Tuesday, December 31, 2019

Essay on Madness in King Lear Act 4 - 848 Words

Madness in King Lear: Act 4 In Shakespeares play King Lear, Shakespeare introduces many themes. The most important theme shown in King Lear is the theme of madness. During the course of this play madness is shown in the tragic hero, King Lear. King Lear develops madness right in the beginning of the play but he actually shows it in Act 4. In this act, King Lear is not only at the peak of madness but it is also shown him coming out of his madness as well. This act is likely to be the most important act because it shows the phases King Lear goes through, from complete madness to him coming out of his madness and realizing his mistake, the point of tragic vision. The theme of madness in King Lear is first shown in the act through Cordelias†¦show more content†¦King Lear is shown completely insane, through his garments and his speeches to Gloucester and Edgar. In one of his speeches, King Lear makes comments about a mouse and a bird that are not present. quot;..Look look, a mouse! Peace, peace; this piece of toasted cheese will do it†¦O, well flown, bird!quot; [iv, vi, 88-91]. This statement was the first sign of him being mad. At the beginning of Act 4, it was just mentioned that King Lear was gone mad, this was the first sign of proof that he was indeed mad. Although King Lear shows signs of being mad, he also shows signs of being sane. This is shown through him knowing the cause of him being mad. If King Lear was completely mad he would not be able to justify the reason for his madness. In [iv, vi, 96-105] he states that his daughters’ have done him wrong and shows signs of insanity when he calls Gloucester Goneril. quot;Ha! Goneril with a white beard? They flattered me like a dog, and told me I had white hairs in my beard ere the black ones were there. To say ‘Ay’ and ‘no’ too was no good divinity†¦Go to, they are not men o’ their words! They told me I was everything. ‘Tis a lie- I am not ague-proof.quot; This quote shows Lear’s sanity. Lear may have qualities in him to make him seem mad but he possess sanity, enough to know the cause of his madness. This possession of sanity soon brings King Lear to his moment of tragic vision. King Lear’s moment of tragic vision comes when he isShow MoreRelatedThe Theme Of Madness In Shakespeare, By William Shakespeare927 Words   |  4 PagesMadness can be defined as the state of mental delusion/ mentally ill or showing extremely foolish/eccentric behavior which begins with anger. The incorporation of madness in literature has been a long-standing tradition and can be encountered in these three works: King Lear by William Shakespeare where he tells the story about King Lear whose madness has been promoted by his two daughters, Regan and Goneril, â€Å"Daddy† by Sylvia Plath, where she reveals her anguish at her father’s death, she also disclosesRead More Essay on Edgars role in King Lear, Act 3, Scene 4806 Words   |  4 Pages Edgars role in King Lear, Act 3, Scene 4 In Act 3, Scene 4, Edgar takes on the roles of a madman, and a spirit. In counterfeiting madness, he not only hides from an unjust death, but also serves as a character that resembles King Lear: (1) Both are deceived by family; (2) Both are outcasts of Gloucesters castle; (3) Both are threatened with death; and (4) Both enter into a form of madness. But, whereas King Lear actually becomes mad, Edgar only feigns madness. As Edgar takes the roleRead MoreShakespeare s King Lear Appearances1704 Words   |  7 PagesIn Shakespeare’s King Lear appearances are not always reflective of reality. While in many scenes throughout the play characters are disguised, their identities concealed behind a physical shroud, the theme of appearances versus reality runs much deeper, making the lines between love and hate, foolishness and wisdom, and cruelty and innocence ambiguous to both the characters and the audience. As the play progresses, a veil of ignorance seems lift, elucidating the trut h of each matter to the charactersRead MoreKing Lear As A Man Of Great Power And Authority902 Words   |  4 PagesRecognised easily is King Lear being the main character in this script. At the beginning of the play, Shakespeare had introduced him as a man of great power and authority. Lear adopted use of pronouns such as ‘we’, ‘our’ and ‘us’ which showed he believed his regal character to be monumental. Therefore the part he played in this tragedy was the tragic hero. Although he was the most authoritative character in the play, it became highly evident that he was not as astute and quick-witted as others andRead MoreMental Illness in Shakespeares Works1371 Words   |  6 Pagesprominently are King Lear, Hamlet, and Macbeth, while also managing to showcase the conception of mental illness at the time. Of the three plays, King Lear is the one that examines mental illness the most. King Lear is the story of the titular king, Lear, his decision to exclude his third daughter, Cordelia, from her inheritance, the abuse he suffers at the hands of his other two daughters, Goneril and Regan, and his descent into insanity, before dying. Possibly the first indication of Lear’s madness is whenRead MoreEssay on The Development of the Character of King Lear1132 Words   |  5 Pagesâ€Å"King Lear† is one of the most complicated of all Shakespeares plays. It is about political authority as much as it is about family dynamics. It is a ruthless play, filled with human cruelty and awful, nonsensical disasters. Lear, an autocratic leader, is the king of Britain and has three daughters, Regan, Cordelia and Goneril. Regan and Goneril are cold, heartless and selfish, whereas Cordelia, the youngest is quite the contrary, honest, realistic and straightforward. P Lear is introducedRead MoreGloucester and Lears Realizations of the Importances in Life1158 Words   |  5 PagesShakespeare’s King Lear, Gloucester and Lear both experience similar situations in which their children cause them to suffer greatly: The former suffers from blindness and the latter slips from reality into a state of madness. It is not until Act 4, scene 6 that they come to the realization of the importances in life; such as true love for and from a child. Gloucester is convinced by his illegitimate son Edmund that his legitimate son Edgar cannot be trusted, resulting in the banishment of Edgar. King LearRead MoreDramatic Scene Illustrated in Shakespeares King Lear - Storm Scene891 Words   |  4 PagesShakespeare’s King Lear offers its audience an impossible number of dramatic and memorable scenes, but I have chosen the storm scenes in Act III Scenes 1, 2 and 4 as my key dramatic scenes. The storm provides a dramatic centre to the play. It is used to brin g about change, to represent Lear’s inner unrest, to symbolise the power of nature and to expose the play’s characters under the intolerant conditions of thunder and lightning. The scenes in which the storm takes place are very different toRead MoreKing Lear Character Development Essay1662 Words   |  7 PagesKing Lear is understandably one of William Shakespeare’s greatest tragedies, it encompasses the journey through suffering and explores, in detail, the idea of justice. Each character in the play experience s one or the other throughout the progression of the plot, it is evident that through compositional features such as these, the play write is trying to convey this meaning. Through methods such as intense imagery, motifs, repetition of words and rhyming the play write has given intensity to certainRead MoreWilliam Shakespeare s King Lear1470 Words   |  6 PagesShakespeare’s tragedies accentuate the qualities of human behavior and interactions with others when faced with adversity where the emotions of greed, ambition and madness are strongly expressed. Insight into the character’s psyche and moral values is explored to give understanding of the logic and reasoning behind the ways humans act. Harboring a universal and timeless quality, Shakespeare’s plays have the ability to exceed the restraints of the cultural values during the Elizabethan era, making

Monday, December 23, 2019

A Brief Note On Obesity And Saudi Society Essay - 943 Words

4: Importance obesity in Saudi society : Obesity is confirmed to have serious dangerous effects in health. obese people will be at a greater risk of developing chronic conditions that compromise their general health and may even result in premature death. Socio-economic problems related to the condition are also common. These can range from aches-and-pains that lead to lose valuable work-time to psychological concerns including low self-esteem. Obesity is thus considered one of the world s most prevalent, chronic and disabling conditions. [ This problem, although not unique to Saudi Arabia, is a major healthcare challenge facing Saudi society. Approximately, one-third of the Saudi population is now overweight and one-third is obese ] (Obesity Research Center) [ Dr. Abdul Majeed Al-Abdulkarim, vice president, postgraduate studies and academic affairs at King Saud University for Health Sciences, said obesity is one of the most widespread contemporary diseases in most societies]. [ Quoting from World Health Organization (WHO) statistics, he said there are about 1.6 billion adults world-wide who are obese. Nearly 60 percent of the population aged over 16 in the Kingdom was overweight, placing the country in the 29th position among 194 countries, he said]. 6: Causes of the obesity : †¢ Genetics : chances of being overweight are greater if one or both of parents are overweight or obese. genes also may affect the amount of fat store in the body and where on body carry the extraShow MoreRelatedEssay on Mcdonalds in Vietnam4753 Words   |  20 PagesMCDONALD’S IN VIETNAM By Ayodeji Akin Abiri Table of Contents Abstract 1.0 Introduction 3 1.1 Background note 4 1.2 Global Strategy 5 2.0 McDonald’s In Vietnam 8 2.1 Entry Strategy 9 2.2 PESTEL analysis of Vietnam 9 2.3 SWOT analysis of HCM city 11 2.4 Expansion strategy 12 2.5 Franchising in Vietnam 13 2.6 Drive-thru restaurants 13 2.7 LocalizationRead MoreThe Walt Disney Company and Disney Management25371 Words   |  102 PagesNorms, Fair Lovely, and Advertising 2-3 Starnes-Brenner Machine Tool Company: To Bribe or Not to Bribe? 2-4 Ethics and Airbus 2-5 Coping with Corruption in Trading with China 2-6 When International Buyers and Sellers Disagree 2-7 McDonald’s and Obesity 2-8 Ultrasound Machines, India, China, and a Skewed Sex Ratio CASE 2ïš º1 The Not-So-Wonderful World of BONJOUR, MICKEY! In April 1992, EuroDisney SCA opened its doors to European visitors. Located by the river Marne some 20 miles east of ParisRead MorePrimary Sector of Economy17717 Words   |  71 Pages 19 |   South Korea | 34.915 | 3.0% | 0.8% | 20 |   Canada | 33.415 | 1.9% | 0.8% | - | | | | | Economy of India From Wikipedia, the free encyclopedia Jump to: navigation, search Economy of The Republic of India | Modern Indian currency notes | Rank | 9th (nominal) / 3rd (PPP) | Currency | 1 Indian Rupee (INR) () = 100 Paise | Fiscal year | 1 April – 31 March | Trade organizations | WTO, SAFTA, G-20 and others | Statistics | GDP | $1.846 trillion (nominal: 9th; 2011)[1]$4.469 trillionRead MoreCeramics: Pottery and Clay17443 Words   |  70 Pagesvery elaborate tradition of figurative sculpture that was often used to decorate temples. English: Wedgwood: 1810: cast earthenware. European ceramics in northern areas first appears about 4000 BC and, except for a brief period during the Roman occupation, continued the low temperature unglazed handbuilt tradition until the twelfth century. Southern Europe, notably Spain was geographically near other active cultures and after 700 A.D. occupied by Islamic North AfricansRead MoreExploring Corporate Strategy - Case164366 Words   |  658 Pagescapture the richness and complexity of real-life management situations and we would also encourage readers and tutors to take every possible opportunity to explore the live strategic issues of organisations – both their own and others. The following brief points of guidance should prove useful in selecting and using the case studies provided: ââ€"  The summary table that follows indicates the main focus of each of the chosen case studies – together with important subsidiary foci (where appropriate)Read MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagesed. p. cm. Includes indexes. ISBN-13: 978-0-13-283487-2 ISBN-10: 0-13-283487-1 1. Organizational behavior. I. Judge, Tim. II. Title. HD58.7.R62 2012 658.3—dc23 2011038674 10 9 8 7 6 5 4 3 2 1 ISBN 10: 0-13-283487-1 ISBN 13: 978-0-13-283487-2 Brief Contents Preface xxii 1 2 Introduction 1 What Is Organizational Behavior? 3 The Individual 2 3 4 5 6 7 8 Diversity in Organizations 39 Attitudes and Job Satisfaction 69 Emotions and Moods 97 Personality and Values 131 Perception andRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pagescompromise policy, popularly known as â€Å"don’t ask, don’t tell,† was instituted that is still considered hopelessly flawed by many on both sides. But now let us look at this situation from the perspective of the interactional framework. First of all, note how much more complex the situation of their meeting was than a mere first meeting between two successful men. One of them was the top military leader in the world at that time, the other would soon be his commander in chief by virtue of free electionRead MoreMarketing Mistakes and Successes175322 Words   |  702 Pagesâ€Å"Sponsored Links.† These â€Å"Links,† because of their relevance to the search, would be clicked on more often than if they were labeled simply â€Å"Ads.† They decided to display the links in a clearly marked box above the free search results. The ads would be brief and look identical, with just a headline, a short description, and a link to a web page. But these would be targeted ads, offering a major advantage for advertisers confronted with the huge wastage of advertising reaching uninterested audiences.

Sunday, December 15, 2019

Lesson questions Free Essays

Write an explanation to someone who does not know how to make proper measurements on how to measure the following line with the ruler. To the untrained eye, the ruler may seem like a useless and mundane tool straight out of a crappy ass’s movie. But in fact, resent studies have that the ruler has many functionally sign efficacy purposes other than the ones used by teenagers behind closed bathroom doors. We will write a custom essay sample on Lesson questions or any similar topic only for you Order Now This tool is used to measure objects in standard or metric measurements. Here are instructions on how to use this device: 1 . Put down the TV remote and the bag of extra cheesy Ghettos. 2. Find an object worth measuring (I. E. The length of your TV remote) 3. Align the far edge of the remote with the line that reads â€Å"O† on the ruler. 4. Scanning to your right, locate the opposite end of the remote and read the corresponding number found on the ruler. That’s it! 5. Repeat when necessary or to resolve any bets between your roommates or friends. The ruler is so easy to use a foeman can do it! Be safe and enjoy! Explain how you would gather data and calculate the density of an irregularly shaped rock. By the word â€Å"rock† can only assume that you are referring to the one and only Deanne Johnson, who is both extremely manly and slightly irregular. Taking this into consideration, lets discuss how we would measure his density (this technique will also work on regular rocks as well but are far less entertaining). Here are the steps: 1. First we need a vessel filled approximately halfway with water that also has markings of measurement on them. Note the original volume of water (this will be used later) 2. Carefully introduce the object (or person) into the vessel until the water is displaced. 3. Note the new water level on the measurement indicators of the vessel (This measurement is your objects volume). 4. Now divide the volume by the object mass and the answer will equal the objects density. 5. Finally, get Deanne Johnson a towel, he’s cold! How to cite Lesson questions, Papers

Friday, December 6, 2019

Ensuring Sustainable Tourism Improvement of Transportation

Question: Describe about the Report for Ensuring Sustainable Tourism and Improvement of Transportation. Answer: Tourism first experienced a huge amount of increase after the improvement of transportation means as well as road networks across the globe. In the earlier days the form of travel were ranged from conquests, education, pilgrimages as well as trade. In the later part of 18th century, the individuals were noted to make numerous bathing places as well as seaside trips. The industrialization effectively increased the income rate of the population, which effectively hiked the tourism demand around the world. The wider phenomenon of development in sustainable perspective originated the sustainable concept (McGehee, 2014). However, it can be identified from the study of tourism that the sustainable tourism concept rooted back in thousands of years in the form of town, agricultural as well as town planning. The major milestones in sustainable tourism approach that have been identified are Industrialization in England, the Second World War as well as green tourism argument rising in 1960. The mass tourism demand as well as development project made the associated environmental as well as social issues more apparent. This clear visual extensively helped the world to undertake the sustainable tourism approach under a more serious consideration. The current paper extensively focuses on explaining the sustainability issues in the tourism context from an economic, social and environmental point of view. It also focuses on identifying the process to achieve the sustainable outcomes. Tourism refers to the set of activities associated with the travelling as well as staying outside the usual environment of any individual. This staying should not be related with any kind of business as well as leisure purpose. Unlike popular notion, the tourism is greatly different from travelling due to the presence of displacement. In order to conduct a tourism activity an individual must travel by using any form of transportation. After obtaining a clear visual of various environmental as well as social issues associated with the tourism and the development made the tourist industry conscious of necessity of sustainable tourism (Weaver, 2013). The sustainable tourism refers to the activities conducted by the tourism industry aiming to reduce the impact on local culture as well as environment. It provides a sense to that the sustainable tourism can be considered as positive experience for tourists, tourist companies as well as local people. The continuous development in the tourism sector along with a huge demand of tourism service creates a major concern for the preservation of the environment. In order to make the sustainable tourism the industry must focus on stable economic support as well as environmental preservation. These dual variables of sustainable tourism effectively create a major impasse, which creates several major dilemmas. The climate change has posed the most crucial issue for the sustainable tourism management approach (Hall, Scott Gssling, 2013). In this context, it has been identified that climate change will effectively destroy better part of tourism facilities around the world. The major catastrophic impacts of climate change on the tourism are reduction of snow cover, rising of sea level as well as bushfires. These particular phenomenons will effectively damage the tourism business around the entire world. The tourism management has attempted to prevent these disastrous events by the environment approach. However, this approach has faced several major dilemmas, as the development rate of the tourism will be damaged due to this approach (Fodness, 2016). The contemporary tourism is highly depended on the growing rate of air traffic that emits a significant amount of green house gas and thereby put in the progression of climate change. In order to avoid the cataclysmic events of climate change the tourism need to use renewable energy source so that greenhouse gas emission can be controlled. However, in this context, it has been identified that the renewable source of energy cannot support the extensive size of tourism industry properly. It is unable to substitute the conventional energy sources for a various reason. The major problems are huge cost of the installation as well as maintenance of the renewable source technology (Bramwell Lane, 2012). Low energy density of the renewable sources as well as lack of awareness of the renewable source of technology eventually limits the growth of the renewable approach. This particular problem creates major problem for sustainable development of tourism. In addition to that, tourism industry also suffers from the issue of water preservation. The sustainable approach of tourism demands that the industry focus on various natural open grounds. Moreover, the tourism industries also emphasizes on golf courses, spas as well as swimming pools to attract a number of customers (Ruhanen, 2013). However, it is quite difficult to maintain, as it will need a huge amount of water. The countries where water is scarce it can pose a huge threat for the environment. Another major issue is waste, which can be catalyst for degradation of the environmental condition. The tourists tend to produce huge amount of waste, i.e. 1.5 kg per day. This particular problem has a very crucial effect on the environment and hinders the sustainable tourism approach. As the tourism is integration of individual parties in different environment, the process will include an interaction of two parties from different background. There are huge number tourists exposed to different cultural environment in the tourism destination. It creates a clash between the tourists social as well as cultural practice and the local societal practices (Salazar, 2012). This particular phenomenon immensely hinders the local culture and societal exercises. Therefore, the tourism setting faces a crucial necessity to administer sustainable approach in social context. However, there are several major problems that hinder the sustainable practice of the tourism industries. The first problem that has been identified is lack of awareness of the tourists regarding the sustainable approach of tourism. The tourism concept is quite vast as well as highly complex as it includes a number of actors providing a great range of service to the tourists. Therefore, it is immensely difficult to for the tourists as well as service providers to adopt the sustainable approach. It has been identified that tourists as well as service providers are unaware of the exact exercises needed for the sustainable practice of tourism (Bramwell Lane, 2013). This has eventually created a major gap within the sustainable practice. In order to resolve this particular issue the tourism industry must focus on generating awareness among the tourism service providers. In addition to that, the industry needs to promote the tourism educational content so that the tourists get attracted towards the sustainable practice of tourism. It will eventually help the service providers to initiate numerous sustainable practices with a greater ease. Another major identified issue in tourism context is low participation of the local community. The sustainable tourism concept is immensely related with the local values as well as exercises. The practices associated with the sustainable tourism will need a great deal of support from the local communities. The lack of awareness greatly contributes in the hindrance of the local community participation to the tourism practice. In addition to that, the local community is not interested in lots of sustainable practices such as waste management as it will create a extra effort of responsibilities from their end. Moreover, they also are not inclined to share any opinion regarding the arrangement of sustainable tourism practice (Waligo, Clarke Hawkins, 2013). This particular phenomenon critically creates a barrier for the sustainable practice of tourism. In this context, the tourism settings need to promote the benefit of the sustainable practice, which will effectively enhance the interes t of the local community. The tourism industry also needs to establish several practices that will enhance the preservation of the cultural as well as social practice. The major practices that have been identified in this context are establishing respect to the cultural practice along with preservation of the heritage settings. This way they can earn the loyalty of the local community so that they would be interested to share their opinion and active support. In the contemporary competitive market, all of the developing countries are focused on industrialization of the rural as well as urban areas. Focus on the industrialization effectively allocated a significant amount of fund to the development projects in the rural as well as urban development projects. This situation has significantly created a situation where the tourism approach cannot get the benefit of sufficient investment (Jamal Camargo, 2014). Henceforth, the tourism cannot create necessary infrastructural advance in order to undertake the sustainable approach. In order to solve the issue the tourism industry must involve the regulatory stakeholders so that they can perceive the importance of the sustainable tourism. The stakeholders will be able to contribute actively in the growth of the sustainable approach. In addition to that, the development project is likely to consume lots of free land as well as tourism attraction in a rapid speed. In this context, the tourism indust ry will effectively focus on creating a standard that will restrict the urbanization to progress in the potential tourist destination. It will create a balance between the industrialization and the tourism activities. This harmony will be highly significant for the growth of the sustainable approach of the tourism. Another major issue with respect to economic characteristics of the sustainable tourism is its expensive nature. The sustainable management entails several major tools, which are highly costly with regard to the tourism practice. First of all the tourism management will need to renovate the entire infrastructure of the tourism so that they can adopt the sustainable approach more smoothly (Buckley, 2012). This infrastructure transformation will demand great amount of investment. Another major problem faced by the sustainable tourism management is the growing necessity of the renewable energy development. The renewable energy technology entails a great amount of installation cost as each of the tools associated with the renewable technology is highly expensive. In addition to that, this particular technology needs a constant maintenance and support by most experienced as well as efficient experts. This particular demand of human resource will effectively increase the cost of the sustai nable tourism at a whole. The sustainable tourism is unable to initiate this large amount of investment at a first go and thereby hinders the sustainable tourism implementation. Above-described article extensively focused on the explanation of the sustainability issues in the tourism context from an economic, social and environmental point of view. It has also focused on the identification of the process to achieve the sustainable outcomes. It reflected that the implication of the tourism has been started for a long time. It also clarified the difference between tourism as well as mere travelling. The article has successfully discussed the environmental, social as well as economic issues with regard to the sustainable tourism. The article has been able to discuss every critical aspect as well as their impacts on the sustainable tourism. It effectively established that these issues are highly imperative for developing essential barriers of sustainable tourism. It also discussed several major solution of these issues that will help to pave the pathway of sustainable tourism. Reference List: Bramwell, B., Lane, B. (2012). Towards innovation in sustainable tourism research?.Journal of Sustainable Tourism,20(1), 1-7. Bramwell, B., Lane, B. (2013). Getting from here to there: Systems change, behavioural change and sustainable tourism.Journal of Sustainable Tourism,21(1), 1-4. Buckley, R. (2012). Sustainable tourism: Research and reality.Annals of Tourism Research,39(2), 528-546. Fodness, D. (2016). The problematic nature of sustainable tourism: some implications for planners and managers.Current Issues in Tourism, 1-13. Hall, C. M., Page, S. J. (2014).The geography of tourism and recreation: Environment, place and space. Routledge. Hall, C. M., Scott, D., Gssling, S. (2013). The primacy of climate change for sustainable international tourism.Sustainable Development,21(2), 112-121. Jamal, T., Camargo, B. A. (2014). Sustainable tourism, justice and an ethic of care: Toward the just destination.Journal of Sustainable Tourism,22(1), 11-30. Lee, T. H. (2013). Influence analysis of community resident support for sustainable tourism development.Tourism Management,34, 37-46. McGehee, N. G. (2014). Volunteer tourism: Evolution, issues and futures.Journal of Sustainable Tourism,22(6), 847-854. Mowforth, M., Munt, I. (2015).Tourism and sustainability: Development, globalisation and new tourism in the third world. Routledge. Ruhanen, L. (2013). Local government: facilitator or inhibitor of sustainable tourism development?.Journal of Sustainable Tourism,21(1), 80-98. Salazar, N. B. (2012). Community-based cultural tourism: issues, threats and opportunities.Journal of Sustainable Tourism,20(1), 9-22. Waligo, V. M., Clarke, J., Hawkins, R. (2013). Implementing sustainable tourism: A multi-stakeholder involvement management framework.Tourism Management,36, 342-353. Weaver, D. B. (2013). Asymmetrical dialectics of sustainable tourism: Toward enlightened mass tourism.Journal of Travel Research, 0047287513491335.

Friday, November 29, 2019

Ethics Notes Chapters 1 and 2 Essay Example

Ethics Notes Chapters 1 and 2 Essay Ethical issues exist in all areas of criminal justice system (from passage of laws to punishment) Criminal justice professionals have discretion Legislators: in making laws Police: in enforcing laws Attorneys and Judges: affecting justice process Correctional Professionals: affecting offenders lives What do criminal justice professionals have in common? power to make decisions duty to enforce the law obligation to provide â€Å"due process† and â€Å"equal protection† for all commitment to â€Å"public service† Goals of the study of ethics -Braswell Become aware of and open to ethical issues Begin developing critical thinking skills Become more personally responsible Understand coercive element of the justice system Develop wholesight (the ability to explore with one’s heart as well as one’s mind) Defining Terms morals The judgment of behavior as right or wrong. ethics The study and analysis of what constitutes good or bad conduct. * The two words are often used interchangeably. meta-ethics Technical investigation of the meaning of ethical terms, as well as how ethical statements can be verified. ormative ethics Definition of right conduct and moral duties. applied ethics Application of ethical principles to specific issues or fields. professional ethics Examination of the behavior of certain professional groups. duties Moral obligations that one must carry out to be considered ethical. supererogatory An act that goes beyond duty and is not required to be considered good or moral. imperfect duties General obligatio n with no specific acts. Honesty Health Family Financial success Beauty What else are values? Are some more important than others? We will write a custom essay sample on Ethics Notes Chapters 1 and 2 specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ethics Notes Chapters 1 and 2 specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ethics Notes Chapters 1 and 2 specifically for you FOR ONLY $16.38 $13.9/page Hire Writer To be judgedmoral or immoral,behavior must involve: human acts of free will affecting others. Inventory of Ethical Issues Individual or Other Employees backstabbing and lack of support gossip sexual or racial harassment lying to cover up blame taking credit for others’ work sexual or racial harassment Organization and Employees sexual or racial harassment by supervisors discouraging honest criticism or feedback arbitrary or unfair decisions inadequate compensation inadequate training unrealistic or inappropriate demands putting employees in unnecessary danger By the Individual and Organization work ethic (day’s work for a day’s pay) petty theft of supplies or cash overtime abuse gifts and gratuities falsifying reports misuse of sick days personal use of supplies or equipment Morality and Behavior Even when people know what is right, sometimes they choose to do wrong—why? Criminology Psychology Other fields seek to answer this question Are people fundamentally good or fundamentally bad? Thinking Point Omar Thornton of Connecticut walked into his employer, Hartford Distributors, for a hearing concerning his possible termination. During the meeting, Thornton pulled out a pistol and shot ten of his coworkers, killing eight, before turning the gun on himself. What caused Thornton to carry out this horrific act? Was he born intrinsically bad? Was he a good person that had a tragic turn of circumstances that forced him into a criminal act? Morality = Law ? Ethical Issues and Dilemmas Decriminalization of soft drugs? Sex-offender registries? Death penalty? Mandatory DNA testing? Three-strikes legislation? Racial profiling? Steps for ClarifyingEthical Dilemmas Review all the facts. Identify relevant values of all parties. Identify all moral issues. Identify most immediate moral issue. Resolve the dilemma. CHAPTER 2: Determining Moral Behavior Ethical Systems Deontological Ethical Systems Teleological Ethical Systems Ethical Formalism According to German philosopher Immanuel Kant: Good will (motivation) is the only thing that is intrinsically good. Duty is required behavior. It is self-imposed and necessary to morality. The Categorical Imperative Ethical Formalism: Imperatives Categorical imperatives Are absolute. Are based on good will. Determine morality. You must not lie. Criticisms of Ethical Formalism Utilitarianism Jeremy Bentham An action’s morality depends on how much it contributes to the overall good of society. Humans are hedonistic. They seek to maximize pleasure and avoid pain. ood for the greatest number Thinking Point On April 20th, 2010 a British Petroleum offshore rig exploded killing 11 employees and causing one of the largest oil spills in modern history. Investigators soon located the faulty alarm systems. The alarms did not alert because they had been intentionally disconnected close to a year ago. BP had the alarms turned off in order to allow employees to sleep without being interrupted by false alarms thus creating a better functioning workforce. If the alarms were enabled, the rig would have automatically entered shut down mode, virtually eliminating the oil spill. Was BP’s original â€Å"act† inherently good? Bad? Did they have a duty to act one way or the other? Criticisms of Utilitarianism Religion People hold different opinions about which religion is the â€Å"true† religion. People within a religion often disagree on how to interpret its principles. Religious controversies are often difficult to resolve. Natural Law Criticisms of Natural Law How can we determine what is natural law versus man-made law? What are the â€Å"natural† laws of morality? The Ethics of Virtue Aristotle True virtue is the median between extremes of character: the golden mean. People develop moral virtues through practice, just like any other strength. Eudaimonia: living the â€Å"good life† Six Pillars (Josephson Institute) Trustworthiness : Honesty, sincerity, loyalty Respect : Golden Rule Responsibility : Being accountable Fairness : Equality, impartiality, and due process Caring : Altruism and benevolence Citizenship : Duties of citizenship Criticisms of Ethics of Virtue Basically assumes a good person will make a good decision. Little help for people facing dilemmas. The Ethics of Care Western ethical systems focus on issues like rights, laws, and universalism. Ethics of care—nurturance, meeting needs Criticisms of Ethics of Care The Ethics of Virtue Criticisms of Egoism Violates universalism. Logically inconsistent (for everyone to try and maximize self interest). Enlightened egoism is not too different from categorical imperative or golden rule. Other Methods ofEthical Decision Making The imperative principle directs a decision maker to act according to a specific, unbending rule. The utilitarian principle determines the ethics of conduct by the good or bad consequences of the action. The generalization principle is based on this question: â€Å"What would happen if all similar persons acted this way under similar circumstances? † General Principles ofDecision Making Obtain all facts (including the effects of prospective decisions). Evaluate whether you’d be comfortable with your decision appearing on the front page (in public view). Consider one’s principles to be like a formula – applicable in all situations. Relativism Ethical Relativism Moral systems are products of an individual or group. If people believe different things are good and bad, how can you define what is good? Situational Ethics: A compromise between relativism and absolutism There are basic principles of right and wrong. They can be applied to ethical dilemmas and moral issues. They may call for different results in different situations. 1. Treat each person with the utmost respect and care. 2. Do one’s duty or duties in such a way that one does not violate the first principle. Summary of Ethical Systems Ethical formalism: What is good is that which conforms to the categorical imperative. Utilitarianism: What is good is that which results in the greatest utility for the greatest number. Religion: What is good is that which conforms to God’s will. Natural law: What is good is that which is natural. Ethics of virtue: What is good is that which conforms to the Golden Mean. Ethics of care: What is good is that which meets the needs of those concerned. Egoism: What is good is that which benefits me.

Monday, November 25, 2019

PrepScholar is Hiring! Share With Anyone You Know

PrepScholar is Hiring! Share With Anyone You Know SAT / ACT Prep Online Guides and Tips PrepScholar is growing, and we're hiring! If you've enjoyed our resources, you can help us create even better content and tools by helping us hire the best people possible. We're currently hiring for these roles: Full stack software engineer SAT/ACT test content creator Academic adviser SAT/ACT tutor You can find out more about these roles and about us as a company at our careers page:www.prepscholar.com/careers If you're interested in applying yourself, we'd love to hear from you! And if you know anyone who might be interested, I'd be grateful if you shared this with them. If you know someone exceptional who would love to contribute to our mission, I'm confident that person can be a good fit. Looking forward, Allen and the PrepScholar Team Want to improve your SAT score by 160 points?We've written a guide about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Thursday, November 21, 2019

Law vs. Ethics ( In Training) Business Law Assignments Essay

Law vs. Ethics ( In Training) Business Law Assignments - Essay Example This diversity is also evident especially when according to one person or group, a certain behavior may be unethical or unlawful, but to the other it is acceptable. Ethics comprise of â€Å"divine† behaviors, which an individual ought to do to others, and expect a similar reciprocation despite many of them lacking tangible documentation. Conversely, laws are universal, consistent, legislated, written and accepted directives whose core purpose is to show the government’s position concerning a society’s behavior. Despite laws and ethics being applicable in all occupations entailing human life, they do not have a common standard (Kerridge, Lowe and McPhee 84). Since, the relationship amid the two in some circumstances usually differs despite both having a similar core purpose. For illustration, in some instances what many people perceive to be illegal may be ethical or vice versa whereas in other occasions both the law and ethics overlap. This is evident in the medical field where the law compels the doctor to act as necessitated in providing the necessary assistance to the ailing person, which is also in accordance to ethics (Kerridge, Lowe and McPhee 594). However, it is not a law for the doctor when he or she is unable to handle a certain patient’s condition to refer him or her to a more experienced specialist (Kerridge, Lowe and McPhee 151). This is an ethical responsibility where the doctor acts compassionately to help the patient. The doctor could wait for the hospital’s m anagement to dictate the patient’s next move according to the patient’s progress records. Hence, implying laws are ethically neutral. This is because there is no room where law enforcement process can compel the specialist to act at his or her level best given that ethics emanate from a person’s moral values (Kerridge, Lowe and McPhee 146). In addition, laws compared to the ethics are stricter and entail full conformity where one fails to comply with them. Therefore, one is

Wednesday, November 20, 2019

Material Science Essay Example | Topics and Well Written Essays - 500 words

Material Science - Essay Example Graphene is another example of a nano-structural material that is being used in the optic and electronic industry, due to its high energy capacity and also the high rate of charge. Scanning probe microscope works through the use of a physical probe that scans specimens and then provides the recorded data that is depicted in the form of a heat map that takes either an orange or a black and white image. Shear stress refers to the force that pushes particles within a liquid, gaseous or solid material in the direction that is parallel to the surface/plane. On the other hand, tensile stress refers to the forces that push a particle on to the other from varied directions. Compressive stress refers to the forces in the materials that push the material particles against one another. A phase diagram offers information related to the structure of a material through graphic presentation, which indicates the relationship between solid, liquids and gaseous state of a material when the material is heat-treated. It offers information regarding at which heat-point the solid state of material changes to liquid, and at which heat-point the liquid changes into gas. Annealing refers to the heat treatment of a material such that it increases its ductility and becomes more workable. Quenching refers to the rapid cooling of a material through immersion into a liquid such as oil or water, to form a certain material property that is activatable in different material states. Austenitizing refers to the heat-treatment of material such that it attains certain hardening characteristic when it is cooled down through quenching. Normalizing is a heat-treatment method for materials that softens the materials without producing the uniformity of the material property. Collision occurs on the event of two signals being sent through the same channel of transmission, such that the signals collide with each other. Packet collision is a form of

Monday, November 18, 2019

Inter-Global Medicares Expansion Strategy Essay

Inter-Global Medicares Expansion Strategy - Essay Example Having good quality product and service packages would likely attract upper and middle class citizens in the market. These people can afford quality health care. In most cases in the developing countries, such people usually seek alternative opinion on medication from the developed countries. The U. S is one such destination for such patients. This puts into perspective the strategic position that the company would have in such markets. Having a health facility that will be able to offer these services within their countries will thus be a relief as it will save on the travel expenses besides the timeliness in cases of emergencies.The potential audiences for this business plan include potential financers such as monetary lending institutions and possible partners. All these have a common interest in the plan; its viability and the promise for returns. The plan must therefore prove beyond any reasonable doubt that it is achievable and practical. In proving these, it is common knowledg e that most African countries are underdeveloped. They lack the quality basic services such as health care. Despite the poverty levels in the continent, it is also evident that it has some of the world’s richest men. The firm is not setting foot in Africa to exploit the people there, but to assure quality for the money that every single client will opt to invest in own health.Inter- Global Medicare offers both services and product delivery. This thus divides its potential market into two.... All these have a common interest in the plan; its viability and the promise for returns. The plan must therefore prove beyond any reasonable doubt that it is achievable and practical. In proving these, it is common knowledge that most African countries are underdeveloped. They lack the quality basic services such as health care. Despite the poverty levels in the continent, it is also evident that it has some of the world’s richest men. The firm is not setting foot in Africa to exploit the people there, but to assure quality for the money that every single client will opt to invest in own health. Inter- Global Medicare offers both services and product delivery. This thus divides its potential market into two. The company runs both a private hospital and an all-inclusive pharmacy. The first market segment includes those who will seek medical services on the diagnosis and treatment of diseases. These will be the hospital’s clients. Offering both out and in-patient services , the hospital looks forward to having a very busy schedule. On the other hand, the hospital will run a pharmacy. This is a facility which will be developed within the premises of the hospital. This follows an understanding that there are some ailments in which self-medication is effective in controlling. At one time everyone uses such. However, in the purchase of these, the clients normally attach a lot of importance in the effectiveness of the drugs they buy (Tabbush, 2011). To ensure this, the facility plans to have drugs which are affordable availed to the customers at their convenience. This further widens the customer base because of the price disparity between

Saturday, November 16, 2019

The Godfather Movie Analysis Film Studies Essay

The Godfather Movie Analysis Film Studies Essay The Godfather (1972) is a one of a kind movie; it is even considered by many an American classic. The American Film Institute (AFI) has The Godfather listed at number two in 2008 as one of the greatest films in American culture today. This movie has everything from great action scenes to world famous actors. This movie stars Marlon Brando, Al Pacino, and James Cann among many others. The Godfather portrays one major theme throughout the entire movie and that is violence. Almost every scene in this movie is either a shot of actual violence accruing or the audience sees some of the characters talking about violence. However, it is the violence in this movie that makes it the classic it is today. The opening scene in The Godfather is of man pleading with Don Vito Corleone (Marlon Brando) to hurt some men out of justice for his daughter. This man tells his story of his daughter being taken advantage of by some young men and it is indicated to the audience that this mans daughter was raped. This opening scene is dark with very little light shown which sets the mood for the entire movie. The audience gets the sense right away the Don Corleone holds the power to make things happen such as justice and make people pay for the wrong they have caused. After what seems to be an eternity Don Corleone grants the man his wish to bring justice to his daughter but in exchange Don Corleone tells the man that one day in the future he will call upon him for a favor. It is here in this scene that we see that Don Corleone is in charge and that violence is the reoccurring theme in the entire movie. The next scene is of a singer Johnny Fontane (Al Martino) which happens to be Don Corleones godson. Johnny is there to ask the Godfather for his help in landing a lead role in an upcoming movie. Johnny believes that if he gets this role it will help boost his career and stardom again. With this request Corleone sends his adopted son Tom Hagen (Robert Duvall) to California to make the director of the movie cast Johnny. After the director refuses to cast Johnny, Tom Hagen cuts the head off the directors favorite horse and puts it in the directors bed while he is sleeping. We assume that after this violence occurs the director casts Johnny in his movie. When the camera shoots to the director in bed there is a lot of blood and the audience actually gets to see a severed horse head. This is scene is very gruesome and realistic. After this scene it is clear that if the Corleone family doesnt get or hear what they want that they will use any action to make their needs met. This scene is use d to show the power the Corleone family holds throughout the country. Again violence was the main objective in this scene. In the upcoming scenes in The Godfather are some of the most important events in the movie because these events are what lead to the continuation of the movie. When Hagen returns from California, the entire Corleone entourage goes to a very important meeting where they meet up with a man named Virgil Sollozzo (Al Lettieri.) Sollozzo wants Corleones corporation in protecting the rival Tattaglia family because of their interest in getting started in trafficking heroin. Coreleone refuses to help because he believes that getting involved with narcotics will destroy his political connections and his reputation. After this meeting Corleone becomes very concerned and sends one of his biggest men, Luca Brasi (Lenny Montana) to check in with Sollozzo to see what he is up to but while Brasi is there he is stabbed in the hand and is beaten to death. Again, we see violence used as a way to get things done. Brasi is killed because Sollozzo is being set up. It comes as a shock to the audience beca use in this scene all of the characters are standing calmly talking to one another when all of a sudden a man takes a knife and stabs Brasi hand into the counter top. The audience gets to experience the entirety of how horrific it is for Brasi because the camera is focused on Brasi hand when the knife goes through it. In this scene it is clear that other families have efficient ways of handling business. It seems as though there is a competition between the different families and who ever can do the most damage is the family who holds the most power. The next major, important scene is where Corleone is shopping in an outdoor market, purchasing fruit. Corleone has his back towards the camera and the audience feels that something bad is about to happen. Moments later the camera shows men running towards Corleone with guns pointed toward him. These men start shooting Corleone until he falls to the ground. These men shot Corleone because he refused Sollozzos offer. At the same time Corleone is being shot, Sollozzo captures Hagen and tries to convince him to tell Corleones oldest son Sonny (James Cann) to take the offer. This is one of the less graphic scenes the audience gets to experience, this is probably done discretely because it represents the respect people hold for Corleone. Here, the audience experiences more of an emotional effect when Corleone is shot. Even though he is a mob boss the audience has learned to except and like Corleone and to see him shot causes sadness. There is hope for us that he is okay and that becomes a relief. The youngest son out of the Corleone family is Micheal (Al Pacino) who is a war hero and is assumed to not follow in the family mob business. This all changes though when Michael goes to visit his father in the hospital and realizes that there is a set up occurring in an attempt to try and kill his father for a second time. When Micheal stops the murder attempt, a corrupt police caption name McCluskey (Sterling Hayden) breaks his jaw out of frustration. Sonny then retaliates by killing Tattaglias son. This is almost another touching scene because we see how emotional Corleone sons are towards their father. The audience really starts to see the meaning of family and how strong their bond is. Michael is really starts to be seen here because he steps up and keeps his cool unlike his brother Sonny. This family is willing to do anything to keep each other together and safe. After Michael gets his jaw broken there is a fire inside of him that is initiated and he wants to seek revenge not only for himself but also for the attempt on his fathers life. With that being said he meets Sollozzo and McCluskey at a small Italian restaurant to settle and end this dispute. Halfway through the meal Michael asks to use the bathroom; in the bathroom Michal has planted a gun so he could kill Solozzo and McCuskey. As Michael returns to the table we hear the sound of a subway train which is loud and very squeaky and this sound contradicts the calm movement and expression on Michaels face. Because of the harsh sound of the subway and Michaels cool attitude the audience knows something bad is about to happen. Then all of sudden Micheal pulls out the gun and shots Sollozzo and McCluskey it the head. At this point the audience starts to notice the strength of violence in this film but it is done in almost a tasteful way. There is never a crime committed in this movie that is nt done without purpose and deep thought. Every murder is thought out and planned carefully. The mafia business is scary to the audience but for these characters it is everyday business that they have to take care of. Even though there is a great deal of violence in this movie and around the corner of every scene there seems to be a murder or crime being committed there is something else the audience gets to experience and that is the strength of family unity. The Corleone family has a very strong bond and will do anything to keep the family safe and together. We especially see this when Sonny gets a phone call from his sister Connie (Talia Shire.) Connie proceeds to tell Sonny that she is being abused by her husband Carlo (Gianni Russo.) With this news Sonny goes and beats up Carlo and warns him that if he touches his sister again he will kill Carlo. Just as the audience expected Carlo beats Connie again and so now Sonny goes to kill him but while Sonny is at a toll booth he is ambushed and shot to death but the other rival families. The last major scene that involves violence is at the very end of the film. The scene starts with christening of Connies baby where Michael is to assume role of the godfather to the child. As the christening proceeds has planned the assassination of the murder for each the heads of the rival families. While the audience sees shots of the christening taking place there is also scene shots of the murders of the heads of the family. Each head is shot to death and this shows the power Michael has now. Michael can be doing some completely different but has the control to handle business while doing something so pure, such as being at a christening. There is great irony in that. It shows the value of family but also how the family business will take over Michaels life. Michael, as much as his father had tried to steer Michael away from the family business is now clearly the new leader and assumes all the responsibility that his father had.

Wednesday, November 13, 2019

Employee Motivation Essay -- Work Job Employee Motivation Management

Employee Motivation INTRODUCTION In the quest to obtain the maximum from employees and achieve organizational success, employers recognised the need to acknowledge that people have complex needs. With the growing affluence of our society, Singaporeans of today are no longer solely driven by money but also challenges inherent in their responsibility. This is supported by our Senior Minister Goh who recently commented that Singaporeans prefer the experience of working abroad than locally as the foreign employer advocate the importance of not only work, but also the employee’s needs.(TODAY, 15 March 07). Before discussing the motivational strategies, a simplistic approach will be taken, using Hackman Oldham’s Job Characteristics Model, which defines the workforce into two categories. The first category consist of staff in job settings which are low in skill variety, task identity, task significance, low autonomy and feedback and followed by staff in complicated job settings with scorer high in all fronts (Robbins, Millet, Waters-Marsh, 2004). GOAL SETTING / EXPECTANCY THEORY â€Å"Specific hard goals produce a higher level of output than does the generalised goal of ‘do your best† (Robbins, 2003). This statement defines Edwin Locke’s goal-setting theory which advocates giving employees clear targets so that they are aware of what needs to be done and how much effort to be expended. While easier goals are more readily accepted, difficult goals, when accepted, result in higher performance as the specificity of goals itself acts as an internal stimulus. Also, people tend to perform better when timely feedback is provided (Bartol, Tein, Matthews, and Martin, 2005). When applied to individuals who are motivated by inhe... ...cShane, S and Glinow, MA 2003, Organisational Behaviour, McGraw-Hill, New York. McShane, S and Travaglione, T 2007, Organisational Behaviour on the Pacific Rim, Irwin/McGraw-Hill, Sydney. Robbins, SP 2003, Organisational Behaviour, Prentice Hall, Sydney Robbins, SP, Millet, B, and Waters-Marsh, T, 2004, Organisational Behaviour, Prentice-Hall, Sydney Wood, J, Chapman, K, Fromholtz, M, Morrison, V, Wallace, J, Zeffane, R, Kennedy, R, Schermerhorn, J, Hunt, J and Osborn, R 2004, Organisational Behaviour: A Global Perspective, John Wiley & Sons, Brisbane. Internet References â€Å"Singapore leaking talent† http://www.channelnewsasia.com/stories/specialreport/news/264096_8/1/.html Fortune’s â€Å"Best companies to work for.†http://money.cnn.com/magazines/fortune/fortune_archive/2007/01/22/8397996/index.htm AIA Singapore http://www.aia.com.sg/Content.asp?ca_typeid=4

Monday, November 11, 2019

Cyber Security India Essay

†¢After China and the U.S., India has the highest number of Internet users. There are also an estimated over 381 million mobile phone subscriptions with Internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th. †¢A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to defend against cyber attacks. †¢Cyber security threats and hacking attempts in India rose to 22,060 in 2012 from 23 in 2004 What it means †¢Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Cyber Threats Cyber threats can be disaggregated, based on the perpetrators and their motives, into four baskets: cyber espionage, cyberwarfare, cyberterrorism, and cyber crime. Cyber Warfare – attacking the information systems of other countries for espionage and for disrupting their critical infrastructure. Why Cyber Security is needed †¢Third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook! †¢The same computing DNA that produced the communications revolution has also created acute vulnerabilities – and attractive terror targets – for societies that depend on cyberspace for national security and economic survival. †¢The growing dependency on the information technology (IT) makes cybersecurity a vital component of the India’s national security infrastructure. Lately, data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing in huge numbers and make cyber attacks easily to occur. †¢Considered the newest domain in modern warfare, cyberspace has now joined the ranks of traditional areas assessed by militaries all over the world. And this is exactly how cyberspace should be assessed, since an effective terrorist attack against a nation’s power grid, for example, could result in massive loss of life, crippling damage to infrastructure and a blow to the economy that could take years to repair. Stuxnet has carried out what in the past could only be accomplished by directly bombing a country’s infrastructure or sending in human agents to plant explosives. †¢It can affect Infrastructures like banking system, air traffic control, power infrastructure and gas pipelines. †¢Destruction now can bypass the military force and attack via â€Å"cyber-brute-force† suppressing a country’s military control systems, navigation, communication system, shutting down or paralysing critical infrastructure and affecting the country’s economy, cyber-weapons linking nuclear weapons †¢Most common usage of Internet is by designing and uploading websites on which false propaganda can be pasted. This comes under the category of using technology for psychological warfare. †¢The web can promote and support acts o f terrorism by means of propaganda, promotion, instructional dissemination and execution, financing, training, recruiting and can also facilitate specific attacks. †¢Non-state actors have the technology to create cyber attacks or endanger the cyber environment of the global socio-political system. The 2011, Arab Spring revolution in Tunisia, Egypt, and Libya was successful to use cyberspace to pass its message. †¢Threats abound: cyber crime, cyber espionage, cyber war and cyber terrorism, all represent genuine risks to nations, firms and individuals around the world. Experts reckoned it is a matter of time before cyberspace becomes an â€Å"independent theatre of war†. †¢With the rapid march of technology, such attacks will only become more widespread as the use of Internet for manipulating things increases. â€Å"We have now entered into a new phase of conflict in which cyber weapons can be used to create physical destruction in someone else’s critical infrastructure. And there is a distinct possibility that the disruptions and dislocations it causes are permanent and severe.† E.g †¢The Flame virus (which has been circulating for more than five years and has yet to be claimed by an owner, although speculation centres around Israel) has turned the computer into the ultimate spy, gathering data files, turning on PC microphones to record nearby conversations, logging instant messaging chats, taking screen shots and even remotely changing settings on other computers. †¢Moreover, hacker groups, such as Anonymous and Lulz Security (Lulz Sec), have executed distributed denial of service (DDOS). Under that process, they were successful to deface websites to various governmental and corporate interests. They hacked NASDAQ and International Momentary Fund (IMF). †¢Internet’s capabilities dictate the rules of engagement in cyberspace to initiate on-ground battles and at the same time create a fertile ground for new, aspiring jihadist. †¢In the recent past, the case of Stuxnet virus which attacked centrifuges. While the targeted victim was the Natanz nuclear site in Iran, other organisations across the world, including in India, operating with the Siemens system suffered from collateral damage from the attack. †¢Since 2000-01, there have been regular reports of Pakistani cyber criminals defacing Indian websites and writing derogatory messages against India. On the other hand, China has become a formidable adver sary in cyber space. Recent cases of Chinese hacking into many Indian government establishment computers and even the highly secure national security domains provide enough evidence of its capability in waging cyber warfare. Since 2003, the People’s Liberation Army has trained more than 30,000 cyber warriors and another 150,000 in the private sector. According to several reports available in the public domain, the Chinese goal is to build the world’s best ‘informationised armed forces’. †¢ Existing Counter Cyber Security Initiatives. Indian Computer Emergency Response Team (Cert-In). Cert-In is the most important constituent of India’s cyber community. Its mandate states, ‘ensure security of cyber space in the country by enhancing the security communications and information infrastructure, through proactive action and effective collaboration aimed at security incident prevention and response and security assurance’. National Information Security Assurance Programme (NISAP). (a) Government and critical infrastructures should have a security policy and create a point of contact. (b) Mandatory for organizations to implement security control and report any security incident to Cert-In. (c) Cert-In to create a panel of auditor for IT security. (d) All organizations to be subject to a third party audit from this panel once a year. (e) Cert-In to be reported about security compliance on periodic basis by the organizations. Indo-US Cyber Security Forum (IUSCSF). Under this forum (set up in 2001) high power delegations from both side met and several initiatives were announced for intensifying bilateral cooperation to control cyber crime between the two countries. To mitigate supply-chain risks emanating from telecom equipment manufactured by companies belonging to China, the telecom and home affairs ministry have issued guidelines mandating service provides to secure their networks and induct equipment that has been tested as per international standards. CCTNS taking help of ISRO for making project fully indigenous Warned by intelligence agencies that using a foreign satellite in the proposed nationwide Crime and Criminal Tracking Network and Systems (CCTNS) could make critical databases vulnerable to eavesdropping by other countries, the Union Home Ministry has decided to take the help of the Indian Space Research Organisation (ISRO) to make the project fully indigenous. Since the intelligence agencies raised objections to the proposed use of the IPSTAR satellite managed by Thaicomm in the project, the BSNL diverted to this project some 400 VSATs that it had for other services. Fact Box: National Cyber Coordination Centre (NCCC) Indian government will establish its own multi-agency body — National Cyber Coordination Centre (NCCC) — that would carry out â€Å"real-time assessment of cyber security threats† and â€Å"generate actionable reports/alerts for proactive actions† by law enforcement agencies. NCCC , to be set up at a cost of Rs 1000 crore, would be a multi-agency body under Department of Electronics and IT. It will function in sync with other government agencies. These agencies include: †¢National Security Council Secretariat (NSCS) †¢Intelligence Bureau (IB) †¢Research and Analysis Wing (RAW) †¢Indian Computer Emergency Response Team (CERT-In) †¢National Technical Research Organisation (NTRO) †¢Defence Research and Development Organisation (DRDO) †¢DIARA (Defence Information Assurance and Research Agency) †¢Army, Navy, Air Force †¢Department of Telecommunications What will be its functions? †¢It will be India’s first layer for cyber threat monitoring and all communication with government and private service providers would be through this body only. †¢The NCCC would be in virtual contact with the control room of all Internet Service Providers to scan traffic within the country, flowing at the point of entry and exit, including international gateway. †¢Apart from monitoring the Internet, the NCCC would look into various threats posed by cyber attacks. †¢ The agency will provide law enforcement agencies direct access to all Internet accounts, be it e-mails, blogs or social networking data. DRDO doesn’t uses any US based company services in its organization. Challenges In India, we need to create an environment within which security is built into our cyber and communications working methods. While it is the government that correctly takes a lead in evolving a coherent picture of what constitutes vulnerability in our cyber domain and a strategy on how to counter attacks, the private sector needs to recognise the real threat it faces. And this is not a future threat or a prospective threat that we need to prepare ourselves against; this is an ongoing, current threat.Cyber threat will continue to grow due to the fast evolution and development of internet and related technologies. At the global level, nations are stepping up their cyber defence efforts. The U.S. was one of the first countries that considered this to be a strategic problem in 2006, both in terms of national security and their future economic wellbeing. †¢The major concern when dealing with Cyber threats is ubiquity and anonymity. What other international medium is highly accessible, far-reaching, ridiculously inexpensive, whereby information is transferred at the speed of light, the attacker invisible and untraceable? Unlike a missile trajectory, IP (Internet Protocol) pathways can be masked and the locations appear opaque. Implicating a source and assigning blame to the attack progenitor is extremely difficult. †¢the extreme difficulty of producing timely actionable warning of potential cyber attacks †¢the extreme complex vulnerability associated with the IT supply chain for various India’s networks †¢India’s approach to cyber security has so far been ad hoc and piecemeal. A number of organisations have been created but their precise roles have not been defined nor synergy has been created among them. †¢ Lack of awareness and the culture of cyber security at individual as well as institutiona l level. †¢ Lack of trained and qualified manpower to implement the counter measures. †¢Too many information security organisations which have become weak due to ‘turf wars’ or financial compulsions. †¢A weak IT Act which has became redundant due to non exploitation and age old cyber laws. †¢ No e-mail account policy especially for the defence forces, police and the agency personnel. †¢Cyber attacks have come not only from terrorists but also from neighboring countries inimical to our National interests. Recommendations. International Co-operation †¢Acknowledging that better indigenous snooping capabilities may not be enough to protect India’s cyber security, National Security Advisor Shivshankar Menon has advocated formulating a set of â€Å"standard operating procedures† (SOPs) — ground rules for cooperation which would help India succeed in obtaining Internet information from major powers that control much of cyber space. †¢Given the cyber reality, ‘sensible’ powers should work towards a globally acceptable cyber regime to bring in a set of rules, build transparency and reduce vulnerabilities. †¢Agreements relating to cyber security should be given the same importance as other conventional agreements. †¢The government should also consider joining the European Convention on Cyber crime. †¢A 24Ãâ€"7 nodal point for international cooperation with cyber authorities of other countries should be set up. Critical Infrastructure †¢Cyber security should be mandatory in computer science curriculum and even separate programmes on cyber security should be contemplated. Government should initiate a special drive of implementing practices in the critical infrastructure sectors and provide necessary budgetary support for such implementation. †¢ Government should establish a mechanism for measuring preparedness of critical sectors such as security index, which captures preparedness of the sector and assigns value to it. †¢Government should incorporate IT Supply Chain Security as an important element of e-security plan to address security issues. †¢Government should promote R&D in private industry through active government support for industry-led research projects in the areas of security. Establish enabling mechanisms to facilitate this. †¢Emphasis should be placed on developing and implementing standards and best practices in government functioning as well as in the private sector. Cyber security audits should be made compulsory for networked organisations. †¢Capacity building in the area of cyber crime and cyber forensics in terms of infrastructure, expertise and availability of HR and cooperation between industry, LEAs and judiciary. †¢Cyber security education, R&D and training will be an integral part of the national cyber security strategy. †¢PPP model should be explored for taking security to the regions and industry sectors. †¢Strengthening telecom security – one of the key pillars of cyber security, especially through development of standards and establishment of testing labs for telecom infrastructure(equipment, hardware). †¢More investment in this field in terms of finance and manpower. †¢The impact of the emergence of new social networking media, and convergence of technologies on society including business, economy,national security should be studied with the help of relevant experts, Legal †¢Procedural laws need to be in place to achieve cooperation and coordination of international organisations and governments to investigate and prosecute cyber criminals. †¢Government must put in place necessary amendments in existing laws or enact a new legislation like a Data Protection/Privacy Act so as to safeguard against the misuse of personal information by various government agencies and protect individual privacy. †¢Need for trained and qualified experts to deal with the highly specialised field of cyber security and laws related to it. †¢ Govt Machinery †¢Make it a mandatory requirement for all government organisations and private enterprises to have a designated Chief Information Security Officer (CISO) who would be responsible for cyber security. †¢Establishment of a cyber range to test cyber readiness. †¢ More powers to sectoral CERTs. †¢Establish an online mechanism for cyber crime-related complaints to be recorded. †¢Policymakers need to recognise this and put in place structures that allow the sharing of cyber security information through both formal and informal cyber exchanges. That requires a fast, unified action between government agencies and the private sector. †¢Indian agencies working after cyber security should also keep a close vigil on the developments in the IT sector of our potential adversaries. †¢Joint efforts by all Government agencies including defence forces to attract qualified skilled personnel for implementation of counter measures. Awareness Need to sensitize the common citizens about the dangers of cyber terrorism. Cert-in should engage academic institutions and follow an aggressive strategy. Conclusion †¢Defining how we deal with Cyber threats and attacks internationally is crucial to peace and security. If Cyber weapons are treated with indifference in comparison to other weapons then it can open the doors to multifaceted retaliation if a nation is provoked †¢Enforcing the right policies to amalgamate security of governments and law-abiding citizens is critical. The safety of individuals outweighs commercial piracy. Sophism and intellectual rhetoric redirects focus on eliminating irrefutable threats like violence and terrorism. Instead, diluted versions of policies are implemented and lives are put at risk. †¢. â€Å"India must take an early lead in creating a framework where the government, the national security experts and the industry catering to strategic sectors of economy, can come together, to pursue the goal of cyber security in the larger national cause †¢Need to prepare cyber forces . The United States was the first country to formally declare this as the fifth domain warfare after land, sea, air and space. It has also formally classified the use of cyberspace as a â€Å"force†, a euphemism for offensive capability. The Chinese adopted the concept of â€Å"informationalisation† in the mid-1990s and have relentlessly built up structures and operations in this domain. Cyber Security Dilemma †¢John Herz, an American scholar of international relations and law is credited for coining the term â€Å"security dilemma†. †¢ The dilemma expresses how both the strong and weak states can upset the balance of power that could eventually become a catalyst for war. The security dilemma could arise from the state’s accumulation of power due to fear and uncertainty about other states’ intentions. †¢ Post-9/11, successive US administrations have mostly attempted to handle global disorder by accumulating more â€Å"power†. Not surprisingly, since 2007, the US has been collecting and analysing significant amount of data available in the cyber space. †¢Cyber security dilemma of the US was recently exposed by the US whistle-blower Edward Snowden, giving details about the US National Security Agency’s controversial Prism programme. †¢ The US, clearly has been monitoring the global e-traffic covertly and in the process checking on c yber activities on Google, You Tube, Skype, Facebook, etc. This has resulted in a huge amount of metadata (a data about data). †¢ US administration has been spoofing on the rest of the world. †¢In the 21st century, with the number of computer and internet users is increasing significantly, the cyber environment has almost become fundamental to a nation’s ‘existence’. †¢ Over the years Information and Communication Technologies (ICT) have become central to various sectors from social, economic, political to defence. The fillip side to it is that various unauthorised, illegal, criminal, anti-national and terrorist activities have also become rampant. Astonishing as it may sound, but the third most populous country after China and India is not any geographical entity but a ‘virtual state’ called facebook! †¢The human rights activists and states who are under the US surveillance consider it an anti-democratic act that undermines the civil liberties and individual privacy. The absence of a globally accepted cyber regime and legal structure adds further to the commotion. †¢ The excessive dependence on cyber tools has given rise to various vulnerabilities. Recently the US National Security Agency chief Gen Keith Alexander, who also heads the US military’s Cyber Command, has expressed concerns and is of the opinion that on a scale of 1 to 10, the US critical infrastructure’s preparedness to withstand a destructive cyber attack is about 3, this in spite the US having established a major defence infrastructure to defend against foreign hackers and spies. This assessment would push the US to strengthen its defences further. However, since the nature of the threat is extremely dynamic it may not be possible to build any foolproof defensive mechanism. †¢Any cyber architecture can be viewed as a doubled edged sword – either ignore it and be exposed or use it to one’s advantage. Cyber espionage is here to stay. Today, the US is upfront because of its technological superiority and ability to ‘manage’ the ICT industry and prevent few acts of terrorism from actually happening. More importantly, the data gathered would have u tility in other fields too. Conclusion: †¢Snowden has clearly exposed the US but it is hard to imagine that the US would halt its cyber activities. As a leading power, the US is accustomed to international criticism, lawsuits and questioning and at the end of the day cyber spying and spoofing actually strengthens their intelligence gathering capability. †¢It is important to note that cyber expertise offers significant amount of asymmetric advantage to the user. In the future, it is not only the US but many other states that are also likely to use this method (mostly covertly). †¢States would support a cyber regime essentially because intelligence collection is not the sole purpose for possessing cyber assets. ITC also leads to empowerment and its importance for socioeconomic development s undisputed. †¢In general, the norms of privacy in a cyber-era world would remain a constant subject of debate since the nature of technology presents a challenging task to catch the actual offender. Technologically superior power would always have an advantage. The time has come to recognize that in the future we would always be watched and mostly against our own wishes! India-US collaboration in Cyber Security Indian officials and security officers would soon be visiting the U.S. for training in an array of courses — from cyber security, megacity policing and forensics, to critical infrastructure protection, financial terrorism and anti-terrorism intelligence. â€Å"The list of training programmes include ‘Land Transportation Anti-terrorism’; ‘Weapons of Mass Destruction’; ‘Seaport Security’; ‘International Border Interdiction Training’ and ‘International Sea Interdiction Training’ to check smuggling and trafficking; ‘Handling of equipment for screening men against radiological, chemical and explosive materials’ and ‘Handling of intrusive detection at airports and seaports.’ With the growing population in cities and increasing threat perception, the U.S. has also offered India to help develop the concept of megacity policing, a step it has been promoting since the 9/11 attacks. â€Å"An advance course in surveillance, control room design and its operation by various security agencies and police authorities are key elements of this concept. Balancing vigilance and privacy As the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequences The Indian state is arming itself with both technological capabilities and the institutional framework to track the lives of citizens in an unprecedented manner. A new Centralised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As The Hindu reported on June 21, this would allow the government to access in real-time any mobile and fixed line conversation, SMS, fax, website visit, social media usage, Internet search and email, and will have ‘unmatched capabilities of deep search surveillance and monitoring’. Civil society groups and citizens expressed concern about the government’s actions, plans, and intent at a discussion organised by the Foundation for Media Professionals, on Saturday. The context Usha Ramanathan, a widely respected legal scholar, pointed to the larger political context which had permitted this form of surveillance. It stemmed, she argued, from a misunderstanding of the notion of sovereignty. â€Å"It is not the government, but the people who are sovereign.† Laws and the Constitution are about limiting the power of the state, but while people were being subjected to these restrictions, the government itself had found ways to remain above it – either by not having laws, or having ineffective regulators. States knew the kind of power they exercised over citizens, with the result that ‘impunity had grown’. â€Å"There is also a complete breakdown of the criminal justice system,† Ms Ramanathan said. This had resulted in a reliance on extra-judicial methods of investigation, and ‘scape-goating’ had become the norm. ‘National security’ had been emphasised, re-emphasised, and projected as the central goal. â€Å"We haven’t paused to ask what this means, and the extent to which we have been asked to give up personal security for the sake of national security.† It was in this backdrop that technology had advanced by leaps, and made extensive surveillance possible. The implications are enormous. The data is often used for purposes it is not meant for, including political vendetta, keeping track of rivals, corporates, and digging out facts about a citizen when he may have antagonised those in power. Pranesh Prakash, director of the Centre of Internet and Society (CIS) looked back at the killing of Haren Pandya, the senior Bharatiya Janata Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a friend, and it was by tracking the SIM, and through it his location, that the Gujarat government got to know that Mr Pandya had deposed before a commission and indicted the administration for its role in the riots. Eventually, he was found murdered outside a park in Ahmedabad. The Gujarat Police had accessed call details of 90,000 phones. It is also not clear whether mining this kind of data has been effective for the national security purposes, which provide the reason for doing it in the first place. Saikat Datta, resident editor of Daily News and Analysis, and an expert on India’s intelligence apparatus, said a core problem was the absence of any auditing and over sight. â€Å"There needs to be a constant review of the number of calls, emails under surveillance, with questions about whether it is yielding results. But this does not happen, probably because a majority is not for counter-terrorism. There would be trouble if you build accountability mechanisms.† When he sought information under RTI around precisely such issues, he was denied information on the grounds that it would strengthen ‘enemies of the state’. Anja Kovacs, who works with the Internet Democracy Project, said this form of â€Å"mass surveillance† criminalised everybody since it was based on the assumption that each citizen was a â€Å"potential criminal†. She also pointed out that having â€Å"more information† did not necessarily mean it was easier to address security threats – there was intelligence preceding the Mumbai attacks, but it was not acted upon. She added, â€Å"Most incidents have been resolved by traditional intelligence. Investing in agencies, training them better could be more effective.† Bring in the caveats Few argue that the state is not entitled to exercise surveillance at all. In fact, a social contract underpins democratic states. Citizens agree to subject some of their rights to restrictions, and vest the state with the monopoly over instruments and use of violence. In turn, the state – acting within a set of legal principles; being accountable to citizens; and renewing its popular legitimacy through different measures, including elections – provides order and performs a range of developmental functions. This framework, citizens and civil liberty groups worry, is under threat with governments appropriating and usurping authority to conduct unprecedented surveillance. Citizen groups, technology and privacy experts came together globally to draft the International Principles on the Application of Human Rights to Communication Surveillance. It prescribed that any restriction to privacy through surveillance must be ‘legal’; it must be for a ‘legitimate aim’; it must be ‘strictly and demonstrably necessary’; it must be preceded by showing to an established authority that other ‘less invasive investigative techniques’ have been used; it must follow ‘due process’; decisions must be taken by a ‘competent judicial authority’; there must be ‘public oversight’ mechanisms; and ‘integrity of communications and systems’ should be maintained. (Full text available on www.necessaryandproportionate.org)Mr Prakash of CIS, which has done extensive work on surveillance and privacy issues, said, â€Å"An additional principle must be collection limitation or data minimisation.† Giving the instance of Indian Railways seeking the date of birth from a customer booking a ticket, Mr Prakash said this was not information which was neces sary. But it could be used by hackers and many other agencies to access an individual’s private transactions in other areas. The UPA government is finalising a privacy Bill, but its final version is not yet public, and it is not clear how far the government would go in protecting citizen rights. National cyber security Policy 2013 National Cyber Security Policy 2013 This policy aims at facilitating creation of secure computing environment and enabling adequate trust and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber space. †¢ The National Cyber Security Policy document outlines a road-map to create a framework for comprehensive, collaborative and collective response to deal with the issue of cyber security at all levels within the country. †¢ The policy recognises the need for objectives and strategies that need to be adopted both at the national level as well as international level. †¢ The objectives and strategies outlined in the National Cyber Security Policy together serve as a means to: i. Articulate our concerns, understanding, priorities for action as well as directed efforts. ii. Provide confidence and reasonable assurance to all stakeholders in the country (Government, business, industry and general public) and global community, about the safety, resiliency and security of cyber space. iii. Adopt a suitable posturing that can signal our resolve to make determined efforts to effectively monitor, deter & deal with cyber crime and cyber attacks. Salient features of the policy †¢The Policy outlines the roadmap for creation of a framework for comprehensive, collaborative and collective responsibility to deal with cyber security issues of the country. The policy has ambitious plans for rapid social transformation and inclusive growth and India’s prominent role in the IT global market. †¢The policy lays out 14 objectives which include creation of a 5,00,000-strong professional, skilled workforce over the next five years through capacity building, skill development and training. †¢The policy plans to create national and sectoral level 24Ãâ€"7 mechanisms for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective, predictive, preventive, proactive response and recovery actions. †¢The policy will also establish a mechanism for sharing information as well as identifying and responding to cyber security incidents and for cooperation in restoration efforts. †¢The policy identifies eight different strategies for creating a secure cyber eco-system including the need for creating an assurance framework apart from encouraging open standards to facilitate inter-operability and data exchange amongst different products or services. †¢There is in place a plan to operate and strengthen the national Computer Emergency Response Team (CERT-In) to operate 24Ãâ€"7 and to act as a nodal agency for all efforts for cyber security, emergency response and crisis management, as an umbrella agency over CERTs. †¢It is expected that he policy w ill cater to the cyber security requirements of government and non-government entities at the national and international levels. The policy will help in safeguarding the critical infrastructure like Air Defence system, nuclear plants, banking system, power infrastructure, telecommunication system and many more to secure country’s economic stability. National Nodal Agency †¢The National Cyber Security Policy, in order to create a secure cyber ecosystem, has planned to set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to cyber security in the country. †¢The nodal agency has a wide mandate as it will cover and coordinate security for all strategic, military, government and business assets. This is distinctive, since, so far, national security regimes have been divided among the Ministry of Defence (for securing India’s borders) and the Ministry of Home Affairs (for national and internal security across States). Public-private partnership to protect national assets †¢Another defining aspect of the policy is the level at which it envisages public-private partnership to protect national assets. †¢There is a clear recognition in the policy that, apart from India’s IT, technology and telecommunications services, large parts of financial & banking services, airline & transportation services, energy and healthcare assets are not only owned by the private sector but, in fact, remain vulnerable to cyber-attacks, both from state and non-state actors. Protection centre †¢A crucial aspect of the policy is building resilience around the Critical Information Infrastructure (CII) by operationalising a 24Ãâ€"7 Nation Critical Information Infrastructure Protection Centre (NCIIPC). The Critical Information Infrastructure will comprise all interconnected and interdependent networks, across government and private sector. †¢The NCIIPC will mandate a security audit of CII apart from the certification of all security roles of chief security officers and others involved in operationalising the CII. Operationalisation †¢The policy will be operationalised by way of guidelines and Plans of Action, notified at national, sectoral, and other levels. While there is a recognition of the importance of bilateral and multilateral relationships, the policy does not clearly identify India’s position vis-à  -vis the Budapest Convention even though government delegations have attended meetings in London and Budapest on related issues in 2012. Why does India need a cyber security policy? †¢Cyber security is critical for economic security and any failure to ensure cyber security will lead to economic destabilisation. †¢India already has 800 million active mobile subscribers and 160 million other Internet users of which nearly half are on social media. India targets 600 million broadband connections and 100% teledensity by 2020. Internet traffic in India will grow nine-fold by 2015 topping out at 13.2 exabytes in 2015, up from 1.6 exabytes in 2010. †¢The ICT sector has grown at an annual compounded rate of 33% over the last decade and the contribution of IT and ITES industry to GDP increased from 5.2% in 2006-7 to 6.4% in 2010-11, according to an IDSA task force report of 2012. †¢Given the fact that a nation’s cyber ecosystem is constantly under attack from state and non-state actors both. It becomes extremely critical for India to come up a coherent cyber security policy. †¢One of the key objectives for the government is also to secure e-governance services where it is already implementing several nationwide plans including the â€Å"e-Bharat† project, a World Bank-funded project of Rs. 700 crore. Criticism The release of the National Cyber Security Policy 2013 is an important step towards securing the cyber space of our country. However, there are certain areas which need further deliberations for its actual implementation. The provisions to take care security risks emanating due to use of new technologies e.g. Cloud Computing, has not been addressed. Another area which is left untouched by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements. There is also a need to incorporate cyber crime tracking, cyber forensic capacity building and creation of a platform for sharing and analysis of information between public and private sectors on continuous basis. Creating a workforce of 500,000 professionals needs further deliberations as to whether this workforce will be trained to simply monitor the cyberspace or trained to acquire offensive as well as defensive cyber security skill sets. Indigenous development of cyber security solutions as enumerated in the policy is laudable but these solutions may not completely tide over the supply chain risks and would also require building testing infrastructure and facilities of global standards for evaluation. Indian Armed forces are in the process of establishing a cyber command as a part of strengthening the cyber security of defence network and installations. Creation of cyber command will entail a parallel hierarchical structure and being one of the most important stakeholders, it will be prudent to address the jurisdiction issues right at the beginning of policy implementation. The global debate on national security versus right to privacy and civil liberties is going on for long. Although, one of the objectives of this policy aims at safeguarding privacy of citizen data however, no specific strategy has been outlined to achieve this objective. The key to success of this policy lies in its effective implementation. The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the ever-changing threat landscape. Central Monitoring System (CMS) project – Justified †¢Indian government’s own Central Monitoring System (CMS) project. †¢roughly 160 million users are already being subjected to wide-ranging surveillance and monitoring, much of which is in violation of the government’s own rules and notifications for ensuring â€Å"privacy of communications†. †¢ While the CMS is in early stages of launch, investigation shows that there already exists — without much public knowledge — Lawful Intercept and Monitoring (LIM) systems, which have been deployed by the Centre for Development of Telematics (C-DoT) for monitoring Internet traffic, emails, web-browsing, Skype and any other Internet activity of Indian users. †¢While mobile operators deploy their own LIM system, allowing â€Å"interception† of calls by the government, only after checking â€Å"due authorisation† in compliance with Section 5(2) of the Indian Telegraph Act read with Rule 419(A) of the IT Rules †¢In the case of the Internet traffic, the LIM is deployed by the government at the international gateways of a handful of large ISPs. The functioning of these secretive surveillance systems is out of reach of these ISPs, under lock and key and complete control of the government.