Saturday, January 25, 2020

A Comparison of Edgar Allan Poe’s Annabel Lee and The Raven Essay

A Comparison of Edgar Allan Poe’s Annabel Lee and The Raven With insistent meter and captivating rhyme schemes, Edgar Allan Poe’s â€Å"Annabel Lee† and â€Å"The Raven† are both very similar. However, in their views of love, namely the loss and mourning of beautiful women, they differ greatly. Through analysis of the two poems, the reader observes that whom Poe had chosen for a speaker, the tone and the sound effects are all factors in both poems that make two poems with a similar theme contrast. Both poems mean the same thing and follow the same theme or â€Å"melancholy topic† as Poe called it in his essay. They both depict a speaker who is severely depressed over the death of a beautiful woman. Poe gave a sense of madness in their character, though, which made them obsess and think constantly... A Comparison of Edgar Allan Poe’s Annabel Lee and The Raven Essay A Comparison of Edgar Allan Poe’s Annabel Lee and The Raven With insistent meter and captivating rhyme schemes, Edgar Allan Poe’s â€Å"Annabel Lee† and â€Å"The Raven† are both very similar. However, in their views of love, namely the loss and mourning of beautiful women, they differ greatly. Through analysis of the two poems, the reader observes that whom Poe had chosen for a speaker, the tone and the sound effects are all factors in both poems that make two poems with a similar theme contrast. Both poems mean the same thing and follow the same theme or â€Å"melancholy topic† as Poe called it in his essay. They both depict a speaker who is severely depressed over the death of a beautiful woman. Poe gave a sense of madness in their character, though, which made them obsess and think constantly...

Friday, January 17, 2020

Crash Human Nature Essay

Human nature is The general psychological characteristics, feelings, and behavioural traits of humankind, regarded as shared by all humans. * Crash directed by Paul Haggis presents to us an intertwining story set within the streets of LA, confirming and challenging racial stereotypes and at the same time reflecting the ever existing good and dark side of human nature. Human nature drives us all to view â€Å"the other† as bad, evil and untrustworthy, it is complex and every man, despite differences holds the underlying values buried deep into our subconsciousness * In the film crash, Haggis has successfully portrayed the truth about human nature through the conventions of dialogue, camera shot and symbolism, confusing us as viewers, but also giving us an intruging insight into the reality of each and every one of us despite differences in race and background. * Haggis has successfully evoked feelings of uneasiness, confusion, anger and empathy at through the making of the film crash Human nature drives us to fear the unknown, the â€Å"other† in our eyes is seen as evil and that we should steer away from any communication. It may be in relation to race, ethnicity, age, gender or beliefs but in reality each one of us does not have the ability to fight this automatic discrimination against those who are different. * Haggis has successfully reflected this dark aspect of human nature through the convention of dialogue. * In one scene a Persian man is attempting to purchase a gun from a white American. The salesman calls the man â€Å"osama† and then continues to talk about 9/11, he then is aggressively told to leave the shop. * The white American man displays his fear of â€Å"the other† by racially discriminating him through his dialogue, he has his own racist, stereotypical image of this man in his mind automatically relating him to 9/11 and due to his human nature sees him as â€Å"the other† and as untrustworthy to be in his shop telling him he â€Å"has no right to buy a gun here† * In another scene a Hispanic locksmith is changing a white American couples locks on their door after their car had been hijacked. The American woman makes assumptions that this locksmith is going to sell their key to his â€Å"homies† purely because of the way he looks and his race and demands to get her locks changed again in the morning. * The American woman views the locksmith as â€Å"the other† and due to her human nature she fears him, and does not trust him to be in her house. Her judgement is not on personality or individual traits it is based upon the automatic assumptions she makes about him due to his tattoos, dress sense and skin colour. Little does she know that the Hispanic locksmith was in many eyes the only character in crash seen as completely innocent, but due to her ignorance she believed the opposite. * Through dialogue Haggis has successfully positioned the viewer to feel anger at both of these scenarios and causes us to question our own human nature and our own classification of â€Å"the other†. We are positioned to feel guilt as we feel partly responsible for these racial stereotypes as we too, through our human nature, instinctively stick to our own. Human nature is complex, values at polar opposites could exsist in the same man, particular beliefs could be compromised and in reality no one can ever truly understand the extent of complexities embedded within each person. * Racsim and nobility can exsist in the same man. Haggis has successfully portrayed this idea of human nature through the narrative conventions of camera shot and dialogue. * In one scene a cop pulls over a black couple, he abuses his power and shows extreme racism seen through the convention of low camera angle while he molests her. In another scene the same cop shows nobility while is seen rescuing the same black woman he molested, he ironically says things to her such as â€Å"im not going to hurt you† * The camera angle in the first scene is a panning low angle displaying the police officers hand stroking up the womans leg, emphasizing his sickening racist actions. In the second scene the camera angle is a close camera angle focusing on his remorseful worrying facial expression. The shot of the hand in the first scene could represent â€Å"a mans hand† where the shot of his face in the second scene presents him, and therefore suggests that although his racism and dark side of his human nature exsists the good side of his human nature is a representation of his true identity and we begin to question the reasons behind his actions. * These two scenes In the movie crash display to us that humans are extremely complex. A man can live a life full of sin but then commit a noble act just as a man can be a criminal but then save a life. * The concept of human complexities is hard to grasp, an individuals identity can determine why they act a certain way or do certain things. The cop in the film displayed racism due to the fact that a black woman would not help his sick father, but does this excuse particular values and behaviours? * Through the convention of camera angle Haggis has effectively positioned the viewer to feel both disgust and awe at the same man. We begin to question what drives humans to be so complex and we wonder whether it is ever possible for a man to be seen as completely innocent. * Instinctively human natures drives us to protect and stick to our own, just as we repel those who are seen as different. * This universal value embedded inside each and every human is represented by Paul Haggis in the film crash through utlising the narrative convention of symbolism. * Crash follows the story of a Hispanic locksmith and unconditional love of his

Wednesday, January 8, 2020

ICT and the Law - Free Essay Example

Sample details Pages: 6 Words: 1804 Downloads: 10 Date added: 2017/06/26 Category Law Essay Type Analytical essay Level High school Did you like this example? ICT and the Law 1.Cybercrime in the UK: Cybercrime, is a growing problem for law enforcement agencies worldwide; what actions can be taken against such criminal activity in the UK and are there any implications regarding an individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s rights? Cybercrime, or à ¢Ã¢â€š ¬Ã‹Å"computer misuseà ¢Ã¢â€š ¬Ã¢â€ž ¢, is defined by the Computer Misuse Act 1990 as recently amended by the Police and Justice Act 2006 as à ¢Ã¢â€š ¬Ã‹Å"unauthorised access to computer materialà ¢Ã¢â€š ¬Ã¢â€ž ¢. A person is deemed to be guilty of this crime if they have carried out activities to gain access to data without permission and they have done this with full knowledge and intent. Due to recent technological advancements that have enabled the world to become a more efficient and dynamic place, there has simultaneously been a rise in reported cyber crime in the UK and across the globe (Prasad, 2004). In addition, it has been said that there has been a shift from fin ancial hacking to the access of sensitive business and government data with the view to blackmail and extort (BBC News, 2015). This essay is going to discuss what can be done to fight against the growing issue of cyber crime as well as assess the dangers it poses to individuals and their rights. As previously stated, cyber crime is anything that involves a computer and a network. It can range from financial scams, pornography or spreading a virus in a chain of emails (BBC News, 2015). Initially, financial gain appeared to be the motivating factor, however, more and more examples of stalking, extremist sites and politically centered attacks are being detected (Wold and Shrivers, 1990). Once more, in 2010 it was found that cyber crime targeting mobile phone devices had increased by nearly 50% (FT.com, 2011). It would seem that criminals have spotted the growth in mobile gaming, communication and applications in order to integrate and mask their scams and ultimately gain access to i ndividualsà ¢Ã¢â€š ¬Ã¢â€ž ¢ private information. In 2014, several celebrities had their social media sites such as Instagram and Twitter hacked alongside their iCloud accounts through the form of phishing. These areas held personal information about and images of themselves (BBC, 2014). Many were threatened and blackmailed by the perpetrators to ultimately have the images leaked anyway. This is a prime example of the breach of an individualsà ¢Ã¢â€š ¬Ã¢â€ž ¢ right to private life as detailed in the European Convention on Human Rights Article 8. Once more, it also demonstrates its ability to cause reputational damage to an individual or an organisation; often a key motivator for these types of attacks (McQuade, Colt and Meyer, 2009). One of the main strategies that can be adopted to avoid the aforementioned scenario is to always check that the email is correctly addressed to the recipient. In addition, checking the senderà ¢Ã¢â€š ¬Ã¢â€ž ¢s email address carefully for authentici ty could also reduce the propensity for responding to a falsified message. Finally, Apple, PayPal and many other Internet e-commerce sites will not ask you to verify or change any details regarding your passwords or financial information via email (Norton.com, 2015). If this advice is followed, it could significantly reduce the likelihood of damage and save the government millions in the form of compensation. In 2008 the Police Central E-Crime unit was established in an effort to counteract the rise in cyber crime in the UK. Over  £600 million pounds has been invested in developing systems to prevent and detect cyber crime alongside collaboration with other countries. A very serious culture has been generated; dealing with instances of cybercrime as a tier 1 threat that can be deemed to be terrorism or classified as a à ¢Ã¢â€š ¬Ã‹Å"major incidentà ¢Ã¢â€š ¬Ã¢â€ž ¢ (BBC, 2010). However, it has been said that many systems in place are no longer advanced enough and are subse quently incapable of being effective. The police and the law often à ¢Ã¢â€š ¬Ã‹Å"lag behindà ¢Ã¢â€š ¬Ã¢â€ž ¢ not necessarily being proactive but reactive in nature. It would seem that there is a real need for the arms of state to be strategically thinking of ways to counteract cybercrime. The judiciary, legislature and executive need to more effectively develop the sharing of information so as to reduce the propensity for cybercrime escalating. Another issue that perpetuates cyber crime is the difficulty in identifying where the original crime took place (KPMG International, 2011). This is further aggravated by the shortage of skilled à ¢Ã¢â€š ¬Ã‹Å"cyber crime fightersà ¢Ã¢â€š ¬Ã¢â€ž ¢ to detect and catch criminals at work (Parker, 1998). A possible solution to this could be for the government to channel some of their investment into training more individuals in this area (Dot-ie, 2010). However, it has to be said that the issue of cyber crime could arguably be a wider more e conomically driven problem. Due to levels of unemployment rising in many areas of the world, there has been a movement of talented individuals who have turned to à ¢Ã¢â€š ¬Ã‹Å"underground cyber crimeà ¢Ã¢â€š ¬Ã¢â€ž ¢ where financial information is sold over an untraceable site (Cabinet Office and Detica, 2011). Therefore, it would seem that governments need to address basic economical issues if they are to eradicate cyber crime. Heating up the economy through investment in the public sector as well as in private businesses could arguably result in more jobs and incentives being offered to those à ¢Ã¢â€š ¬Ã‹Å"talented individualsà ¢Ã¢â€š ¬Ã¢â€ž ¢ as opposed to them turning to illegal means of making a living. It is the age-old issue due to lack of adequate pay in public sector jobs many feel it is not lucrative enough for them to join the career. If the demand for highly skilled employees is evident this should be reflected in the remuneration. Perhaps this is where the dispar ity is arising. Furthermore, it would seem that more could be done in educating people about the dangers of purchasing inauthentic products off the Internet. Downloading a pirated version as opposed to purchasing the real thing is another way cyber crime is growing. These types of programs do not contain adequate security systems but several viruses embedded within them. This makes individuals vulnerable to hacking as well as viruses damaging their systems. In 2009, the UK government introduced the à ¢Ã¢â€š ¬Ã‹Å"Cyber Security Strategyà ¢Ã¢â€š ¬Ã¢â€ž ¢ in an effort to help fight against the effects of cyber crime and to work in conjunction with other units to prevent the misuse of computers and the Internet. Once more, the Digital Britain Report highlighted the UK governmentà ¢Ã¢â€š ¬Ã¢â€ž ¢s interest in making the Internet a safer place to trade. In 2008,  £48 billion pounds was made through online retail (House of Commons, 2013). Therefore, it is of vital importance t hat the UK government think of effective ways of reducing cyber crime during retail transactions. The issue of identity theft is also prevalent in relation to cyber crime. This is where criminals obtain sensitive information usually to gain access to financial data. As stated by the Home Office within the first à ¢Ã¢â€š ¬Ã‹Å"6 months of 2009 there was 43% more victims of impersonators; a 74% increaseà ¢Ã¢â€š ¬Ã¢â€ž ¢ from the year before (Home Office, 2010, pg. 13). This is another example of where individuals and their rights to private life are affected, causing them to be victims of fraud. This in turn lowers consumer confidence in e-commerce; a potentially dangerous and damaging occurrence that could affect the health of the UK economy. Having a strong response to these crimes, collaborating with international partners and working with businesses in terms of making their sites and products more resilient to cyber crime is another strategy that can be adopted by government ( Home Office, 2010). Moreover, the increase in child abuse often in the form of grooming or pornography over the Internet is another issue reported on as well as defamation and racial hatred sites. The Home Office pledge to counteract the upsurge in this type of crime by à ¢Ã¢â€š ¬Ã‹Å"creating a hostile environmentà ¢Ã¢â€š ¬Ã¢â€ž ¢ whereby specialist units and the incorporation of legislation such as the Criminal Justice and Immigration Act (2008), Sexual Offences Act (2003), Terrorism Act (2006), Race Relations Act (2000) and The Protection From Harassment Act (1997) serve as a safeguard and enables a quick response in detecting and destroying situations where these offences can arise. Overall, it is apparent that many things could be done to try and reduce the risk of cyber crime in the UK and internationally. Although technological advancement is pivotal to our progression and survival it would seem it comes at a real cost if it gets into the wrong hands. Ensuring that peo ple are educated and warned against the dangers of responding to emails from unknown senders, more high quality training and incentives are provided to counteract the current uprising wave in cyber crime and finally, legislation is proactive and forward thinking so as to create a blanket of safeguards is vital if the UK are to fight against cyber crime and its devastating effects. In 2015, the government passed the Bill for the Serious Crimes Act 2015 which further amends and strengthens The Computer Misuse Act 1990. It is now an offence to perform unauthorized acts that cause serious damage. Hopefully, the judiciary in conjunction with Parliament and The Cabinet will continue to develop a system that is not just à ¢Ã¢â€š ¬Ã‹Å"reasonably equippedà ¢Ã¢â€š ¬Ã¢â€ž ¢ Bainbridge (2004, pg. 359) but strongly resilient so as to protect individuals, businesses and the UKà ¢Ã¢â€š ¬Ã¢â€ž ¢s safety. References: Academic Books: Bainbridge, D., (2004) An Introduction to Computer Law, 5th edition, London Pearson Education McQuade, S., Colt, J., Meyer, N., (2009) Cyber bullying: protecting kids and adults from online bullies, Conneticut:London, Praeger Parker, D.B (1998) Fighting Computer Crime: A New Framework for protecting information, London, Wiley Prasad, R., (2004) Cyber Crime: Combat Strategies, Hyderabad, ICFAI University Press Wold, G., Shriver, R., (1990) Computer Crime: techniques, prevention and detecting crime in financial institutions, London, McGraw Hill Websites BBC News (2010) UK cyber security plans à ¢Ã¢â€š ¬Ã‹Å"essentialà ¢Ã¢â€š ¬Ã¢â€ž ¢ for strong defence https://www.bbc.com/news/technology-11566145 Accessed March 20th 2015 BBC News (2014) Apple à ¢Ã¢â€š ¬Ã‹Å"Celebrity photos targeted by hackersà ¢Ã¢â€š ¬Ã¢â€ž ¢ https://www.bbc.co.uk/news/technology-29032705 Accessed March 20th 2015 BBC News (2015) The worldwide crime web https://news.bbc.co.uk/hi/english/static/in_depth/uk/2001/life_of_crime/cybercr ime.stm Accessed April 22nd 2015 Cabinet Office and Detica (2011) The Cost of Cyber Crime https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-CYBER-CRIME-SUMMARY-FINAL.pdf Accessed March 23rd 2015 Dot-ie (2010) Interpol Boss warns of cybercrime skills shortage https://www.dot-ie.com/tag/attack/ Accessed March 23rd 2015 FT.com (2011) Threat of mobile cyber crime on the increase https://www.ft.com/cms/s/0/5a4ed514-32e5-11e0-9a61-00144feabdc0.html#axzz3Z9fHdpDD Accessed April 20th 2015 Home Office (2010) Cyber Crime Strategy https://www.publications.parliament.uk/pa/cm201314/cmselect/cmhaff/70/7004.htm#n1 Accessed April 10th 2015 House of Commons (2013) https://www.publications.parliament.uk/pa/cm201314/cmselect/cmhaff/70/7004.htm#n1 Accessed April 2nd 2015 KPMG International (2011) Cybercrime a growing challenge for governments https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublicat ions/Documents/cyber-crime.pdf Accessed March 20th 2015 Norton.com (2015) 7 tips to protect against phishing https://uk.norton.com/7-tips-to-protect-against-phishing/article Accessed March 20th 2015 Legislation Computer Misuse Act 1990 Protection From Harassment Act 1997 Race Relations Act 2000 Sexual Offences Act 2003 Police and Justice Act 2006 Terrorism Act 2006 Criminal Justice and Immigration Act 2008 The Bill for Serious Crimes Act 2015 Don’t waste time! Our writers will create an original "ICT and the Law" essay for you Create order