Saturday, November 30, 2019

The Concept of the Homeland Security After the September 11 Incident

Introduction Following the glaring terrorist attacks on September 11, 2001, the homeland security became a key national concern. Law enforcement bodies and their respective roles changed at the federal, state, and local levels. The United States’ Congress responded to the attacks by enacting the U.S.Advertising We will write a custom research paper sample on The Concept of the Homeland Security After the September 11 Incident specifically for you for only $16.05 $11/page Learn More Patriot Act, which sought to restructure the federal, state, and local bureaucracies coupled with disseminating powers to law enforcement bodies across various agency departments (Davis 2010, 44). Even though most of the traditional security policies changed drastically, law enforcement personnel is yet to understand how to adapt to these new roles and powers towards curbing terrorism. In many respects, many people may perceive the Homeland Security as a recent policy a rea developed to react to the terrorist attacks of September 11. However, it is not a new idea since the U.S. government has been dealing with domestic invasions for a long time. In addition, much attention since the World War I has been given to safeguarding the home front from internal and external enemies. However, the concept of the homeland security shaped as an internal policy after the September 11 incident. Research question Several national intelligence issues continue to pose threat to the future of the Department of the Homeland Security (DHS) including strict bureaucratic structures, inadequate finances, lack of coordination, reluctance to share intelligence information, fragmentation as opposed to integration, and lack of accountability (Jenkins, Liepman, and Willis 2014, 19). In addressing these issues, this article will be answering the question on the challenges that the DHS will continue to face in the future. These areas will continue to pose challenges because the decision makers seem to be contented with the existing bureaucratic organization. Second, the same bureaucratic leadership is tasked with the allocation of finances meaning that considerable time will be wasted while trying to distribute funds to the security bodies. Furthermore, due to the bureaucratic systems, information sharing is highly restricted to a few people, thus leading to mistrust and further fragmentation of intelligence bodies (Goldstein 2013, 11).Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More Purpose statement The most prominent future intelligence challenges encountering the DHS are much attributable to the September 11 attacks. Most notably, the immediate response issued by the George Bush administration was an enforcement of strict bureaucratic systems across the national intelligence community. This approach did not solve the problem, but it created differences since many workers were demoralized due to working under highly bureaucratized structures. This system has been reflected in the current Obama administration not only in the security systems, but also in other departments that influence the performance of the security agencies. Currently, the process of recruitment, training, and firing of workers is strictly bureaucratized. For instance, the incumbent Secret Service Permanent Chief, Joseph Clancy, has often expressed his regrets over the complex system deterring him to take swift actions to security agents and other officers who engage in mischievous and unacceptable behaviors (Rogers 2014, 337). Following the intensive consultations in decision-making, achieving timely interventions has been in vain. In addition, lack of adequate finance has led to poor service delivery and yet the government looks reluctant to utilize soft power to mitigate this issue. Literature Review Even before the September 11 attacks, intelligence analysts had explored the risks and threats of terrorism in a bid to fill the gaps that persisted within the US security system (Hymans 2006, 457). The experts repeatedly identified the lack of cooperation and poor coordination as the eminent concern amongst the several bodies linked to the Homeland Security. Prior to these attacks, the law enforcement system was majorly divided and bureaucratized. For example, the CIA addressed foreign threats while the FBI handled internal threats. This fragmentation encouraged division and different versions of intelligence operations. In most cases, the National Security Agencies (NSA) dealt with similar problems, thus overlapping each other. Before the attacks, the US government lacked a clear framework for pulling its intelligence expertise together to offer protection against terrorism. Apparently, insufficient information sharing by key federal entities remains the primary indicator in the security gaps in the US.Advertising We will write a cus tom research paper sample on The Concept of the Homeland Security After the September 11 Incident specifically for you for only $16.05 $11/page Learn More Most of the post-attack responses made it common knowledge that the U.S.s security efforts suffered poor coordination. This aspect led to the formation of the DHS to foster coordination among all security entities with a mission of preventing future attacks together with enhancing preparedness and response (Kamien 2006, 31). In a bid to mitigate the foreseen challenges facing the DHS and the American fraternity as a whole, this review will address various issues that are seen as weak ends destabilizing the homeland security framework. For instance, the bureaucratic system is still acting as a barrier to implement the recommended changes. The main national intelligence challenge facing the DHS is poor coordination and this aspect brings forth the possibility that attacks will continue to happen if not contr olled. Coordination does not only involve the intelligence entities, but it also extends to the Congress, which passes budgetary allocations coupled with enacting key security laws. The current workforce in the DHS is inadequately equipped in terms of resources, empowerment, and training. For example, after the September 19 2014 White House incident in which a man managed to jump over the White House fence, Cummiskey, a former DHS agent, argued that the security flaw was purely attributable to the lack of funds (Shear and Schmidt 2014). Further investigations backed this claim by showing that several agents on duty had no appropriate skills to handle the situation. In addition, the majority had no idea on how White House Communication radio operated under such circumstances. This assertion holds due to the lack of enough financial resources, which should not be a reason to expose prominent leaders such as the president to any sort of security threats. Despite the evident commitment and progress demonstrated amongst government agencies, this review notes that there has been lacking professional exchange of intelligence information amongst security agencies. Furthermore, military and law enforcement training is yet to upgrade to the standards of the 21st Century technology that can assist in promoting the US security level (Rychnovska 2014, 27). It is about 14 years down the line since the September 11 attacks, but the US government continues to delve into research and forums to develop strategies to enhance the homeland security. It has become increasingly evident that the U.S. security entities are suffering due to the lack of interconnectedness.Advertising Looking for research paper on homeland security? Let's see if we can help you! Get your first paper with 15% OFF Learn More In light of this impasse, President Obama, in a directive to evaluate the DHS and its efforts towards counterterrorism, retaliated that the DHS is inseparable from other security agents and they should be functionally thought as a unit rather than separate entities (LaPira 2014, 230). Contrary, the federal state still faces conceptual and functional differences. This aspect has weakened integration, efficiency, and cohesive approaches that promote the national security since the bureaucratic system inhibits the formulation of ways that reflect this reality. In a bid to address the underlying mission of the homeland security, it is good to understand that the burgeoning campaign against terrorism is a multifaceted endeavor. The federal machinery has to deploy every tool at its disposal to wage this fight; for instance, international training, law enforcement, finance, diplomacy, as well as the new tools that are being invented. In this regard, it is noteworthy to review the works of Joseph Nye, viz. Soft Power: The Means to Success in World Politics. Soft power is a concept developed as an alternative to use of force, coercion, or monetary compensation to persuade others to adhere to what one wants (Nye 2004, 74). Nye (2004) had keenly observed how the American society was struggling with hard power, yet enemies were in a position to not only hit, but also hit hard regardless of the alleged preparedness of the US security agencies. Nye’s conviction of power as possessing the ability to lure others to get to the preferred destination is currently given a chance albeit in part by various security entities across the world (Nye 2004, 98). The US Congress has shown reluctance in allocating more money to cater for security matters. In the last decade, in spite of the security concerns, the budget allocation to ensure a more secure homeland has always fallen short. Consequently, planning and implementation have overlooked key security factors that gradually co ntinue to affect the homeland security negatively. The US government can adopt soft power and save chunks of taxpayers money used on hard power like the military. Soft power and hard power should be used alongside each other, but the former should be granted much attention in terms of implementation and financing. It is evident that soft power is hugely overlooked, and this aspect contributes partly to the current fall in the US power influence over the past five decades. The old image of the US as the representative of democracy and a symbol for others to emulate has declined dramatically. The use of hard power by the US has doubled the fear rather than instilling optimism. The US security entities have developed an old versioned tendency of using tactics employed in past wars to address current concerns. While there are positives to be drawn from history, facing the 21st Century terrorism requires a paradigm shift. Since the case is new, security agents should adapt quickly to new measures and act in new ways. So far, the existing partnerships encouraged by President Obama’s administration are yet to materialize, as there is still overlapping of critical roles by different intelligence partners. The CIA’s chronic failure prior to the September 11 attacks to inform partner agencies about the names of the alleged terrorists in the country enabled them to stay and orchestrate the attacks. Therefore, information- sharing continues to suffer from significant flaws. In order to learn from past events, it is necessary to change the bureaucracy that encourages information hoarding and empower experts to take full responsibility for their roles with less closed systems. This hindrance can be overcame by developing a paradigm shift whereby experts have the power to react to an urgent situation at best of their knowledge instead of waiting for commands from the top, which are time wasting and uninformed in most cases (Puyvelde 2013, 142). Despite the many advantages of soft power, it has some shortcomings. Americans are scientifically oriented, and thus they resist soft power because they find the design behind it difficult to trace and research. As a society, the US is used to quick answers and it seeks immediate satisfaction. Unfortunately, soft power is a long diplomatic investment with no assured outcomes. This aspect explains why the US government prefers hard power even though it is expensive. In addition, soft power is not purely owned by the government like the case with hard power. Many public and private entities engage in soft power, thus making it hard to collect information together. After evaluating the social learning theory, one is in a position to identify that not all cultures are receptive of other nations’ strategies and ideas (Lieven and Hulsman 2006, 61). In this regard, these theorists challenge soft power as not many cultures find the US values and ideologies admirable to follow. Therefore, there is a possibility that soft power can backfire especially when in control of the wrong people. Cultural exchanges have developed to serve as measures to control national security. Through cultural exchanges, different people are in a position to gain better understanding of others. Similarly, other individuals get the opportunity to acquire greater understanding of the US mainstream culture. For instance, some scholars attribute the fall of the Soviet Union to social exchanges gained after visiting the US the international relations theory advocates for multilateral relations between the state and non-state actors. Developing mutual understandings is one way through which the DHS can achieve its mission of ensuring security at both domestic and international levels. This theory further suggests that mutual relations are difficult since every state has its own ambitions and if they fail to reciprocate with those of the other state, then cooperation is not possible. So far, the Government A ccountability Office’s (GAO) appraisal of the federal government and its security agencies indicates that there has been positive progress yet not enough to guarantee sustainability. For example, in a report done on September 2013, GAO reported on the activities that DHS had taken in regard to the use of resources outside the US. The GAO established that the DHS had not identified strategic plans like target zones to combat crime and secure the US borders. The DHS also lacked mechanisms to capture resource deployment neither did it have a reliable cost data to make informed resource-allocation decisions. This aspect implies that the DHS is failing significantly in planning since it does not consider data monitoring and analysis on expenditure abroad. Without this data, it is hard to disseminate funds on future programs. In addition, this aspect manifests poor intelligence planning and data collection gaps, hence poor analysis. In a bid to avoid this issue, the DHS must inform its resource deployment outside the US as well as encourage screening. Theoretical analysis Following a review of the past literature, this theoretical approach seeks to test the hypothesis that poor gathering and utilization of intelligence data will continue to hinder the performance of the DHS in the future. Looking at the state of affairs in the US intelligence community, it is largely generalizable that the US law enforcement and intelligence bodies depict the overarching problems of coordination and sharing of intelligence information based on baseless assumptions. Although the US Congress and the Obama administration have shown efforts to eradicate some of the misunderstandings that hinder coordination, there is still no confidence in sharing of critical intelligence information. Nevertheless, the social learning theory offers an appropriate approach to learn the changing social context of the American Society as well as its potential enemies concerning the significance link ed to the national intelligence community. This theory claims that learning is a cognitive process that prevails in a social environment through provided directives or observation. In this case, according to the GAO, the US security services have shown the desire to learn through observation of past attacks, but that desire has been jeopardized by the slow rate of behavior change and adaptation to new trends in the management of security affairs. Some of the stringent measures adopted by the US Congress and the George Bush administration following the September 11 attacks have failed to impede security threats. Critiques posit that the bureaucratic measures have led to a string of security gaps even in the White House. To critics like Hummel, tight bureaucratic measures foster a circular sluggishness in decision-making. The policymakers have been reluctant to initiate a paradigm shift in security affairs. On the contrary, they keep on twisting old strategies to solve emergent proble ms. For instance, the DHS and the Secret Service require strong and flexible leadership, which is open to criticism and ready to share security information with relevant bodies. Working under strict bureaucracies is discouraging for workers and if it proves hard to avoid the protocols, then it is also difficult to enhance performance and coordination. Bureaucratic values discourage teamwork and decrease trust among security machinery, thus meaning that information sharing is minimal if any. This approach has proved inadequate particularly after the September 19, 2014 invasion of the White House by a stranger who managed to jump over the fence without being noticed. Models that influence leadership In a bid to understand the research on human intelligence, it is crucial to explore the triarchic theory of intelligence. In this theory, Sternberg defines human intelligence as mental activity focused on a specified goal and shaping of real world events influencing one’s life (Spar ks and Sulmasy 2006, 34). This assertion implies that intelligence entails how effective a person can handle changes occurring throughout life. His model entailed three components including problem solving, performance, and knowledge acquisition. The combination of all the three components completes tasks that entail selective choice of information from irrelevant sources or unforeseen events. In addition, these components assist in putting together the several pieces of information collected and analyzed to establish any possible cues. Different people have disparate abilities to learn new information depending on training. The DHS has expertise with the potential to utilize these three components fully and come up with useful intelligence information. The challenge comes in when experts seek to change the norms to suit the situation. The bureaucratic machine fails to acknowledge change from outside since all decisions come from the top. Even though the DHS is willing to adapt to n ew environments that contend with real world situations, the pace is too slow and it might keep on playing catch-ups with its enemies. The policy regime theory holds that in the policy world, major attacks are rare and in most cases, unpredictable, but they have huge effects. Unexpected external disruptions often influence routine policy goals and government activities. Policy theorists refer to these events as ‘shocker moments’ that force some drastic shifts in government concerns to issues that had for a long time been overlooked. The September 11 attack is an example of these trigger events. Such moment causes dramatic focus by government machinery, but the attention quickly fades away soon after. The issue may not be completely forgotten as it was the case before the attack, but it fails to keep the heightened concentration that was employed amid the attack. The government seems to assume that the adversaries disappear entirely, and thus get reluctant once again (Th achuk 2007, 71). Contrary to these views by the policy regime theorists, this paper affirms that government security agencies such as the DHS have enough intelligence to foresee attacks and neutralize them before they hit the targets. The fact that large-scale attacks are rare should provide enough time for the intelligence community to organize and identify all security loopholes that may be exploited by terrorist groups. In addition, the work of the DHS is to ensure security, and thus there should be heightened attention continuously irrespective of whether there is a looming attack or not. The government demand-oriented theories for interest representation argue that the government itself engages in activities that encourage groups to foster political action merely by orchestrating concerns that those groups will benefit. In other words, the government demand theory advocates the idea that groups as well as individuals react to policy agendas determined by only the government ins titutions. This theory fails to consider the efforts of non-governmental agencies. This aspect is reflected in the lack of cooperation as experienced by the US security agencies. This view is different from the Truman’s classic pluralist disturbance theory, which claimed that different groups, both governmental and non-governmental, should come together in response to some foreseen threats in the society. This aspect implies that problems outside and inside the government motivate like-minded people to respond cohesively to try to find a permanent solution. This model influences the leaders’ behavior as the government shows attention to factors that might affect a group like the DHS, and thus it is more likely that the DHS will work towards government objectives (Stana 2003, 84). When leaders in the DHS get financial support from the government, they feel obligated to perform effectively. Future threats to the homeland security Military researchers and defense technolo gists are recently exploring possible challenges that face not only the US, but also the entire global security. This review gives a forecast of four potential traditional and non-traditional security challenges that may catch the US unawares in the near future. This assertion holds because the pace of research is slow and it may not match that of the terrorists. First, there is the possibility that biological weapons will be used in large scale in a terrorist attack. In 2009, the White House came up with a National Strategy for Countering Biological Threats with an assumption that such weapons might be used for major attacks (Robinson, Xinsheng, Stoutenborough, and Vedlitz 2013, 715). With these insights, the US government has acted too slowly to identify ways to ensure that it can prevent deadly viruses from being used as weapons of mass destruction. Due to the lack of coordination and bureaucratic structures, it is hard to attain timely insight on possible attacks as well as taki ng swift measures in case one is detected. Since this phenomenon is new, researchers need to anticipate widely by closing all potential gaps that might be useful to terrorists. The second issue is the eminent threat of cyber-attacks. Cyber warfare is a traditional security threat to global peace that has persisted for years. Terrorist networks are using the same technologies that propel developments to sabotage the critical structures, which are necessary for public safety (Thachuk 2007, 99). The US intelligence community has embarked on cyber security activities to ensure timely fixes, but it is now evident that the sophistication of attacks is outdoing the available security measures. Therefore, solutions should surpass the traditional approach, which requires more funds to upgrade the system and catch up with the enemy. This assertion holds because in the near future, attacks on computer systems are about to cross the line from mere theft and disruption to serious terrorist attac ks. These attacks will be controlled remotely and devastating damages will occur if such circumstances happen. These postulations are within the realm of the possible given what has been witnessed when hackers overwhelm networks. The National Security Agency and the Cyber Command have a wide array of expertise, but they lack the commitment to share classified information. The private sector in most cases is not ready to reveal attacks for the fear of losing clients or facing lawsuits. The lack of enough network security personnel remains a concern in the private sector as well as the government (Sun 2008, 170). Therefore, it is time to create incentives and issue bonuses as a way of retaining and motivating experts. The third aspect is the existence of the transnational crime. The US intelligence community views transnational terror as a key global security challenge (Nakaya 2005, 93). These groups lead to instability and blackmail to governmental organizations through corruption. T hese groups are very well organized without strict bureaucratic systems. They generate funds through engaging in illicit activities such as human and drug trafficking. Much of the US efforts to counter terrorism have been concentrated in the Middle East, thus forgetting that al-Qaida sympathizers are located everywhere (Murray 2003, 66). The last aspect is the proliferation of nuclear weapons. For at least the past five decades, the US has spent huge sums of money and time trying to find, monitor, and impede all means through which they are developed. Non-state actors such as terrorist groups are hiding nuclear weapons deep in the ground. Finding and destroying these weapons has remained an increasingly complicated endeavor. Thus, the US government will need weapons that can unravel these mysteries. Due to lack of adequate finance and poor coordination, it will be hard for the US to destroy nuclear weapons in the possession of terrorist groups any time soon (Mullins 2010, 102). Find ings Based on the reviewed articles, there are clear signals that the frequency and intensity of attacks on the US and its allies will escalate. Since terrorism is a strategy that can be used by any enemy, the DHS must be ready to react to foreseeable and unforeseeable threats coming from expected as well as unfamiliar origins. As technology evolves and becomes readily available to a larger population of actors, potential attackers are motivated to use terrorism. This aspect has been attributable to the gaps left in the innovation of these technologies. For instance, computer manufacturers should redesign their products in a way that it is hard to manipulate its functioning to suit the terrorists’ desires. The movement of people across borders has also increased the ease of movement by terrorists. The Internet has served as a key platform for terrorist activities ranging from recruitment and training to planning and attacking. Of huge concern is the spread of religious radica lization, which is taking root in the Muslim society due to different reasons. These tensions have become widespread via the Internet even to countries like the US, which have a better understanding of the Muslim populations (Maxwell 2004, 94). Increased funding is now needed than ever to advance training and purchase sophisticated facilities because threats continue to evolve. The DHS must be in a stable financial state to cater for learning programs and ensure good pay for security agents to ensure that they are motivated to perform well (Marion and Cronin 2009, 22). The enemies are proactive, innovative, adequately funded, always learning, and adapting to the dynamics of a globalizing world. The DHS must be in a position to surpass the adversary tactics and reflect the evolving threat environment. The DHS has so far issued analysis of possible future occurrences, but it is yet to demonstrate its capabilities to counter those threats. Furthermore, effective collection and utilizat ion of intelligence data will only be achieved if the DHS is allocated enough money to cater for its extensive activities (Walker 2007, 74). The increase in funding should also target all avenues of international cooperation to bolster the existing and create new alliances to create and sustain international networks that embrace information sharing. The Sternberg’s intelligence theory helps in answering the research question as it shows what the DHS lacks and the consequences it has to face for its ignorance. For instance, Sternberg talks of divergent thinking, which is brought by activities like task switching and domineering management. The DHS must learn specific skills to help in coping with the ever-changing environment. Strategies to impede future threats The primary strategy is impudent leadership. Combining tools of soft power with selected hard power can transform the National Security apparatus greatly. Leadership is a common tool that the US has embraced for decad es. The question is how this leadership has influenced matters of national security. From previous reviews, it is evident that the American leadership both at home and abroad has suffered poor coordination, thus leaving gaps for terrorists to exploit. Adopting the soft power model brings forth leadership styles that mobilize people with an objective and the leader helps the people in attaining those shared targets. It is time for the US leadership system to abandon the hierarchical leadership pyramid and shift to what Nye (2004, 106) refers to as leading from the center of a circle. The current leadership model in the DHS is a rigid one because information flow is often slow from top to the bottom or from bottom to the top. In addition, information is subject to distortion amid intended or unintended additions and omissions. The second model is more flexible because leaders at the center of the circle find it easy to coordinate large groups via persuasion and influence. Leaders are in a position to link straight to the subordinates, and thus their influence is felt on a wide scope. In a fast globalizing world, the US should ensure that it encourages leadership from the center since it is the way to impertinent leadership. The former Secretary of State, Hillary Clinton, echoed these sentiments by reaffirming the need to embrace civilian power in line with military power as essential pillars in enhancing global security. The role of international training and cultural exchanges by the DHS can be a starting point in a bid to make a huge effect on both national and global security by utilizing soft tools as opposed to hard power. Given that the homeland security has a direct link to the global community, embracing intercultural literacy is paramount. Leadership in the homeland security has to understand the dynamics of culture. This aspect can enable them to act as pioneers of transformational leadership that motivates individuals from various diverse origins to f ight global criminal cartels and ensure national security. These changes can only be possible if improvements are done on communication both within the DHS and within other agencies. Evidently, the homeland security has failed to speak a common language on various occasions, and thus increasing communication is necessary. Communication should not only focus on the security agencies, but also engage the public since security is everyone’s responsibility. The DHS should collaborate with learning institutions, media, and religious bodies to sensitize the public on terrorism. As the US adopts a new paradigm, civil rights and individual freedoms must be observed. Even though some risks have to be taken, this move will ensure that the process does not interfere with human dignity. The DHS in partnership with the media should embark on instilling trust in the public by keeping the society well informed with accurate and timely information (Caponi and Belmont 2015, 17). Conclusion Af ter the September 11 attacks, homeland security has gained national interests with key projects focused toward promoting the safety of the US citizens. This review has established that the US Homeland Security faces many conceptual, structural, organizational, and functional problems that are posing threats to security. A review of several cases shows that even the White House has become vulnerable to attacks due to poor coordination and training of security agents. These dysfunctions have been directly linked to the lack of enough funding and rigid leadership that discourages innovation as well as employee motivation. Cultural diversity has also been identified as a possible problem impeding interagency cooperation. Consequently, this paper has predicted various challenges that ought to face the DHS including cyber attacks, biological weapons, nuclear weapons, and transnational crimes. The DHS in partnership with other bodies of the intelligence community has a chance to prevent th ese attacks from happening. As indicated earlier, the application of soft power is a major way forward since it does away with bureaucratic systems, whilst keeping the critical values of that system. However, through proper coordination and information sharing amongst security agencies, the US will stand a better position to promote homeland security. Reference List Caponi, Steven, and Kate Belmont. 2015. â€Å"Maritime Cybersecurity: A Growing Threat Goes Unanswered.† Intellectual Property Technology Law Journal 27, no. 1 (January): 16-18. Davis, Lois. 2010. Long-Term Effects of Law Enforcement’s Post-9/11 Focus on  Counterterrorism and Homeland Security. Santa Monica, CA: RAND Corporation. Goldstein, Mark. 2013. â€Å"Homeland Security: Federal Protective Service Continues to Face Challenges with Contract Guards and Risk Assessments at Federal Facilities: Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate.† United Stat es Government Accountability Office. Web. Hymans, Jacques. 2006. â€Å"Theories of nuclear proliferation: The state of the field.† Nonproliferation Review 13, no. 3 (May): 455-465. Jenkins, Brian, Andrew Liepman, and Henry Willis. 2014. Identifying Enemies among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing. Santa Monica, CA: Rand. Kamien, David. 2006. The McGraw-Hill Homeland Security Handbook. New York, NY: McGraw-Hill. LaPira, Timothy. 2014. â€Å"Lobbying after 9/11: Policy Regime Emergence and Interest Group Mobilization.† The Policy Studies Journal 42, no. 2 (June): 226-251. Lieven, Anatol, and John Hulsman. 2006. Ethical Realism: A Vision for America’s Role  in the World. New York, NY: Pantheon Books. Marion, Nancy, and Kelley Cronin. 2009. â€Å"Law Enforcement Responses to Homeland Security Initiatives: The Case of Ohio.† Southwest Journal of Criminal Justice 6, no. 1 (M ay): 4-24. Maxwell, Bruce. 2004. Homeland Security: A Documentary History. Washington, D.C.: CQ Press, 2004. Mullins, Matt. 2010. Homeland Security. Ann Arbor, MI: Cherry Lake Pub. Murray, Williamson. 2003. National Security Challenges for the 21st Century. Carlisle, PA: Strategic Studies Institute, U.S. Army War College. Nakaya, Andrea. 2005. Homeland Security. Detroit, MI: Greenhaven Press. Nye, Joseph. 2004. Soft Power: The Means to Success in World Politics. New York, NY: Public Affairs. Puyvelde, Damien. (2013) â€Å"Intelligence Accountability and the role of public interest groups in the United States.† Intelligence and National Security 28, no. 2 (May): 139-158. Robinson, Scott, Liu Xinsheng, James Stoutenborough, and Arnold Vedlitz. 2013. â€Å"Explaining Popular Trust in the Department of Homeland Security.† Journal of Public Administration Research Theory 23, no. 3 (June): 713-733. Rogers, Christopher. 2014. â€Å"A Slow March Towards Thought Crime: How Th e Department of Homeland Security’s Fast Program Violates the Fourth Amendment.† American University Law Review 64, no. 1 (December): 335-337. Rychnovska, Dagmar. 2014. â€Å"Securitization and the Power of Threat Framing.†Ã‚  Perspectives: Central European Review of International Affair 22, no. 2 (May): 9-31. Shear, Michael, and Michael Schmidt. 2014. â€Å"Armed Intruder at White House Got to East Room.† The New York Times, September 29. Web. Sparks, Thomas, and Glenn Sulmasy. 2006. International Law Challenges: Homeland Security and Combating Terrorism. Newport, R.I.: Naval War College. Stana, Richard. 2003. Homeland Security Challenges to Implementing the Immigration  Interior Enforcement Strategy. Washington, D.C: U.S. General Accounting Office. Sun, Henry. 2008. â€Å"International Political Marketing: a Case Study of United States Soft Power and Public Diplomacy.† Journal of Public Affairs 8, no. 3 (August): 165-183. Thachuk, Kimberley. 200 7. Transnational Threats: Smuggling and Trafficking in Arms, Drugs, and Human Life. Westport, CT: Praeger. Walker, David. 2007. Homeland Security Management and Programmatic Challenges Facing the Department of Homeland Security: Testimony Before the House Homeland Security Committee. Washington, D.C: U.S. Government Accountability Office. This research paper on The Concept of the Homeland Security After the September 11 Incident was written and submitted by user Jayden E. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Reasons Animals Become Endangered

Reasons Animals Become Endangered When an animal species is considered endangered, it means that the International Union for Conservation of Nature (IUCN) has evaluated it as nearly extinct, which means that a significant portion of its range has already died off and the rate of birth is lower than the species death rate. Today, more and more animal and plant species are on the verge of extinction because of a variety of major factors that cause a species to become endangered, and as you might expect, humans play a role in quite a few of them. In fact, the biggest threat to endangered animals is human encroachment on their habitats. Fortunately, conservation efforts around the world are bent on helping these endangered animals revitalize their dwindling populations through a variety of humanitarian efforts, including curtailing illegal poaching, halting pollution, and habitat destruction, and curtailing the introduction of exotic species into new habitats. Habitat Destruction and Pollution Every living organism needs a place to live, but a habitat is not just a residence, it is also where an animal finds food, raises its young and allows the next generation to take over. Unfortunately, humans destroy animal habitats in a number of different ways: building houses, clearing forests to get lumber and plant crops, draining rivers to bring water to those crops, and paving over meadows to make streets and parking lots. In addition to physical encroachment, human development of animals habitats pollutes the natural landscape with petroleum products, pesticides, and other chemicals, which destroys food sources and viable shelters for the creatures and plants of that area. As a result, some species die outright while others are pushed into areas where they cant find food and shelter. Worse yet, when one animal population suffers it affects many other species in its food web so more than one species population is likely to decline. Habitat destruction is the number one reason for animal endangerment, which is why conservation groups work diligently to reverse the effects of human  developments. Many non-profit groups like the Nature Conservancy  clean up coastlines and establish nature preserves to prevent further harm to native environments and species around the world. Introduction of Exotic Species Destroys Delicate Food Systems An exotic species is an animal, plant, or insect that is introduced into a place where it did not evolve naturally.  Exotic species often have a predatory or competitive advantage over native species, which have been a part of a particular biological environment for centuries, because even though native species are well adapted to their surroundings, they may not be able to deal with species that closely compete with them for food. Basically, native species havent developed natural defenses for an exotic species and vice versa. One example of endangerment due to both competition and predation is the Galapagos tortoise. Non-native goats were introduced to the Galapagos Islands during the 20th century. These goats fed on the tortoises food supply, causing the number of tortoises to decline rapidly. Because the tortoises could not defend themselves or stop the overpopulation of goats on the island, they were forced to abandon their native feeding grounds. Many countries have passed laws banning specific exotic species known to endanger native habitats from entering the country. Exotic species are sometimes referred to as invasive species, especially in cases of banning them. For instance, the United Kingdom has placed raccoons, mongooses, and cabbages on their invasive species list, all of which are barred from entering the country. Illegal Hunting Can Endanger Species When hunters ignore rules that regulate the number of animals that should be hunted (a practice known as poaching), they can reduce populations to the point that species become endangered. Unfortunately, poachers are often hard to catch because they are deliberately trying to evade authorities, and they operate in areas where enforcement is weak. Furthermore, poachers have developed sophisticated techniques for smuggling animals. Baby bears, leopards, and monkeys have been sedated and stuffed into suitcases for transport. Live animals have been sold to people who want exotic pets or medical research subjects. And, animal pelts and other body parts are also secretly smuggled across borders and sold through black market networks of buyers who pay high prices for illegal animal products. Even legal hunting, fishing, and gathering of wild species can lead to population reductions that cause species to become endangered. A lack of restriction on the whaling industry in the 20th century is one example. It wasnt until several whale species were nearing  extinction  that countries agreed to abide by an international moratorium. Some whale species have rebounded thanks to this moratorium but others remain at risk.   International laws forbid these practices, and there are a number of government and nongovernment organizations (NGOs) whose sole purpose is to stop illegal poaching, especially of animals like elephants and rhinoceroses. Thanks to the efforts of groups like the International Anti-Poaching Foundation  and local conservation groups like the PAMS Foundation in Tanzania, these endangered species have human advocates fighting to protect them from outright extinction. How Are Animals Endangered? Of course, species endangerment and extinction can happen without human interference. Extinction is a natural part of evolution. Fossil records show that long before people came along, factors such as overpopulation, competition, sudden climatic change, and catastrophic events like volcanic eruptions and earthquakes drove the decline of numerous species. There are a few warning signs that a species could become extinct. If a species has some economic importance, such as the Atlantic salmon, it may be at risk. Surprisingly, large predators, who we might expect to have an advantage over other species, are often at risk as well. This list includes grizzly bears, bald eagles, and gray wolves. A species whose gestational period is lengthy, or who have small numbers of offspring at each birth has the potential to become endangered more readily. The mountain gorilla and California condor are two examples.  And species with weak genetic makeup, like manatees or giant pandas, have more risk of extinction with each generation.

Friday, November 22, 2019

The Domestication History of Cotton (Gossypium)

The Domestication History of Cotton (Gossypium) Cotton (Gossypium sp.) is one of the most important and earliest domesticated non-food crops in the world. Used primarily for its fiber, cotton was domesticated independently in both the Old and New Worlds. The word cotton originated from the Arabic term al qutn, which became in Spanish algodà ³n and cotton in English. Key Takeaways: Domestication of Cotton Cotton is one of the earliest domesticated non-food crops, independently domesticated at least four different times in four different parts of the world.  The first cotton domesticate was from the wild tree form in Pakistan or Madagascar at least 6,000 years ago; the next oldest was domesticated in Mexico about 5,000 years ago.  Cotton processing, taking the cotton bolls and making them into fibers, is a global technique; spinning those fibers into strings for weaving was anciently accomplished by the use of spindle whorls in the New World and spinning wheels in the Old World.   Nearly all the cotton produced in the world today is the New World species Gossypium hirsutum, but before the 19th century, several species were grown on different continents. The four domesticated Gossypium species of the Malvaceae family are G. arboreum L., domesticated in the Indus Valley of Pakistan and India; G. herbaceum L. from Arabia and Syria; G. hirsutum from Mesoamerica; and G. barbadense from South America. All four domestic species and their wild relatives are shrubs or small trees which are traditionally grown as summer crops; domesticated versions are highly drought- and salt-tolerant crops that grow well in marginal, arid environments. Old World cotton has short, coarse, weak fibers that are today primarily used for stuffing and quilt making; New World cotton has higher production demands but provides longer and stronger fibers and higher yields. Making Cotton Wild cotton is photo-period sensitivein other words, the plant begins to germinate when the day length reaches a certain point. Wild cotton plants are perennial and their form is sprawling. Domestic versions are short, compact annual shrubs which do not respond to changes in day lengththats an advantage if the plant grows in places with cool winters because both wild and domestic kinds of cotton are frost-intolerant. Cotton fruits are capsules or bolls which contain several seeds covered by two kinds of fiber: short ones called fuzz and long ones called lint. Only the lint fibers are useful for making textiles, and the domestic plants have larger seeds covered with comparatively abundant lint. Cotton is traditionally harvested by hand, and then the cotton is ginnedprocessed to separate the seeds from the fiber. After the ginning process, the cotton fibers are batted with a wooden bow to make them more flexible and carded with a hand comb to separate the fibers before spinning. Spinning twists the individual fibers into a yarn, which can be completed by hand with a spindle and spindle whorl (in the New World) or with a spinning wheel (developed in the Old World). Old World Cotton Cotton was first domesticated in the Old World about 7,000 years ago; the earliest archaeological evidence for cotton use is from the Neolithic occupation of Mehrgarh, in the Kachi Plain of Balochistan, Pakistan, in the sixth millennium BC. Cultivation of G. arboreum began in the Indus Valley of India and Pakistan, and then eventually spread over Africa and Asia, whereas G. herbaceum was first cultivated in Arabia and Syria. The two main species, G. arboreum and G. herbaceum, are genetically very different and probably diverged well before domestication. Specialists agree that the wild progenitor of G. herbaceum was an African species, whereas the ancestor of G. arboreum is still unknown. Regions of the possible origin of the G. arboreum wild progenitor are likely Madagascar or the Indus Valley, where the most ancient evidence for cultivated cotton has been found. Gossypium arboreum Abundant archaeological evidence exists for the initial domestication and use of G. arboreum, by the Harappan (aka Indus Valley) civilization in Pakistan. Mehrgarh, the earliest agricultural village in the Indus Valley, holds multiple lines of evidence of cotton seeds and fibers beginning about 6000 BP. At Mohenjo-Daro, fragments of cloth and cotton textiles have been dated to the fourth millennium BCE, and archaeologists agree that most of the trade that made the city grow was based on cotton exportation. Raw material and finished cloth were exported from South Asia into Dhuweila in eastern Jordan by 6450–5000 years ago, and to Maikop (Majkop or Maykop) in the northern Caucasus by 6000 BP. Cotton fabric has been found at Nimrud in Iraq (8th–7th centuries BCE), Arjan in Iran (late 7th–early 6th centuries BCE) and Kerameikos in Greece (5th century BCE). According to Assyrian records of Sennacherib (705–681 BCE), cotton was grown in the royal botanical gardens at Nineveh, but cool winters there would have made large-scale production impossible. Because G. arboreum is a tropical and subtropical plant, cotton agriculture did not spread outside the Indian subcontinent until thousands of years after its domestication. Cotton cultivation is first seen in the Persian Gulf at Qalat al-Bahrain (ca 600–400 BCE), and in North Africa at Qasr Ibrim, Kellis and al-Zerqa between the 1st and 4th centuries CE. Recent investigations at Karatepe in Uzbekistan have found cotton production dated between ca. 300–500 CE. G. arboreum is thought to have been introduced into China as an ornamental plant about 1,000 years ago. Cotton may have been grown in the Xinjiang (China) province cities of Turfan and Khotan by the 8th century CE. Cotton was finally adapted to grow in more temperate climates by the Islamic Agricultural Revolution, and between 900–1000 CE, a boom in cotton production spread into Persia, Southwest Asia, North Africa and the Mediterranean Basin. Gossypium herbaceum G. herbaceum is much less well-known than G. arboreum. Traditionally it is known to grow in African open forests and grasslands. Characteristics of its wild species are a taller plant, compared to the domesticated shrubs, smaller fruit, and thicker seed coats. Unfortunately, no clear domesticated remains of G. herbaceum have been recovered from archaeological contexts. However, the distribution of its closest wild progenitor suggests a northward distribution toward North Africa, and the Near East. New World Cotton Among the American species, G. hirsutum was apparently cultivated first in Mexico, and G. barbadense later in Peru. However, a minority of researchers believe, alternatively, that the earliest type of cotton was introduced into Mesoamerica as an already domesticated form of G. barbadense from coastal Ecuador and Peru. Whichever story ends up to be correct, cotton was one of the first non-food plants domesticated by the prehistoric inhabitants of the Americas. In the Central Andes, especially in the north and central coasts of Peru, cotton was part of a fishing economy and a marine-based lifestyle. People used cotton to make fishing nets and other textiles. Cotton remains have been recovered in many sites on the coast especially in residential middens. Gossypium hirsutum (Upland cotton) The oldest evidence of Gossypium hirsutum in Mesoamerica comes from the Tehuacan valley and has been dated between 3400 and 2300 BCE. In different caves of the region, archaeologists affiliated to the project of Richard MacNeish found remains of fully domesticated examples of this cotton. Recent studies have compared bolls and cotton seeds retrieved from excavations in Guila Naquitz Cave, Oaxaca, with living examples of wild and cultivated G. hirsutum punctatum growing along the east coast of Mexico. Additional genetic studies (Coppens dEeckenbrugge and Lacape 2014) support the earlier results, indicating that G. hirsutum was likely originally domesticated in the Yucatn Peninsula. Another possible center of domestication for G. hirsutum is the Caribbean. In different eras and among different Mesoamerican cultures, cotton was a highly demanded good and a precious exchange item. Maya and Aztec merchants traded cotton for other luxury items, and nobles adorned themselves with woven and dyed mantles of the precious material. Aztec kings often offered cotton products to noble visitors as gifts and to army leaders as payment. Gossypium barbadense (Pima cotton) G. barbadense cultivars are known for their production of high-quality fiber and called variously Pima, Egyptian, or Sea Island cotton. The first clear evidence of domesticated Pima cotton comes from the Ancà ³n-Chillà ³n area of the central coast of Peru. The sites in this area show the domestication process began during the Preceramic period, beginning about 2500 BCE. By 1000 BCE the size and shape of Peruvian cotton bolls were indistinguishable from todays modern cultivars of G. barbadense. Cotton production began on the coasts, but eventually moved inland, facilitated by the construction of canal irrigation. By the Initial Period, sites such as Huaca Prieta contained domestic cotton 1,500 to 1,000 years before pottery and maize cultivation. Unlike in the old world, cotton in Peru was initially part of subsistence practices, used for fishing and hunting nets, as well as textiles, clothing and storage bags. Sources Bouchaud, Charlà ¨ne, Margareta Tengberg, and Patricia Dal Pr. Cotton Cultivation and Textile Production in the Arabian Peninsula During Antiquity; the Evidence from Madà ¢Ã¢â‚¬â„¢in Sà ¢lih (Saudi Arabia) and Qal’at Al-Bahrain (Bahrain). Vegetation History and Archaeobotany 20.5 (2011): 405–17. Print.Brite, Elizabeth Baker, and John M. Marston. Environmental Change, Agricultural Innovation, and the Spread of Cotton Agriculture in the Old World. Journal of Anthropological Archaeology 32.1 (2013): 39–53. Print.Coppens dEeckenbrugge, Geo, and Jean–Marc Lacape. Distribution and Differentiation of Wild, Feral, and Cultivated Populations of Perennial Upland Cotton ( PLoS ONE 9.9 (2014): e107458. Print.Gossypium hirsutum L.) in Mesoamerica and the Caribbean.Du, Xiongming, et al. Resequencing of 243 Diploid Cotton Accessions Based on an Updated a Genome Identifies the Genetic Basis of Key Agronomic Traits. Nature Genetics 50.6 (2018): 796–802. Print.Mou lherat, Christophe, et al. First Evidence of Cotton at Neolithic Mehrgarh, Pakistan: Analysis of Mineralized Fibres from a Copper Bead. Journal of Archaeological Science 29.12 (2002): 1393–401. Print. Nixon, Sam, Mary Murray, and Dorian Fuller. Plant Use at an Early Islamic Merchant Town in the West African Sahel: The Archaeobotany of Essouk–Tadmakka (Mali). Vegetation History and Archaeobotany 20.3 (2011): 223–39. Print.Reddy, Umesh K., et al. Genome-Wide Divergence, Haplotype Distribution and Population Demographic Histories for Gossypium Hirsutum and Gossypium Barbadense as Revealed by Genome–Anchored SNPs. Scientific Reports 7 (2017): 41285. Print.Renny–Byfield, Simon, et al. Independent Domestication of Two Old World Cotton Species. Genome Biology and Evolution 8.6 (2016): 1940–47. Print.Wang, Maojun, et al. Asymmetric Subgenome Selection and Cis-Regulatory Divergence During Cotton Domestication. Nature Genetics 49 (2017): 579. Print.Zhang, Shu–Wen, et al. Mapping of Fiber Quality Qtls Reveals Useful Variation and Footprints of Cotton Domestication Using Introgression Lines. Scientific Reports 6 (2016): 31954. Print. Updated by K. Kris Hirst

Thursday, November 21, 2019

Students interest in a career as a civil engineer for the Kentucky Essay

Students interest in a career as a civil engineer for the Kentucky Transportation Cabinet - Essay Example The skills acquired are relevant to the Kentucky Transportation Cabinet since they deal with projects that rely on vast knowledge in physical sciences and mathematics. I am a female, and have obtained an ACI Certification. I feel I have what it takes to become a member of the Kentucky Transportation Cabinet. However, my certificate will be expiring after five years, meaning that I will be able to offer quality and certified services for the next five years. I am open-minded, and like learning new skills. I am committed in playing an important role in key debates that pertains sustainability, climate change as well as energy efficiency. While I was studying, I often attended seminars and workshops, as well as attachments with leading organizations, which enabled me to solve work related problems. Thus, I understand that civil engineering works need attention and teamwork. While studying mathematics in school, I enjoyed problem solving, which is another desired quality for civil engineers. I am now looking for an opportunity to advance my career, and I am quite sure that Kentucky Transportation Cabinet has all what I

Tuesday, November 19, 2019

Math Modeling Essay Example | Topics and Well Written Essays - 750 words

Math Modeling - Essay Example Thus both the subjects are pure creations of the human intellect and exist only in our creative plane of abstraction. In its outset, it seems surprising that there must be a mathematical basis for music, but centuries of mathematical thought form the theoretical foundation upon the modern musicology has been built. All fields of modern mathematics have found applications in musicology – from the simple tuning of instruments and the description of notes to numerical algorithms for tonal temperament. The very description of notes begins with mathematics. All the notes that we are familiar of - A, B, C major, C minor- and so on are ratios of each other. Music is nothing but the harmony of sound waves reaching our ears. Each wave is characterized by its amplitude (which determines its sound or pitch), frequency, shape of its wave envelope, beat and so on. The ‘A’ note for example has a standard frequency of 440 Hz. All corresponding notes until the next octave of 880 Hz are in a fixed ratio to each other (this ratio is the subject of our further discussion). It has been found from our experience that these notes are melodious and when played in the correct combinations create the sensation of music. This description might create a rather mechanistic view of melody but the selection of the right notes is not easy and can come only with deep knowledge, practice and a more than an average talent. String instruments use this manipulation of notes (or equivalently frequencies) to the fullest. A flute produces unadulterated notes. A string on the other hand also produces what are known as ‘harmonics’ of the original notes. A 440 Hz note has its ‘first Harmonic’ at twice the frequency and half its amplitude, the second harmonic at thrice its frequency and a third of its amplitude and so on. This iteration can continue as long as the frequencies are too high to be discerned or the amplitude is too low to be heard. Thus the

Saturday, November 16, 2019

Algal Bio-Diesel Power Plant Essay Example for Free

Algal Bio-Diesel Power Plant Essay Algae- most promising alternative renewable energy source available. It decreases the need for fossil fuels and thus makes our environment healthier. Algae oil is produced as much faster as 30 times than other biomass feedstock while its producing amount is up to 300 times more resulting 600 tons of bio-diesel per day which will produce 200MW of electricity per hour. MAJOR COMPONENTS IN ALGAE BIO-DIESEL POWER PLANT: 1. Algae plantation 2. Algae oil extraction and bio-diesel plant 3. Internal combustion power plant Continuous Algae production utilizing the photobioreactors is a highly reliable method for producing high density monocultures of marine and fresh water algae. The total control of all parameters are automatically controlled via a PLC, making the device dramatically reduce the labor requirements and eliminates handling problems. The photobioreactors work by recirculating algae, nutrients, water and CO2 through transparent tubes to maximize the amount of light reaching the algal cells, the short light field maximizes this process; thereby enhancing the photosynthesis process. There are two major types of extraction namely * Mechanical extraction * Chemical Extraction The chemical extraction methods for algae extraction is done mainly using Chemical Solvents such as Benzene, Hexane. Other chemical methods include soxhlet extraction and supercritical fluid extraction. The mechanical extraction methods include the Ultrasonic Extraction. Internal combustion engines are constructed from one or more cylinders, each sealed at one end and open at the other, in which close fitting pistons can move up and down. The engine derives its power from the burning of a compressed air-fuel mixture in each of the cylinders in succession. The fuel is ignited when the piston is at the top of its stroke and the expansion of the burning gas drives the piston downwards. The reciprocating motion of the pistons is converted to rotary movement by a crankshaft which delivers motive power to the desired application, in this case a generator. Air or an air-fuel mixture is introduced into the cylinder when the piston is at its lowest point and a flywheel on the crankshaft provides the momentum to drive the piston upwards to compress it. The piston and connecting rod in a reciprocating engine form a large mass which is accelerated from zero to a very high speed and decelerated back to zero again with every revolution of the engine (100 times per second in an engine operating at 6000 rpm). This places immense forces on the moving parts of the engine. CONCLUSION: Therefore, based on the comparisons made over other power plants and the advantages of the algal biodiesel power plant, we conclude that algal biodiesel is one of the most promising green fuel because of its potential as a renewable and sustainable fuel source for the electric power generation.

Thursday, November 14, 2019

Antibiotics :: essays research papers fc

Antibiotics An antibiotic, is defined to be a drug produced by certain microbes. Most doctors use antibiotics to help fight the germs in a patient. Antibiotics are obtained from plants, fungi, air, water, soil, just about anything on earth. Antibiotics kill and attack the germ or virus in the body, but do not hurt the human cells, ordinarily. The antibiotics are used to treat many various types of diseases, such as tuberculosis, syphilis, and several kinds of infections. People have been using antibiotics for more than 2,500 years. They used molds to help cure some skin infections and rashes. It was in the late 1800's that the real study of medicine began. Louis Pasteur discovered that bacterium was the cause of disease, and proved wrong the theory of spontaneous generation. After him there was Robert Koch, who developed a method of isolating and growing bacteria. Scientists tried developing drugs that could kill microbes, but they proved to be either dangerous or ineffective. In 1928 there was a discovery by Alexander Fleming. He detected that a substance he called "penicillin" destroyed bacteria. Then in the late 1930's, two British scientists invented a method of extracting penicillin from the mold. This was the start of developing new drugs to treat diseases and bacteria. Over the years, numerous thousands of antibiotic material have been found in nature as well as produced chemically but, there are few that are safe and useful. However the ones that are safe and effective have saved many lives and have helped extend life expectancy. Right now, there is more than 70 different kinds of antibiotics in use. Most antibiotics are used to treat infections, some for fungi and protozoa, but antibiotics are not usually effective against viruses. So they have developed other methods such as vaccines against viruses. Antibiotics work by one of three ways, they can one, prevent the cell wall from growing; two, obstruct the cell membrane; or three disrupt the chemical processes. When the antibiotic prevents the cell wall from forming, the antitoxin surrounds the bacteria's membrane, and then it forms a rigid wall that stops the cell wall from splitting open, which would produce another cell. The humans' cells are not hurt by this because human cells do not have cell walls. If the antibiotic obstructs the cell membrane, which controls the flow of items in and out of the cell, then essential nourishment can escape the cell. Then a toxic substance could enter the cell killing it. Human cells are not effected by this method because the antitoxin only effects the microbial cells. If the antitoxin disrupted the chemical process, then the microbe cannot

Monday, November 11, 2019

Life Skills in Substance Abuse and Mental Health Treatment

Life Skills in Substance Abuse and Mental Health Treatment School of Advanced Studies, University of Phoenix Wesley Tyler Meredith Ward Substance Abuse and Mental Health Treatment Recidivism relates to a person repeating an undesirable behavior after they have either experienced negative consequences of that behavior, or have been treated or trained to extinguish that behavior (Henslin, 2008). Progress being made in families and individuals due to lack of life skills that lead to causal factors to high recidivism rates in substance abuse and mental health treatment has been a growing issue posed by researchers. According to Miller & Hobler (1996), â€Å"In Deleware, 84% of Life Skills participants are male; 66 percent are African-American; 25% are white, non-Hispanic; and about 6 percent are Hispanic. The average age is 31. The lead offenses of 33% of the participants are violent offenses against persons; 38% are drug offenses, the more serious of which also are classified as violent in Delaware†. â€Å"Despite advances, differences in health status and access still remain. Minorities are still at increased risk, primarily because they live in adverse conditions linked to poverty† Hall (1998, p. 1). Problem Formulation Poor life skills are thought to increase recidivism among minorities (Reference) . The purpose of this study is to determine whether addicts who have completed life skill training have an improved recidivism rate over those who have not received life skills training. This study may provide education on effective life skills training and reinforce the importance of substance abusers with life skills. Study Design and Research Method A quantitative correlation study will be used to measure two different variables; life skills (independent) and recidivism (dependent) in order to determine whether and in what way recidivism and life skills characteristics might be interrelated. Quantitative studies quantifies observable behaviors and each occurrence of the behavior is counted to ascertain frequency (Leedy & Ormrod, 2010); non-experimental quantitative studies show correlations between variables and examines the extent to which differences in one variable is related to differences in one or more variables (Leedy & Ormrod, 2010); this methodology will look at the relationship between life skills and recidivism and the effect poor life skill training has on the increase of the recidivism rate. Research Question 1. Does life skill training reduce recidivism in drug addicts? Through historical and developmental research an effort to reconstruct or interpret historical events through the gathering and interpretation of relevant historical documents and/or oral histories. Primary research data will consist of surveys, in-depth interviews, focus groups and experiments. Primary data will be gathered through informal interviews and observations. According to Lev, Brewer, & Stephenson (2004), â€Å"Interviews can be used to determine what services current customers would like to have access to, while observation can be used to determine which current providers are popular through other vendors. † There is an emerging literature on the relationship of coping strategies and substance use. Some evidence shows that individuals naturally adopt coping strategies to moderate behavioral and substance abuse problems (King & Tucker, 2000; Sugarman & Carey, 2007). Similarly, in a study with heroin users, participants who were abstinent at follow-up had greater increased use of coping responses compared with participants who had lapses or relapses (Gossop, Stewart, Browne, & Marden, 2002). Secondary research may consist of published research and data provided by the government in addition to data collected and analyzed by private companies. Secondary research will be gathered through peer reviewed journals and publications. Contribution to knowledge According to Samhsa (2011), â€Å"The use of illicit drugs among Americans increased between 2008 and 2010 according to a national survey conducted by the Substance Abuse and Mental Health Services Administration (SAMHSA). The National Survey on Drug Use and Health (NSDUH) shows that 22. 6 million Americans 12 or older (8. 9-percent of the population) were current illicit drug users. The rate of use in 2010 was similar to the rate in 2009 (8. 7-percent), but remained above the 2008 rate (8- percent). † (para. 1). The proposed study may contribute to the literature and to leaders in the substance abuse field by further research and understanding of patterns in healthcare services provided to substance abuse and mental health recipients. Factors that influence recidivism among minority recipients are very important to filling the gap and delivering accurate treatment. This study may contribute to probable causes of inadequate life skills such as income, education, healthcare literacy and services solicited to target market are variables or central phenomena of the study. Review of Relevant Scholarship â€Å"We stand at a crossroads in our nation’s efforts to prevent substance abuse and addiction,† said SAMHSA Administrator Pamela S. Hyde. â€Å"These statistics represent real lives that are at risk from the harmful and sometimes devastating effects of illicit drug use. This nation cannot afford to risk losing more individuals, families and communities to illicit drugs or from other types of substance abuse — instead, we must do everything we can to effectively promote prevention, treatment and recovery programs across our country. Research Question 1. Does life skill training reduce recidivism of drug addicts? References Henslin, James. â€Å"Social Problems: A Down-To-Earth Approach. † (2008). Miller, M. L. , & Hobler, B. (1996). Delaware's Life Skills program reduces inmate recidivism. Corrections Today, 58(5), 114. Retrieved from EBSCOhost. SAMHSA. (2011). Retrieved from http://www. samhsa. gov/newsroom/advisories/1109 075503. aspx

Saturday, November 9, 2019

Merchants of the Renaissance

This following three page essay is about merchants. I will be describing of how merchants affected the Renaissance,what merchants did, what merchants sold. And so on. The merchants in the renaissance really helped out because there were a lot of them and they were all over the place. There were many items that merchants sold during the renaissance. A lot of the merchants sold different I items. A lot of merchants sold same items. And some merchants sold very different items.The items that almost or all merchants sold were salt, sugar, glass, silk, gold, money, cinnamon, and weapons. Sometimes merchants sold cattle. There were merchants that were also very rich and actually had enough money to make the city they lived in more beautiful. To make the city they lived in they put paintings, bushes, flowers, statues, and much more items that made the city more beautiful. Those people that made the city more beautiful were well known and famous. Florence became a better city during the Rena issance because of its lines of communication to the world around it.In the late Middle Ages, the city became important as a crossroads for wool traders. Giovanni and Cosimo de Medici used banking to make Florence a crossroads for finance. With these connections made, Florence became a crossroads for ideas. The city was opened up to the ideals and philosophies of distant lands, and absorbed these into the writing and art it produced. That art then flowed freely outward to the rest of Italy and the European continent. The Medici maintained the stability of these connections through financial and political means.The connection they established with the Papacy was particularly beneficial to both Florence and Rome. The two cities, which might have otherwise been rivals, mutually developed under the spirit of cooperation during the Renaissance. The bankers like the Medici and other businessmen such as wool merchants of Florence provided the money to support artists such as Da Vinci and M ichelangelo during the renaissance. Without rich people paying the artists, the Renaissance would not have been so beautiful and amazing paintings, sculptures, and architecture.

Thursday, November 7, 2019

Colonial Expansion of Western Civilization essays

Colonial Expansion of Western Civilization essays From the late nineteenth to the early twentieth century, Western nations including; Germany, Great Britian, France, and Italy, enrolled in a remarkably fierce period of imperial expansion. From the sixteenth to the eighteen centuries, there has been a on going fight for control over the new world. There are a several factors that contributed to the crave colonial expansion. One very imporant factor was the need to spread economic influence. Also, other countries believe that this was their nations last chance to gain any control and enlarge and of their empires. It was almost like a national competition among countries to see who could aquire the most territories because if they didnt then someone else would. Lastly, was the need to sway public opinion. Before the late eighteenth century, the opinion of the public was rarely considered, but when it came to colonial expansion, everyone is affected...positively or negatively. According to Friedrich Fabris Bedarf Deutschland der Kolonien in 1879, the German nation is more than capable of expanding its colonies and pave the way of a new course. He believes that Germany is financially and economically inclined, intensely appropriate for being a cultivated country, and could provide plentiful number of workers to do so. He feels it will be beneficial to the economic situation and to the entire national development for that matter. Fabri also states that Germany has such a political and historical power and he feels that new nations are made bitter amongst eachother and he appeals to the public by letting the German people think that by colonizing, this will bring the nations and the people together as one and this could create a liberating effect The letter form John G. Paton to James Service Urging British Possession of the New Hebrides in 1883, also states his opinion to why the British should expand to ...

Tuesday, November 5, 2019

The Upside of Change No More Automatic Group Member Connections on LinkedIn

The Upside of Change No More Automatic Group Member Connections on LinkedIn On October 1, 2014, LinkedIn unceremoniously eliminated a widely relied-upon function: the ability to connect with anyone with whom you share a group, without needing to know their email address. Before October, if you wanted to connect with someone on LinkedIn with whom you shared a group, you would see a dropdown that looked like this: Now, the dropdown is one item shorter: While some LinkedIn members are postulating that the loss of automatic group member connections is a technical glitch that will be resolved, I’m assuming for now that it’s a permanent game changer. LinkedIn experts have recommended for years that you join the maximum number of LinkedIn group (50) so that you can easily expand your network. This reason for group membership seems to have disappeared. Or has it? The fact is, the people in your groups are still pre-filtered for shared interests and so you might still want to make the effort to connect with them. Just because you need their email address doesn’t mean you have to give up on building your network! Groups are still a great place to interact with valuable contacts, share information, and ask and answer questions. You can still do all that! The elimination of the automatic group connection feature might actually have an upside. Let’s say there’s someone in a group you want to connect with. What should you do? First, look in their Contact Information section or their Summary for their email address. If you find it there, you can easily enter it when prompted. Next, if you know what company they work for, Google them at their company. Or Google anyone at the company and you might be able to model your new contact’s email address on someone else’s. For instance, if you find an address like JaneSmith@Company.com, you can guess that your contact’s email address is JohnBrown@Company.com. If those options fail, you now must send an actual *message* to the person! Its free though. There are two ways to do this: Option #1 From Discussions, click on the members photo or name link to see that members activity. You will be taken to that members group Activity summary page. Click the Follow drop down menu on the right and select Send message. Option #2 Go to the group page and click on the number of members at the top right of the page. Search for the member you want to message. Then click the Send message link under their title. Your message might read something like this: Dear John, I was impressed by your contribution to the discussion in the Job Hunt group about HR practices in pharmaceutical companies. I would love to speak with you further about this topic and would be honored if you would provide me with your email address so I can send you an invitation to join my network! I would be happy to arrange a phone call as a starting point. Yes my dear social-media-savvy, you might have to interact with another human being before adding them as another number on your connection list. What I’m suggesting is that LinkedIn may have done us all a favor by forcing us to work a bit to connect with people whom we don’t really know even though we share a group. What do you think about this idea? Remember again that group membership is valuable for many reasons, not just for ease of connecting with group members. Smaller, more local group in particular provide a forum for you to become a thought leader in your niche. If you participate enthusiastically enough, it’s likely that other people will do the work of finding *your* contact information and send you requests to connect, rather than the other way around! What do you see as the impact of the â€Å"loss† of this connection feature? I’d love to hear your opinion.

Saturday, November 2, 2019

Psychology Literature Review on Peer Pressure and its influence on Essay

Psychology Literature Review on Peer Pressure and its influence on females appearance schemas and body dissatisfaction - Essay Example Benedikt, Wertheim, and Love (2002) and Paxton et al. (2003) found that best friends' encouragement to diet increased dieting behavior among adolescent girls. Dixon, Adair, and O'Connor (2000) also found that peer encouragement to diet (separate questions were not asked for other friends and boyfriend) was associated with both body dissatisfaction and dieting behaviors among adolescent girls. However, there was no overall association between the dieting practices of friends and those of adolescent girls, although boyfriends' dieting behavior was associated with some aspects of their girlfriends' dieting behaviors. Keel, Heatherton, Harnden, and Hornig (2001) also found that although boyfriends influenced their girlfriends' body dissatisfaction but not their eating practices, best friends had a greater influence on their girlfriends' dieting behaviors. In contrast to these findings, Steiger, Stotland, Ghadiriam, and Whitehead (2003) found no difference among binge eaters, dieters, and no dieters in the eating concerns of family members. The authors suggested that rather than an actual eating disturbance, it may be a general tendency toward some form of psychopathology that is associated with eating disturbance among adolescent girls. A follow-up study by Steiger, Stotland, Trottier, and Ghadiriam (2000) indicated that there was some association between girlfriends' and best friends' eating concerns, but that the strongest influence on disordered eating among adolescent girls was psychopathological traits of friends. Other researchers have also reported that friends of eating-disordered adolescents did not differ from control-group friends on dietary restraint or eating disturbances (Evans & le Grange, 2003; Leon, Fulkerson, Perry, & Dube, 2003), although some studies have revealed a relationship between best friends' eating restra int and that of their girlfriends but not of their sons (Ruther & Richman, 2003; Scourfield, 2003; Thelen & Cormier, 2003). The results from the aforementioned studies demonstrate a lack of clarity in the extent to which best friends and boyfriends may influence body satisfaction and disturbed eating among adolescent females and girls, with a particular focus on girls. Furthermore, that research has focused on weight loss but neglected consideration of strategies to gain weight and increase muscle tone. These are strategies that may be particularly relevant to adolescent females, but the impact of peer feedback on these strategies has not been explored. It is important to determine the nature of the feedback provided to adolescent females, how it differs from that provided to adolescent girls, and the impact of this feedback on weight gain and strategies to increase muscle, as well as weight loss. Peers also seem to exert some pressure among