Sunday, December 29, 2019

The Impact Of Green Supply Chain Management On Industry,...

Green Supply Chain Management In Automotive Production Stephanie C. Soutier College of Charleston Abstract This paper investigates the impact of green supply chain management on industry, consumer perception and environment. Through research into multiple companies and case studies, a distorted perception among large corporations shows a historic struggle to find a balance between profit and sustainability. However, the potential long-term effects of the lack of environmental courtesy cannot be undone and therefore must be carefully engineered. Multi-billion dollar automotive corporations such as Hyundai and Toyota will be discussed and studied in depth to conclude the innovative changes†¦show more content†¦Keywords: green supply chain, automotive sustainability, global impact Green Supply Chain Management In Efficient Business Practices The automotive industry changed the way that Americans purchased products when cars became an affordable luxury in the early 19th century. Not only did cars drastically reduce travel in daily life, they provided a gateway of possibilities for expanding business beyond carriage or foot travel. Due to the mass production assembly line strategy implemented by Henry Ford, cars could be produced quickly and efficiently. This dramatic shift in production dropped prices to the affordable level for the average American, which led to the establishment of buying on credit. The automotive industry provides economic growth and convenience in America and throughout the world – but this amenity comes at a great price to the environment. Throughout the entire life cycle of an automobile, carbon emissions and waste are produced. Although most believe that automobiles creates only carbon emissions when in use, the process begins negatively contributing to the environment long before and long after the life of the car. Additionally, the understanding and research related to carbon emissions from the use of gasoline-powered cars has provided consumers with an awareness of their effect on the environment. For some, this realization has prompted conservatory measures in vehicle use, utilizing public

Saturday, December 21, 2019

Mutually Assured Destruction in Theory and Practice

By definition Mutually Assured Destruction (MAD) is a doctrine of military strategy in which full-scale use of nuclear weapons by both sides would effectively result in the destruction of both side. It is not a complicated concept. An elementary school child could understand that the two biggest kids in the class dont openly brawl because both would suffer unacceptable damage as well as put third parties in the danger of the crossfire. The concept of MAD is not the complicated part; it is everything else that pertains to it that has baffled policy makers and theorists for generations. Mutually Assured Destruction is a complex but precarious balance that dominated the Cold War Era. The stability can easily be disrupted by actions taken by†¦show more content†¦Credited with first use of the phrase assured destruction, McNamara did much to outline the dilemma that both the United States and the United Soviet Socialist Republic faced. Secretary McNamara proved to be highly influ ential on the Cold War, such as the Kennedy Administration actions on the Bay of Pigs Operation, (although it ended up backfired on the Administration). He was also a member of the Executive Committee of the National Security Counsel that advised President Kennedy on the Cuban Missile Crisis. He is famous for his Athens and Ann Arbor speeches in Greece and Michigan respectfully, which suggested picking military targets rather than cities, as well as indivisibility of control which stressed a united nuclear deterrent against the communist forces. The idea of a change in targets was however dropped when it was realized how difficult it would be to make it an effective strategy. 9 Central to the employment of mutually assured destruction as a military doctrine is a belief that neither side would attack for it would ensure its own death. This delicate balance exists only while conditions remain stable. Different actions each side takes in the conflict effect the stability in different and often unexpected ways. How it effects the stability depends on the perception each country takes. One action intended by one country to helpShow MoreRelatedSignificance of Cuban Missile Crisis1470 Words   |  6 Pages Nuclear Strategy during Cold War -Soviet threat (increasingly formidable military power after 1945) defined US policy amp; military strategy. -Both Soviet amp; NATO governments regarded nuclear weapons as useable instruments of war. Theories and contributions Bernard Brodie -Establishing the basics of nuclear strategy -Architect of nuclear deterrence strategy -Strategy in the Missile Age outlined the framework of deterrence -Saw the usefulness of the atomic bomb not in its deploymentRead MoreThe Threat Of Nuclear Weapons1474 Words   |  6 PagesFinally it will be looked at whether nuclear terrorism is an immediate, or even real threat to the US. MAD, States and International Law The most common phrase in the discourse on the threat of nuclear weapons is the infamous acronym MAD (mutually assured destruction). MAD is the primary principle as to why nuclear weapons are not the number one threat especially to the US, who have primacy over nuclear weapons. MAD was born out of the 1950s’ US doctrine of massive retaliation, and despite attemptsRead MoreComparison of the 1938 Munich Crisis and 1962 Cuban Missile Crisis and the Role of Nuclear Arms2588 Words   |  11 Pages1945, shaped contemporary international relations. What makes the Cuban Missile Crisis fundamentally different was precisely because it occurred during nuclear age. This essay will outline some of the concepts such as deterrence, mutual assured destruction doctrine, and the concept of balance of terror to justify why the nuclear age has shaped events after World War II. The essay concludes by affirming the need to rethink and revisit the role of nuclear weapons in the 21st century. ComparisonRead MoreThe On Ai Should Not Make Things Worse Essay1697 Words   |  7 Pagesof AI weapons would inevitably lead to Mutually Assured Destruction. Take the Cold War for example; the nuclear arms race put practically the entire population of the planet on edge worrying about whether a nuclear bomb would wipe them out at any second. Therefore, establishing clear and concise laws would reinforce the idea of having rules allow the positive prosperity of AI instead of the negative ones, such as autonomous weapons, therefore making it mutually beneficial to everyone in the futureRead MoreMilitary Technology And Technological Advancements2082 Words   |  9 Pagesthrough a combination of firepower, mobility, and maneuver. Warfare has now transitioned to become the battle of wits, nerves, technology and tactics. Military thinkers developed new theories to integrate these technological advancements into the existing military setup. General Swinston and Colonel Fuller developed th eories that influenced development of the armored warfare. Early airpower theorists, Giulio Douhet, Billy Mitchel and Hugh Trenchard evolved different concepts for effective employment ofRead MoreThe Utility of Deterrence as a Central Nuclear Security Strategy6048 Words   |  24 Pagesis orders of magnitude larger than conventional weapons, and the eventual introduction of Intercontinental Ballistic Missiles (ICBMs) meant that during the Cold War, the United States and Soviet Union were on the brink of mutual, possibly total destruction of the global population at any given time, a scenario that has never before existed in the human experience (Crouch et. al. 2009, p. 2-3). Granted, human beings have lived under the threat of mass extinction throughout their entire history, butRead MoreImpact Of Social Media On Society1443 Words   |  6 Pagessurgeon-only technique. Another glaring downfall, is that robotic-assisted surgery is not regulated by the FDA, and all of the training, a nd equipment upgrades, and certifications needed are issued by the producer, doctors, and facilities in which they practice. People must decide for themselves whether or not robotic or robotic-assisted surgery has cross the line from a personal procedure, to a cold, metal, electrical occurrence. Military technology has made tremendous strides in the past one hundred yearsRead MoreThe Nuclear Warfare And Weapons2178 Words   |  9 Pagesimpossible, so different theories and opinions on how nuclear weapons should be handled were formed. One main strategy, called deterrence, is the idea that the threat of destruction from nuclear weapons is so frightening that they, themselves can be used to discourage countries from using them or even going to war with each other. The other main strategy is called non-proliferation. This is the effort of destroying all nuclear weapons, thus destroying the chance of such mass destruction. This idea, whileRead MoreNuclear Weapons Should Be Handled2123 Words   |  9 Pagesimpossible, so different theories and opinions on how nuclear weapons should be handled were formed. One main strategy, called deterrence, is the idea that the threat of destruction from nuclear weapons is so frightening that they, themselves can be used to discourage countri es from using them or even going to war with each other. The other main strategy is called non-proliferation. This is the effort of destroying all nuclear weapons, thus destroying the chance of such mass destruction. This idea whileRead MoreThe Necessity to Swap Ethnic Profiling for Behavioral Profiling1718 Words   |  7 Pageswent â€Å"colorblind†, the southerners attempted to restore order through the lynching of blacks. As said by Lancaster in his Journal American Essentialism: White Supremacy and Collective Violence in the United States, â€Å"lynching had its genesis in the practice of judicial killing, so does the modern system of capital punishment have its origins in lynching†. Thus, the modern system of capital punishment descends from the southerners attempt to reconstitute the â€Å"social order upset by the ostensibly color-blind

Friday, December 13, 2019

Political Maharashtra Free Essays

Politics of Maharashtra After India’s independence, most of Maharashtra’s political history was dominated by the Indian National Congress party. Maharashtra became a bastion of the Congress party producing stalwarts such as Yashwantrao Chavan, Vasantdada Patil, Shankarrao Chavan, Vasantrao Naik, Vilasrao Deshmukh and Sharad Pawar. The party enjoyed near unchallenged dominance of the political landscape until 1995 when the Shiv Sena and the Bharatiya Janata Party (BJP) secured an overwhelming majority in the state to form a coalition. We will write a custom essay sample on Political Maharashtra or any similar topic only for you Order Now After a split in the Congress party, former chief minister Sharad Pawar formed the Nationalist Congress Party (NCP), but formed a coalition with the Congress to keep out the BJP-SS combine. Prithviraj Chavan of Congress party is the current Chief Minister of Maharashtra. Maharashtra, 1960-1971 Establishment of the State : In 1956 the Bombay State ceded Kannada-speaking territory to Mysore, but gained Marathwada (Aurangabad Division) from Hyderabad State and Vidarbha (Amravati and Nagpur Divisions) from Madhya Pradesh Berar. In 1960, Bombay State was split into the States of Gujarat and Maharashtra. Administration : From 1962 to 1979 Maharashtra was administrated by an Indian National Congress (INC) led government Annals : 1960 : Bombay State split into Gujarat and Maharashtra; Bombay capital of Maharashtra, Marathi provincial language 1960 : Nagpur Pact; Nagpur (Vidarbha) elevated to second capital of Maharashtra; legislative assembly meets here for two weeks in December every year 1961 : communal violence in Nagpur (BBoY 1962) 962 : state election; INC formed government 1966 : communal incidents in Maharashtra (BBoY 1967) 1966 : Shiv Sena (SHS), Maharashtra Hindu party, founded 1967 : state election; INC formed government 1968 : Hindu-Muslim riots in Aurangabad and Nagpur (BBoY 1969) 1969 : India’s first nuclear power station at Tarapur became operational (BBoY 1970) Social History : In 1961 the population of Maharashtra was 39. 9 million, in 1971 50. 3 million. The Statesman’s Yearbook, based on the census of 1971, gives the literacy rate for Maharashtra in 1971 as 39. %; in 1961 80. 2 % of the population were Hindus, 7. 6 % Muslims, 7 % Buddhists. Government, Politics and Judiciary Maharashtra is one of the most advanced states in India, the second most populated state and the third largest state in India. The government, politics and judiciary of Maharashtra is quite similar to those of the other states. The state of Maharashtra is governed by the Governor and the Chief Minister. The Governor is the nominal head of the state and the Chief Minister is the Head of the government. He is the head of the political party which has the maximum number of seats in the State Legislative Assembly. The State Legislative Assembly is also known as the Vidhan Sabha and it is situated in the capital city of Maharashtra, Mumbai. The Chief Minister has all the executive powers which he can execute taking the advice of his council of ministers. The government of Maharashtra is aided by a bicameral parliament, the lower house and the upper house – the Vidhan Sabha and the Vidhan Parishad. At present the Chief Minister of Maharashtra is Vilasrao Deshmukh from the Congress Party. The political party which holds the maximum number of seats in the Vidhan Sabha at present is the NCP which had formed the government with a coalition with the Congress. The state of Maharashtra has been nominated 19 seats in the Rajya Sabha and 48 in the Lok Sabha. Commissions : The four commissions of the government of Maharashtra are the State Election Commission, Maharashtra Public Service Commission, Union Public Service Commission, and Staff Selection Commission. These commissions have been formed to fulfill certain special responsibilities such as conducting exams which are related to government jobs. The State Election Commission: has the responsibility of taking care of the election chores in the state. There is a state election commissioner who is appointed on the basis of certain qualifications. Maharashtra Public Service Commission: the MPSC consists of examinations which are scheduled for the posts of Judges of the Co – Operative courts, Assistant Director, Special District Social Welfare Officer, Medical Officer. This commission fixes the dates of the examinations, the syllabus for the examination, the schedule for the interview and other details in connection with the examinations. Union Public Service Commission: the most important function of the Union Public Service Commission is the recruitment of services through written examinations and interviews, advising the state government on the recruitment of personnel, disciplinary functions, other miscellaneous functions regarding pensions and reimbursements of legal expenses. Staff Selection Commission: he function of the Staff Selection Commission of the Maharashtra government is to select staff of the Group B and technical staff of the Group C in the Ministries or Departments, Government of India offices, Election Commission and the Central Vigilance Commission. The Commission is responsible for formulation of policies which might assist in conducting the examination smoothly. Government Departments : Maharashtra government is dedicated tow ards serving the citizens and for that purpose it has delegated the responsibility to the various departments of the government. Each department takes care of the different needs of the inhabitants. Apart from the government departments, the government of Maharashtra is assisted by the Boards and Corporations in the fulfillment of its duty. The Government Departments and their functions are: Agriculture Department Co-operation Department Directorate of Medical Education and Research (DMER) Directorate of Technical Education, Maharashtra Directorate of Vocational Education and Training (DVET) Employment and Self Employment Department, Maharashtra Finance Department, Maharashtra Food, Civil Supplies and Consumer Protection Department Forest Department Home Department Irrigation Department Public Works Department (PWD) Vidhan Sabha : The Vidhan Sabha of Maharashtra is the lower house or the House of the People. The total strength of the House is 289 members and the term of office for the members is five years. Under unusual conditions the House may be dissolved. It consists of members who are directly elected by the people of Maharashtra. There are certain qualifications required to be the member of the Vidhan Sabha which are: To be a citizen of India To be not less than 25 years of age To be mentally sound and not bankrupt To have an affidavit of not having any criminal procedures against him. Mumbai High Court : The highest body of the Maharashtra judiciary is the Bombay High Court under which there are the Subordinate Courts which serve the districts and the City Civil Courts. The Bombay High Court can exercise original jurisdiction over the state of Maharashtra, Goa, Daman and Diu. It has benches in the cities of Bombay, Aurangabad, Nagpur and Panaji in Goa. The Bombay High Court can exercise both original and appellate jurisdiction in Bombay. The Bombay High Court can have maximum of 64 judges. The judiciary of the state of Maharashtra offers legal aid services in all its benches. The Lokayuktas and the Upa – Lokayuktas form the subordinate courts of Maharashtra. the benches of the Bombay High Court in the cities also serve as the subordinate courts in the state. Other than that there is the Maharashtra State Legal Services and Authority department which provides all the necessary information about the important names and contact numbers related to the judiciary services. Maharashtra Politics : Current Scenario India is the biggest democratic country in the world. Indian democracy provides the right of vote to its citizens to elect the government of their choice after every period of five years. However, some times unfortunately the situation rises when the ruling government looses majority in the house and vote of non-confidence is passed by the opponent party, and if the ruling party is not able to win the vote of non-confidence the house has to under go the mid-term elections. This situation may rise at the Lok Sabha in centre or at Vidhan Sabha or State Assembly in state. The major political parties dominating Indian Politics from the last few decades have been Indian National Congress and Bhartiya Janta Party besides them there are various regional parties at state level which play an influencing role in the political scenario. These parties however do not have their threshold in whole country but they have their impact on the politics at state level. These parties are the ruling parties in some of the states and in some states they act as an alliance of the party in rule. The politics of Maharashtra is not an exception to it where apart from the two major political parties i. e. , Indian How to cite Political Maharashtra, Essay examples

Thursday, December 5, 2019

Child Pornography On Internet Essay Example For Students

Child Pornography On Internet Essay In this new age of Information, the Internet has made all types of informationreadily available. Some of this information can be very useful, some can bemalicious. Child pornography, also known as Paedophilia is one of theseproblems. Any one person can find child pornography on the internet with just afew clicks of the mouse using any search engine. Despite webmasters and lawenforcement officials efforts to control child pornography and shut downillegal sites, new sites are posted using several ways to mask their identity. The Internet provides a new world for curious children. It offers entertainment,opportunities for education, information and communication. The Internet is atool that opens a window of opportunities. As Internet use grows, so do therisks of children being exposed to inappropriate material, in particular,criminal activity by paedophiles and child pornographers. Many children firstcome in contact with the Internet at a very young age. Some children becomevictims of child pornography through close relatives who may have abused them. Some children become involved with chat services or newsgroup threads. It isusually through these sites that they meet child pornographers. Children may beasked to send explicit pictures of themselves taken either by a digital cameraor scanned from a polaroid. The pornographer will then post the pictures ontheir web site, sometimes hiding them through encryption, steganography orpassword protecting them using a javascript or applet. Certain efforts have beenmade to control child pornography through legislation. In 1977 the SexualExploitation of Children Act was put into Legislation. (U.S. Code : Title 18,Section 2251-2253) The law prohibits the use of a minor in the making ofpornography, the transport of a child across state lines, the taking of apornographic picture of a minor, and the production and circulation of materialsadvertising child pornography. It also prohibits the transfer, sale, purchase,and receipt of minors when the purpose of such transfer, sale, purchase, orreceipt is to use the child or youth in the production of child pornography. Thetransportation, importation, shipment, and receipt of child pornography by anyinterstate means, including by mail or computer, is also prohibited. The ChildProtection Act of 1984 (U.S. Code : Title 18, Section 2251-2255) defines anyoneyounger than the age of 18 as a child. Therefore, a sexually explicit photographof anyone 17 years of age or younger is child pornography. On November 7, 1986,the U.S. Congress enacted the Child Sexual Abuse and Pornography Act (U.S. Code: Title 18, Section 2251-2256) that banned the production and use ofadvertisements for child pornography and included a provision for civil remediesof personal injuries suffered by a minor who is a victim. It also raised theminimum sentences for repeat offenders from imprisonment of not less than twoyears to imprisonment of not less than five years. On November 18, 1988, theU.S. Congress enacted the Child Protection and Obscenity Enforcement Act (U .S. Code : Title 18, Section 2251-2256) that made it unlawful to use a computer totransmit advertisements or visual depictions of child pornography and itprohibited the buying, selling, or otherwise obtaining temporary custody orcontrol of children for the purpose of producing child pornography. On November29, 1990, the U.S. Congress enacted US Code : Title 18, Section 2252 making it afederal crime to possess three or more depictions of child pornography that weremailed or shipped in interstate or foreign commerce or that were produced usingmaterials that were mailed or shipped by any means, including by computer. Withthe passage of the Telecommunications Act of 1996, it is a federal crime foranyone using the mail, interstate or foreign commerce, to persuade, induce, orentice any individual younger than the age of 18 to engage in any sexual act forwhich the person may be criminally prosecuted. The Child Pornography PreventionAct of 1996 amends the definition of child pornography to inclu de that whichactually depicts the sexual conduct of real minor children and that whichappears to be a depiction of a minor engaging in sexual conduct. Computer,photographic, and photocopy technology is amazingly competent at creating andaltering images that have been morphed to look like children eventhough those photographed may have actually been adults. People who alterpornographic images to look like children can now be prosecuted under the law. .uf4a0caf91cf49580b9c6408805a6aa7f , .uf4a0caf91cf49580b9c6408805a6aa7f .postImageUrl , .uf4a0caf91cf49580b9c6408805a6aa7f .centered-text-area { min-height: 80px; position: relative; } .uf4a0caf91cf49580b9c6408805a6aa7f , .uf4a0caf91cf49580b9c6408805a6aa7f:hover , .uf4a0caf91cf49580b9c6408805a6aa7f:visited , .uf4a0caf91cf49580b9c6408805a6aa7f:active { border:0!important; } .uf4a0caf91cf49580b9c6408805a6aa7f .clearfix:after { content: ""; display: table; clear: both; } .uf4a0caf91cf49580b9c6408805a6aa7f { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uf4a0caf91cf49580b9c6408805a6aa7f:active , .uf4a0caf91cf49580b9c6408805a6aa7f:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uf4a0caf91cf49580b9c6408805a6aa7f .centered-text-area { width: 100%; position: relative ; } .uf4a0caf91cf49580b9c6408805a6aa7f .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uf4a0caf91cf49580b9c6408805a6aa7f .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uf4a0caf91cf49580b9c6408805a6aa7f .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uf4a0caf91cf49580b9c6408805a6aa7f:hover .ctaButton { background-color: #34495E!important; } .uf4a0caf91cf49580b9c6408805a6aa7f .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uf4a0caf91cf49580b9c6408805a6aa7f .uf4a0caf91cf49580b9c6408805a6aa7f-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uf4a0caf91cf49580b9c6408805a6aa7f:after { content: ""; display: block; clear: both; } READ: Thomas Hobbes Essay ThesisAbstracts for these laws can be found at http://www4.law.cornell.edu/uscode/18/. The current legislation in place at the federal and state level clearly defineschild pornography, and the standard sentencing for offenders. It also clearlydefines a minor and what activity involving a minor is illegal. What thelegislation does not do is set the standards for retreival of evidence from anelectronic device, namely computers. Also, the current legislation does not setstandards for decrypting child pornography that is protected. One example is theuse of Steganography. Steganography uses a bitstream algorithm to hideinformation in the form of raw binary code within other files suitable to holdinformation. The most commonly used form of Steganography uses the leastsignificant bit of a bitmap image to store virtually any type of information. Every three bytes in a bitmap file represents a pixel. Each of these bytesrepresents a level of red, blue or green. Since there are eight bits in a byte,there can be up to 256 different combinations of 1s and 0s in a single byte. In the case of a bitmap, each unique combination of 1s and 0s represents alevel of red, blue or green. When the colors are combined, there is thepossibility of 256^3 or 4,294,967,296 different colors. In order to hideinformation within a bitmap file, the file in which you want to hide must becopied bit for bit into the last bit of each byte in the bitmap file. This willchange each pixel of the bitmap file at the most by 1 / 2,097,152, depending onwhether the bit being copied is the same as the bit it is replacing. Since thehuman eye can only physically distinguish between an average of 250 differentcolors, a difference of 1 / 2,097,152 is indistinguishable. Since only one bitof the target bitmap is being used to store information, the source file can atmost be 1/8 of the size of the target file. In the case of a bitmap, a highresolution picture can easily hold a lower resolution picture that may containchild pornography. Legally, if a bitmap image is found to contain a hidden imageus ing steganography, there is no legal procedure for extracting that evidencefor a court case. The prosecution would have to somehow explain howsteganography works to a jury, and to the judge, and would have to prove in someway that the information found did in fact come from that bitmap file. Currently, evidence found in this manner is inadmissible in court because thereis no legislation dealing with this type of evidence. Also, there is no standardapproved software that will decode these files. There are several softwareprograms readily available on the internet which will encode or decodeinformation using the least significant bit algorithm. One example is calledHide and Seek. Anyone can obtain this software free of charge, making it easyfor child pornographers to hide their work. Another problem is illicit materialthat is stored on a remote computer. If the perpetrator of child pornographydoes not own the computer that the material is stored on, it would be difficultfor law enforcement officials to obtain a warrant to search a third partyscomputer. Also, there is currently no legislation that defines what space an amachine belongs to a specific do.