Friday, January 24, 2020
Free Handmaids Tale Essays: The Oppression of Women :: Handmaids Tale Essays
The Oppression of Women in Handmaids Taleà à à à à à à à Within freedom should come security. Within security should come freedom. But in Handmaids Tale by Margaret Atwood, it seems as though there is no in between. Atwood searches throughout the novel for a medium between the two, but in my eyes fails to give justice to a womanââ¬â¢s body image. Today's society has created a fear of beauty and sexuality in this image. It is as though a beautiful woman can be just that, but if at the same time, if she is intelligent and motivated within acting as a sexual being, she is thought of as exploiting herself and her body. Atwood looks for a solution to this problem, but in my eyes fails to do so. In the Handmaid's Tale women are supposed to be more secure then they have ever been. Their bodies and their ability to reproduce are worshiped by society. Crimes against women have been erased. There is no longer rape, or domestic physical and mental violence against women. There is also no abortion. For women to exist in a space like this, one would think that they had the freedom to be powerful, strong women. Yet they are enslaved to this idea of being "protected." Atwood tries to define a womanââ¬â¢s security as being powerful, but really she just contributes to the idea that women are incapable of taking care of and protecting themselves. The novel also portrays a space where a womanââ¬â¢s body is something to fear and hide. "My nakedness is strange to me already. My body seems outdated. Did I really wear bathing suits at the beach? I did, without thought, amoung men, without caring that my legs, my arms, my thighs and back were on display, could be seen. Shameful, immodest. I avoid looking at my body, not so much because it's shamefull or immodest but because I don't want to see it. I don't want to look at something that determines me so completely."(P.63) Women fear their own bodies, they don't love themselves. Which is unfortunate because having love for your body can create a very powerful space for a woman. When women learn to love themselves and their bodies and not fear what they can do with them, they gain self-esteem and confidence to do whatever it is they want to do. A society such as this, defined as having a basis on women, truely, does not.
Thursday, January 16, 2020
Cybercrime â⬠computer crime Essay
1.1Background Cybercrime is also called computer crime. The use of computers as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy is cybercrime. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.1 New technologies creates new criminal opportunities because of the early and widespread adoption of computers and the Internet, these days computer crime has been a growing issue even here in Nepal. 1.2 Statement of Problem The development on information technology and cyberspace made the world as a small global village. People can get access right through the world from their home with internet. The trends of global terrorism are also changed by using such IT. Cyber crime as a ââ¬Å"new weaponâ⬠becomes a potential threat in international peace. In particular, this paper is focused on cyber crime, its effects, challenges and impact of cyber crime on global security. 1.3Objectives of the Study: a. To know how far cybercrimes are occurring in Nepal b. Cyber crime in Nepal and the law into force c. To learn about cyber security 1.4Importance of the Study The research work is basically useful for all researchers and learners who are willing to study about cyber crime. It is equally beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is being a great challenge in each and every development sector. So, it will be useful for the planners and policy makers too. 1.5Limitation of the Study It is because of time constrains; the research is limited in studying on cyber crime, its effects and cyber security only. However, broaden concept of cyber crime has been drawn in the study. Field visit was very costly in terms of time and resources, so only secondary sources (data) have been used to complete the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warfare, and potential threat in international peace. At last various measures for combating it and recommendations. 1.6Methodology In this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research work are based on secondary sources. They were obtained through books, and World Wide Web sites. CHAPTER II HISTORY OF CYBER CRIME The first recorded cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquardââ¬â¢s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was lacking in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date. But we can see many people being the victim of cybercrime. Especially in Nepal, many renowned companies are receiving emails from proxy mailing address demanding for money. Beside this, hacking websites of banks, newspaper and face book accounts, humiliating gi rls and uploading images in porn sites, sales of pirated CDS and DVDS are the most commonly practiced cybercrime in Nepal. CHAPTER III CATEGORIES OF CYBERCRIME Basically we can categories cybercrime into two types: (a) The computer as Target: using of computer to attack another computer like hacking, virus/ worms attacks. (b) The computer as a weapon: using a computer to commit real world crime like cyber terrorism, credit card fraud and pornography, DoS attack and many more.2 CHAPTER IV EFFECTS OF CYBERCRIME As the world goes mobile, cybercrime follows. Criminal takes advantage of technologies and internet in many ways to commit crime which is very hard to control by solo effort. Some of the effects of cybercrime that is frequently occurring in Nepal are as follows; (a) Hacking:This is a type of crime wherein a personââ¬â¢s computer is broken into so that his personal or sensitive information can be accessed. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a personââ¬â¢s computer and the person may not be aware that his computer is being accessed from a remote location. (b) Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading. (c) Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victimsââ¬â¢ lives more miserable. (d) Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a personââ¬â¢s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victimââ¬â¢s name. It can result in major financial losses for the victim and even spoil the victimââ¬â¢s credit history. (e) Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. (f) Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. CHAPTER V CYBER SECURITY AND ITS ADVANTAGES 5.1Cyber security:Cyber Security involves protection of sensitive personal and business information through prevention, detention and response to different online attacks. The measures of applying cyber security are as follows: (a) Privacy Policy: Before submitting your name, e-mail address, on a website look for the sites privacy policy. (b) Keep Software Up to Date: If the seller reduces patches for the software operating system your devices install them as soon as possible. Installing them will prevent attackers from being able to take advantages. Donââ¬â¢t choose options that will allow your computer to remember your passwords. (c) Disable remote connectivity: Some devices are equipped with wireless technologies like Bluetooth that can be used to connect to other devices. You should disable these features when they are not in use. 5.2Advantages of Cyber Security:The advantages of cyber security are mentioned below: (a) The cyber security will defend us from critical attacks. (b) It will defend us from hacks and virus. (c) Internet Security processes all the incoming and outgoing data on your computer. (d) Application of cyber security used in our PC needs update every week. (e) It helps us to browse the site, website. CHAPTER VI CYBER LAW IN NEPAL Nepal has moved a step further in the information and communication technology (ICT) as the government has promulgated Electronic Transaction Act-2063 and Regulations, legalizing all electronic transactions and digital signatures. 4 Cyber law or Electronic Transaction Act clearly defines the rights, duties and authorities of the subscribers, network service provider, etc. The act had provision of separate bodies, IT Tribunal and Appellate Tribunal. The both look into all cases related to computer crime and the cyber crime. The IT tribunal is headed by the District Court Judge and has 3 members. The main purpose of this act (law) is to legalize the electronic transactions and digital signatures for both private and public transactions, protecting the electronic documents from the unauthorized access and to control the illegal activities or the cyber crimes. This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber law. The Cyber law 2006 dictates the limitation for complaint within 35 days of first knowhow of crime and breaching of the cyber law. The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime. CHAPTER VII CHALLENGES IN CYBER CRIME Though there is cyber law in Nepal, but yet there are many challenges in investigating Cybercrime due to: a. Internet and the computers as the Scene of Crime there are many types of computer crime that exist, as well as the legal and technical challenges that face law enforcement and prosecutors in their efforts to combat this crime. b. Investigatorââ¬â¢s skills (not trained) to combat cyber terrorism. c. knowhow of cyber security d. high-tech crimes and confusions e. Low participation of tech groups and less co-operation of resource groups f. Imitation of traditional perspective for defining cyber crime. A challenging aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast distances. g. Creating a Safer Information Society by Improving the Security of Information Infrastructures. CHAPTER VIII RECOMMENDATION Many people has become the victim of cybercrime especially girls, celebrities, politicians and many other renowned personalities. Itââ¬â¢s a well known saying that ââ¬Å"Prevention is always better than cureâ⬠, Therefore, it is always better to take certain precaution beforehand rather than regretting afterwards. Whosoever is accessing the net should take Safety and privacy activation on social networking site. Some of the safety measures are mentioned below: a. Stay informed, pay attention to news sources to learn about recent threats and websites that have been attacked. b. Be careful, to never enter private or financial data into websites that donââ¬â¢t show proof of security. c. Clean and clear your internet cache, lost fragments, orphaned registry keys, temporary files, deleted email messages, and other temporary files on your computer often. d. Google yourself and make sure there is nothing out there that gives out too many details about you. e. Never provide your c redit card number as a proof f. Report abuse, if you are stalked or harassed online, donââ¬â¢t respond to the attacker. Instead keep a record of the communications and report the abuse to the websites administrator. CHAPTER IX CONCLUSION There are appropriate investigative law enforcement agencies, District Police Offices of Police Headquarters or Local Police office, Metropolitan Crime Division who are working against cybercrime and the criminals. Cybercrime is indeed getting the recognition it deserves. However, it is not going to be restricted that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security. Moreover, every individual most apply the possible way to stay alert. ACRONYMS FBI- Federal Bureau of Investigation DoS- Denial-of-Service PC- Personal Computer IT- Information Technology CD-Compact Disc DVD-Digital Versatile Disc / Digital Video Disc ICT-Information and Communication Technology BIBLIOGRAPHY a. http://www.britannica.com/EBchecked/topic/130595/cybercrime b. http://www.bezaspeaks.com/cybercrime/history.htm c. http://www.slideshare.net/aemankhan/cybercrimeppt-27376284 d. http://www.slideshare.net/aemankhan/cybercrimeppt-27376284 e. http://egovernancenepal.blogspot.com/2007/03/cyber-law-electronic- transaction-act.html f. http://www.crossdomainsolutions.com/cyber-crime/ g. http://www.spotlightnepal.com/News/Article/-Cyber-Law-And-Its-Challenge- h. http://www.ekantipur.com/2014/05/25/oped/cybercrime-without-cyber-rules/390001.html i. http://www.thehimalayantimes.com/fullNews.php?headline=Journo+charged+with+cyber+crime&NewsID=38http://setopati.net/politics/1775/0963 j. http://mybhaktapur.com/2011/12/20/nepal-police-arrests-facebook-mis-user-for- cyber-crime/ k. http://www.thehimalayantimes.com/fullNews.php?headline=Cyber+criminals+to+target+mobile%26sbquo%3B+social+in+2014&NewsID=401622 l. http://surendraphuyalnepal.wordpress.com/ m. Kantipur Daily n. Nagarik Dainik o. A Guide to Computer Crime from legal.practitioner.com p. International Journal of Cyber Criminology q. Cybercrime Nepalese Prospective by Nepal Police r. Moore, R. (2005) ââ¬Å"Cyber crime: Investigating High-Technology Computer Crime,â⬠Cleveland, Mississippi: Anderson Publishing.
Wednesday, January 8, 2020
Overuse of Antidepressants Today and How Aldous Huxley...
Antidepressants are a prescription drug now used by people of all ages. They have become a part of society, therefore, taking antidepressants is not frowned upon. Antidepressants are used to make people feel ââ¬Å"happierâ⬠and not to feel sadness. This is shown in the dystopian society in the book Brave New World written by Aldous Huxley in 1932. In that society the people use soma, a well-known drug, to make them feel no pain and are conditioned to think soma fixes everything. Helmholtz and Bernard two main characters, do not take it because they want to be able to see the world for what it is. They also do not want soma to change how they feel; they want to appreciate nature. In addition Lenina and Henry love taking soma because then theyâ⬠¦show more contentâ⬠¦Not everything has to be cured by modern-day technology, such as better antidepressants, sometimes the ââ¬Å"old-fashionâ⬠way is a lot better and more effective. Since the prescriptions have increased, t he use of antidepressants has also optimized in children and adolescents. Part of the high growth in the usage of antidepressants was because doctors were prescribing the drug to children younger than 6. The number of ââ¬Å"antidepressant prescriptions written for teens increases every yearâ⬠(Mitchell). That statistic should be going down because teenagers do not know if they are really depressed or if they just had a bad day. By the doctor just giving them medicine teenagers will never learn how to deal with their problems and how to fix certain situation. By prescribing the medication children and teens are learning how to take the easy way out, by resorting to taking drugs. Antidepressant use is not only in teenagers, but antidepressant prescriptions for ââ¬Å"kids ages 6 and under rose to a surprising 580 percentâ⬠(Mitchell) as well. Starting kids young on antidepressants should not be allowed because then the children could not develop correctly. The childâ⬠â¢s brain is still developing and the use of antidepressants make it that the brain can not fully developed or get so use to the antidepressant doing all the work, that the child would not know how to cope with a bad day or stress. The child would just go straight to the medicine drawer and take
Subscribe to:
Posts (Atom)