 6, 2019

Paint a face on the Audiences of Outdoor Magazine and PC Photo Magazine

Paint a face on the Audiences of Outdoor Magazine and PC Photo Magazine Writing for a specific magazine, the writer should take into consideration many important details that will make it possible to create the article interesting for the readers. In other words, the writer should direct his writing on a particular audience. For example, writing for a professional magazine, the writer will choose topics relevant to the subject and use specific terms.Advertising We will write a custom essay sample on Paint a face on the Audiences of Outdoor Magazine and PC Photo Magazine specifically for you for only $16.05 $11/page Learn More In fact, there are many means used to attract and, what is more important, hold the reader’s attention. These means are the author’s language choice, tone of the voice, specific descriptions, example and details. All these means should be focused on the interests and knowledge of the target audience. Stark and Pitt are the writers who create articles for magazines with different audience. Cons equently, their articles cover the topics relevant to the target audiences and use voice and terminology that are understandable for the readers. However, how would their writings change if they switch audiences with each other? Thus, in order to attract and keep the attention of their new audience, the writers would have change the manner of representation of the material, terminology and voice of their articles. As it has already been mentioned, the author should focus his writing on the knowledge and interests of the target audience. Edward Jay Friedlander and John Lee in their book Feature Writing for Newspapers and Magazines: The Pursuit of Excellence say that, â€Å"writers, if they are to be successful, must learn not only to write in different voices, but also deliver the topics in a manner expected by readers† (76). In other words, the writer should define a target audience. Each magazine has a specific target audience. It can be a professional magazine, scientific, a magazine for teenagers, housekeepers or car drivers, etc. In each case, the writer should take into account. Thus, if the authors switch the audience, the first thing they should do is to correct the titles of their articles. According to the settled condition, the authors should make the topics of their articles interesting for audience of a different journal. Pitt would have to change the manner of presentation of the material, as a majority of the target audience of the Outside magazine would not understand the terminology applied to digital technologies. His article is aimed at teaching people work with Photoshop and some of its new versions. Thus, it presupposes that readers can use the program and knows the terminology, â€Å"we used Jasc Paint Shop Pro 8 for our example, but most photo imagine has the same or similar tools† (Pitt n. pag.). The readers of the Outside Magazine, who might be interested in the digital edit of the photography by themselves, hardly know th ese tools.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Thus, the author should introduce explanations for the terms and usage of the tools. Moreover, as the audience much of the context of the writing, the author might change the subject matter, for example, instead of editing human photo, he could suggest editing of the nature or animals pictures. Finally, he uses the first first-person voice, and then switches to the second-person voice to teach his readers. In case with the audience of the Outside Magazine, he must change the way of addressing to the audience. It should be less straightforward, as the majority of articles in the Outside Magazine are the stories that happen to people and look like literature stories. Thus, Pitt must change the tone of instruction to less straightforward, more get-to-know one and switch to the second or third voice. If Peter Stark writes fo r the PC Photo Magazine, he also must change many things in his article. It is very important to remember that: â€Å"The words in the text should reflect an author’s knowledge of the topic with the intent of informing the reader. Most authors not only want the information to be accessible, but also want to achieve their purpose by allowing the reader to â€Å"enter† into the text comfortably. Authors do this by making the word choice and language interesting, compelling, and appropriate to the audience’s knowledge level, age, and experience† (Medina 41). For him, it would be a bit difficult to attract the attention of people who are interested in the digital technologies, to the topic of his article â€Å"As Freezing Persons Recollect the Snow – First Chill, then Stupor, then the Letting Go†. Thus, the first thing that can be done is changing the title into more appropriate. For example, â€Å"What Should One Do if†¦Ã¢â‚¬ . The form of the writing should be changed as well. It should contain some instructions or helpful advice. The article should be written in second voice and include some conclusion, for example, some addition to the story after the experience. In addition, the terminology, such as â€Å"hypothermia† should be changed to more common words. Thus, we can come to a conclusion that the target audience of the magazine article, as well as other writings has a great meaning, and the writing interesting for one reader can be absolutely indifferent to other reader. If Pitt and Stark change the target audience of their articles, they will have to change many issues, such as title, examples, terminology, idea, voice, manner of representation of the material.Advertising We will write a custom essay sample on Paint a face on the Audiences of Outdoor Magazine and PC Photo Magazine specifically for you for only $16.05 $11/page Learn More Friedlander, Edward Jay, and John Lee . Feature Writing for Newspapers and Magazines: The Pursuit of Excellence. Harper Collins College Publishers, 1996. Medina, Conni. Successful Strategies for Reading in the Content Areas. Huntington Beach: Shell Education, 2007. Pitts, Wes. â€Å"Photo Exorcism†. Motives for Writing 5th Ed. Ed. Robert Keith Miller. Online Learning Center. Web. Stark, Peter, â€Å"As Freezing Persons Recollect the Snow – First Chill, then Stupor, then the Letting Go†. Motives for Writing 6th Ed. Ed. Robert Keith Miller. Online Learning Center. Web.

Sunday, November 3, 2019

Loyalty(Hotel on the corner of bitter and sweet) Essay

Loyalty(Hotel on the corner of bitter and sweet) - Essay Example Although both of them are victims of racial discrimination, they become very close and loyal to each other. In order to understand the role of loyalty in families and relationships, we will focus our attention on the different relationships between Keiko and Henry. First, loyalty as a base of confidence between or among members of a family. Being loyal refers to keeping confidence without fail. Amidst the commotion caused by blackouts, curfews, and raids by the FBI, Henry and Keiko were loyal to each other thereby creating a strong and confident bond of friendship. This resulted into a treasurable love which surpassed the partialities of their ancestors. The high level of loyalty between each other enabled them to create a strong bond of association which was unimaginable to their ancestors. Loyalty is also seen at the instance after Henry and her family were forcefully evacuated from the camps. Keiko and Henry clung on to the hope that they were going to see each other in future again. In that sense, loyalty was used to instill courage and confidence that even though the two were parting, they would definitely see each other in future. Similarly, Loyalty can also be used to shows obedience, honor and love that exist not only in families and relationships but between individuals and nations as well. For instance, When Kieko asked Henry whether he was Chinese, Henry nodded not knowing what she was exactly supposed to say. This is because although he was Chinese, he had stayed for long in America and therefore, he saw himself being a noble and loyal American citizen. They insisted that they were still â€Å"loyal to the United States of America† since they too were Americans by right (Ford 184). This act brings out loyalty as a sign of obedience an expression of honor for the country and an ideal act of pure love. This therefore implies that loyalty can be used to show obedience, honor and love not

Friday, November 1, 2019

Essay Questions Example | Topics and Well Written Essays - 500 words - 14

Questions - Essay Example The resultant turnovers are as a result of lack of low income growth that is contemporaneous and is not found in government change propensity that is also contemporaneously increasing. (Russett, Starr and Kinsella) Economic growth results to a middle class that is educated and entrepreneurial which soon or later strives for control over the country’s fate. This ends in the acceptance and giving in by the repressive government in place. The progression in most of the countries that are democratic is not pegged to economic growth after their democratization. Among democracies that are already existing and established, a high growth rate is as a result of stability as a result of liberal democracy. Greater prosperity alone doesn’t result to political freedom of a greater degree. However, the benefits of economic development are reaped through invasion of pressure to political control relaxation. The connection between liberal democracy that is emerging and economic growth lies in sophistication growth of authoritarian governments. Democracy has a minimal impact on economical success to countries that practice it. All the successes in economy are propagated under the political regime that is undemocratic. Many of them developed as a result of state capitalism and centralization which is different from economic liberalization. This is as a result of policy which directly achieves rapid growth in third world countries. This is done through the creation of protective tariffs around the country’s nascent ship-building and automotive industries. Economies succeed through economic liberation adoption, this process usually occurs under political system that is authoritarian. This type of system always associates to military coup in democratic overthrow of elected government. Democratic states that are developing are usually undermined by economic liberation. This is because of the