Friday, December 27, 2019

The Use Of Satire In The Canterbury Tales By Geoffrey Chaucer

Geoffrey Chaucer wrote The Canterbury Tales, using his characters as the mouthpiece for his iconoclastic views. Chaucer had serious issues with the hypocrisy of the church as well as, many other sacred institutions. The only reason that Chaucer was not exiled or even imprisoned for his views is the way in which he exposed them. Through the allegorical meanings of this text and Chaucer’s claim that he is simply retelling the events of his pilgrimage to Canterbury as it occurred, Chaucer is saved from extreme persecution. From the beginning of time there has always been issues with challenging the higher order; allowing people to make their own decisions and separate themselves from the way of the church often lead to death. In 1350 the†¦show more content†¦Chaucer’s most brutal attack was on the high ranking class and nobility, his use of satire allowed for him to make accusations of their lack of accountability for their actions. This concept was outlined in th e Wife of Bath’s Tale, where a young knight physically assaulted a maiden the instance was brought to a court of the king and the knight was then sentenced to execution. The queen, however, chose to spare the knight’s life if he was able to find what women desired most within one year. He returned to the court a year later and revealed that women wanted freedom more than anything, and in return he was forced to marry an old lady that revealed the secret to him. This was what taught him the ultimate lesson. The old lady made a deal with the knight, he could have her old and ugly, but loyal or he could have a young and beautiful wife that he could not trust; when presented with the choice the knight chose to let the woman decide. â€Å"The knight thought long, and with a piteous groan at last he said, with the care in life, â€Å"My lady and my love, my dearest wife, I leave the matter to your wise decision. You make the choice yourself, for the provision of what may b e agreeable and right in honor to us both, I dont care which; whatever pleases you suffices me.† (lines 374-381) The knight has learned that he cannot control his wife and have her love him, as a result of this revelation the lady changes herself into a loyal and beautiful wife. This lessonShow MoreRelatedGeoffrey Chaucers Use of Characterization Essay1308 Words   |  6 Pagesfame or shame. Geoffrey Chaucer, a pioneer of English Literature’s works carried mass appeal. His best known works appealed to those of all walks of life. Chaucer’s work resulted in mass appeal because it used many forms of characterization to present the characters to the reader. In Geoffrey Chaucer’s Prologue to the Canterbury Tales, Chaucer uses thoughts and actions, his word, and satire to characterize The Squire and The Wife of Bath. Geoffrey Chaucer is well known for his use of characterizationRead More Chaucers Canterbury Tales2103 Words   |  9 Pagesinto. Geoffrey Chaucer served most of his life in the employment of the crown, as both a soldier and a clerk. Yet through all of these titles, Chaucer would be forever immortalized as Geoffrey Chaucer the writer, and the Satirist. The true goal of any Satire is to point out the flaws in certain aspect of society, while also inspiring reform to that very same aspect in one way or another. In Chaucer’s Canterbury tales, Chaucer satirizes the corruption Catholic Church and those associated. Chaucer sawRead MoreCanterbury Tales Satire Analysis866 Words   |  4 PagesChaucer (A Discussion of Geoffrey Chaucer’s use of Satire in Canterbury Tales Directed Towards Church Hypocrisy, Class Nobility, and the Patriarchy) All well known, articulate speakers and writers throughout history use critical speaking techniques to rally support from those around them. One such tool is the use of satire in public speaking or writing. Satire is the combination of a poignant message along with sarcasm. Arguably the founder of Middle English, Geoffrey Chaucer was a mastermind inRead MoreThe Canterbury Tales By Geoffrey Chaucer1321 Words   |  6 Pagesread the Canterbury Tales? The story behind The Canterbury Tales is enhancing. Geoffrey Chaucer was a revolutionary writer whose life influenced his writing. Geoffrey Chaucer helped the king and stayed at his service for years. Chaucer quit the service to chase his ambitious dream of being a writer and a poet, and hoped to succeed. Chaucer wrote many stories and poems and his most successful and popular was The Canterbury Tales. His stories were revolutionary and successful. Geoffrey Chaucer s lifeRead MoreGeoffrey Chaucer View and Change on Judgement968 Words   |  4 Pagesorganization. Geoffrey Chaucer is one of these people, but he actually did something about it. He had problems with some social aspects during the 1300s which included the church, gender differences, and hypocrisy. He wrote about these problems in a set of tales widely known as The Canterbury Tales. The first is The General Prologue which describes a pilgrimage to Canterbury that many people endure, but on this specific journey, twenty-nine different people travel together to Canterbury. He uses two typesRead MoreThe Canterbury Tales By Geoffrey Chaucer897 Words   |  4 Pages Geoffrey Chaucer had done many things including being a son of a merchant, page in the royal house, soldier, diplomat, and a royal clerk. Being all thing thinks he has seen quite of the world which helped him write â€Å"The Canterbury Tales† and through this piece of work he did entertains us. We consider this as a masterpiece that provides the best contemporary. He wrote a collection of stories to make a political point. He died before he was done righting all of his poems and short stories. AlsoRead MoreUse Of Satire In Canterbury Tales1301 Words   |  6 PagesChaucer’s Satyric Attack (An analysis of Chaucer’s use of satire to reach his intended audience in his Canterbury Tales) Satire is defined as â€Å"the use of humor, irony, exaggeration, or ridicule to expose and criticize peoples stupidity or vices, particularly in the context of contemporary politics and other topical issues† (Oxford). Another term that people would be more familiar with to describe this would be sarcasm. Language can be utilized in a nasty way, especially when wanting to demoralizeRead MoreChaucers The Canterbury Tales1381 Words   |  6 PagesThe Canterbury Tales serves as a moral manual in the Middle Ages. In the tales, Geoffrey Chaucer portrays the problems of the society. For instance, Chaucer uses the monk and the friar in comparison to the parson to show what the ecclesiastical class are doing versus what they are supposed to be doing. In other words, it is to make people be aware of these problems. It can be inferred that the author’s main goal is for this literary work to serve as a message to the people along with changing theRead MoreExamples Of Corrupti on In Canterbury Tales1035 Words   |  5 Pagesand most powerful. In many of Geoffrey Chaucer’s The Canterbury Tales, Chaucer would use satire to criticize different social classes. For example, the middle class, those people who worked for their possessions. He satirizes religious hypocrisy in such tales as the Pardoner, in which a middle class man, showing the corruption of the Pardoner’s job. Through his description of the Pardoner as being a man who is disitful, greedy, and hypocritical, Chaucer uses satire to comment on corruption in theRead MoreFrame Characteristics In Geoffrey Chaucers The Canterbury Tales1119 Words   |  5 PagesThe Canterbury Tales, Chaucer uses frame narratives to incorporate the many stories of pilgrims. The author, Geoffrey Chaucer, also known as the â€Å"Father of English Literature,† writes these little stories to mirror his inquisitive language and use of cunning and satirical passion. The tale takes place in the fourtee nth century where the wealthy Catholic Church dominates the political scene of England. This story describes twenty-nine individuals who are going on a pilgrimage to Canterbury with

Thursday, December 19, 2019

Essay about My Sociological Perspective - 803 Words

Sociology is a part of everyday life. People experience sociological changes when they get married, get a new job, or get discriminated against. All of these things can alter a person’s perspective on a group of people or even the world. Since the beginning of this class, I have personally endured several sociological changes in my life. I recently started a new job. I’m meeting new and wonderful people and I no longer dread having to go to work. I have also begun setting plans for my wedding to the one girl who I know will make everyday better than the one before. But, perhaps the one instance that has affected me the most and the deepest was when my parents got a divorce. This is something that occurred over ten years ago but it†¦show more content†¦If there was anything that I valued as a child, it was the togetherness of my mother and father. Due to the fact that my father was now on his own and trying to raise three children (my older brother from my father’s first marriage), he had to take a different position at his work. Although he was getting a raise it wasn’t necessarily a good thing. He had to start working the night shift so he could get the raise. He didn’t really have a choice in the matter and because of this new change, I began to lose valuable time with him as well. It was now up to my brother to watch over us at night and make sure we got to bed on time. If there was any trouble or and problems in general, my brother would call my grandmother. For three years my dad worked that job and every night he would stay up after he got home to see us. He would make my sister and I breakfast and make we were off to school on time. This meant the world to me because no matter what he always made time for us. Now, it will soon be my turn to make the same vows my parents once did. However, I will not make the same mistakes that they did. After seeing what divorce did to my family, I will never even utter that word when I have my own. My children will never experience the pain and agony and shear despair that I had to go through. Although it has been ten years, I still hurt. WhenShow MoreRelatedEssay on The Sociological Imagination1389 Words   |  6 PagesMy personal condensed definition of â€Å"the sociological imagination† is that it is the idea one should be aware of the societal structures around themselves, and how those structures can influence a person and vice-versa. In addition, I think that having a â€Å"sociological imagination† also involves a deep appreciation for the importance of society and culture. Consequently, for a person that has completed a basic introducti on to sociology college course and actually paid attention, I would hope thatRead MoreSociological Perspective On The And Mate Selection1597 Words   |  7 Pagespossesses strong sociological perspective however would argue that the decision of marriage is largely influenced by factors from the world around them. More specifically, sociological perspective is the point of view that examines how institutions such as the government or mass media, cultural norms and beliefs, and social hierarchies such as race or ethnicity influence the lives of individuals (Mills 2013:3-4). It can also be explained as the opposite of an individualistic perspective, which is theRead MoreLiving As Woman And A Muslim Essay1235 Words   |  5 PagesMuslim in America The term sociological imagination was a concept constructed by the American Sociologist C. Wright Mills in 1959 to describe the ability to understand how our lives are affected by the historical and sociological changes around us. In order to possess the knowledge of sociological imagination, we should be able to pull away from the current situation and be able to look and think from a different perspective. C. Wright Mills defined his concept of sociological imagination as â€Å"...theRead MoreBriefly Outline the Distinctive Features of the Sociological Approach to Understanding Human Life and the Illustrate How You Would Use Sociology to Make Sense of Globalisation.1554 Words   |  7 Pagesof the understanding of the human life. The aim of this essay is to outline the sociological approach to understanding human life , to explore the different sociological perspectives , to question the reliability of the different forms of research and to emphasise the key elements that make sociology different to other ways of exploring the human life. Finally I shall be illustrating its approach with regards to my biography. Peter Berger distinctive approach to understanding human life was characterisedRead MoreSociology Paper The Other Wes Moore 1356 Words   |  6 Pageshave been mine. The tragedy is that my story could have been his† (Moore, 2010, front cover). The Other Wes Moore is about two guys with the same name but end up going down totally different paths in life, hence the quote. In this paper it will discuss the novel, The Other Wes Moore, describe their social location, and describe the sociological perspectives used in sociology and analyze excerpts from the book using each of the three sociological perspectives. Social location is the combinationRead MoreThe Theories Of The Sociological Imagination976 Words   |  4 Pagesaround them. So, you may ask how the individual above can make sense of the complex world around them. The answer is simple by looking at the world like any great social analysts would. They do this through C. Wright Mills sociological imagination. To understand the Sociological imagination we first need to understand what the term means. It is the process of the mind which allows us to understand the relationship between our individual lives (personal experience) and the larger social forces (publicRead MoreSociological Perspective : The Sociological Imagination972 Words   |  4 Pageswe have and the behaviours of the people around us. These decisions and actions in turn have an effect or impact on the society. In this essay, I will explain the â€Å"sociological imagination† according to Mills, his distinction between personal troubles and public issues and analyse sociological imagination in my biography by showing how my dream of attending university is made a reality as a result of social or historic forces. C. Wright Mills, a sociologist in 1959 showed concerned and studiedRead MoreThe Role Of Religion And Sociological Perspective923 Words   |  4 PagesThe Role of Religion in Sociological Perspective Religion is a system of beliefs that many of us may not understand in detail. However, the intention of this paper is to describe the role of religion in my personal life, and to briefly explain the functionalist perspective, the symbolic interactionism perspective, types of religious groups, and religion in the United States with the sole purpose to understand religion concepts in a sociological perspective and my personal point of viewRead MoreMy Sociological Imagination And Push Myself858 Words   |  4 Pagesgreatly as a sociologist in that I have developed my sociological imagination and push myself to ask and answer the tough questions about society. Instead of simply taking aspects of our society for face value, I have begun to dig deeper and examine how and why we define differentiate developed and underdeveloped countries or how and why everything is becoming â€Å"faster† within society (fast fashion, fast food, etc.). The readings helped a great deal in my analyzing of society by given me models in howRead MoreThe Concept Of Sociological Imagination : Connecting History987 Words   |  4 PagesClaudia Rosado Professor Williams Sociology 3 October 2014 The Concept of Sociological Imagination: Connecting History to Biography C. Wright Mills believed that sociological imagination connects history and biography by means of cause and effect. Society and all things surrounding it have a particular interconnection when it comes to change. As a result, one major alteration to everyday society causes human relationships in history to adapt to change. History is altered by man, without human interaction

Wednesday, December 11, 2019

Debate speech free essay sample

To my fellow students, to my worthy, Mr. Moderator and to the board of Judges, ladies and gentleman a pleasant morning. I am the second speaker of the affirmative who strongly believe on the proposition â€Å" Resolved that K-12 Education system be abolished† based on the following contentions to wit: First, K-12 curriculum is a proposal of government that would add two more years to the secondary or High School level. So therefore, we have 6 years in grade school and another 6 years on high school. K-12 education system implemented in our country is a bad idea for me. There are too many glaring factors and reasons on why this is a bad idea at this time. First, Poverty. THIS is the most glaring issue here and THIS is the most popular reason. Majority of the Filipinos are having a hard time in balancing the budget for primary needs of their families. How about those parents who can’t afford very high tuition fees that seemingly increase year after year? Some people are even fighting neck-to-neck with one another just to get their kids to schools that are perceived to give quality education. We will write a custom essay sample on Debate speech or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Nowadays, it is very difficult to sustain quality education for a much younger member of the family. Second, Teacher’s Training and Interest. No matter how good the system is, it will just end up a failure if you are not putting the best and the most competitive. Given the current overall status of teachers in the Philippines, I think that they aren’t that prepared for an extended run. There is a positive side, because there will be more jobs generated for teachers. However, most of the teachers think that they deserve more than what they are currently being paid for. If a good teacher is just being paid at a low rate, then it is just another bad case of â€Å"Brain Drain†. Some of our teachers might just end up showing displeasure, and will find other ways to make a living instead. Furthermore, we will just continue to lose our best professionals trained in grassroots at a gradual rate. Then, Student’s Interest To Study. In a generation dominated by computer and online games, it is difficult to distinguish on whether students are actually reporting to classes or not. Despite the efforts of computer shops not allowing elementary and high school students during class hours, it seems that some rascals are finding ways on how they can have access to internet cafes just to play with one another. Some of our younger students may find learning disinteresting because they don’t like the subject or the teacher. Instead, they will just make some noise in the class by conversing with their classmates. Some students even don’t make their assignments on their own, and they â€Å"bully† or â€Å"pay† the smartest in their class by letting them do it. Some even cram to the max level days before the deadline of submission. Fourth, Private Schools Will Benefit†¦On the Business Side. We’re speaking about the money here. Some parents seem to complain about the meteorically rising prices of basic needs. Year by year, there has been an increase in tuition fees, especially in the â€Å"miscellaneous† ones. Schools and training centers not credited by DepEd such as home schooling institutions like Kumon might not benefit from their â€Å"business side† though. Imagine, thousands will pour in to their budget before a school year starts. Finally, F for Facilities I grade our educational facilities an F, and I can also think of many reasons. Here are the following: †¢Many schools have been washed away by typhoons. †¢Some schools are already prone to structural damages. Many schools even lack the basic facilities such as chalks, blackboard, etc. †¢Some families can’t even purchase textbooks and notebooks for children to use †¢The classroom-student ratio is at the ludicrously high 1:50. Some schools are even higher than that. It resulted into shortage of classrooms and lack of ventilation and proper spacing. †¢Some of our local textbooks might be misprinted and might contain wrong information. It can give our students a wrong perception about something that is discussed in class. †¢Some schools don’t comply to sanitary measures. Bathrooms aren’t clean enough for use. †¢Some school canteens lack supply of foods that keep children healthy. There are many problems in the Philippine education scene that needed much attention and long-term solutions first. Such problems are being addressed for a long time already. Build classrooms, improve teaching quality, renovate old schools, provide the necessary needs, or do whatever is needed to be accomplished in order for the quality of education to be restored. I’m not saying that K-12 system is totally a nixed idea, as it worked on our neighbouring countries. However, I strongly believe that K-12 will only work better if the overall quality of education here will be improved to a much competitive level first. The Philippine’s basic education is one of the shortest in Asia. Despite the short span of education, too many students are dropping out of school to help augment the family’s income. Poverty is seen as a major problem of the inability of Filipino students to finish a college degree. Adding two years in the basic education is considered additional burden by parents who are sending children to school. So once again ladies and gentleman I rest my case.

Wednesday, December 4, 2019

The Coalition Essay Prompts 2017-2018

The 2016-2017 college application cycle saw only 45 out of the 95Coalition for College Access (CCS)members launch applications on the platform, with the remaining on-boarding this summer. If you’re applying to college this fall, stay tuned for the announcement in May. In the meantime, check out the CCS 2017-2018 essay prompts that have already been released:PROMPT #1 Tell a story from your life, describing an experience that either demonstrates your character or helped to shape it. This prompt encourages the applicant to share an experience or an encounter that demonstrates personal growth. It could also be something that changed your perspectives or outlook on life. PROMPT #2 Describe a time when you made a meaningful contribution to others in which the greater good was your focus. Discuss the challenges and rewards of making your contribution. This essay prompt is perfect for students who are heavily involved in community service activities, or have consistently volunteered throughout high school. Of course, this isn’t limited to such applicants. Students can also reflect on occasions you stumbled upon that resulted in a meaningful contribution. PROMPT #3 Has there been a time when you’ve had a long-cherished or accepted belief challenged? How did you respond? How did the challenge affect your beliefs? Colleges want to see students’ thought process as they tackle this essay prompt. The belief that was challenge doesn’t have to be deep and philosophical, it just has to be something that you truly believe: whether that be equal gender rights, or a hotdog is considered a sandwich. PROMPT #4 What is the hardest part of being a teenager now? What’s the best part? What advice would you give a younger sibling or friend (assuming they would listen to you)? This might be the most personal college essay prompt an applicant can write. At first glance, it might seem too straightforward to talk about your teenage years, but it requires a lot of reflection and self-awareness. It’s a lot easier to praise and criticize others than it is to do so to yourself. PROMPT #5 Submit an essay on a topic of your choice. The freedom of being able to choose what essay topic to write on can be a blessing and a curse. Essay prompts provide applicants with guidance and indication of what admission officers want to know, and the lack of it can potentially cause applicants to wonder in their personal statement. But, for those who are interested in creative writing, this could just be what you need. A lot of the essay prompts that the CSS offer are similar to the options that the Common App have. The biggest difference between the two platforms is the word limit of the essays. The CSS recommends students to write an essay between300-400 words, while the Common Application has a650 word limit. Make sure you also check out the Common App 2017-2018 Essay Prompts! Familiarize yourself with the essay topic options as you go through the college research process, and stay updated with the colleges that are on the Coalition or Common App platform.

Wednesday, November 27, 2019

Porters Diamond in a Mexican Context free essay sample

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [emailprotected] org. . Springer is collaborating with JSTOR to digitize, preserve and extend access to MIR: Management International Review. http://www. jstor. org This content downloaded from 146. 50. 153. 8 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions mir SpecialIssue 1993/2, 41-54 pp. mir Illfftl lUllLuU Pftviftlif ll  © Gabler Verlag 1993 Richard M. Hodgetts Porters Diamond Framework in a Mexican Context Abstract used as a basis forexamining  ¦ The Porterdiamondmodelhas been widely This examines waysin which the international competitive strategies. article itself theU. S. economy a doublediamond. to via Mexico is linking cluste rs petrochemicals automobiles  ¦ The strategies Mexicosleading of and the within doublediamondframework. We will write a custom essay sample on Porters Diamond in a Mexican Context or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page re considered Key words to  ¦ A doublediamondmodelis alreadybeingused by Mexicancorporations bothcreateand sustaineconomic progress. Author at of is M. Dr. Richard Hodgetts Professor Strategic University, Management FloridaInternational Boca Raton,FL, U. S. A. March1992,revised received April1992. Manuscript mir vol. 33 †¢ Special Issue †¢ 1993/2 41 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Richard Hodgetts M. Porter Revisited Porters and diamondmodelis well-known bothresearchers practitioners. to In wayofreprise, modelis based on four and determinants the country-specific twoexternal variables. These include: 1. Factorconditions and cost of personnel; suchas: (a) thequantity, skills, (b) rethe abundance,quality,accessibility, cost of the nationsphysical and sources;(c) thenationsstockof knowledge resources; theamountand (d) cost of capitalresources and thatare availableto finance industry: (e) the and usercost of thenationsinfrastructure. type, quality, 2. Demand conditions such as: (a) the composition demandin the home of market: thesize and growth of thehomedemand;and (c) themechrate (b) anismsthrough whichdomestic and demandis internationalized pullsa nationsproducts and services abroad. 3. Relatedand supporting industries as: (a) thepresence internationally such of in indusindustries createadvantages downstream that competitive supplier tries and (b) or efficient, through early, rapidaccessto cost-effective inputs; and can related industries which coordinate share internationally competitive in activities thevaluechainwhencompeting thosewhich involve or products thatare complementary. . Firmstrategy, firms are and suchas: (a) thewaysin which structure, rivalry seekto attain managedand chooseto compete; thegoals thatcompanies (b) as well as the motivations theiremployees and (c) the of and managers; amountof domestic of and and persistence competitive rivalry thecreation in advantage therespective industry. The twooutsideforces, but also affecting competitiveness a nation, not the of direct are determinants, these: 1. The roleofchanceas causedbydevelopments as: (a) newinventions; such (b) in shifts decisions foreign wars;(d) significant political (c) by governments; in worldfinancial markets exchange or discontinuities inputcosts rates;(e) such as oil shocks;(f) surgesin worldor regional demand;and (g) major technological breakthroughs. 2. The variousrolesof government (a) (b) poliincluding: subsidies; education toward of cies;(c) actions markets; theestablishment localproduct capital (d) standards regulations; thepurchase goodsand services; taxlaws; and of (f) (e) and (g) antitrust (Porter, 69-130). egulation pp. an of of Figure1 provides illustration thecomplete system thesedeterminants and external and variables. can be seen,each determinant As affects others the are all, in turn, affected theroleof chanceand government. by 42 mir vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditio ns the Porters DiamondFramework: MexicanContext DiamondFramework 1. Figure Porters The from MichaelE. Porter, Competitive Source: Adapted Advantage Nations (NewYork:Free of Press,1990),p. 127. Critique and Evaluation of the Porter Model business it to modelto international In applying Porters strategy, is important in is the realize First, governmentofcritical importance influenckey eight facts. it as For example, can use tariffs a advantage. inga homenationscompetitive subsidies an as and to barrier penalizeforeign direct firms, it can employ entry firms. the with for vehicle penalizing indirect However, problem foreign-based and can suchas theseis thatthey backfire end up creating actions government thatis unable to competein the worldwide domestic a sheltered industry market 1990). Rugmanand Verbeke in factor international business chanceis a critical Second,while influencing until For and difficult predict guardagainst. example, to itis extremely strategy, was HusseininvadedKuwait,theUnitedStatesgovernment theday Saddam thattherewould be no invasion. In a similarvein,technological predicting in have resulted rapid electronics in and breakthroughs computers consumer mir vol. 33 †¢ Special Issue †¢ 1993/2 43 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions M. Richard Hodgetts ndustries in manycases,werenotpredicted companies and, by changein these weremarket leaders. that,at thetime, in modelmustbe applied business Porters of Third, thestudy international interms company As and of considerations notnational advantages. he specific in international marso wellnotesin his book, Firms,not nations, compete kets(Porter, 33). p. based on statistical modelwas constructed Fourth,thePorter analysisof data on exportsharesfor ten countries: Denmark,Italy,Japan, aggregate the the SouthKorea,Sweden, Switzerland, UnitedKingdom, United Singapore, wereprovided In historical cases studies States,and WestGermany. ddition, the forfourindustries: Germanprinting the patient pressindustry, American and tile the monitoring equipment industry, Italianceramic industry, theJapaand neseroboti cs about thesecountries examples Whatis important industry. nations. Sincemost is thatthey drawn are industrialized from triad other the or as or affluence countries theworlddo nothave thesameeconomic of strength thosestudiedby Porter, is highly it thathis modelcan be appliedto unlikely them without modification. Porter forth sets our distinct Fifth, developcompetitive stagesofnational and wealth-driven. ment:factor-driven, innovation-driven, investment-driven, In thefactor-driven internationally advandrawtheir successful industries stage resources from basicfactors production the of suchas natural tagealmost solely on and thenationslarge,inexpensive labor pool and they compete primarily efficient In the investment-driven companiesinvestin modern, price. stage theseinvestments facilities technology they and and workto improve through not In modification alteration. heinnovation-driven firms onlypurand stage chase technology and methodsfromothers,but theywork to createthem and from i nnovation their on own partas wellas assistance suppliers through in In firms related industries. thewealth-driven beginto lose their stage,firms to ebbs, and thereis a declinein motivation competitive advantage, rivalry Korea is investIn invest. Porters viewSingapore in thefactor-driven is stage, ment-drive, Germanyand the United States are Japan is innovation-drive, and between innovationand wealth-driven, Great Britainis wealth-driven. he influences countrys Since the stage of development competitive greatly in is So theplacement countries thisschema critical. too is thelogic of response, two or thanspanning rather thatcountries move from one stageto another in or to moreof thesestages, sincethere likely be industries companies all are at majoreconomies operating each of thesestages. investment thatonlyoutward direct Porter contends Sixth, (FDI) is foreign investment is valuablein creating and inboundforeign advantage, competitive subnever solution a nationscompetitive to the Mor eover, foreign problems. idiaries are not sourcesof competitive foreign advantageand widespread in investment thatthe processof competitive upgrading an usuallyindicates 44 mir vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Porters Diamond Framework: the Mexican Context is becausedomestic in firms manyindustries lack economy notentirely healthy their to market thecapabilities defend firms positions againstforeign (Porter, are questionable. For example,Canadianp. 61). These statements highly based scholars (Safarian1968,Rugman1980,and Crookell1990)havedemonand undertaken foreign-owned is not strated research development that firms by different thatof Canadian-owned from companies. significantly Additionally, thatthe20 largest American subsidiaries Canada export in Rugmanhas found rateofexports salesis 25 percent to as muchas they while (the import virtually to tha tof imports sales is 26 percent). reliance natural on resources factor-driven as Seventh, (the stage)is viewed to worldwide stature. nsufficientcreate However, Canada, forone, competitive a of whichhave turned counhas developed number successful the megafirms in natural resources proprietary into comparative advantage firm-specific trys in and and are of processing further refining; these sources advantages resource case studies sustainable of advantage (Rugmanand Mcllveen1985). Moreover, multinationals as Alcan,Noranda,and Nova help such successful thecountrys illustrate methods whichvalue added has beenintroduced themanthe by by resource-based ofthese companies (DCruz and Fleck1987,Rugmanand agers DCruz 1990). odeldoes not adequatelyaddresstherole of MNEs. the Eighth, Porter multinational such as Dunning(1990) have suggested Researchers including as a thirdoutsidevariable(in additionto chance and government). activity MNE activity covered in whether is there good reasonto question is Certainly and some researchers and thefirm determinant; structure, rivalry strategy, determinant both can how have raisedthequestion regarding thesame rivalry for includemultinationality global industries excludeit formultidomestic yet to thatMNEs As industries. Dunningnotes,thereis ampleevidence suggest theconfiguration thediamondin of in are influenced their by competitiveness in and homecountries, thatthis, turnmayimpinge otherthantheir upon the of (Dunning,p. 111). For example,Nestle competitiveness home countries Thus the Swissdiamondof of earns95 percent its sales outsideSwitzerland. in countries shaping thanthatof foreign is lessrelevant advantage competitive of the contribution Nestle to the home economy. This is truenot only for of nations. For example, all but Switzerland for95 percent theworlds virtually of Canadas largemultinationals on sales in theUnitedStatesand other rely is that U. S. diamond morerelevant the it markets. triad Indeed, couldbe argued thanis Canadas own diamond,since multinationals forCanadas industrial takeplacein theUnitedStates. Other of over70 percent their sales,on average, home diamondsincludeAustralia, New nationswithMNEs based on small if as and most, notall, Asian and LatinAmerican countries, Zealand,Finland, in of Even smallnations theEC, wellas a largenumber othersmallcountries. he of havebeenable to overcome problem a smalldomestic suchas Denmark, vol. nth* 33 †¢ Special Issue †¢ 1993/2 45 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Richard Hodgetts M. market gaining access to one of thetriadmarkets. in applying Porters So by framework international to businessat large,one conclusionis irrefutable: diamonds needto be constructed analyzed different and countries, Different for and thesediamonds and linkagewith diamonds the often integration of require other countries creating double thus a diamond stronger economically paradigm. Mexico and the Double Diamond Paradigm Porters diamond the nations advanhelpsexplain nontriad develop competitive their diamondintothatof triadcountries. Mexicoprovides an tageby linking excellent example. Background Mexicocurrently thestrongest has in The has economy LatinAmerica. country also vigorously to theUnitedStateswhichnow promoted exports, especially counts Mexicofor25 percent all imported on of fruit vegetables and (Bakerand Walker1991a). The maquiladoraindustry another is sourceof ecogrowing nomicstrength thecountry. thesametimeMexicois a majormarket for At for multinational investment. MNE Investment Theclimate foreign for direct investment increasing(FDI) inMexicohasgrown the favorable recent in on Whilethere werestrict controls FDI during ly years. in As introduced 1989reversed 1970s,regulations manyof theserestrictions. a For example, an number MNEs are now investing of there. esult, increasing Ford Motor has beguna $ 700 million plantin expansionin an automotive in to produce cars Nissanis putting 1 billion a newassembly $ Chihuahua; plant forexport boththeUnitedStatesand Japan;Volkswagen investing 950 to is $ million expanditsplant;McDonalds has earmarked 500 million open to to $ 250 new restaurants theyear2000; Sears Roebuckis putting 150 million $ by intonew storesand malls throughout country, additionto renovating in the a older units;and PepsiCo has expandedits snack businessby purchasing stakein Gamesa, Me xicos largest cookie maker(Bakerand Walker majority 1991b). amin One of themajorreasonsforthisincrease FDI is theprivatization thatbeganin 1982and whichhas pickedup speedsincethen. Whilethe paign continues playa majorrolein theeconomy, to through primarily government has the there beensignificant state-owned entities suchas Pemex, giantoil firm, reduction itsownership. in Thesesales havebeenmadeto bothforeign companiesand Mexicaninvestors (Baker 1991). 46 nth* 33 †¢ Special Issue †¢ 1993/2 vol. This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Porters Diamond Framework: the Mexican Context Another reasonfornewFDI has beenthechangesin investment that laws to hold major equitypositions. In the past, foreign now permit foreigners in had to of but companies beenlimited 40 percent equity, ownership auto-parts the reduces number firms of thatare subject this a newdecreenow sharply to based on percentages exportsales and sales to of law by creating exemptions river lake individuals. and mining, Exceptin someareassuchas petrochemicals, investment permitted to is and telecommunications, foreign up transportation, in and 100 percent (although somecases suchas agriculture, publishing, conis It struction, approval required). as also becomeeasierto acquire government withMexicanfirms. or realestateand to purchase merge Todayapproximately is of 75 percent theeconomy open to fullforeign ownership (Perry 1992). has been theLaw for thePromotion Protection and Another majorchange in a which was enacted 1991and provides muchbroader Property ofIndustrial This also thanpreviously. newlegis lation placestighter ofpatent coverage scope that on Still controls tradesecrets. another changehas beenlegislation endsthe for conneed forofficial requirements technology approvaland registration the thatMNEs willintroduce increase likelihood These developments tracts. nto theirMexican operations. There have also been more hightechnology newprotection software for in copyright thatprovide laws producers changes These changesare designedto attackpiracy,a and the recording industry. in serious inadequate copyright proproblem Mexicobecauseofitspreviously tection. FDI is thelow wage rates. In 1992 minimum factor Another encouraging in MexicoCityand majortownswas around$ 4 perday,whileit was $ wage Thiswage 3. 60 in manyother largecitiesand $ 3. 25 in therestof thecountry. cardin attracting investment. as Thus structure beena strong foreign drawing in over theeconomicenvironment Mexico has improved dramatically thelast decade. Double Diamond Analysis Mexico mustcontinue develop to its I n orderto maintain economicgrowth, Thisis currently done bylinking into international being strength. competitive in and this not theUnitedStatesmarket, particular, viewing market just as a source for exportbut also as part of the home market(see Figure2). In this particular, requires: 1. developing innovative new products and services thatsimultaneously meet theneedsof American and Mexicancustomers, that recognizing close relawithdemanding S. customers U. houldset thepace and styleof tionships product development; ink vol. 33 †¢ Special Issue †¢ 1993/2 47 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions M. Richard Hodgetts 2. Figure U. S. -MexicoDouble Diamond Source: Adapted fromAlan M. Rugmanand JosephR. DCruz, Fast Forward:Improving Kodak Canada 1991). CanadasInternational (Toronto: Competitiveness 2. drawing thesupport of on industries infrastructureboththeU. S. and and to Mexicandiamonds, that theU. S. diamondis morelikely possess realizing and and moreefficient markets suchindustries; for deeper in 3. aking free and fulluse of thephysical and humanresources bothcountries (DCruz and Rugman1992). Strategic Clusters In Mexicos Double Diamond business The primary advantageof usingthedoublediamondis thatit forces and publicpolicy and government leadersto think aboutmanagement strategy as in a different No longer thedomestic diamondtheunitof analysis, is way. now becomes in Porters The singlediamondframework. properperspective of clusters indusviablestrategic thatofidentifying successful potentially and acrossthe and performance within nation and to examine their tries the linkages doublediamond. ocatactivities and A strategic is of cluster a network businesses supporting and firms ed in a specific competeglobally regionwheretheleadingflagship 48 mk vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All us e subject to JSTOR Terms and Conditions Porters DiamondFramework: MexicanContext the In somemaybe foreign-owned. are activities home-based, although supporting business inutsand skillsmaycome from outside someof thecritical addition, and determined themembership relevance usefulnes withtheir thecountry by cluster. f thestrategic will have one or more large multinational cluster A successful strategic is these homeor foreign-ownedirrelevant, are Whether at enterprises itscenter. on a globalbasis are so longas they globally Ideally, they operate competitive. within framework globalcompetithe of and plan their strategies competitive is with related supporting and ofthecluster companies tion. A vitalcomponent In and publicsectororganizations. addition, bothprivate activities, including and institutions research there tanks, supportgroups, educational maybe think theseefforts. ing Mexicos Strategic Clusters The clusters. sixmajorones,in orderof are In Mexicothere a hostof strategic maand arepetroleum/chemicals, automotive, housing household, importance, The and and foodand beverage, semiconductors computers. and terials metals, to the and two thatare mostinternationally competitive provide bestinsights and the cluster how the Mexicandouble diamondis used are the petroleum It Crudeoil is Mexicos largest cluster. automotive industry. accountsfor4. 3 is of and of theworldscrudeexports, 57 percent thisproduction sold percent due beenexpanding has cluster in theUnitedStates. The automotive rapidly to has Since1986carand truck inthis production been globalrestructuring sector. thesetwo clusters, In at an annual rate of 24 percent. examining increasing of determinants competitiveness; four on is attention focused Porters principal and relatedand supporting demandconditions, factor industries, conditions, and firm strategy rivalry. Petroleum Cluster of and 15 accountedfor28 percent all exports Mexicos petroleum industry in the is of GDP in 1991. Of all firms thiscluster, largest state-owned percent is fifth Mexicanos Petroleos largest currentlytheworlds (Pemex). Thecompany firm. Pemexhas a workforce of and crudeoil producer theworlds57thlargest and assets of $45 billion,including refineries, 168,000employees pipelines, and aircraft, railcars. tankers, at reserves theendof1989 base is huge. Proven resource Mexicospetroleum in to barrels the for at werecalculated 66. 4 billion barrels, contrast 26. 3 billion of Mexicois a netexporter energy, UnitedStates. As a result, oil, principally, nuclearand geothermal and coal. naturalgas, hydraulic power, power, mk vol. 33 †¢ Special Issue †¢ 1993/2 49 This content downloaded from 146. 50. 153. 8 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions M. Richard Hodgetts Thereare also strong industries infrastructure. and Over petroleum-related thepast50 years under statecontrol oil exploration, of and processing refining, ofbasicand secondary and a majorindustry infrastrucstrategy petrochemicals, turehas emerged refining for use bothcrudeoil fordomestic and export and ot her refined there suchas gasolines and petrochemicals. present, At products are 1975 companiesoperating basic and secondary 490 plants petrochemical the and 130,000 throughout country employing pproximately people. Foreign in sector with Mexcompanies participate thesecondary petrochemical usually icanjointventure partners. in Domesticdemandof oil-related products Mexico has been increasing in more Pemexto becomeconsiderably sharply recent years. This has forced As in over the productive. a result, 1991 crudeoil outputwas up 7 percent at market thisoil is expected remain current for to previous year. The export levelsforthe foreseeable future. withcapitalexpenditures However, planned overthenextfiveyearscoupledwithrising demandforpetroleum products, crudeoil outputis forecasted riseto around3. million barrels day in to per 1995,comparedto 2. 68 millionbarrels dailyin 1990. The UnitedStateswill from continue be Mexicoslargest to and customer, whiledemandhas declined its1976-1980peak,U . S. conservation willconmeasures depressed and prices NAFTA discussions tinueto createdemandforoil imports. recent Moreover, and through have centered U. S. access to Mexican oil through on imports in theenergy sector. increased forAmerican Major opportunities technologies off are American suchas Arco,Chevron, and Phillips selling some companies outof their domestic and for opportunities properties are looking exploration thatthe sidetheU. S. Mexicois likely provea very to attractive location, except of alter refuses substantially itsownership hydrocarto government currently bon resources. are contracts now beingused to However, turnkey exploration and Mexicandrilling American and efficiency effecintegrate expertise improve Table1. MexicanPetroleum/Chemical Cluster FirmName Petroleos Mexicanos CelaneseMexicanaSA DupontSA CV Industrias Resistol SA Petrocel SA Ciba GeigyMexicanaSA CV FibrasQuimicasSA Tereftalatos MexicanosSA SA GrupoPrimex CV PoliolesSA QuimicaDe. Rey SA CV Source:Expansion, 21, August 1991. 1990sales(U. S. $m) 16,996 757 277 207 189 187 165 139 129 127 84 50 mlr vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Porters Diamond Framework: the Mexican Context reduce costofbringing to themarket. the oil Thistrend makeMexico will tively in one of thelowestcost producers theworldnextto Saudi Arabia. in firms theMexicanpetroleum cluster reported Table 2. n The leading are As can be seen,Pemexis thedominant firm. company vertically The is flagship in and and stageofthevaluechainin bringing integrated involved every energy to UndertheSalinasgovernment, recent in petrochemicals themarket. changes for of investment theproduction basic and secondary foreign petrochemicals will increasethe role of international firms such as Celanese,DuPont, Ciba haveannounced and other firms suchas Exxonwhich the plansto enter Geigy, Th esecompanies looking growth are for Mexicanmarket. utside opportunities are theUnitedStates. In particular, they seeking cheaperoil and they relyon and The rivalry oil imports their for and refining petrochemical production. has alreadyestablished in the American market thesevertically competition and firms worldleadersin exploration, as transportation, refining, integrated of products. marketing energy-related little nature theenergy of business for The commodity provides opportunity the of bothpricing demand and itself from cyclical Mexicoto insulate changes for to in this cluster. The real opportunities Mexico lie in trying improve efficiencies (a) exploration programs allowingmore by through: liberalizing contractors carry turnkey to out efficient operations; work(b) drilling foreign to withtheunionsto rationalize jobs thatare not required reducethecost ing in Mexicanexpertise lacking; is base; (c) usingforeign technologies areaswhere in of foreign firms producing participation petrochemicals (d) allowing greater of to domesand to expandcapacity competitivenesscommodity products meet MNEs to bringin technology to tic and exportdemand;(e) using foreign to and (f) market; produceadvancedpetrochemicals be used in theAmerican fuels, alternative, cleaner-burning suchas natural and unleaded gas developing and to complywithinternational fuelsto reducerelianceon U. S. imports standards. nvironmental in of looks promising even though recent The potential thiscluster years and have fallen benchmark Mexicanprovenreserves slightly theinternational priceforcrudehas droppe dto the $ 15-20 per barrelrange. The vast unexto a opportunities continue strong ploredareas of Mexico providelong-term cluster. the of Additionally, proximity the UnitedStates, hydrocarbon-based and increased on will withits declining provenreserves dependence imports, economiesof scale and provideMexico withan exportbase forimproving in and exploration fundsforreinvestment drilling activities. Thus generating willbe closelylinkedto theAmerican Mexicoseconomic diamond. progress AutomotiveCluster s The globalauto industry currently a In undergoing worldwide restructuring. as thisprocessMexicois emerging a majorcar and truck Since1986 producer. mlr vol. 33 †¢ Special Issue †¢ 1993/2 51 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Richard Hodgetts M. theindustry grown has In with was rapidly. 1990totalunitproduction 820,000 of and unofficial over1 million for exports 276,800 figures 1991puttotalou tput units. If a NAFTA is negotiated, units to is production expected top 3 million theyear2000. OverthelastdecadetheBigThreeU. S. automakers havebeen by their in expanding capacities Mexico,whileclosingplantsin theUnitedStates in and Canada. At thesame time, firms investing are Europeanand Japanese to as Mexico,in an effort tap such benefits low cost labor,low capitalcost, in to of auto market theworld, demand, proximity thelargest growth domestic and accessibility relatedsupportindustries. close look at Portersfour A to that occurring is determinants national of the advantage helpsillustrate linkage between Mexicanand U. S. diamonds. the 2. ) (Again,see Figure cluster. Mexico has a strong, its richresource base supporting automotive is Morethanhalfthepopulation under age of20,and there an abundance is the thatthese of young,skilled, are adaptablelabor. Foreignauto firms finding in workers particularly are effective after have been giventraining total they In and quality concepts. ddition, management, just-in-time inventory, related than their unionsin Mexico are much more cooperative withmanagement some to thenorth. a result, resource As this base is nowproducing counterparts of thehighest in and the Hermosillo cars and trucks NorthAmerica, quality on as one plantis widely regarded thenumber auto factory thecontinent. Thereare also strong industries a well-developed and infrastrucsupporting in ture theautomotive cluster. auto parts The consists approximateof industry that workers supply and around51 percent the of ly400 firms employ125,000 auto partsmarket. Thesecompanies forboththedomestic countrys produce and exportmarkets, and manyare a resultof foreign directinvestment by U. S. -based auto part firms. For example,General Motors has component as in a plantsin thecountry, wellas financial participation Aralmex, Mexican auto partcompanythatexportssnobbers, and the Condumexgroup,which Table2. MexicanAutomotive Cluster FirmName GeneralMotorsof MexicoSA CV de Chrysler MexicoSA de Volkswagen MexicoSA CV Ford MotorCo. SA RenaultIndustrias MexicanasSA CV Kenworth MexicanaSA CV Cifunsa CV SA Cummins CV SA MetalsaSA CV Y SUBS Central Industrias CV de SA NemakSA Source:Expansion, 21, August 1991. 1990 sales (U. S. $ m) 2,252 2,090 1,600 1,242 208 143 134 93 92 90 53 52 nth vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Porters Diamond Framework: the Mexican Context ith and Ford Motorhas a jointventure Mexicanauto harnesses rings. exports and firms thatmanufacture motorheads, plasticparts. security glasses, parts firms have similar Nissan,and a host of otherforeign arrangeV olkswagen, ments. customers auto outputin Mexico are in thelocal market. for The primary of thatgoes forexport increasing is the However, percentage thisoutput every in and In 1986itwas 17 percent; 1988itwas 32 percent; by 1990,thelast year. The forecast 1995 are for yearforwhichstatistics available,it was 34 percent. if In particular, a free tradeagreement signed is Mexicosaccessiis 50 percent. in Thisaccessiauto market theworldwillincrease to sharply. bility thelargest sinceU. S. rotectionism now is critical the country, to is bility particularly A Mexicanacceptance of barriers. thesame time, to raiseimport threatening in The sameis true American carsmanufactured Mexicois at an all-time high. of the where qualityreputation Mexicanassembly in theUnitedStates, plants at is beingfelt thedealershowroom. cluster in The leadingfirms theMexicanautomotive (see Table 2) all have in investments Mexico. For example,General Motors uses these significant Ford makesthe and to Cavaliers; operati ons produceBuickCentury Chevrolet turns the Ram Charger, out and Escortshere;and Chrysler Tracers Shadow, In thesefirms, wellas others as in and Spirit itsMexicanoperations. ddition, of will billions dollarsoverthenextfiveyearsto in theindustry, be spending is and expand theirlocal capacityin Mexico. The results that the upgrade in thiscountry overthenextdecade will of cars and trucks produced quality of to continue riseand Mexicowillbecomea majorworldclass producer cars market. and theexport forboththedomestic is cluster extremely of The market high. Thereare potential theautomotive is thatwill have to be dealt withif thecountry to some problems, however, Primeamong theseis the need for its continueincreasing competitiveness. One of the major reasonswhy Mexican autos are cost technology. greater and It that trend automation robotics. s unlikely this is efficientthelackofhigh and Canadian auto In can continue. addition,as more and moreAmerican on to is business shifted Mexico,thiswi llput majorpressure any NAFTA to from strategy that this and benefit thatthesetwocountries ensure handsomely and Europeans, not. do suchas theJapanese otherforeign producers, Conclusion future closelylinked thatof theUnitedStates,and if is to Mexicoseconomic of a NAFTA is signed,NorthAmerica. When analyzedin terms the Porter mk vol. 33 †¢ Special Issue †¢ 1993/2 53 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions Richard M. Hodgetts iamond someofthecountrys worldclusters havealready strategic developed wide competitive and automotive strength. Duringthe 1990s the petroleum clusters proving be highly the of are to It thatbefore turn competitive. is likely thecentury, into Mexicowillhaveeffectively linked theseindustries theNorth in and American market willbe a majoreconomic and force energy automotive will It thatthecountry beginmaking products. is equallylikely majorinroads in otherareas such as sem iconductors computer. in its automotive and As this as is of success, development lessa result technological prowess itwillbe the defavorable factor relatedand supporting industries, conditions, countrys firms. efore, As Mexico mandconditions, thestructure rivalry the and of and willfindthatitcan linkitsdiamondframework thatof theUnitedStates with in areas(Magnusand in theprocess becomea worldwide other competitor still will son 1992). Once again,Porters diamondframework proveto be a useful paradigm. References Baker, S. (1991) The Friends of Carlos Salinas. Business Week 3223, pp. 40-42. Baker, S. and S. Walker. (1991a) Mexico: The Salad Bowl of North America? Business Week 3201, pp. 70-71. Baker, S. and S. Walker. (1991 b) The American Dream is Alive and Well in Mexico. Business Week 3233, pp. 102-103. Crookell, H. (1990) Canadian-American Trade and InvestmentUnder the Free Trade Agreement. Westport,Conn: Quorum Books. DCruz, J. R. and J. Fleck. (1987) Yankee Canadians in the Global Economy. London, Ontario: National Centre for Management Research and Development. Toronto: DCruz J. R. and Alan M. Rugman. (1992) New Compactsfor Canadian Competitiveness. Kodak Canada Inc. Dunning, J. (1990) Dunning on Porter. Paper presentedat the Annual Meeting of the Academy of InternationalBusiness. Magnusson, P. Building Free Trade Bloc by Bloc. Business Week. No. 3267, pp. 26-27. Perry,N. (1992) Whats Powering Mexicos Success. Fortune125, 3, p. 114. Porter,M. E. (1990) The Competitive Advantageof Nations. New York: Free Press. and Performance, EconomicImpact. Boston: Rugman, A. (1980) Multinationalsin Canada: Theory, Martinus Nijhoff. for Canadas Multinationals. Toronto: Rugman, A. and J. Mcllveen (1985) Megafirms:Strategies Methuen/Nelson. Rugman, A. and A. Verbeke (1990) Global Corporate Strategyand Trade Policy. London: Routledge. for for Rugman, A. M. and J. DCruz. (1990) New Visions Canadian Business: Strategies Competing in the Global Economy. Toronto: Kodak Canada Inc. Canadas International CompetitiveRugman, A. M. and J. DCruz. (1991) Fast Forward: Improving ness. Toronto: Kodak Canada Inc. Toronto: McGraw-Hill. Safarian, A. E. (1968) Foreign Ownershipof Canadian Industry. 54 mir vol. 33 †¢ Special Issue †¢ 1993/2 This content downloaded from 146. 50. 153. 28 on Thu, 30 May 2013 08:40:14 AM All use subject to JSTOR Terms and Conditions

Sunday, November 24, 2019

Back to Space

Back to Space I found President Bush's "State of the Union Address" was very interesting. As he talked about his new space plans about NASA. As I got to thinking about his new plan, I found myself wondering what is out there in the universe? Should we really be spending so much money on space activities?There are many good reasons why we should send people to mars and moon. Our universe is very complex and mysterious. The more we learn about it the better off we will be. Like what the wise man, Francis Bacon, once said "Knowledge is Power." Many people wonder what is out there. Maybe sending people to mars and moon could answer some of our questions. NASA has had problems in the past, but they have helped us learn so much about space. We have already had the rover on mars for sometime now. The rover has helped us find out many interesting facts.English: President George W. Bush delivers his Sta...Space program all over the world should share information about the finding on the universe. I know th e chinese have just put their 1st astronaut up in space a month or so ago. It may draw conflict with NASA. I think they should just all work together. We all live on one planet.There is some controversy why we shouldn't send people to Mars. For example, the space shuttle Colombia that crashed and killed seven astronauts. What makes them think that something like this won't happen again? Money is also a very big issue. American is in a lot of debt right now. Is spending all this money going to mars a good idea? Think of the Americans we will be putting in danger.Overall I strongly agree with President Bush, and his idea of putting people on mars and moon. We could learn...

Thursday, November 21, 2019

ISMG 3000 Essay Example | Topics and Well Written Essays - 750 words

ISMG 3000 - Essay Example This paper will therefore analyze the impacts of information technology in the governance of firm in relation to the case study â€Å"is there a smarter approach to IT governance?† The Accenture IT model is an essential model since enables researchers and businesses to identify or establish their business environment in relation to IT governance. According to the case study the Accenture model measures the effectiveness of existing and new IT policies within an organization. The model therefore enables businesses to measure their level of decision making in relation to their access to information technology. In addition, the model relies on a business’ competitive advantage and the value of IT. The model uses different parameters to classify different companies in to four categories. According to the given quadrants, Aclan can be considered as a responsive solution providing company. This is because the company can only realize competitive advantage over its competitors through efficiency in its production. Aclan produces metal-based products and therefore it is faced with the challenge of high cost of inputs and raw materials (A-G Magazine, Web). Effec tive IT governance models for the company will therefore, work by enhancing efficiency in production and operation. After identifying the category within which a firm or business fall within the governance model, the next step is to establish the decision category of IT governance. The Weill and Ross model of IT governance is based on accountability and desirable behavior for IT users. Organizing model and investment are the main governance style at Aclan. These governance styles have a close connection with Weill and Ross model of IT governance. Aclan Company uses a decentralized system of governance that has a high degree of rigidity. The main reason for having such a governance structure is to facilitate the production and marketing of the company’s products while maintaining as high degree

Wednesday, November 20, 2019

Musicals in the West End Essay Example | Topics and Well Written Essays - 1750 words

Musicals in the West End - Essay Example Before presenting any logical argument, it is inherent to carry out a practical check on the shows currently running in the West End theatres and those lined up for production later in the year. According to the London Theatre Online by Darren Daglish, there are 23 musicals, 13 comedies, and 11 dramas (or straight plays if you like) currently running. Mathematically, this translates to 48% musicals, 28% comedies, and 24% drama. At this point, one might conclude that there many musicals shows than the other two classes. However, there is a list of shows lined up for production this year, including 9 musicals, 11 comedies, and 37 plays: or 16% musicals, 20% comedies, and 64% dramas [2]. Clearly, plays still dominate the theatre time if these statistics are anything to go by. While there may be repetition of some musicals such as Billy Eliot, Blood Brothers, and Jersey Boys, there is a relatively few number of repetition of plays. Actually, there are fifteen musicals repetitions with on ly six repeated plays. Thus, it would be inaccurate to say that the West End harbours more musicals than other subsidised theatres. However, one must bear in mind that musicals have relatively long runs than plays. Thus, there may not necessarily be a 64% increase in the number of plays. Dominance of musicals Another interesting statistic is that about two-thirds of the straight plays currently showing or planned for production show in subsidized theatres, with only seven and two musicals. Therefore, there will be around 30 musicals, 17 comedies, and 16 straight plays in the commercial theatres. Certainly, this is not a show of unhealthy competition and dominance by musicals! Essentially, the dominant nature of musicals in the West End theatres is a perception rather than a matter of fact. To prove this practically, try asking any average person about any showing musicals in the West End theatres and majority will mention Billy Elliot, Jersey Boys, and The Lion King [3]. The person may also mention Cats and Les Mis, and probably Beauty and the Beast. Similarly, ask the people to mention a few straight plays in the same theatres would probably respond by naming just a single play and add the typical â€Å"some Shakespeare.† This highlights the enormous interest that the public has for musicals as compared to straight plays at all levels, with the exception of real theatrical devotee

Sunday, November 17, 2019

The Keys Stages in the Capital Investment Decision-Making Process Essay

The Keys Stages in the Capital Investment Decision-Making Process - Essay Example This research will begin with the identifying investment opportunities. Once the capital investment strategy and budgetary processes are developed, the remaining process hinges on the generation of good investment ideas.   Projects do not exist merely to be discerned, rather opportunities for investment need to be highlighted or created, and subsequently exploited.   Initial investigation of the proposal pursues highlighting the projects’ feasibility (both technically and commercially). The origination of the proposal can come either from laid mechanisms that the entity has established to scan the environment for investment opportunities; technological developments/changes; or from those working in technical positions. Investment opportunities or proposals could emanate from analysis of strategic choices, an investigation of the present business environment, research and development, or legal requirements. A two-stage decision approach can be an effective way of encouragin g investment ideas whereby, first, organizational personnel is encouraged to advance any preliminary undeveloped ideas that they have. The advanced ideas are then reviewed in the first stage and those that fail feasibility test screened out using decision criteria. The most promising ideas continue to the next stage whereby thorough financial and strategic appraisals are undertaken.   The core requisite in this stage details that investment proposal should reinforce the attainment of organizational objectives. It is essential to appreciate that even projects that fail to come to realization may produce ideas and information that benefit future investments; hence, unsuccessful projects are not merely a waste of time and effort. An investment idea cannot be evaluated until the idea has been suitably defined and presented. In reality, within the business world, capital markets are imperfect, manifested by the fact that, among other aspects, companies are usually restricted in the amo unt of finance available for capital investment. Companies, thus, need to decide between competing for investment proposals and pick those manifesting the best strategic fit and the most suitable utilization of economic resources. The company’s capital investment procedures manual should outline the requirements for project information, as well as the format of the proposal. The preferred terminology ought to be specified and defined, and the project appraisal methods and criteria should be made clear. Standardized proposal forms should allow for flexibility in the lifespan, costs, and benefits of projects. However, too much flexibility may constrain the comparability of proposals. Thus, a balance has to be struck to match the organization and the forms of projects it considers. The screening of the projects may spotlight aspects such as cash flow analysis, critical variables, documentation, and sensitivity analysis. Candidate investment proposals require an in-depth analysis and appraisal to establish projects, which avail the most attractive opportunities critical to the attainment of organizational goals such as enhancing shareholder wealth. Analysis and acceptance stage involve undertaking financial analysis of the project and comparing the project to predetermined acceptance criteria, as well as considering the project as per the capital budget for both present and future operating periods.

Friday, November 15, 2019

The History Of International Cybersecurity Politics Essay

The History Of International Cybersecurity Politics Essay The United States, England, and Continental Europe have very different approaches to cybersecurity. The United States and United Kingdom conceive of cyber primarily as a national security problem to be handled by the military- which in turn sees the Internet as a fifth domain of war to be dominated. The rest of the European Union, however, sees cyber threats mostly as an irritant for commerce and individual privacy that should be dealt with by civilian authorities working in combination with private enterprise. Additionally, while the United States can have a single policy, even though its one implemented by many different federal departments, the European Union is made up of twenty-seven nations with their own laws, notions, and philosophical differences over how to approach cyber issues. Finally, there is NATO, where a unified transatlantic cyber vision must be reconciled and arranged in a coherent manner among twenty-eight allies through a cumbersome bureaucratic process. To make sense of these conflicting visions, this essay reviews cyber attacks against NATO members, attempts to outline the challenges of developing a transatlantic vision for cyber policy, and highlights some of the fundamental differences among NATO members. It is helpful to remember that although the Internet is so ensconced in most of our lives that it is hard to envision living without it, the first modern Web browser didnt debut until 1993 and broadband access has only become widespread over the last decade. As a result, senior government and military leaders did not grow up with the Internet and are gradually having to adapt to emerging cyber realities. Franklin Kramer, who worked as assistant secretary of defense under President Bill Clinton, draws a comparison with the Great Fire of London, he notes that it nearly destroyed the city in 1666 because an advance in living conditions- wooden houses for many- was not matched by security measures. There were no firefighting technologies, no firefighting processes, and no resources devoted to fire fighting. This was still true more than two centuries later with the Great Chicago Fire. Despite our slow learning curve, in the modern world, while fire may strike, it is not the city-devourin g scourge that it once was. Through government regulations that established building codes and through volunteer and government-run fire departments, a protective-response was established over the centuries.  [1]   Former Deputy Secretary of Defense William J. Lynn III uses a more aggressive analogy: The first military aircraft was bought, I think, in 1908, somewhere around there. So were in about 1928, he said. Weve kind of seen some à ¢Ã¢â€š ¬Ã‚ ¦ biplanes shoot at each other over France, he added. But we havent really seen kind of what a true cyberconflict is going to look like.  [2]   Currently, European policymakers seem to treat cybersecurity more along fire-prevention lines rather than as biplanes over France. And framing is critical when thinking about cyber issues. As Kramer observes, Ask the wrong question, and you generally will get the wrong answer. And cyber- and what to do about cyber conflict- is an arena where there is generally no agreement on what is the question, certainly no agreement on what are the answers, and evolving so fast that questions are transmuted and affect and change the validity of answers that have been given. He argues that the lack of agreement over the nature of the problem, lack of coherent regulation and authority mechanisms, and conflict between connectivity and security together make cyber a wicked problem not easily susceptible to resolution.  [3]   Lynn manages to frame the issue in military and security terms but fully acknowledges that the reality is quite blurred and that no clear lines exist in this new domain. I mean, clearly if you take down significant portions of our economy we would probably consider that an attack. But an intrusion stealing data, on the other hand, probably isnt an attack. And there are [an] enormous number of steps in between those two.  [4]   Lynn goes on to say, one of the challenges facing Pentagon strategists is deciding at what threshold do you consider something an attackà ¢Ã¢â€š ¬Ã‚ ¦ I think the policy community both inside and outside the government is wrestling with that, and I dont think weve wrestled it to the ground yet. In other words, it is difficult to know whether the house is on fire or biplanes are shooting at each other.  [5]   Correspondingly tricky, defense officials say, is how to pinpoint who is doing the attacking. This raises further complications that are clearly at the heart of the Pentagons mission. At the Council on Foreign Relations Lynn summarized the issue If you dont know who to attribute an attack to, you cant retaliate against that attack, As a result, you cant deter through punishment, you cant deter by retaliating against the attack. He discussed the complexities that make cyberwar so different from, say, nuclear missiles, which of course come with a return address.  [6]   The cyber threat is very much a part of our current reality. Over the last several years several NATO members and partners, including the United States, have been targeted by severe cyber attacks. Estonia What is commonly believed to be the first known case of one state targeting another by cyber-warfare began on April 27, 2007, when a massive denial-of-service attack was launched by Russia against Estonia over a dispute involving a statue. The attack crippled websites of government ministries, political parties, newspapers, banks, and companies.  [7]  The attack was nicknamed Web War One and it caused a resonation within transatlantic national security circles.  [8]   The German newspaper Deutsche Welle wrote that Estonia is particularly vulnerable to cyber attacks because it is one of the most wired countries in the world. Nearly everyone in Estonia conducts banking and other daily activities on line. So when the cyber attack occurred, it nearly shut Estonia down.  [9]  Then-EU Information Society and Media commissioner Viviane Reding called the attacks a wakeup call, commenting that if people do not understand the urgency now, they never will. Her reaction was to incorporate a response into an EU-wide law on identity theft over the Internet.  [10]  Additionally, NATO did establish a Cyber Center of Excellence in Tallinn, which will be discussed later in the essay. Georgia While not a NATO member, Georgia is a NATO partner, and the April 2008 Bucharest Summit declared that it will become a member at some unspecified time in the future, a promise reiterated at the November 2010 Lisbon Summit.  [11]  Weeks before the August 2008 Russian land invasion and air attack, Georgia was subject to an extensive, coordinated cyber attack. American experts estimated that the attacks against Georgias Internet infrastructure began as early as July 20, with coordinated barrages of millions of requests- known as distributed denial of service, or DDOS, attacks- that overloaded and effectively shut down Georgian servers.  [12]  The pressure was intensified during the early days of the war, effectively shutting down critical communications in Georgia. After defacing Georgian President Mikheil Saakashvilis web site and integrating a slideshow portraying Saakashvili as Hitler, coming up with identical images of both Saakashvili and Hitlers public appearances, the site remained under a sustained DDoS attack. Writing as the attacks were under way, security consultant Dancho Danchev believed it smells like a three letter intelligence agencys propaganda arm has managed to somehow supply the creative for the defacement of Georgia Presidents official web site, thereby forgetting a simple rule of engagement in such a conflict- risk forwarding the responsibility of the attack to each and every Russian or Russian supporter that ever attacked Georgian sites using publicly obtainable DDOS attack tools in a coordinated fashion.  [13]  Bill Woodcock, the research director at Packet Clearing House, a California-based nonprofit group that tracks Internet security trends, noted that the attacks represented a landmark: the first use of a cyber a ttack in conjunction with an armed military invasion.  [14]   The nature of cyber attacks is such that, two and a half years later, there is still no definitive answer on who caused the attack. They certainly emanated from Russia, but the precise role of Moscows military and intelligence services remains unclear. Given that the cyber attacks preceded and accompanied conventional military attacks, there appears to be a link to the Russian government. A March 2009 report by Greylogic concluded Russias Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB), rather than patriotic hackers, were likely to have played a key role in coordinating and organizing the attacks. They added, The available evidence supports a strong likelihood of GRU/ FSB planning and direction at a high level while relying on Nashi intermediaries and the phenomenon of crowd-sourcing to obfuscate their involvement and implement their strategy.  [15]   United States In a 2010 essay for Foreign Affairs, Lynn revealed that in 2008, the US Department of Defense suffered a significant compromise of its classified military computer networks. It began when an infected flash drive was inserted into a US military laptop at a base in the Middle East. The flash drives malicious computer code, placed there by a foreign intelligence agency, uploaded itself onto a network run by the US Central Command. That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control.  [16]   The upshot is that adversaries have acquired thousands of files from US networks and from the networks of US allies and industry partners, including weapons blueprints, operational plans, and surveillance data.  [17]   Lynn classified this attack as the most significant breach of US military computers ever and stated that it served as an important wake-up call.  [18]  He acknowledged that to that point, we did not think our classified networks could be penetrated.  [19]  The result of this new awareness was Operation Buckshot Yankee, a fourteen-month program that rid US systems of the agent.btz worm and helped lead to a major reorganization of the armed forces information defenses, including the creation of the militarys new Cyber Command.  [20]   United Kingdom In a speech at the 2011 Munich Security Conference, British foreign secretary William Hague revealed that a series of cyber attacks on his country took place the previous year. He noted that in late December a spoofed email purporting to be from the White House was sent to a large number of international recipients who were directed to click on a link that then downloaded a variant of ZEUS. The UK Government was targeted in this attack and a large number of emails bypassed some of our filters.  [21]   Additionally, sometime in 2010 the national security interests of the UK were targeted in a deliberate attack on our defense industry. A malicious file posing as a report on a nuclear Trident missile was sent to a defense contractor by someone masquerading as an employee of another defense contractor. Good protective security meant that the email was detected and blocked, but its purpose was undoubtedly to steal information relating to our most sensitive defense projects.  [22]   Finally, in February 2011, three of my staff were sent an email, apparently from a British colleague outside the FCO, working on their region. The email claimed to be about a forthcoming visit to the region and looked quite innocent. In fact it was from a hostile state intelligence agency and contained computer code embedded in the attached document that would have attacked their machine. Luckily, our systems identified it and stopped it from ever reaching my staff.  [23]  Still, the prevalence and sophistication of these attacks are a principal reason why cybersecurity and cyber-crime were listed as two of the top five priorities in the UKs National Security Strategy.  [24]   Given the interconnectivity of the Internet, Hague argued that more comprehensive international collaboration is vital, noting that, while cyber security is on the agendas of some 30 multilateral organizations, from the UN to the OSCE and the G8, the problem is that much of this debate is fragmented and lacks focus. He continued, We believe there is a need for a more comprehensive, structured dialogue to begin to build consensus among like-minded countries and to lay the basis for agreement on a set of standards on how countries should act in cyberspace.  [25]   US- European Attitudinal Differences We begin to be able to discern a pattern: The United States and the United Kingdom take cyber security very seriously and view it primarily through the lens of national security. The EU and most Western European members of NATO see it primarily as a national infrastructure problem. In the run-up to the November 2010 Lisbon NATO Summit, Pentagon officials were pressing very firmly to incorporate a concept of active cyber defense into the revised NATO Strategic Concept. Lynn argued that the Cold War concepts of shared warning apply in the 21st century to cyber security. Just as our air defenses, our missile defenses have been linked so too do our cyber defenses need to be linked as well. However, this notion was firmly rejected by the Europeans, with the French particularly adamant.  [26]   USCYBERCOM A July 2010 Economist story proclaimed: After land, sea, air and space, warfare has entered the fifth domain: cyberspace.  [27]  It noted that President Obama had declared the digital infrastructure a strategic national asset and had appointed Howard Schmidt, the former head of security at Microsoft, as the first cybersecurity tsar. Peter Coates notes that the air force had actually anticipated this move in December 2005, declaring cyber a fifth domain when it changed its mission statement to To fly and fight in air, space, and cyberspace. In November of the following year, it redesignated the 8th Air Force to become Air Force Cyberspace Command.  [28]   In May 2010 the Defense Department launched a new subunified command, United States Cyber Command, with Gen. Keith Alexander dual-hatted as its chief while continuing on as director of the National Security Agency. CYBERCOM is charged with the responsibility to direct the operations and defense of specified Department of Defense information networks and prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/ Allied freedom of action in cyberspace and deny the same to our adversaries.  [29]   As the scale of cyberwarfares threat to US national security and the US economy has come into view, the Pentagon has built layered and robust defenses around military networks and inaugurated the new US Cyber Command to integrate cyber-defense operations across the military. The Pentagon is now working with the Department of Homeland Security to protect government networks and critical infrastructure and with the United States closest allies to expand these defenses internationally. An enormous amount of foundational work remains, but the US government has begun putting in place various initiatives to defend the United States in the digital age.  [30]  Even with stepped-up vigilance and resources, Lynn admits, adversaries have acquired thousands of files from US networks and from the networks of US allies and industry partners, including weapons blueprints, operational plans, and surveillance data.  [31]   The cyber policy of the United States is rapidly evolving, with major developments under way even as I write this essay. The White House issued a new International Strategy for Cyberspace in May 2011. While not by any means moving away from a defense-oriented posture- indeed, it generated breathless commentary by declaring the right to meet cyber attacks with a kinetic response- it sought to bring commercial, individual, diplomatic, and other interests into the equation. This was followed by a new Department of Defense cyber strategy in July 2011, which built on Lynns Foreign Affairs essay. European Network and Information Security Agency (ENISA) While CYBERCOM is the most powerful and well-funded US cyber agency, the lead EU cyber agency is ENISA, the European Network and Information Security Agency. Whereas CYBERCOM is run by a general with an intelligence background, ENISA is run by a physics professor with long experience in the IT sector, including the energy industry, insurance company engineering, aviation, defense, and space industry.  [32]  The agencys mission is to develop a culture of Network and Information Security for the benefit of citizens, consumers, business and public sector organizations in the European Union.  [33]   In December 2010 ENISA released a report identifying what it sees as the top security risks and opportunities of smartphone use and gives security advice for businesses, consumers and governments. The agency considers spyware, poor data cleansing when recycling phones, accidental data leakage, and unauthorized premium-rate phone calls and SMSs as the top risks.  [34]  New regulations are proposed that would see the perpetrators of cyber attacks and the producers of related and malicious software prosecuted, and criminal sanctions increased to a maximum two-year sentence. European countries would also be obliged to respond quickly to requests for help when cyber attacks are perpetrated, and new pan-European criminal offences will be created for the illegal interception of information systems. Home affairs Commissioner Cecilia Malmstrà ¶m added that criminalizing the creation and selling of malicious software and improving European police cooperation would help Europe step up our efforts against cybercrime. ENISAs new mandate will let the agency organize pan-European cybersecurity exercises, public- private network resilience partnerships, and risk assessment and awareness campaigns. ENISAs funding will also be boosted, and its management board will get a stronger supervisory role. ENISAs mandate is also to be extended by five years to 2017. The new directive will also supersede a 2005 council framework decision on cybercrime because that previous regulation did not focus sufficiently on evolving threats- in particular, large-scale simultaneous attacks against information systems, such as Stuxnet, and the increasing criminal use of botnets. Stuxnet was recently used to attack Irans nuclear power infrastructure, and a single botnet, Rustock, is estimated to be responsible for two-fifths of the worlds spam.  [35]   Additionally, EU states are constrained by Directive 95/ 46/ EC, better known as the Data Protection Directive, which provides enormous protection for any information relating to an identified or identifiable natural person. Compare this to the USA Patriot Act, which gives enormous leeway to US law enforcement and intelligence agencies to access electronic data held by US companies in order to investigate and deter terrorist activities. In June 2011 Gordon Frazer, managing director of Microsoft UK, set off a firestorm when he declared that European customer data stored on cloud computing services by companies with a US presence cannot be guaranteed the protections afforded under the Data Protection Directive, setting off a demand from some EU lawmakers to resolve this issue.  [36]   Germany In late February 2011 Germanys outgoing minister of the interior, Thomas de Maizià ¨re, unveiled the countrys Nationale Cyber-Sicherheitsstrategie (National Cyber Security Strategy).  [37]  To American eyes, the fact that it was the interior ministry, not the defense ministry, issuing the strategy is striking. It was no accident: this is by no means a defense document. The documents introduction notes that in Germany all players of social and economic life use the possibilities provided by cyberspace. As part of an increasingly interconnected world, the state, critical infrastructures, businesses and citizens in Germany depend on the reliable functioning of information and communication technology and the Internet. Among the threats listed: Malfunctioning IT products and components, the break-down of information infrastructures or serious cyber attacks may have a considerable negative impact on the performance of technology, businesses and the administration and hence on Germanys social lifelines. Contrast this with Lynns analogy of biplanes over France, and his pondering at what threshold do you consider something an attack? German security scholar Thomas Rid laments that the strategy is coming a bit late and that Germanys thinking lags that of the United States and the United Kingdom. Beyond that, he notes that the two agencies created to manage cyber issues are woefully understaffed and tasked with myriad responsibilities related tangentially at best to cyber security. And, according to a cyber kodex established in the new strategy, German interests in data security à ¢Ã¢â€š ¬Ã‚ ¦ would be pursued in international organizations such as the UN, the OSCE, the European Council, the OECD, and NATO- in that order.  [38]   United Kingdom as Outlier As is frequently the case on matters of international security, the United Kingdom is much more in line with its American cousin than its neighbors on the Continent. In an October 12, 2010, speech at Londons International Institute for Strategic Studies, Iain Lobban, director of GCHQ (the UKs National Security Agency analogue, responsible for signals intelligence) noted that his country combines the intelligence and information assurance missions in a single agency, an arrangement shared by only a few other countries, most notably the US. It gives us a richer view of vulnerabilities and threats than those who consider them purely from the point of view of defense.  [39]   He confessed to constant barrages of spam, worms, theft of intellectual property on a massive scale, some of it not just sensitive to the commercial enterprises in question but of national security concern too, and all manner of other attacks that have caused significant disruption to Government systems. Consequently, his government was looking to significantly increase its investment in the cyber realm even at a time when the global recession was forcing significant austerity in other departments, including in more traditional military assets.  [40]   Thomas Rid notes the sheer breadth of Lobbans focus: Cyber encompasses, for instance, more and more online government services (read: steadily increasing vulnerability); critical national infrastructure, publicly or privately run; online crime in all its facets; espionage (both industrial and governmental), and such things as the proper norms of behavior for responsible states.  [41]   The implications are vast, as Lobban hints and Rid explicates: partnerships of a new kind are needed to deal with cyber threats and risks. International partnerships, with like-minded countries that need to establish and maintain appropriate norms of behavior in crisis situations- and intersectoral partnerships, between government agencies and industry, especially the high-tech sector.  [42]   In his Munich Security Conference speech, Hague noted that we rely on computer networks for the water in our taps, the electricity in our kitchens, the sat navs in our cars, the running of trains, the storing of our medical records, the availability of food in our supermarkets and the flow of money into high street cash machines. Further, Many government services are now delivered via the internet, as is education in many classrooms. In the UK, 70 percent of younger internet users bank online and two thirds of all adults shop on the internet.  [43]   Given the new awareness of vulnerabilities and the degree of dependence, then, the United Kingdoms new National Security Strategy ranks cyber attack and cyber crime in our top five highest priority risks. This is not lip service. At the same time that the British military is suffering such severe cutbacks that the Royal Navy is reduced to sharing a single aircraft carrier with France, the current budget provided  £ 650 million of new funding for a national cyber-security program, which will improve our capabilities in cyber-space and pull together government efforts. As part of that effort, Hague said, We have established a new Ministerial Group on cyber security which I chair. And we have boosted the UKs cyber capabilities with the establishment of a new Defense Cyber Operations Group, incorporating cyber security into the mainstream of our defense planning and operation.  [44]   NATO Responses After months of study and debate the 2010 NATO Summit in Lisbon issued a new strategic concept on November 19, 2010. In it, cyber issues were officially recognized for the first time as a core alliance mission. Recognizing that cyber attacks are becoming more frequent, more organized and more costly in the damage that they inflict, NATO pledged to develop further our ability to prevent, detect, defend against and recover from cyber-attacks, including by using the NATO planning process to enhance and coordinate national cyber-defense capabilities, bringing all NATO bodies under centralized cyber protection, and better integrating NATO cyber awareness, warning and response with member nations.  [45]   This was followed in June 2011 by a revised NATO policy on cyber defense and a parallel cyber defense action plan. Combined, they offer a coordinated approach to cyber defense across the Alliance with a focus on preventing cyber threats and building resilience. Additionally, all NATO structures will be brought under centralized protection.  [46]   What practical actions will flow from these policy statements remains unclear, especially in an era of radically declining budgets. But they give an overview of what it terms NATOs principle cyber defense activities.  [47]   Coordinating and Advising on Cyber Defense The cyber-defense policy was implemented by NATOs political, military, and technical

Tuesday, November 12, 2019

Religion in Public Schools Essay -- Prayer In Public Schools

Religious Rights in Public Schools "JESUS in the classroom!" Are you feeling uncomfortable yet? Religion in the public school systems is among the top of the list of controversial topics in American society, We've long been advised to avoid this and other religiously politically intertwined subjects in polite conversation. If you're like most Americans, this topic makes you frustrated, high strung, or at least a little queasy. From the day the 1st amendment right appeared in the U.S. Constitution, to this present day, and surely into our nation's tomorrows, the proper role of religion in public schools has been, is, and will continue to be a subject of great debate. It is important for school officials, parents, and students to have a clear understanding of the 1st amendment and how it affects their religious rights and the religious rights of others in a public school setting. Unfortunately, most people are confused or misguided when it comes to this issue. The purpose of this paper is to guide the reader throu gh a clear understanding of the 1st amendment; the impact it has had in education, the religious freedoms it grants to students, and the religious freedoms it grants (or doesn't grant) to teachers. The Constitution exists precisely so that opinions and judgments, including can be formed, tested, and expressed. These judgments are for the individual to make, not for the Government to decree even with the mandate or approval of a majority (Supreme Court Justice Anthony M. Kennedy, 1999). In knowing that, the 1st amendment states, "Congress shall make no law respecting an establishment of religion or prohibiting free exercise thereof…" As you can see there are two clauses in this part of the amendment. ... ... First Amendment Court Cases. Schenck v. United States (1919). Riley, R. (1998). Secretary's statement on religious expression. Retrieved November 15, 2001, from, the World Wide Web: http://www.ed.gov/Speeches/08-1995/religion.html Staver, Mathew. Teachers' Rights on Public School Campuses. Retrieved November 16, 2001, from the World Wide Web: http://www.lc.org/OldResources/teachers_rights_0900.html United States Supreme Court. (1993). Lamb's Chapel v. Center. Washington DC. Government Printing Office. United States Supreme Court. (1994). Mozert v. Hawkins County Board of Education, 827 F.2d 1058 (6th Cir. 1987). Washington DC; US Government Printing Office. United States Supreme Court. (1969). Tinker v. Des Moines School Districk, 393 U.S. 503, 89 S. Ct. 733, 21 L. Ed. 2d. 731. Washington DC; US Government Printing Office.