Monday, September 30, 2019

Powder Metallurgy

Powder metallurgy is the process of blending fine powdered materials, pressing them into a desired shape or form (compacting), and then heating the compressed material in a controlled atmosphere to bond the material (sintering). The powder metallurgy process generally consists of four basic steps: (1) powder manufacture, (2) powder blending,(3) compacting, (4) sintering. Compacting is generally performed at room temperature, and the elevated-temperature process of sintering is usually conducted at atmospheric pressure. Optional secondary processing often follows to obtain special properties or enhanced precision. 1] Two main techniques used to form and consolidate the powder are sintering and metal injection molding. Recent developments have made it possible to use rapid manufacturing techniques which use the metal powder for the products. Because with this technique the powder is melted and not sintered, better mechanical strength can be accomplished. History and capabilities The hi story of powder metallurgy (PM) and the art of metals and ceramics sintering are intimately related to each other. Sintering involves the production of a hard solid metal or ceramic piece from a starting powder. While a crude form of iron powder metallurgy existed in Egypt as early as 3000 B. C, and the ancient Incas made jewelry and other artifacts from precious metal powders, mass manufacturing of P/M products did not begin until the mid-or late- 19th century†. [2] In these early manufacturing operations, iron was extracted by hand from metal sponge following reduction and was then reintroduced as a powder for final melting or sintering. A much wider range of products can be obtained from powder processes than from direct alloying of fused materials.In melting operations the â€Å"phase rule† applies to all pure and combined elements and strictly dictates the distribution of liquid and solid phases which can exist for specific compositions. In addition, whole body mel ting of starting materials is required for alloying, thus imposing unwelcome chemical, thermal, and containment constraints on manufacturing. Unfortunately, the handling of aluminium/iron powders poses major problems. [3] Other substances that are especially reactive with atmospheric oxygen, such as tin, are sinterable in special atmospheres or with temporary coatings. 4] In powder metallurgy or ceramics it is possible to fabricate components which otherwise would decompose or disintegrate. All considerations of solid-liquid phase changes can be ignored, so powder processes are more flexible than casting, extrusion, or forging techniques. Controllable characteristics of products prepared using various powder technologies include mechanical, magnetic,[5] and other unconventional properties of such materials as porous solids, aggregates, and intermetallic compounds. Competitive characteristics of manufacturing processing (e. g. , tool wear, complexity, or vendor options) also may be c losely regulated.Powder Metallurgy products are today used in a wide range of industries, from automotive and aerospace applications to power tools and household appliances. Each year the international PM awards highlight the developing capabilities of the technology. [6] Isostatic powder compacting Isostatic powder compacting is a mass-conserving shaping process. Fine metal particles are placed into a flexible mould and then high gas or fluid pressure is applied to the mould. The resulting article is then sintered in a furnace. This increases the strength of the part by bonding the metal particles.This manufacturing process produces very little scrap metal and can be used to make many different shapes. The tolerances that this process can achieve are very precise, ranging from +/- 0. 008  inches (0. 2  mm) for axial dimensions and +/- 0. 020  inches (0. 5  mm) for radial dimensions. This is the most efficient type of powder compacting. (The following subcategories are also from this reference. )[7] This operation is generally applicable on small production quantities, as it is more costly to run due to its slow operating speed and the need for expendable tooling. oda[8] Compacting pressures range from 15,000  psi (100,000 kPa) to 40,000  psi (280,000 kPa) for most metals and approximately 2,000  psi (14,000  kPa) to 10,000  psi (69,000 kPa) for non-metals. The density of isostatic compacted parts is 5% to 10% higher than with other powder metallurgy processes. Equipment There are many types of equipment used in Powder Compacting. There is the mold, which is flexible, a pressure mold that the mold is in, and the machine delivering the pressure. There are also controlling devices to control the amount of pressure and how long the pressure is held for.The machines need to apply anywhere from 15,000 psi to 40,000 psi for metals. Geometrical Possibilities Typical workpiece sizes range from 0. 25  in (6. 35  mm) to 0. 75  in (19. 05  mm) t hick and 0. 5  in (12. 70  mm) to 10  in (254  mm) long. It is possible to compact workpieces that are between 0. 0625  in (1. 59  mm) and 5  in (127  mm) thick and 0. 0625  in (1. 59  mm) to 40  in (1,016  mm) long. Tool style Isostatic tools are available in three styles, free mold (wet-bag), coarse mold(damp-bag), and fixed mold (dry-bag). The free mold style is the traditional style of isostatic compaction and is not generally used for high production work.In free mold tooling the mold is removed and filled outside the canister. Damp bag is where the mold is located in the canister, yet filled outside. In fixed mold tooling, the mold is contained within the canister, which facilitates automation of the process. Hot isostatic pressing Hot isostatic pressing (HIP) compresses and sinters the part simultaneously by applying heat ranging from 900 °F (480 °C) to 2250 °F (1230 °C). Argon gas is the most common gas used in HIP because it is an inert gas, thus prevents chemical reactions during the operation. Cold isostatic pressingCold isostatic pressing (CIP) uses fluid as a means of applying pressure to the mold at room temperature. After removal the part still needs to be sintered. Design Considerations Advantages over standard powder compaction are the possibility of thinner walls and larger workpieces. Height to diameter ratio has no limitation. No specific limitations exist in wall thickness variations, undercuts, reliefs, threads, and cross holes. No lubricants are need for isostatic powder compaction. The minimum wall thickness is 0. 05  inches (1. 27  mm) and the product can have a weight between 40 and 300 pounds (18 and 136  kg).There is 25 to 45% shrinkage of the powder after compacting. Powder production techniques Any fusible material can be atomized. Several techniques have been developed which permit large production rates of powdered particles, often with considerable control over the size ranges of the final grain population. Powders may be prepared by comminution, grinding, chemical reactions, or electrolytic deposition. Powders of the elements titanium, vanadium, thorium, niobium, tantalum, calcium, and uranium have been produced by high-temperature reduction of the corresponding nitrides and carbides.Iron, nickel, uranium, and beryllium submicrometre powders are obtained by reducing metallic oxalates and formates. Exceedingly fine particles also have been prepared by directing a stream of molten metal through a high-temperature plasma jet or flame, simultaneously atomizing and comminuting the material. On Earth various chemical- and flame-associated powdering processes are adopted in part to prevent serious degradation of particle surfaces by atmospheric oxygen. Atomization Atomization is accomplished by forcing a molten metal stream through an orifice at moderate pressures.A gas is introduced into the metal stream just before it leaves the nozzle, serving to create turbulence as the entrained gas expands (due to heating) and exits into a large collection volume exterior to the orifice. The collection volume is filled with gas to promote further turbulence of the molten metal jet. On Earth, air and powder streams are segregated using gravity or cyclonic separation. Most atomised powders are annealed, which helps reduce the oxide and carbon content. The water atomized particles are smaller, cleaner, and nonporous and have a greater breadth of size, which allows better compacting.Simple atomization techniques are available in which liquid metal is forced through an orifice at a sufficiently high velocity to ensure turbulent flow. The usual performance index used is the Reynolds number R = fvd/n, where f = fluid density, v = velocity of the exit stream, d = diameter of the opening, and n = absolute viscosity. At low R the liquid jet oscillates, but at higher velocities the stream becomes turbulent and breaks into droplets. Pumping energy is applied to droplet form ation with very low efficiency (on the order of 1%) and control over the size distribution of the metal particles produced is rather poor.Other techniques such as nozzle vibration, nozzle asymmetry, multiple impinging streams, or molten-metal injection into ambient gas are all available to increase atomization efficiency, produce finer grains, and to narrow the particle size distribution. Unfortunately, it is difficult to eject metals through orifices smaller than a few millimeters in diameter, which in practice limits the minimum size of powder grains to approximately 10 ? m. Atomization also produces a wide spectrum of particle sizes, necessitating downstream classification by screening and remelting a significant fraction of the grain boundary.Centrifugal disintegration Centrifugal disintegration of molten particles offers one way around these problems. Extensive experience is available with iron, steel, and aluminium. Metal to be powdered is formed into a rod which is introduced into a chamber through a rapidly rotating spindle. Opposite the spindle tip is an electrode from which an arc is established which heats the metal rod. As the tip material fuses, the rapid rod rotation throws off tiny melt droplets which solidify before hitting the chamber walls.A circulating gas sweeps particles from the chamber. Similar techniques could be employed in space or on the Moon. The chamber wall could be rotated to force new powders into remote collection vessels,[9] and the electrode could be replaced by a solar mirror focused at the end of the rod. An alternative approach capable of producing a very narrow distribution of grain sizes but with low throughput consists of a rapidly spinning bowl heated to well above the melting point of the material to be powdered.Liquid metal, introduced onto the surface of the basin near the center at flow rates adjusted to permit a thin metal film to skim evenly up the walls and over the edge, breaks into droplets, each approximately the thickness of the film. [10] Other techniques Another powder-production technique involves a thin jet of liquid metal intersected by high-speed streams of atomized water which break the jet into drops and cool the powder before it reaches the bottom of the bin. In subsequent operations the powder is dried. This is called water atomisation.The advantage is that metal solidifies faster than by gas atomization since the heat capacity of water is some magnitudes higher, mainly a result of higher density. Since the solidification rate is inversely proportional to the particle size smaller particles can be made using water atomisation. The smaller the particles, the more homogeneous the micro structure will be. Notice that particles will have a more irregular shape and the particle size distribution will be wider. In addition, some surface contamination can occur by oxidation skin formation. Powder can be reduced by some kind of pre-consolidation treatment as annealing. sed for cerami c tool Powder compaction [pic] [pic] Rhodium metal: powder, pressed pellet (3*105 psi), remelted Powder compaction is the process of compacting metal powder in a die through the application of high pressures. Typically the tools are held in the vertical orientation with the punch tool forming the bottom of the cavity. The powder is then compacted into a shape and then ejected from the die cavity. [7] In a number of these applications the parts may require very little additional work for their intended use; making for very cost efficient manufacturing.The density of the compacted powder is directly proportional to the amount of pressure applied. Typical pressures range from 80 psi to 1000 psi, pressures from 1000 psi to 1,000,000 psi have been obtained. Pressure of 10 tons/in? to 50 tons/in? are commonly used for metal powder compaction. To attain the same compression ratio across a component with more than one level or height, it is necessary to work with multiple lower punches. A c ylindrical workpiece is made by single-level tooling. A more complex shape can be made by the common multiple-level tooling. Production rates of 15 to 30 parts per minutes are common.There are four major classes of tool styles: single-action compaction, used for thin, flat components; opposed double-action with two punch motions, which accommodates thicker components; double-action with floating die; and double action withdrawal die. Double action classes give much better density distribution than single action. Tooling must be designed so that it will withstand the extreme pressure without deforming or bending. Tools must be made from materials that are polished and wear-resistant. Better workpiece materials can be obtained by repressing and re-sintering. Here is a table of some of the obtainable properties. Introduction | |[pic] | | | |Powder metallurgy uses sintering process for making various parts out of metal powder. The metal powder is compacted by placing in a closed| |meta l cavity (the die) under pressure. This compacted material is placed in an oven and sintered in a controlled atmosphere at high | |temperatures and the metal powders coalesce and form a solid.A second pressing operation, repressing, can be done prior to sintering to | |improve the compaction and the material properties. | |[pic] | |The properties of this solid are similar to cast or wrought materials of similar composition. Porosity can be adjusted by the amount of | |compaction. Usually single pressed products have high tensile strength but low elongation. These properties can be improved by repressing | |as in the following table. |Material | |Tensile | |MPa | |(psi) | |Tensile | |as Percent of Wrought Iron Tensile | |Elongation | |in 50 mm    | |(2 in) | |Elongation | |as Percent of Wrought Iron Elongation | | | |Wrought Iron, Hot Rolled | |331 | |(48,000) |100 % | |30 % | |100 % | | | |Powder Metal, 84 % density | |214 | |(31,000) | |65 % | |2 % | |6% | | | |Powder Metal, repressed, 95 % density | |283 | |(41,000) | |85 % | |25 % | |83 % | | | |Powder metallurgy is useful in making parts that have irregular curves, or recesses that are hard to machine. It is suitable for high | |volume production with very little wastage of material. Secondary machining is virtually eliminated. |Typical parts that can be made with this process include cams, ratchets, sprockets, pawls, sintered bronze and iron bearings (impregnated | |with oil) and carbide tool tips. | | | |Design Considerations | |[pic] | | | |†¢ | |Part must be so designed to allow for easy ejection from the die. Sidewalls should be perpendicular; hole axes should be parallel to the | |direction of opening and closing of the die. | | |†¢ | |Holes, even complicated profiles, are permissible in the direction of compressing. The minimum hole diameter is 1. 5 mm (0. 060 in). | | | |†¢ | |The wall thickness should be compatible with the process typically 1. 5 mm (0. 060 in ) minimum. Length to thickness ratio can be upto 18 | |maximum-this is to ensure that tooling is robust.However, wall thicknesses do not have to be uniform, unlike other processes, which offers| |the designer a great amount of flexibility in designing the parts. | | | |†¢ | |Undercuts are not acceptable, so designs have to be modified to work around this limitation. Threads for screws cannot be made and have to | |be machined later. | | | |†¢ | |Drafts are usually not desirable except for recesses formed by a punch making a blind hole.In such a case a 2-degree draft is recommended. | |Note that the requirement of no draft is more relaxed compared to other forming processes such as casting, molding etc. | | | |†¢ | |Tolerances are 0. 3 % on dimensions. If repressing is done, the tolerances can be as good as 0. 1 %. Repressing, however, increases the cost | |of the product. | | | Powder Metallurgy – Processing | | | |Topics Covered | |Materials | | |Powde r Consolidation | | |Cold Uniaxial Pressing | | |Cold Isostatic Pressing | | |Sintering | | |Hot Isostatic Pressing | | |Hot Forging (Powder Forging) | | |Metal Injection Moulding (MIM) | | |Materials | |The majority of the structural components produced by fixed die pressing are iron based.The powders are elemental, pre-alloyed, or partially | |alloyed. Elemental powders, such as iron and copper, are easy to compress to relatively high densities, produce pressed compacts with adequate| |strength for handling during sintering, but do not produce very high strength sintered parts. | |Pre-alloyed powders are harder, less compressible and hence require higher pressing loads to produce high density compacts. However, they are | |capable of producing high strength sintered materials. Pre-alloying is also used when the production of a homogeneous material from elemental | |powders requires very high temperatures and long sintering times.The best examples are the stainless steels, who se chromium and nickel | |contents have to be pre-alloyed to allow economic production by powder metallurgy. | |Partially alloyed powders are a compromise approach. Elemental powders, e. g. Iron with 2 wt. % Copper, are mixed to produce an homogeneous | |blend which is then partially sintered to attach the copper particles to the iron particles without producing a fully diffused powder but | |retaining the powder form. In this way the compressibilities of the separate powders in the blend are maintained and the blend will not | |segregate during transportation and use. | |A similar technique is to ‘glue’ the small percentage of alloying element onto the iron powder.This ‘glueing’ technique is successfully used | |to introduce carbon into the blends, a technique which prevents carbon segregation and dusting, producing so-called ‘clean’ powders. | |Powder Consolidation | |Components or articles are produced by forming a mass of powder into a shap e, then consolidating to form inter-particle metallurgical bonds. | |An elevated temperature diffusion process referred to as sintering, sometimes assisted by external pressure, accomplishes this. The material | |is never fully molten, although there might be a small volume fraction of liquid present during the sintering process. Sintering can be | |regarded as welding the particles present in the initial useful shape. |As a general rule both mechanical and physical properties improve with increasing density. Therefore the method selected for the fabrication | |of a component by powder metallurgy will depend on the level of performance required from the part. Many components are adequate when produced| |at 85-90% of theoretical full density (T. D. ) whilst others require full density for satisfactory performance. | |Some components, in particular bush type bearings often made from copper and its alloys, are produced with significant and controlled levels | |of porosity, the porosity being subsequently filled with a lubricant. | |Fortunately there is a wide choice of consolidation techniques available. |Cold Uniaxial Pressing | |Elemental metal, or an atomised prealloyed, powder is mixed with a lubricant, typically lithium stearate (0. 75 wt. %), and pressed at pressures| |of say, 600 MPa (87,000 lb/in2) in metal dies. Cold compaction ensures that the as-compacted, or ‘green’, component is dimensionally very | |accurate, as it is moulded precisely to the size and shape of the die. | |Irregularly shaped particles are required to ensure that the as-pressed component has a high green strength from the interlocking and plastic | |deformation of individual particles with their neighbours. |One disadvantage of this technique is the differences in pressed density that can occur in different parts of the component due to | |particle/particle and die wall/particle frictional effects. Typical as-pressed densities for soft iron components would be 7. 0 g/cc, i. e. | |about 90% of theoretical density. Compaction pressure rises significantly if higher as-pressed densities are required, and this practice | |becomes uneconomic due to higher costs for the larger presses and stronger tools to withstand the higher pressures. | |Cold Isostatic Pressing | |Metal powders are contained in an enclosure e. g. a rubber membrane or a metallic can that is subjected to isostatic, that is uniform in all | |directions, external pressure.As the pressure is isostatic the as-pressed component is of uniform density. Irregularly shaped powder | |particles must be used to provide adequate green strength in the as-pressed component. This will then be sintered in a suitable atmosphere to | |yield the required product. | |Normally this technique is only used for semi-fabricated products such as bars, billets, sheet, and roughly shaped components, all of which | |require considerable secondary operations to produce the final, accurately dimensioned component. Agai n, at economical working pressures, | |products are not fully dense and usually need additional working such as hot extrusion, hot rolling or forging to fully density the material. |Sintering | |Sintering is the process whereby powder compacts are heated so that adjacent particles fuse together, thus resulting in a solid article with | |improved mechanical strength compared to the powder compact. This â€Å"fusing† of particles results in an increase in the density of the part and | |hence the process is sometimes called densification. There are some processes such as hot isostatic pressing which combine the compaction and | |sintering processes into a single step. | |After compaction the components pass through a sintering furnace. This typically has two heating zones, the first removes the lubricant, and | |the second higher temperature zone allows diffusion and bonding between powder particles. A range of atmospheres, including vacuum, are used | |to sinter different mate rials depending on their chemical compositions.As an example, precise atmosphere control allows iron/carbon materials| |to be produced with specific carbon compositions and mechanical properties. | |The density of the component can also change during sintering, depending on the materials and the sintering temperature. These dimensional | |changes can be controlled by an understanding and control of the pressing and sintering parameters, and components can be produced with | |dimensions that need little or no rectification to meet the dimensional tolerances. Note that in many cases all of the powder used is present | |in the finished product, scrap losses will only occur when secondary machining operations are necessary. |Hot Isostatic Pressing | |Powders are usually encapsulated in a metallic container but sometimes in glass. The container is evacuated, the powder out-gassed to avoid | |contamination of the materials by any residual gas during the consolidation stage and sealed-off. It is then heated and subjected to isostatic| |pressure sufficient to plastically deform both the container and the powder. | |The rate of densification of the powder depends upon the yield strength of the powder at the temperatures and pressures chosen. At moderate | |temperature the yield strength of the powder can still be high and require high pressure to produce densification in an economic time.Typical| |values might be 1120 °C and 100 MPa for ferrous alloys. By pressing at very much higher temperatures lower pressures are required as the yield | |strength of the material is lower. Using a glass enclosure atmospheric pressure (15 psi) is used to consolidate bars and larger billets. | |The technique requires considerable financial investment as the pressure vessel has to withstand the internal gas pressure and allow the | |powder to be heated to high temperatures. | |As with cold isostatic pressing only semifinished products are produced, either for subsequent working to sma ller sizes, or for machining to | |finished dimensions. |Hot Forging (Powder Forging) | |Cold pressed and sintered components have the great advantage of being close to final shape (near-nett shape), but are not fully dense. Where | |densification is essential to provide adequate mechanical properties, the technique of hot forging, or powder forging, can be used. | |In powder forging an as-pressed component is usually heated to a forging temperature significantly below the usual sintering temperature of | |the material and then forged in a closed die. This produces a fully dense component with the shape of the forging die and appropriate | |mechanical properties. |Powder forged parts generally are not as close to final size or shape as cold pressed and sintered parts. This results from the allowances | |made for thermal expansion effects and the need for draft angles on the forging tools. Further, minimal, machining is required but when all | |things are considered this route is of ten very cost effective. | |Metal Injection Moulding (MIM) | |Injection moulding is very widely used to produce precisely shaped plastic components in complex dies. As injection pressures are low it is | |possible to manufacture complex components, even some with internal screw threads, by the use of side cores and split tools. |By mixing fine, typically less than 20 ? m diameter, spherical metal powders with thermoplastic binders, metal filled plastic components can be| |produced with many of the features available in injection moulded plastics. After injection moulding, the plastic binder material is removed | |to leave a metal skeleton which is then sintered at high temperature. | |Dimensional control can be exercised on the as-sintered component as the injected density is sensibly uniform so shrinkage on sintering is | |also uniform. | |Shrinkage can be large, due to both the fine particle size of the powders and the substantial proportion of polymer binder used. |

Sunday, September 29, 2019

Post Conflict Reconstruction and the Resurgence of Supposedly Resolved Territorial Conflicts Essay

Beyond the rhetoric of traditional causes of conflicts which intermittently are also at the root cause of African territorial civil conflicts, this paper examines the question as to why conflict resurges in states where conflict has previously been resolved. From the perspective of two major theoretical frameworks in International Relations: Liberalism and Realism, this paper argues that mechanisms for conflict resolution are often short-termed and often not home-groomed to accommodate the needs of citizens emanating from a civil war. Liberals argue that this is primarily a failure of cooperation between external and internal actors or stakeholders in the peace process. To them, this lack of cooperation generates economic problems and inhibits mistrust which is the embryo for conflict resurgence. In contrast conflict resolution fails primarily as a result of factors emphasized by Realism. The conflict may not have been ripe for resolution because the practical meaning of recognition revealed large gaps between the ways that the parties defined their core interests. Against this background and given the depth of antagonism between the DRC government and MONUC on the one hand and rebel movements on the other, economic wealth of the Congo has failed to generate support for the peace process. Instead, it increased friction and placed additional political obstacles in the way of compromise. The paper also examines the potency of peacekeeping as a vehicle for conflict resolution. It argues that the design and conceptualization of peacekeeping albeit structural challenges like inadequate resources, ill-equipped personnel and lack of a clearly defined and sustainable vision are at the bedrock of cyclical conflicts. In examining the role of MONUC and other interveners in the Congolese peace process, the paper engages a conceptual thesis which seeks to clarify the difference between peacekeeping as a mediator, meddler and interventionist in African civil conflicts. This clarification will inform conceptual thinking on the potency of peacekeeping as a vehicle for the resolution of civil conflicts. The conflict in the Democratic Republic of Congo (DRC) is one demonstration of the fragile nature of post conflict reconstruction and speaks to the need to step-up conflict prevention strategies to meet current challenges which have given rise to new trajectories to territorial conflicts in Africa. Despite deploying a Peace Mission to the Congo (ONUC)[1] in the 1960s, and despite currently harboring the largest and highest funded United Nations Peace Operation (MONUC);[2] the United Nations (UN) is still finding it difficult to bring an end to the territorial conflict in what is regarded as the site for the world’s worst humanitarian conflict. The conflict, therefore, seems to protract with each renewed effort to resolve it. Following field visits, extensive reading on the Congo and interviews with conflict analysts and residents of the DRC, this paper assesses the viability of peacekeeping as a measure for preventing the resurgence of new territorial conflict. While most interviewed are of the view that the challenges of the DRC peace process are enormous and complex, this paper interrogates the role of MONUC as a conflict prevention mechanism, and its effectiveness in sustainable peacebuilding in the Great Lakes region. The paper enriches conceptual thinking with the view that peacekeeping as a form of external intervention has the capacity to support fragile states in their peace building process, and to check prospective territorial conflicts if certain requirements are met. Preliminary investigations indicate that, contrary to previous research which posited political, natural resource and cultural underpinnings as causes of the current DRC conflict, the lack of a clearly defined plan to stop hostilities in the East can largely be accountable for the cyclical violence. Contrary to expectation that following the 2006 DRC election, the fragile Congolese state had attained sovereign maturity to govern itself with limited external support, this paper posits the need for dedicated and timely funding to a new mediator who will engage a five-phased peacebuilding process which will re-orientate existent theoretical and pragmatic processes of conflict prevention, and define succinctly, through policy recommendations, a new direction for the prevention of territorial conflicts. Following this introduction, the next section will explore the causes of territorial conflicts in Africa and elsewhere. This section engages a brief differentiation between causes of conflicts and causes of conflict resurgence with the view of demonstrating that if one cannot prima facie understand the causes of conflict, its resolution attempts will be flawed and such attempts will serve as the corner stone on which prospective conflicts will be erected. Section two will engage a theoretical overview of causes of conflict resurgence. This section will examine causes of conflict resurgence as propounded by two main schools of thought of International Relations: Realism and Liberalism. Following this, tools of conflict resolution will reviewed with principal focus on peacekeeping. The Section will trickle down to a case specific analysis of whether peacekeeping as a tool for conflict resolution is a byproduct of intervention or mediation, and whether in the exercise of their craft, peacekeepers qualify to be called mediators or would be considered meddlers. This section argues that, between 1999 to 2006 when the first democratic election in the Congo was organized, MONUC could well be considered as a mediator, but following that period, MONUC till date (July 2006 to 2010) she is a meddler in the peace process which is largely driven by the rapprochement that was reached between the DRC and Uganda on the one hand, and the DRC and Rwanda on the other. Causes of territorial Conflicts in Africa There are contending theories as to the causes of territorial conflicts. Conflicts seem to have a litany of literature compared to other subsidiary topics of International Affairs and African studies. Scholars have thus far not been able to see the divide between causes of territorial conflicts and conflicts which ensue from the impotency of mechanisms tailored to resolve them. As a result, there is no dearth of literature on the causes of conflicts but one hardly finds any one who has contended that an ineffective resolution strategy could spark new trajectories to conflict. Existing literature on causes of conflict is sometimes limited in scope to address on causes in particular. Adekeye Adebajo has articulated political and cultural underpinnings to be responsible for conflicts. 3] This could hold true for the Sierra Leone conflict but in the face of global adversities, his speculations stand to be criticized because other conflicts like the Rwandan genocide emanate from imbalances in the distribution of economic, political and social resources. Moreover, the ongoing Sudanese conflicts have religious/and or ethnic undertones with no element of cultural or political formulations which equally go along way to excavate the lacunae in Adekeye’s speculations. Paul Collier holds the view that conflicts are fuelled by economic considerations. He posits that most rebel organizations cling onto the idea of grievances in order to elicit more public support for their cause. In his hypothesis, he contemplates that a state with superfluous resources, increasing working-age population, and high unemployment rate is most likely to harbor conflict. His hypothesis, though true for many conflicts that have plagued Africa does not explain other cases in Africa. For instance, former British trusteeship of Cameroon fondly known as Anglophone Cameroon has been wailing for a fair share of economic, political, social and natural resources of the country. Despite this, discontentment has not resulted to war or any from of concrete violence as has occurred in other countries. This phenomenon consequently makes Collier’s assertions fluid. Summarily, Collier, Eboe Hutchful and Kwesi Aning argue that there are countries that have experienced conflict where natural resources were not articulated as the source of the conflict. They cited the examples of Chad and Ethiopia. [5] They acknowledged that some conflicts have been fueled by purely non-resource driven motives resulted. This is true with the cases of Angola, Afghanistan and Sudan. They, however, conceded to the fact that in the conflicts in Liberia, Sierra Leone, and the Democratic Republic of Congo (DRC) resources were one of the stimulants among other elements. They tried to strike a balance by postulating that the end of the Cold War culminated in the proliferation of arms, and ineffective post conflict demilitarization, demobilization, and reintegration of ex-combatants which culminated in an outburst of wary and distressed combatants resulting several coup d’etat putsch attempts. While one may agree with the grievance theory, the million dollar question is what are people aggrieved about as to resort to conflicts, destruction of property, murder and assassinations? Is it about Governance? Is it distribution of resources? The answer is definitely far from the propositions of the aforementioned scholars. Because some countries have resource crisis and mismanagement, repressive regimes, and poor governance, but know no conflict. This therefore suggests that there is yet an unknown cause of conflict, and this cause is probably one that cuts across all conflicts. The present paper contemplates that inefficacies in the mechanisms for resolving these conflicts could be the brain-child behind the cyclical resurgence of conflicts in states previously hit by territorial civil wars. William Reno on his part contends that internal warfare is motivated by economic considerations especially with regard to the intensification of transitional commerce. He argues that there is a relationship between corruption and politics. According to Reno, conflict is bound to rise where a ruler makes life uncomfortable for his citizens by encouraging the search of his espionage as a means of escaping from squalid conditions. Reno in his postulations contemplates that the absence of good governance engenders politics as a cause of conflict. [8] William Zartman on his part contemplates that the increase in conflict is orchestrated by the collapse of state structure. [9] While one may agree with the collapse of state theory, the lotto question is: What drives the leaders to run the state aground? Keith Somerville, in his view tries to locate the source of conflict within the geopolitical map of Africa, which was bequeathed to it by the colonial powers. He contends that the colonial boundaries and state lines have led to the potpourri of people who hitherto had never before mixed as a group. [10] This articulation is paradoxical. While it means that even if the boundaries that existed in the pre-colonial time were maintained, there could still exist though at different levels, and with different target. [11] The diverse schools of thought examined above have attempted an investigation into the causes of conflict. They have posited economic underpinnings, lack of good governance, and disintegration of state institutions, religious and ethnic differences, corruption and colonial imprints. The opinions are not quite erroneous but fail to see ultimately that conflicts emanate because the global village appears to be in consonance with the fact that peacekeeping is the first port of resort for conflict resolution. Moreover, the fact that the problems postulated by the above authors have engendered conflicts in some areas and not in some despite the presence of similar factors suggest that there is more to conflict than has been articulated by contemporary research on the subject matter. The present paper contemplates that inefficacies in the dispute resolution machinery incubate further conflicts. This paper contemplates that if peacekeeping tools are tailored to empower stakeholders to a peace process, conflicts will be resolved before they escalate. On the contrast between causes of conflicts and causes of conflict resurgence, it should be noted that if conflicts are not prima facie mastered, it will be difficult to seamstress right solutions to them. As a result conflicts tend to hatch new and probably even more complicated dimensions to it.

Saturday, September 28, 2019

Assignment 2 Essay Example | Topics and Well Written Essays - 750 words - 6

Assignment 2 - Essay Example The mathematical model presented by the Deming was considered to be unrealistic model. The new approach of business presented by Deming demanded to change the whole system and completely restructure the system. Restructuring the complete system made the model controversial. Deming’s concept of variation can be implemented to the classroom by understanding the statistical theory. With the implementation of the statistical theory, it is easy to reduce the impact of variation by implementing and enhancing technology, design of the study and through proper training of staff and students. A wood cutting machine cuts wood logs into desirable sized lumber. Wood logs are manually inserted with the help of lifting machine and then the logs are cut into half and then equal sized parallel strips of timber are cut. The common variation factors are hardness of the wood logs, wear of the cutting blades and machine vibrations. Some times the size of the wood logs differs from one another. In the similar manner, sometimes the blade stops rotating which is caused due to the slip of the motor bearing. Deming provided a systematic and mathematical quality control education method that required science, statics, and industrial engineering management. There is a need to generate vision, teach the students approached to be successful, decision should not only based on effective cost, constantly improve the system, train the staff and hire people with good knowledge and skills to teach, provide guidance to the students instead of being their lords, gain respect of the students instead of asking for the respect, reward the efforts of the students, never punish the students but allow than to self improve themselves. Juran’s philosophy emphasizes that quality, production and economy can be increased by improving the management. He described the three management improving ideas to improve the system’s

Friday, September 27, 2019

Easy Jet Airline Company Term Paper Example | Topics and Well Written Essays - 1250 words

Easy Jet Airline Company - Term Paper Example Easy Jet Airline Company Since its establishment in 1994, the company has undergone a lot of improvements including base openings and acquisitions. For a company to survive in the market, it should employ marketing strategies that are compatible with the market and profitability of the company (Koenigsber, Muller & Vilcassim 279). Easy Jet has applied a unique marketing strategy that has enabled it to survive in the competitive market (Koenigsber, Muller & Vilcassim 281). The mission of the company is to provide customers with exceptional value and point-to-point airline services. The company also aims at offering and effecting reliable and consistent fares and products that appeal to business markets and leisure on various European routes. By 2009, the company had employed more than 6107 employees. Easy Jet has been one of the most successful and competitive low-cost and short-haul airline with a clear pricing structure (Mayer 16). All prices for a given flight are quoted one way; this means that a single p rice prevails in any point of the flight. The prices of the airline are low early on, but increase as the date of departure nears. Easy Jet applies various and distinct strategies in its operations. First, the company does not offer a last minute deal. One cannot get a flight ticket at the last minute of the flight. Secondly, the company offers a single class of travelers unlike other airline companies where there are different travelling classes. Price is the only variant that controls the demand for flight tickets at Easy Jet Company (Mayer 17). The third strategy applies to the duration of sale of tickets. The company varies the time in which its tickets are offered on the market. The first two strategies can be contrasted to the traditional airline pricing strategy. Most of the competitors of Easy Jet Company offer the last minute deals through resellers or directly to customers (Koenigsber, Muller & Vilcassim 282). The prevailing pricing strategy at Easy Jet also aims to contro l the demand through seat allocation to certain classes of people. This is done by making price the only variable that controls demand for travelling tickets, and offering equal services to all customers. Ryanair is one of the airlines, which compete with Easy Jet. The two companies use the same pricing strategy that insists on providing air services that are cheaper than other competitors. The low prices set by the two companies are feasible through reducing all possible costs, and having no frills. They use indicative ways to reduce their costs such as little product differentiation, reducing the costs of research and development and reducing the advertising and selling costs (Jones 28). The two companies also use efficient scale facilities; any innovations can only be adopted when the other competitors have tried and implemented them successfully. This helps in reducing the risks that may arise after implementing these innovations. A competitive advantage of the two companies lie s in the fact that they have a combination of high frequency services and low cost fares (Mayer 17). They also have an excellent network of routes where they increase the number of flights. Having reduced prices, Easy Jet and Ryanair do not offer drinks, food, or other services offered by other competitors. This way, the company lowers the expenses thus reducing the prices. Easy Jet has succeeded in reducing the costs

Thursday, September 26, 2019

International Trade Debate Part II Essay Example | Topics and Well Written Essays - 500 words

International Trade Debate Part II - Essay Example 1. While lower-end production jobs have been lost to 3rd world countries, increased use of automation and component-based manufacturing have resulted in an increase of high-paying manufacturing jobs in the US. 4. This increases the employability of Americans, opening up opportunities not just within the US, but overseas too. More Native Americans have migrated out of US in the past 20 years than ever before in history. 1. What is called as outsourcing and off shoring is nothing but one way of implementing balance of trade. The US has more bargaining ability than any other country in the global economy, and any loss of jobs to outside of US would have been offset by a host of other commercial and economic benefits, which are not always visible. 2. Migrants bring high-end skills and specialization to the American economy thereby helping it to maintain its sovereign status. A typical example is the Information Technology industry which employs thousands of migrants, but the largest consumer of which is American industry, which has moved up the value chain, through more automation. 4. Stronger 3rd world economies directly results in lesser migration of low-skilled workers from other countries, and hence less crime, lower unemployment rates and less Government spending on social security. In the long run, Globalization and International Trade benefits all

Wednesday, September 25, 2019

Down sizing at the dodge clinic Article Example | Topics and Well Written Essays - 250 words

Down sizing at the dodge clinic - Article Example In this sense, it promotes optimal service delivery thus improving client satisfaction and goal achievement (Matthews, 2013). Additionally, to the employees, it encourages teamwork and urge to learn more as one gets more experience. However, there is a huge disadvantage that is, putting some employees in high tension. That is, due to personal fear to the changes, an employee can be under high tension to give the best ending up in lower quality service delivery (Matthews, 2013). Two key aspects that have not been put into consideration include, employee motivation factors such as bonuses which will encourage get the best output from each thus aid determining those whom their service delivery is low. Secondly, the technology should have been at the forefront to ensure that the clinic is in touch with all technology advancements in the health industry (Matthews, 2013). In order to keep the hospital’s Continuous quality improvement moving forward, the following steps should be followed by the Administrative staff. Firstly, perform the lay off quickly to avoid morale lowering, and then ensure the law has been put into close consideration. Thirdly, the administrative staff should practice ways of compassionately laying off an employee (Matthews, 2013). Organize a one-on-one meeting with the targeted employee and then hold the meeting. Sixth, offer support to the employee in terms of both resources and reference to the employee. Lastly and yet importantly, if essential clarify the lay off to staff members. Essentially, this provides transparency thus raising the clinic’s reputation to all staff members and encouraging them to give their best in achieving the set out goal (Matthews,

Tuesday, September 24, 2019

Education Politics in UK Essay Example | Topics and Well Written Essays - 1000 words

Education Politics in UK - Essay Example This is also sometimes seen as a form of social control, Education as 'handmaiden': the education system serves the industrial process and the economy by producing a trained workforce, and by providing childminding services, Social change (or 'social engineering'). The education system has been seen as a means of bringing about social change.1 Many social theorists think that for many decades education has suffered through unsuccessful traditional policies to which there always has been a need for fundamental changes in the structure and nature of educational institutions. Educational policies have been dealt with profound and often confrontational debates over the nature and purposes of education in society, particularly those between education, the economy and the nation. The changes initiated during the period altered the power relationships which had underpinned the education system since the 1944 Education Act, which itself had shaped the post-war educational world. Free elementary education was introduced in England in 1870; secondary schools were fee-paying until 1944. 80% of children left after elementary education, which after 1918 finished at 14. The 1944 Education Act introduced free secondary education. ... guments for comprehensives are they reduce the likelihood of discrimination or disadvantage on the basis of class, and that they improve the prospects of children of middling ability. The main argument against is that the selective system may be more consistent with the idea of equality of opportunity. Working class children who went to grammar schools did better than those who go now to comprehensive schools. The current political agenda in the light of educational policies and inclusion require us to analyse the facts behind educational policies highlighting Governmental efforts behind inclusion. When in 1990s Industrial mentoring movement initiated, it involved almost 17,000 pupils in hundreds of British schools to take benefit from those thousands of companies that encouraged their business people and allow them to volunteer as mentors2. From 1994 to 1998, the education was escorted by the European Youthstart Initiative who funded almost a hundred programmes of employment-related guidance, education and training for socially excluded young people in the UK, and the majority of these included mentoring. However, the political extravaganza remain a significant part of the Initiative, where the Institute of Career Guidance (ICG) co-ordinated the Mentoring Action Project (MAP), the largest such programme in Britain to that date3. The MAP remained a success which took over almost one quart er of statutory careers services in England and Wales, thereby allocating mentors to 1,700 young people4. During the same period, the Dalston Youth Project, a voluntary sector scheme working with young black offenders in London's deprived East End, became nationally lauded as an exemplar of mentoring for socially excluded youth. The National Mentoring Network (NMN) in 1994 was

Monday, September 23, 2019

The Autonomic Nervous System Essay Example | Topics and Well Written Essays - 1750 words

The Autonomic Nervous System - Essay Example Each pathway comprises of a preganglionic neurone as well as a postganglionic neurone. Within the sympathetic system, the synapses between these two neurons are located near the spinal cord. On the other hand within the parasympathetic nervous system, these two neurons are located near to, or within the effector organs (Tortora & Derrickson 2009). The effects of the sympathetic and parasympathetic nervous systems normally oppose each other. They are termed as antagonists, thus is one system contracts a muscle, the other usually relaxes it. The balance between the two systems concisely regulates the involuntary activities of the organs and glands. Exceptional to note is that it is feasible to control consciously specific activities of the autonomic nervous system through training. Some examples in this include control of the anal and bladder sphincters. With regard to nerve impulse transmission process, the sympathetic nervous system stimulates effectors and produces noradrenalin as t he neurotransmitter at nerve junctions. In contrast, the parasympathetic nervous system inhibits effectors and produces acetylcholine at the nerve junction, otherwise called the synapse (Tortora & Derrickson 2009). The autonomic nervous system comprises of motor neurons which innervate smooth and cardiac muscles as well as the glands. These neurons also ensure optimal environments conditions within the systems to ensure maximum support for body activities. The neurons operate via subconscious control and have viscera as most of their effectors. Within the autonomic nervous system, the preganglionic fibers release acetylcholine as the major neurotransmitter. Postganglionic fibers release norepinephrine or acetylcholine whose effects can either be stimulatory or inhibitory. The neurotransmitter effects within the autonomic nervous system on target organs are dependent on the neurotransmitter released. Additionally, such effects are dependent on the type of receptors expressed on the e ffector organs. The divisions of the autonomic nervous system serve similar visceral organs but cause opposite effects. These divisions exemplified by parasympathetic and sympathetic categories help in maintaining homeostasis. Precisely, the sympathetic division mobilizes the body during activity while the parasympathetic division conserves the energy within the body. The role of parasympathetic division is well illustrated when a person relaxes after taking a meal. In such a circumstance, the division plays a role of keeping the energy level consumption as low as possible. As such, the heart rate, blood pressure and respiratory rates are kept at lower concentrations. However, during such circumstances, the gastrointestinal tract activity is high as a result of digestion. The skin is warm while the pupils are constricted. On the other hand, the sympathetic division is a good depiction of fight or flight system. This division allows the regulation of activities during exercises. In s uch scenarios, the system reduces the flow of blood to organs while it increases the flow of blood to muscles. Its activity is illustrated by an individual who is under a threat and as such, the heart rate increases with rapid and deep breathing. Additionally, the glucose levels in the blood are high because this important sugar is released from the liver. Furthermore, the skin is cold and sweaty while the pupils of the eyes are dilated due to alertness. Parasympathetic div

Sunday, September 22, 2019

What is the Buddhist Critique of the Christian understanding of God Term Paper

What is the Buddhist Critique of the Christian understanding of God - Term Paper Example Whatever the case, misconception of religious aspects have elicited debates which tend to prove or disapprove practices that do not conform to the perceived beliefs. The concern is not to discredit the practices observed, but to contend to factors that led to such practices. Recent development in the religious circle indicates a practice, which does not seek to find the truth, but creates competition among the religionists. The suspicions that a given group of religionist directs towards others does not portray the intention of religion in humanity. The aim of this paper is critique Buddhist understanding of the God served by Christians. Christian Understanding Christianity is a religion that traces its foundation from the teaching, death and life of Jesus Christ. The focus on Jesus Christ by Christians point to the God they serve. History of Christianity points various incidents when God revealed Himself to men. Understanding the concept of Christian faith necessitate the understand ing of nature of God they serve. Christians profess to serve a God who is monotheist and posses qualities such as ever presence, exercises control over nature and has the ability of redeeming humankind from its predicament.Human beings feel that it is wrong to commit ill against a fellow human being. Religionists contend that perception professed in religious faiths tend to promote harmony in humanity. Pointing at the Christian understanding, human beings co exists as a family whose head is God. The teaching of Christianity project evil deeds as influences, which distract the moral will of God. Humankind has thus been lost because of the practices, which they do. The road to redemption from this lose is through Jesus Christ. Redemption from the evils in the concept of Christian understanding is to focus on Jesus Christ whose misery in death and resurrection redeemed humankind from all sin3. The concept of Christian faith has the following elements punishment for sins, redemption, fo rgiveness and new birth. Christians’ belief observes sin as a factor that separate human beings from divinity of God. God is a divine creature above other creatures. The explanation of Gods existence transcends thought which argue on His visibility. Redemption is relevant to Christians because of the separation created by sin4. The point in the Christian tradition is to serve a God that redeems humankind from the ills of sin. Forgiveness element bring a Christian back to the fold of God since the stain of sin would no longer influence relationship between human beings and God. Forgiveness of sin can only happen when a person believe in the teaching of Jesus and profess the same faith to others. Not until then, human beings have no power over sin. The concept of new birth differentiates a Christian from other human beings who do not profess the same faith. The nature of God that Christians serve is unique in the sense that God respect life, project love, natural order, and har mony. These aspects influence Christians to develop attitudes, which promote the teachings of Jesus Christ. Respect for human life eliminates all manner of evils that a person would be intending to do to the other fellow. Christian doctrines define life and penalty of sin as death with a meaning that the whole idea behind Christianity is life5. Human life is precious or valuable above all other things. The giver of life is thus creature above ot

Saturday, September 21, 2019

Romeo and Juliet Essay Example for Free

Romeo and Juliet Essay Topic Sentence: Who, in your opinion, is most to blame for this tragedy? One of Shakespeare’s most known plays is the love story between Romeo and Juliet, which ends up as a tragedy. There are many different reasons and causes to why this tragedy occurred between the two young lovers, Romeo and Juliet, Friar Laurance, their parents and also the element of fate. Romeo and Juliet are two young lovers who seem to rush the love between each other by becoming married to after only a matter of hours of knowing each other. Friar Laurence who should have been smarter in his actions by marry the two which ending up causing this tragedy, also both Romeo and Juliets have a role that ended up causing their children a tragic end. . Finally, the element of fate comes into play we realise that their tragic deaths may have been predetermined and would be unchanged even if they decided to act differently to what they did. Romeo and Juliet contribute to their tragic end. Both Romeo and Juliet are two young teenagers who rush there love between each other and make important decisions without proper thought to what the consequence might be. Romeo and Juliet are both too naive and do not realise nor think about their actions before actually doing them. ‘ Had I ever loved before? ’ Romeo says this when he first lays eyes on Juliet, without even properly meeting her he is already madly in love with her. This is simple naivety, which causes both Romeo and Juliet not to think about their actions and results in the ultimate sacrifise, their own lives. As for Juliet who has never felt love before, shows how naive she really is by just thinking that she is in love without experiencing it before meeting Romeo. Due to Romeo and Juliet’s naivety and lack of thought, contribute massively to the tragedy that they both suffer. The Montague’s (Romeo’s family) and The Capulet’s (Juliet’s family) have been feuding for decades and has become as bad as them trying to kill each other when they see each other on the streets. This relationship between the two families cause a major problem between Romeo and Juliet when they first realise who their families are. Both Romeo and Juliet realise that they can not tell anyone that they were madly in love with each other because they knew that both of their families would not allow the relationship and they could not be away from each other. So in result of the feud between the two families Romeo and Juliet have to keep their love secret when it would of help their relationship if they could talk to their parents and receive advise to reconsider how fast they were rushing into things. Both Romeo and Juliet did not have this advice and it ended up causing a tragedy. Friar Laurence has a major of role in the tragedy of Romeo and Juliet. Friar Laurence ends up making four fatal mistakes, he gave a poison to Juliet, he trusted someone else with a letter of great significance to deliver to Romeo, he married the two and he fled when Juliet was in the most danger at the tomb. His biggest mistake was the horrible advice and decision making that he made when he first found out about Romeo and Juliet’s secret love for each other. Both Romeo and Juliet were too naive to understand the full extent of the situation, however Friar Laurence being a much older man with much more wisdom and knowledge acted in a way that ended up causing the tragedy to occur. If he had been wiser and gave both Romeo and Juliet advice that they needed and not gone along with their plan to un-thought plan, the end up result would have been different. Fate is a major element in the play Romeo and Juliet. The element of fate is a power that predetermines events in your life and is unchangeable or is certain destiny. It is irreversible. From the first page of the play we hear about fate, Romeo and Juliet are mentioned as `star-crossed lovers meaning that fate will bring them together. It also says that their love is `death markd which means that their fate will be tragic. This suggest to us that the end up result was always going to be the same no matter of what different actions Romeo and Juliet made. The Fate of Romeo and Juliet’s love could also be questioned as unlucky and coincidental. The Montague boys are accidently invited to the Capulet’s â€Å"feast† were Romeo and Juliet meet. Friar Laurences second letter is never sent to Romeo because Romeos cousin reaches Romeo before the letter ever has a chance. Romeo arrives at the tomb just before Romeo sees Juliet waking up and kills himself think she is dead, which results in Juliet killing herself. In conclusion I believe that Friar Laurence is mainly to blame for this tragedy between Romeo and Juliet. Both Romeo and Juliet were just too naive to think about their actions full effect, when Friar Laurence who is a much older and should have been much wiser did not think of the consequences when he really should of and gave them both horrible advice. That is why a believe Romeo and Juliet’s tragedy is to be blamed on Friar Laurence’s actions.

Friday, September 20, 2019

The detection of online child abuse in UK

The detection of online child abuse in UK Introduction The explosion and availability of the internet have seen huge advancements in the world of communications and business. However, along with the benefits the internet has created a new environment for criminals to engage in criminal activity. Theft and fraud are the more common crimes committed on the internet but a more disturbing crime is on the increase. Child abuse has been around for centuries but with advancements in technology, the upsurge in social networking sites and instant messenger services, children are now at greater risk from online sexual abuse within their own homes as the PC, gaming consoles and even mobile phones become the gateways for abusers and organised networks of criminals to prey. This reports aims to look at the way the United Kingdom legal system alongside national and international agencies are working together in order to tackle the growing problem of online child abuse. This report will also highlight cases of abusers who have been jailed for their crimes and also highlight the roles played by Internet Service providers, the media, charities, education and families who all have a role to play in keeping children safe online. What Constitutes Child Abuse? In order to discuss the prosecution and detection of child abuse, it is important to primarily define the term child abuse. According to the World Health Organisation (WHO, 1999) the term child abuse refers to the ill treatment of children which includes sexual abuse, physical abuse, emotional abuse, neglect and exploitation that results in actual or potential harm to the childs health, development or dignity (World Health Organisation, 1999) or in its purest form when an adult intentionally hurts a child under the age of 18 (NSPCC, 2011). It is difficult to define the term online child abuse as it encompasses all of the charcteristics of the current definition of child abuse as already described however, the term online reflects the methodology deployed by the offenders. Online child abuse has many characteristics, e.g., bullying, and more serious offences such as creating and downloading images of sexually abused children or approaching children to engage in sexual conduct either o nline or offline (HUWY, 2011) now legally known as grooming under The Sexual Offences Act 2003 (s14 s15). A well publicised example of this was witnessed In Durham Crown Court, March 2010, where Peter Chapman was convicted of sexually assaulting and murdering 17 year old girl Ashleigh Hall who he had lured through the social networking site Facebook. He created the persona of a teenage youth in order to lure Ashleigh Hall into meeting him (Stokes, P, 2010). At the trial it is estimated Chapman had used the social networking site to make contact with 2981 females between the ages of 13 and 31 (Armstrong, et al., 2010). Internet Usage Since 2001, the number of children using the internet has increased dramatically. A report commisioned by the London School of Economics in 2005 (UK Children Go Online) estimated in the 9 to 19 years age group, 75% of children had internet access at home, rising to 92% access at school (Livingstone, et al., 2005). A report by Ofcom in 2008 indicated that 35% of all 12 to 15 year olds had access to the internet in their bedrooms, 16% of 8 to 11 year olds and even children in the 5 to 7 year age group accounted for 3% (OFCOM, 2009). As technology has developed and the internet is now more accessible through other platforms such as mobile phone technology and online gaming consoles, the UK Council for Child Internet Child Safteys Click Clever Click safe campaign highlighted the Ofcom report by revealing that of the 44 million people who currently have internet access in the UK, 99% were in the 8 to 17 year age group (OFCOM2009 cited in UKCCIS, 2009). Although it is virtually impossible to quantify the total number of unprosecuted online child abuse offences, a report conducted in 2000 by the Internet Crime forum (ICF) estimated that 1 in 5 children online had been approached by paedophiles or other undesirables online (cited in Childnet, 2001). In view of the increasing usage of the internet and mounting crime against children committed online, in 2007, the Labour Government sanctioned an independent review into child online safety and commissioned Dr Tanya Byron to produce a report detailing the risks and effects of children surfing online. The Safer Children in a Digital World report was published in April 2008 and recommended a national strategy for Child Safety and a shared culture of responsibility in order to sustain safety (Byron, 2008). The report focused on the need for legislation, education and parents to all play their role in internet safety. The childrens charity Barnardos as recently as January 2011 reported in their publication Puppet on a String, (Barnardos, 2011) the dangers of child exploitation both on and offline. Using figures recorded by CEOP, Barnardos revealed a 16% year on year increase of reported crimes of which 25% were directly of an online nature. In 2008/9, 5411 crimes were recorded and by 2009/10 that had increased to 6291 (CEOP, 2010). As well as potential for criminal contact between adults and children, the internet has become a portal for offenders to upload and view images an videos of children engaged in sexual acts. There are no official or unofficial figures on the number of child abuse images on the internet but of the 34,871 websites reported to the Internet Watch Foundation in 2007, 85% of those contained images of children in a sexual nature (IWF, 2008). Undoubtedly the rise in internet use and availability of web services will create opportunities for offenders to distribute indecent photographs and videos of abused children, hence the number of pictures will inevitably increase. (Taylor, et al, 2003 cited: Byron, 2008, 3.41, p51). As the use of the internet by children increases and its portability through technology advances further, its is increasingly more important that children, parents and teachers are more aware and knowledgeable of the dangers of being online. This goes hand in hand with mechanisms in place to prevent and report unsolicited or criminal activity and adequate legislation to convict offenders of these heinous crimes. Online Child Abuse and UK Law Legislation created to protect children and subsequently prosecute those guilty of child abuse offences in the United Kingdom falls under many acts of legislation in the UK legal system. The Children and Young Persons Act of 1933, (part 1, c12) still in force today, states the legal obligation to protect children from the prevention of Cruelty and Exposure to Moral and Physical Danger (Childrens and Young Persons Act 1933, c12, 2011). Section 1 (1) of The Indecency with Children Act of 1960, goes further by stating it is an offence to individually or with another incite or engage in acts of gross indecency with a child (Childnet, 2001) and is therefore liable for conviction . Today the legislation for the protection of children online or offline is rooted in The Children Act (1989) and the Sexual Offences Act of 2003. Section 31 of The Children Act states that harm to a child legally constitute the ill-treatment, impairment of health or development of a child which can include sexual abuse and non physical ill treatment (The Children Act 1989, 2011)S31, [f3, (9). The Protection of Children Act 1978 (England and Wales) (c.37) states it is illegal to take, possess, distribute or publish indecent photographs of children under the age of 16 [f22,(6). In May 2004, The Sexual Offences Act (2003, S.45), amended the age limit to include children up to the age of 18 unless defendants could prove they were a) in a relationship with the child involved (section 1A (1) and b) the child had consented to the photographs being taken (section 1A (4). In April 2008, The Police and Justice Act (2008, s39,) revised section 11 of The Protection of Children Act 1978 further by giving the police the powers to remove and retain indecent photographs of children under the age of 18 unless the defendant could prove they had a legitimate reason for being in possession of such material (IWF,2011). In August 2008, Paul Hagan was charged and convicted in Teesside Crown Court for possessing 15,000 child abuse images and distributing nearly 4400 to others. It is estimated that the website collectively had nearly a million indecent images and video clips relating to child abuse (Hunter, 2010). Computer generated Images, not necessarily photographs that depict or infer children engaging in sexual activity are also illegal and fall under the remit of the Coroners and Justice Act (2009) pt2, ch2, (65). This Act defines an image as a moving or still image produced by any means (legislation.gov.uk, 2011) Where the offence involves technology, Online Child abuse is still dealt with as an offence against the child and is determined and punishable also under many acts of the UK legal system in both the criminal and civil courts. However, new legislation incorporates the new methodologies of Child abuse not applicable in for example the creation of The Children and Young Persons Act of 1933; a time when information technology was not invented. The Sexual Offences Act of 2003 was produced as a result of a government investigation in 2000 into sexual offences. The Home Secretary at that time, David Blunkett, viewed the existing legislation and legally and socially outdated and inadequate to deal with mounting public pressure to deal seriously with sex offenders and also to reflect changing social attitudes. (Batty, D, 2003). The Sexual Offences Act (c42, Part 1 sections 14 15) relates to the relatively new offence of sexual grooming. Sexual grooming in the UK is legally defined as communicating with a child with the intention of meeting in order to commit a sexual offence (The National Archives, 2010). If an adult (a person over the age of 18) is seen to have attempted to make contact and arrange to meet with a child on more than one occasion with the intention of committing a sexual act, they will be liable to prosecution under the Sexual offences Act of 2003 s15, (1)(a). Successful prosecutions of this offence can lead to prison sentences of ten years (Sexual Offences Act 2003 s15, (4)(b). Further to this revision, another new law came into force to further protect children further. Under Section 42 of the Sexual Offences Act 2003 part 2, 123 (a)(b), A senior police chief can apply to the courts for a civil Risk of Sexual Harm Order (The Crown Prosecution Service, 2011) against an adult who has previo usly been involved in illicit conduct with a child on more than one occasion even if they may not have necessarily been convicted of such crime. The Risk of Sexual Harm order serves to protect children by placing a minimum of a 2 year order on an adult considered to be a threat to not engage in any form of sexual activity, whether it is verbal, via instant messaging services or in internet chat room (Blackburn City Council, 2011) . On conviction of any sexual offence whether online or offline involving a child (post 1997), the offender is placed on the Sex Offenders Register and will have to comply with orders governed under Sexual Offences Act (2003) c42, part 2, Section 81 (1) that relate to the Sex Offenders Act (1997) pt1. Under this act the offenders must report to a Police station within 3 days of conviction and inform of any address changes or movement which may involve them being away from their current address for more than 7 days. Failure to comply can result in a 5 year jail term (CPS, 2011). Offenders can remain on the sex offenders register indefinitely if their conviction for this offence resulted in a 30 month or more jail sentence. For jail sentences of a lesser term, the length of time spent on the register is seven to ten years or half that time if the offender is less than 18 years old (Batty, 2006). Having served jail sentences and being placed on the Sex Offenders register, under the Proceeds of Crime Act (2002) and the Serious Organised Crime and Police Act (2005) (SOCA, 2011), the police now have the power to remove/seize assets of offenders that have been made through Child abuse offences. This act enables police to confiscate goods through any criminal conduct deemed so in UK law. (The Guardian, 2009). Detecting Online Abuse Responsibility for the detection and prosecution of offline and increasingly more online Child abuse crimes in the UK involves a myriad of specialised agencies. The sensitive nature of this crime requires specialist, sensitive and professional management from the start of an investigation to the end from the childs perspective and the alleged offender. Successful convictions are to be commended; yet cases where there has been an arrest but no conviction can have ominous consequences for those involved. The Government, Crown Prosecution Service, E crime units at local police forces, Internet Service Providers (ISPs), charities such as The Internet Watch Foundation, local authorities and education all play a role in the protection of children from child abuse. The UK collaborates with European directives and international organisations in order to share information and specialist advice. At European level, the Council of European Convention on the Protection of Children against sexual Exploitation and Sexual Abuse came into force in July 2010 (CET.201), stating each member states responsibility to protect children and enforce the law on child abuse offences (EU, 2010) in accordance with Section . Further to this, there are currently proposals to extend the powers each governments hold further to force internet service providers to adhere to the Internet Watch Foundations (IWF) block list of offending web sites and remove the site from the host (Williams, 2011). On a worldwide level, The Virtual Global Taskforce is an example of one such organisation that operates on an international level. The Global Virtual Taskforce was formed in 2003 and consists of 7 multinational police forces from countries such as The UK, Canada and Australia who pool information and strategies in order to protect and educate children and ensure prosecution of offenders (VGT, 2011). Interpol also have a central database of suspects and the movement of offenders whom it shares with specialised units within police forces worldwide known as the International Child Sex Exploitation image Database (ICSE-DB) (INTERPOL, 2010). Interpol also release what are termed as green notices to organisations involved in Child abuse detection to warn of the movement of a convicted offender who may have located in their area (INTERPOL, 2010). Child Exploitation and Online Protection Service (CEOP) The key taskforce currently operating in the UK today created specifically to report, detect and tackle the growing problem of online child abuse is the Child Exploitation and Online Protection Service, otherwise known as CEOP. CEOP was created in 2006 as an independent central unit for detecting individuals and paedophile rings that use the internet to commit such crimes. All UK reported cases of Child abuse whether relating to on or offline offences are reported to CEOP. CEOP was the result of the creation of the Serious Organised Crime Agency (2006) (SOCA) which in turn overhauled the National Hi-tech Crime Unit of 2001 (NHTCU). The NHTCU was originally created to tackle the growing problem of all crime committed on the internet. With the creation of SOCA, the NHTCU was incorporated into SOCAs E crime unit and online crimes against the child fell under the remit of CEOP. CEOP is a multi professional unit of the police force which operates alongside and with the full power of the law. Based on information received, CEOP has the authority to investigate and on successful proof of evidence, prosecute offenders The organisation consists of highly trained police officers, IT experts, with assistance from internet service providers (ISP), local authorities, psychologists and educational agencies who collaborate in order to identify, locate and protect children from potential abuse (CEOP, 2006-10). The organisation has an online reporting mechanism on their website for the public to use if they suspect or have been a victim of child abuse. It also holds a database of the most wanted suspects who are currently wanted for questioning in relation to child sex abuse offences. CEOP have also created with the assistance of social networking sites like Facebook, a panic button known as ClickCEOP enabling children to click and report unsolicited or potentially criminal activity (Allan, 2010). The main function of CEOPS is the detection of online crime against children. Intelligence gathering is one of the key activities of the organisation and involves working nationally and internationally with police forces and experts to coordinate information and track activity across computer networks. CEOP also with the assistance of other agencies attempts to trace convicted offenders who have contravened their conditions determined under the Sex Offenders register. With the authority from The Regulation of Investigatory Powers Act 2002, (RIPA), CEOP is able to share information with other police authorities and non police agencies e.g. local government authorities and councils, as the knock on effects of Child abuse often will require intervention from Social services departments. CEOP is a multi faceted organisation. As well as crime detection CEOP operates preventative measures and works alongside other organisations e.g. NSPCC and software companies like Microsoft to help eradicate online child abuse. It also plays a major role in the education and training of professionals who work within this field, e.g. police officers, social workers and regards itself as a truly holistic organisation that not only deals with the responsibility of detecting crime but works as an agency that endeavours through research and detection methods to trace movement of offenders and offences. This technique known as crime mapping facilitates in locating individuals and organised gangs and pinpoints areas where these crimes have been committed in order to forewarn local police forces and monitor offenders before they offend again. CEOP also aim to educate and promote awareness of safely using the internet through its campaigns such as its thinkuknow website which was developed to educate children and adults responsible for the web safety of children (Thinkuknow, 2007). Since its launch in 2006, CEOP and its associated agencies have seen dramatic rises in the numbers of offenders successfully brought to justice. Official figures from the CEOP website indicate in the years 2009-10, 1121 offenders were arrested compared to 83 in 2006-07 (CEOP, 2010). In the same period, the organisation has also been responsible for smashing 262 paedophile networks in comparison to 29 in 2006-7 (CEOP , 2010). The creation of a National Crime Agency in 2013, proposed by the current Government will see the merger of CEOP with SOCA and the UK Border Agency into one solitary unit. This has been met with in trepidation by those involved as there are fears CEOP will lose its independence and ability to provide a holistic service. The former head of CEOP, Jim Gamble resigned his post believing the move away from a dedicated child abuse unit will seriously but children at risk and return the service to a police department with little scope for all the other services the organisation currently provides(Booth, 2010) (Police Oracle, 2011). The Internet Watch Foundation Another key organisation involved in the fight against online child exploitation is the Internet Watch Foundation (IWF). The IWF is a registered charity formed in 1996 by members of the internet industry. Funded by the EU, the IWF operates alongside law enforcement agencies including CEOP and the internet industry and attains to tackle, block and remove illegal content on the web. The IWF does not have the legal powers of CEOP as it is not part of the UK police force but works and reports to the police on all website activity it investigates and is considered illegal under UK Law. THE IWF operates in conjunction with CEOP and operates a notice and takedown policy (IWF, 1996-2011) which enables them to block or remove UK websites which host illegal content. Where the images are hosted internationally the IWF can block UK access and then informs the relevant agencies of the country where the material is hosted. The IWF does not have the authority to remove content held on international servers and different laws apply in different countries, i.e. what the UK may deem offensive or containing criminal content might not be the case in another country. Amongst its other remit the IWF operates an online reporting mechanism on their internet homepage asimilar to the one provided by CEOP that enables internet users to report websites that may contain indecent images of children or criminal content. The IWF maintain a database or block list of websites believed to host illegal content which it distributes to internet services providers, mobile phone and communications o perators both nationally and internationally. This enables those in the industries to take action to break up networks of crime. Since its Launch in 1996, the IWF has dramatically reduced the volume of child abuse content hosted by UK websites. In 2003 criminal content known to the IWF stood at 1% compared to 18% in 1997 (IWF, 1996-2011). In 2007, the IWFs annual report revealed they were aware of 2755 publicly available websites not hosted in the UK that were displaying child abuse images (IWF, 2008) Case Study: Operation Ore One of the largest and most controversial UK investigations into online child abuse occurred in 1999 and resulted in the arrest of over 3700 men in the UK for online child abuse offences (Hirsch, et al., 2010). The ramifications of this investigation are still ongoing today and heralds the need for those involved in Child abuse detection and prosecution to ensure technological advances and considerations are at fundamental to the enquiry in order to reflect that the evidence is proven beyond a reasonable doubt. The National Criminal Intelligence Service (NCIS), which preceded CEOP ran an enquiry termed as Operation Ore and was the upshot of an existing investigation into online child pornography in the United States knows as Operation Avalanche. Operation Avalanche was an investigation involving a married couple from Dallas, Texas in April 1999. Thomas and Janice Reedy had amassed a personal fortune by creating a network of websites trading as Landslide productions, which enabled users to subscribe to access predominantly adult porn sites. Within the website there was an opportunity to access child abuse images. Although Thomas Reedy had not created, uploaded or hosted the images or websites, he had facilitated others to use the Landslide website as a portal to child pornography websites based in other countries. On their arrest, US police officers discovered a list of 300,000 credit card holders from 60 countries who had subscribed to the Landslide website (CBC News, 2003). On receipt of t his list, the US police authorities informed the UK police that within those credit card numbers found, approximately 7000 of those were UK based and proceeded to provide the UK police force with the names of those involved (BBC, 2002) . On the substantiation of the credit card details provided by the US authorities, the UK police began the largest investigation into online child abuse offences ever witnessed in the UK. Of the 7000 names exchanged, it is estimated that more than 2600 of those have been convicted of child abuse offences (Wardrop, 2009) and all of those cautioned and convicted have been placed on the sex offenders register (The Yorkshire Post, 2009). Operation Avalanche was heralded as a triumph in the fight against child abuse crimes in the United States. The US investigation was commended for the professional manner in which it handled the operation. Of the 35,000 suspected offenders, following meticulous investigations, 144 homes were searched and 100 people arrested (Campbell, 2005). In the UK, all of the names on the list were immediately placed on the sex offenders register before investigations had been completed (The Yorkshire Post, 2009). CEOP who took over the investigation from the NCIS also judge the ongoing operation to be a complete success having cautioned or convicted 2600 offenders (Laville, 2009). The Operation Ore investigation is not without controversy. Many believe that the basis for prosecution was solely placed on the credit card details passed to UK authorities with little thought given to the actuality that subscribers may not have consciously accessed the links directing them to child abuse images or knew the website presented such a service. As the website was predominantly directed at adult pornography, the vast majority users would have admitted to paying for adult services. The names of those alleged offenders were also leaked to a national newspaper, the Sunday Times, (Cullen, 2003) and included professionals and high profile names from the music industry of which many were publicly named causing widespread distress. This in turn also victimised those on the list before they had the opportunity to defend themselves. It is estimated that over 30 of those accused of viewing child abuse images have committed suicide in the wake of Operation Ore (Oates, 2006). Gibraltar based Forces Commodore, David White, was suspended of his duties and took his own life in 2005 having been investigated under Operation Ore. At the inquest, the Ministry of Defence police has written to the Navy to confer there was no substantive evidence (Herbert, 2005) to prove that Commodore White had partaken in any of the crimes he was accused of. An additional concern of the enquiry was that no consideration had been given to the possibility of credit card identity theft. One such instance of this was the case of Consultant Dr Paul Grout who was under investigation and in April 2004 successfully proved his innocence in Hull Crown Court. Dr Grout had paid for a restaurant meal in the UK by the means of his credit card; his details had been fraudulently stolen and had fallen into the hands of a user in the United States (Leppard, 2005). In a recent case not under the remit of Operation Ore, a man was acquitted of downloading child pornography at Southwark Crown Court in October 2010 and awarded  £180,000 in damages after his PC had been affected by a virus. In the process of the investigation the accused, Chris Singam, had been originally investigated by the Fraud squad rather than specialists in online child sex abuse crime. Mr Singam had been found not guilty based on the evidence of a computer specialist who provided technical evidence to prove that the computers in his office had been attacked by a virus and he had not intentionally download illegal images (Welham, 2010). In the process of the investigation, Mr Singams business had collapsed and he had been ostracised by the local community (Shorter, 2010). Although these cases should not reflect away from the successful convictions for these offences, Operation Ore has exposed the human effects of those involved in Child abuse investigations. The effects on family life and career progression will have far reaching consequences even if the accused is found not guilty. An expert witness, Duncan Campbell, who gave evidence in one of the many Operation Ore investigations, reflects on the stigma attached to individuals in these cases and argues that internet users in such cases can become the victims through a combination of technical naivety and fear (Campbell, 2005). It is also clear that technology raises many issues than is evident in offline child abuse cases. Establishing guilt through a users PC or mobile phone records may prove difficult. Although technology can provide the trails of data evidence, it cannot necessarily prove the activity was paved through the actions of the accused. That will require the use of highly trained specialists to work alongside traditional policing methods to successfully prove liability. Conclusion Undoubtedly the Internet has given those who partake in online child sex abuse, a gateway to view pornographic images and an effortless passage through social networking sites and messenger services the potential to sexually abuse children offline. Keeping safe 99% of children in the UK between the ages of 8 and 17 years old with internet access is a colossal task. In view of the rise in internet service and the number of children using the internet, it is evident that the Government through legislation and policing, alongside the internet industry, educational and charitable organisations are proactively working to make the internet a safer place. Revisions of outdated Acts of Parliament are enabling the courts to prosecute offenders under new laws as technology increasingly plays its role in crime. However, technology moves faster than legislation and the Law may not be prepared for technological advances. Educating children and parents through online safety campaigns such as the thinkuknow campaign will alert users not only to the dangers of internet use and will empower them to report suspected crimes making the internet a safer place for others. This could be improved further by television campaigns to reach a wider audience. Dedicated UK specialist organisations such as CEOP and the IWF are working in collaboration with national, European and International organisations to pool data resources as networks of internet crimes operate on a global level. This can only benefit the fight against child online abuse as networks cover global areas. However, there is not a global strategy or organisation in which all countries participate. The Virtual Global taskforce could extend to include other countries in order to be truly international. And finally, Operation Ore reminds us of the emotive nature of involvement in Child abuse cases whether on or offline. Although a large number of offenders were successfully and rightly prosecuted under this investigation, large numbers of those have been left with a lifelong stigma which surrounds this type of offence due to flaws in technical evidence. The need for highly specialised experts is paramount to ensure not only the safety of children on the internet but to bring offenders to justice for their crimes and to protect those not guilty of these crimes from persecution.

Thursday, September 19, 2019

Living in the City vs. Living in the Country :: Compare Contrast City Country Essays

Living in the City vs. Living in the Country   Ã‚  Ã‚  Ã‚  Ã‚  The age-old question has plagued many, â€Å"Should I live in a city or should I live in the country?†. There are many advantages and disadvantages to choosing a lifestyle in either setting, and careful examination of all aspects is needed to make the perfect decision for you.   Ã‚  Ã‚  Ã‚  Ã‚  One major issue affecting many people trying to make the decision on where to live is their quality of life in either extreme. Health, education, transportation are three major concerns that many consider. In a city, pollution surrounds you wherever you step whether on the streets of a busy financial district or on the lawn of a large park. Pollution could possibly cause health problems later in life. In the country, pollution is scarce. Fresh air, rolling green hills, a few pieces of litter here and there but pretty much everything is clean, and wow! No smog, you can see the stars! In the country, childhood education, kindergarten through twelfth grade, is significantly better than in a large city; smaller class sizes and larger budgets create excellent learning environments. In cities, public schools are often plagued with very large classes packed into small spaces. Teachers with low pay, and little or no dedication are thrown into classrooms to teach, resultin g in poor education. Transportation is very accessible in city environments. Public transportation, by way of subways, busses and ferries, are cheap and easy ways of getting around a metropolis, whether going out to work, school, or for a night on the town. In the country, everyone needs to have access to his or her own vehicle. A commute to work or school is about an average of forty-five minutes!   Ã‚  Ã‚  Ã‚  Ã‚  Cash flow is very important when choosing a living environment. Living in the city can easily be more expensive, if you do not know where to look. But it can also be very competitive with that of your spending in the country. Apartments can be very affordable in a rent-controlled neighborhood, and are much more feasible for families, or students just starting out on their own; whereas, in the country, you may have to buy a home or hard to find cheap rentals. Transportation costs, groceries, taxes, and utilities are common expenditures for any adult. But, many may find that a large amount of money can be saved on these living expenses in a city.

Wednesday, September 18, 2019

International Criminal Court Essay -- United Nations Papers

International Criminal Court Allegations of war crimes, genocide, and crimes against humanity have undoubtedly received unprecedented press coverage in recent years – more than at any time since Nuremberg. This is not because the incidences of such barbarities have increased, but simply because those crimes are brought to us more rapidly these days by the electronic media. Since the early 1990’s the international community has witnessed of a variety of criminal tribunals that were meant to promote peace-making and political transition in situations of gross violations of human rights and armed conflict among ethnical or religious groups. This tendency led to the establishment by the UN of two ad hoc Tribunals-for the former Yugoslavia and for Rwanda-and of the International Criminal Court (ICC). There was also a proliferation of 'mixed' judicial bodies-in Cambodia, Sierra Leone, Kosovo and East Timor-composed of both national and international judges and enforcing domestic as well as international criminal law. It is perhaps most cynical to assert that transitional societies, convalescing from conflict or moving from oppression towards democracy, have developed a variety of ways of dealing with past war crimes and human rights abuses. Irrefutably they have united the short-term and long-term goals of ending the conflict and preventing its recurrence, and achieving social stability and reconciliation. Almost a century after the idea for such a body had first been mooted, on 17 July 1998, to the acclaim of many; a permanent International Criminal Court (ICC) was born at last in Rome. The adoption on that day of the Court's Statute... ...rnatives to prosecution it is difficult to express a preference among them, other than the vague notion that "perhaps the challenge is to meet a basic need for balance and wholeness." Neither the "one size fits all" prosecutorial strategy, nor a uniform preference for amnesty or some non-juridical alternative in every case, would be justifiable. Circumstances differ, and circumstances matter. Atrocities, whether committed abroad or at home, are almost by definition highly unusual. For precisely that reason, their resolutions should be too. Ironically, perhaps, a court that is very similar to these from a legal point of view is likely to soon be established in Iraq. You make some good and thought-provoking points, but your language is not always as clear as it might be. Clarity is of supreme importance in law!

Tuesday, September 17, 2019

Teenagers, Computers, and Literacy :: Personal Narrative Education Essays

Teenagers, Computers, and Literacy My sister, Tiffany, is a senior at County High School in Smallville, Ohio, a suburb of Colombus. She is expected by teachers and peers to be able to communicate effectively with the use of computers. Through her daily interactions with the computer due to schoolwork and conversing using Instant Messenger, her literacy practices have been affected. On an average day, Tiffany spends thirty minutes reading on the computer. This includes reading emails, reading information from websites, and reading for homework. For an additional ninety minutes per day, her computer-based reading is devoted to reading responses from her Instant Messenger conversations. This time is also shared with computer-based writing as she types her own responses to her online conversation. She typically spends an additional hour writing on the computer for typing homework, papers, or emails. Tiffany feels that her time spent reading and writing on the computer has affected her literacy in a positive way. She is able to read faster and more efficiently. â€Å"I have learned to type faster and become more aware of what I am typing. Since I have spent a lot of time reading on the computer, it has helped me become a faster reader and helped me learn to skim through trivial information.† This is understandable because with any kind of reading, the more you practice it, the better you become at picking out the main ideas and focusing on the important points. The computer has affected Tiffany’s writing skills in a positive way. When writing a compositional paper, she is able to utilize the computer’s assets to improve the quality of her writing. The use of the Thesaurus function has made her writings seem more professional. It is much easier to use the Thesaurus function on the computer than having to refer to a book. This works for Tiffany when she is unable to pinpoint the exact word that she is looking for, but it may not work for everyone. She is also able to refer to online resources while writing a research paper. The availability of an online encyclopedia is beneficial when gathering information on a topic. Also, the ability to refer to other Word documents, sometimes notes saved on another file, increases her productivity when writing a paper. With so many positive attributes of the computer, there are also some drawbacks. Tiffany finds that her ability to compose creative writing is hindered because of the computer.