Sunday, January 26, 2020

Relationship Between Facebook and Delayed Gratification

Relationship Between Facebook and Delayed Gratification Discussion This chapter is discussing about the significant findings of the relationship between the usage of Facebook and college students, how they fulfill the different gratification by using Facebook. This will relate to the literature review in Chapter 2. Summary of Findings The purpose of our study was to explore and invest the uses and gratification of college students when they use Facebook and the relationship between these. There are five gratifications which we apply through uses and gratifications theory are enhance social interaction, get information of education, simple entertainment, escape from the stresses of daily life and also recognition. Discussion of getting information of education According to the data of Park, Kee and Valenzuela (2009), it shows that students join Facebook because of the need of obtain information about on-and off campus activities, to socialize with friends, to seek self-status and to find entertainment. Of the sample surveyed, more than 40% college students agree that it is convenient to get information about their course or subject on Facebook, only less than 20% college students disagree with it. In addition, there is more than 50%, which is half of the sample agree that it is convenient to get updates of their course or subjects. There are 30% of our sample agree that it is convenient to interact with their lectures about the course or subjects, and 40% choose medium in this. Furthermore, there are 75% of college students agree that it is convenient to interact with coursemates about the course or subjects on Facebook. Facebook can be used as an educational environment, as it improves classroom practices and student involvement (Aydin, 2 012). Besides, the study of Lame, Ellison and Steinfield (2006) found that students who were likely to use Facebook to interact with their instructor in various way were more likely to collaborate using Facebook. In general, we found that most of the college students agree that it is convenient for them to get the information of education through using Facebook which is one of the gratifications in our study. The college students mostly use Facebook to interact with the lecturer, classmates, course mates to discuss the information of their course or subjects. The relationship of college students using Facebook and getting information of education, is as predicted, they use Facabook to fulfil the gratifications of getting information of education through interact with the lecturers and course mates at Facebook. Discussion on Recognition Closed-group Facebook pages are an invisible, virtual space that makes people more visible (Reid, 2011). Again from Reid (2011), Facebook provides access for students to engage in critical literacy activities where they reflect how the way they write on the page constructs their identities and diversity. Gratifications obtained from Facebook allow the users of the website to gain and maintain recognition from others – a social group or community – and satisfy their need to belong (Capua, 2012). The second gratification we examined in our study is college students use Facebook to gain recognition. In our study, we found that there are almost equal numbers of sample are agreeing and disagreeing that they share video, status, photo and others on Facebook to get people notice them, there are 30% college students agree with it and 33% of college students disagree with it. Moreover, there are more college students who disagree that they are posting video, status, photo and ot hers to get attention as well as influence others. Only there is slightly more college students agree that they want to gain emotional support from others when posting video, status, photo and others on Facebook. This shows that most of the students of Tunku Abdul Rahman University College are not using Facebook to fulfil their gratification of gaining recognition. Discussion on getting simple entertainment In the study of Sheldon (2008), there is a significant number of students use Facebook for entertainment reasons, and there are also a larger proportion of students go to Facebook to pass time when they are bored or after receive an e-mail suggesting them that someone had posted on their Facebook site. Park, Kee and Valenzuela (2009) also mentioned that Facebook is mainly for entertainment needs. In our study, although there is more than half of the sample are disagreeing that they are using Facebook to play games, but there is a significant group that more than 80% of college students agree that they are using Facebook to view photos and more than 60% of college students agree that they are using Facebook to view videos. Further, there are a larger group of college students, 40% are agreeing that they use Facebook to view article. The college students use Facebook to gain simple entertainment like view photos, video and article, to kill the time and boredom. Entertainment and boredo m were also prominent reasons for use social networking sites (Sponcil Gitimu, 2010). The result of our study enhance this, as there are more than half amount of the sample are agreeing that they use Facebook to view photos, videos and articles. Other than getting simple entertainment to kill time, enhance social interaction by using Facebook is one of the main reasons for college students as well. Discussion on enhancing social interaction Secondly, is the relationship between college students using Facebook and enhance social interaction. According to past research, most of them found that most of the college students using Facebook to social with their family, friends, keep contacting with them and updating the information about them. Sheldon (2008) found that most of the students go to Facebook to maintain relationships with other people they know. The same purposes of keeping in touch with old friends, current friends and family members emerged as the highest use of social media (Ezumah, 2013). Besides, in the study of Capua (2012) it shows that users employ social networking website mostly to keep in touch with friends and maintain relationships with geographically distant peers. Communicating with friends and family on social media sites was very common among college students and they use a variety ways to communicate like the common ways are wall posts and status updates, as well as private messages and posted photographs (Sponcil Gitimu, 2010). In our study, we found that there are 30% of college students agree that they are using Facebook to meet new friends. Further, there are 75% of college students agree that they are using Facebook to keep in touch with friends or family. Most of them are using Facebook to interact with their friends and family, there are more than 70% of our sample agree with this. We found that although not more than half of the samples agree that they are using Facebook to meet new friends, but most of them agree that they are using Facebook to interact and keep in touch with their friends and family. This shows that most of the college students are using Facebook to enhance social interaction, which is similar with the previous research in other countries. Discussion of escape from the stresses of daily life The data of the research of Dhaha and Igale (2013) shows that the youth of Somali need to obtain virtual companionship escape from the worries of the life by using Facebook. Although this study mentioned that the escape from the stresses of daily life is one of the gratifications fulfilled by college students when using Facebook, but there is slightly different with our study. Most of the college students in our research are disagreeing that such as there are 42% of sample disagree that they are using Facebook to escape from study problems and 50% of sample are disagreeing that they are using Facebook to escape from relationship problems. This shows that most of the college students in Tunku Abdul Rahman University College are not using Facebook to escape the stresses of daily life. On the other hand, most of the student agree that they are using Facebook to release stress from study problem, 43% of sample are agree with this, and 27% of sample are agreeing that they use Facebook to release stress from relationship problems. Therefore, most of the college students do not use Facebook to escape from stresses of daily life but they release stress and mostly release the stress of study problem. Implication of Findings Implications of findings on theory and practice are discussed in this section. Implication on Theory This study intended to elucidate the validity of the constructs in the Uses and Gratification Theory such as information of education, recognition, simply entertainment, enhance social interact and escape from the stresses of daily life as well as fulfilled by college students to using Facebook. Result from this study revealed that all the individual perceptions to information of education, simply entertainment and enhance social interact different with recognition and escape from the stresses of daily life. Therefore, the effect size of the differences between information of education, simply entertainment and enhance social interact were high on OFTEN. The three categories of the uses and gratification theory were high on OFTEN because there are the most usage for college students on Facebook and it is very effective for this study and researchers may use it to develop the new theory in future. Implication on Practice Findings of our study revealed that there are many college students are using Facebook to get information of education. We found that there are larger group of the college students are using Facebook to interact with their lecturer or course mates and get updates and information of course or subject. Facebook should be targeted as a useful tool to communicate within lecture and college students. Limitations of Study This study is not without any limitations. Firstly, it cannot be generalized to all college students of Tunku Abdul Rahman University College because the sample is convenient and the population is not well represented. The sample in this study are most of the students in Penang Branch Campus, the Kuala Lumpur Main Campus contain bigger population and also other branches in Kampar, Johor and so on. Secondly, there could be more equal level distribution, compared the three level in our demographics, there are 64% are age between 21-24 who are mostly enrolled in second year or higher level such as advanced diploma or degree, while the lower level, freshmen or first year of diploma who are probably between age 18-20 only consist 35% from our sample. Lastly is the accuracy and definition of our sample. In our research, we mainly focus to study the college students of Tunku Abdul Rahman University College, we distribute the questionnaire through internet which cannot define the identity of the sample, we cannot identify whether they are the students of Tunku Abdul Rahman University College. Suggestions for Future Research As mentioned above in the limitations of our study, future research can increase the number of the sample and include other branches or colleges. It can be more generalize to represent the college students in Malaysia with study the students from different states or colleges, and also increase other level of college student in different age. Other than that, an area of study worth exploring following this study is to examine the gratifications of enhance social interaction in further between college students maintain relationship with family and friends by using Facebook and develop serious, closer or romantic relationship. According to the research of Capua (2012), found that although private messages in Facebook allow the users to communicate confidentially , but still it not adequate enough to maintain serious relationships with people unless geographically distant because communication over Facebook seems to be seen as ‘cheap’ and low-effort. Therefore, future resear ch can examine the relationship between the maintain relationship with friends or family and maintain serious relationship between closer partner by using Facebook. Works Cited Aydin, S. (2012). A review of research on Facebook as an educational. Education Tech Research Development , 60, 1093-1106. Butler, K. (2010). Tweeting your own horn. District Administration , 46 (2), 41-44. Cantril, H. (1942). Professor Quiz: A Gratifications Study. Radio research 1941 , 34-45. Capua, I. D. (2012). A Literature Review of Research on Facebook Use. The Open Communication Journal , 6, 37-42. Dhaha, I. S., Igale, A. B. (2013). Facebook Usage among Somali Youth: A Test of Uses and Gratificaitons Approach. International Journal of Humanities and Social Science , 3 (3), 299-313. Ezumah, B. A. (2013). College Students’ Use of Social Media: Site Preferences, Uses and Gratifications Theory Revisited. International Journal of Business and Social Science , 4 (5), 27-34. Jenkins, G., Lyons, K., Bridgstock, R., Carr, L. (2012). Like our page using Facebook to support first year students in their transition to higher education. A Practice Report. The International Journal of the First Year in Higher Education , 3 (2), 65-72. Lampe, C., Ellison, N., Steinfield, C. (2006). A Face(book) in the crowd: Social searching vs social browsing. In proceedings of ACM Special Interest Group on Computer-Supported Cooperative Work , 167-170. Lampe, C., Wohn, D. Y., Vitak, J. (2011). Student use of Facebook for organizing collaborative classroom activities. Computer-Supported Collaborative Learning , 6, 329-347. Newhagen, J., Rafaeli, S. (1996). Why communication researchers should study the internet: A dialogue. Journal of Communication , 46, 4-13. ODonohoe, S. (1994). Advertising uses and gratifications. European Journal of Marketing , 28, 52-75. Park, N., Kee, K. F., Valenzuela, S. (2009). Being Immersed in Social Networking Environment: Facebook Groups, Uses and Gratifications, and Social Outcomes. Cyver pschology and behavior , 12 (6), 729-733. Pempek, T. A., Yermolayeva, Y. A., Calvert, S. L. (2009). College students social networking experiences on Facebook. Journal of Applied Developmental Psychology , 30, 227-238. Quan-Haase, A., Young, A. L. (2010). Uses and Gratifications of Social Media: A comparison of Facebook and Instant Messaging. Bullentin of Science Technology and Society , 30 (5), 350-361. Reid, J. (2011). â€Å"We don’t Twitter, we Facebook†: An alternative pedagogical space that enables critical practices in relation to writing. English Teaching: Practice and Critique , 10 (1), 58-80. Sheldon, P. (2008). Student favorite: Facebook and motives for its use. Southwestern Mass Communication Journal , 23 (2), 39-53. Spiliotopoulos, T., Oakley, I. (2013). Understanding motivations for Facebook use: Usage metrics, network structure and privacy. Madeira interactive technologied institute , 1-10. Sponcil, M., Gitimu, P. (2010). Use of social media by college students:Relationship to communication and self-concept. Journal of Technology Research , 1-13. Wong, W. K. (2012). FACES on FACEBOOK: A study of self-presentation and social support on Facebook. Discovery- SS Student E-Journal , 1, 184-214.

Saturday, January 18, 2020

Dos Attack & Mitigation

DDOS Attack and its Mitigation – Simulation in GNS3 Summary: A private LAN network comprising of hundreds of end devices and several servers in DMZ is protected by Cisco ASA (Firewall). In the internet the most commonly found network attack is to take down enterprise resources by DDOS(Distributed Denial of Service) attack either on Servers(which will impact hundreds of end users) or on the network resources like routers itself.In this practical simulation we will analyse how a DOS attack happens on web server placed in DMZ from the internet via traffic flooding, and how we can fine tune ASA to mitigate and stop further attacks on the network. Devices used: a) b) c) d) e) Attacker PC – Windows XP – Service Pack3 Web server (Simulated in GNS3) ASA Version 8. 4 (Simulated in GNS3) Cisco Router – 3750 (Simulated in GNS3) Ethernet Switch (Simulated in GNS3) Software used: a) Wireshark (version – 1. 6. 8) b) GNS3 (Version – 0. 8. 3. 1) c) Net tools (Version – 5. 0. ) Step 1: Install Windows XP (SP3) on a virtual machine, (in this case we have used Oracle’s virtual box). This step is to make sure that the system may not get infected with the virus which comes packed with hacking and network monitoring tools. Furthermore, as we are using a virtual operating system, we will be sure that, our actual working pc may not be affected with our experiments. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 1 Image 1: The Oracle virtual box manager showing windows XP(SP3) Step 2: Install GNS3 (Graphical Network Simulator) inside the virtual XP.Image 2: Image of GNS3 installed and running on virtual XP In the above image, the circle shows the virtual network appliances, i. e. routers, switches, bridges, firewall and IPS/IDS are available for simulation using GNS3. In most cases GNS3 comes with Putty, Wireshark bundled. In case if GNS3 doesn’t have Wireshark, we have to instal l Wireshark on the virtual XP machine too. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 2 Image 3: This image represents the Wireshark software, installed and running on virtual XP.Step 3: Install Net Tools (Network monitoring & Hacking Tool) in the same virtual XP machine. This tool can be used to monitor Network activities and can be used as a potential hacking tool. In this simulation we will use this tool to flood the server with icmp packets, which will lead to a DOS attack on the server. Image 4: This represents the Net Tools, which is installed and running on Virtual XP. Step 4: Now, we will setup the devices required to simulate a DOS attack, in the GNS3 software. a) Setup a Microsoft loopback adapter in Windows XP and assign a public IP address to this.This virtual XP will act as the attacker PC from the internet. b) To create a loopback adapter, the first step is to go to command prompt and type the command â€Å"hdwwiz. exeà ¢â‚¬ , this is the shortest way to add a new hardware. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 3 c) Now the â€Å"Add new hardware† wizard will come up and select the second option which says, â€Å"Install the hardware manually†, as shown in the above image. d) On the next screen, please select â€Å"Network Adapters†, from the hardware list, as shown in the above image. ttps://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 4 e) On the next screen, please select â€Å"Microsoft† from the vendor list and â€Å"Microsoft Loopback Adapter† from the Network adapter list as shown in the above image. f) Now Microsoft loopback adapter is added to windows XP, and this can be viewed under Network Connections in Control panel, as seen in the below image. g) Next step is to configure an ip address to this loopback adapter, so that this adapter can be connected to one of the routers in the simulated internet cloud in GNS3.At this point we have to make sure that the Loopback adapter’s ip address should be something in the public IP range and the interface of the router which is pointing towards the internet should be in the â€Å"same†, public IP range. h) Let us configure the loopback adapter’s ip address as 20. 1. 1. 100/24, and set the default gateway as 20. 1. 1. 1 as shown in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 5 i) The above configuration means that the virtual XP can also be access by the ip address 20. 1. 1. 100 and the default gateway i. . router’s interface which is connecting to the switch has an ip address of 20. 1. 1. 1. j) In the next step, we are going to create a topology, through which we can simulate the DOS attack, after we create the topology, we have to connect our virtual XP to the topology, which actually represents the interne t cloud, a server placed in the DMZ of a corporate (in actual configuration it is placed in Inside zone) and the attacker PC in the internet (i. e. the virtual XP). Between the internet(outside) and the Corporate LAN, we have placed an ASA(Adaptive security Appliance) version 8. , which is has all the functionalities of a firewall and features like NAT, Routing, VPN, AAA services etc. hence it is called UTM(Unified Threat Management) device. The topology which we are going to use for the DOS simulation is in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 6 Configuration: a) Web Server – IP address: 10. 1. 1. 100/24 Zone: Inside Device: Router c7200 used as a web server. Running configuration of this device : version 12. 2 interface FastEthernet0/0 ip address 10. 1. 1. 100 255. 255. 255. speed auto duplex auto ip http server no ip http secure-server ip route 0. 0. 0. 0 0. 0. 0. 0 10. 1. 1. 1 b) Firewall – IP address : https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 7 Inside zone interface – 10. 1. 1. 1 (which acts as gateway for LAN users) Outside zone interface – 1. 1. 1. 1 Access-lists: Configuration before DOS security on firewall ASA Version 8. 4(2) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI. 2KYOU encrypted names ! interface GigabitEthernet0 nameif outside security-level 0 ip address 1. 1. . 1 255. 255. 255. 0 ! interface GigabitEthernet1 nameif inside security-level 100 ip address 10. 1. 1. 1 255. 255. 255. 0 access-list out-in extended permit icmp any any access-group out-in in interface outside route outside 0. 0. 0. 0 0. 0. 0. 0 1. 1. 1. 2 1 c) Gateway router for attacker PC: Ip address – Interface towards firewall – 1. 1. 1. 2/24 Interface towards attacker PC – 20. 1. 1. 1/24 Configuration – https://www. elance. com/s/feroz_sm/ https://www. odesk. com/use rs/~013128626566145b05 Page 8 interface FastEthernet0/0 ip address 1. 1. 1. 2 255. 255. 255. 0 duplex auto speed auto ! nterface FastEthernet0/1 ip address 20. 1. 1. 1 255. 255. 255. 0 duplex auto speed auto ! ip forward-protocol nd ip route 10. 1. 1. 0 255. 255. 255. 0 1. 1. 1. 1 no ip http server no ip http secure-server Attacker PC: Ip address – 20. 1. 1. 100/24 Operating system – Windows XP – SP3 Location – Internet Connectivity Tests: Now that we have all the devices setup and connected, we should test whether the attacker PC can actually reach the web server, after all if there is no reachability, the DOS attack is not possible. We can find this using a simple and trace route test, as shown in the below images. https://www. lance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 9 https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 10 By the above images, we can find that, the attacker pc has access network reachability to the webserver from the internet. Launch of the attack on webserver using Net tools: In our simulation task we use Net tools 5, which is a network monitoring tool and a hacking tool as well. In the first step, we will check whether the Net tools is able to ping the webserver, by going into network tools -> ping option, as shown in the below image. ttps://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 11 We can verify that the software is able to send successful ICMP packets to the web server. This is possible, as we have opened an access control list (ACL) in the firewall which allows any ICMP packets from the internet to the LAN or DMZ. We will analyse what is happening during the Ping, at the packet level using Wireshark. As we can see, four ICMP packets have been sent from the source 20. 1. 1. 100 to destination 10. 1. 1. 100(web server) and the ping is successful.We can also observe that all the 4 packets we sent and received from the internet to the web server in 2 seconds. In the next step we are actually going to deliver the DOS attack on the server, without enabling DOS security on the firewall. To create the DOS attack, first we need to go to Network tools and Http flooder (DOS) in the NetTools, as shown in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 12 In our case we need to give 10. 1. 1. 100 as the Ip to flood instead of 127. 0. 0. 1.As soon as we hit the start button, the web server is under DOS attack as seen in the below wireshark analysis. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 13 As we can observe that hundreds of syn packets from the source 20. 1. 1. 100 are flooded to destination 10. 1. 1. 100 in less than â€Å"one† second. The below image from Cisco’s website, clearly elaborates, what happens in a typical syn flood attack, which represents the above Wireshark capture. The description of each packet says it is a â€Å"SYN† packet, that means it is a half open connection, without the TCP 3 way handshake.With these SYN packets, a certain amount of buffer is allocated for each SYN packet and in less than a minute all the server resources are allocated to these half open connections and the servers failed to respond to genuine queries, stating that it us under Denial Of Service (DOS) attack. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 14 Mitigation techniques: As we have already discussed, a Cisco ASA firewall can be very helpful in mitigating and stopping DOS attacks on LAN or DMZ servers. The above image from Cisco’s website, describes how ASA firewall stop syn flood attacks can.In this process we will limit the number of â€Å"embryonic† or â€Å"half open connections† a client can have. If the embryonic connection limit is reached, then the se curity appliance responds to every SYN packet sent to the server with a SYN+ACK, and does not pass the SYN packet to the internal server. If the external device responds with an ACK packet, then the security appliance knows it is a valid request (and not part of a potential SYN attack). The security appliance then establishes a connection with the server and joins the connections together.If the security appliance does not get an ACK back from the server, it aggressively times out that embryonic connection. In this scenario we have used Modular Policy Frame work, which limits number of half open connections to the server and thus stops DOS attack. We have used the below configuration in the Firewall to stop half open connections, which will have a maximum of â€Å"100† open connections, a maximum of â€Å"200† embryonic connections, and a maximum of â€Å"10† embryonic connections from a particular client (identified by an IP address).Furthermore we have set con nection timeout timer for a normal connection as 2 hours, timeout for embryonic connections as â€Å"45† seconds and â€Å"25† minutes for a half closed connection. Firewall(config)#class-map tcp_syn Firewall(config-cmap)#match port tcp eq 80 Firewall(config-cmap)#exit Firewall(config)#policy-map tcpmap https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 15Firewall(config-pmap)#class tcp_syn Firewall(config-pmap-c)#set connection conn-max 100 Firewall(config-pmap-c)#set connection embryonic-conn-max 200 Firewall(config-pmap-c)#set connection per-client-embryonic-max 10 Firewall(config-pmap-c)#set connection per-client-max 5 Firewall(config-pmap-c)#set connection random-sequence-number enable Firewall(config-pmap-c)#set connection timeout embryonic 0:0:45 Firewall(config-pmap-c)#set connection timeout half-closed 0:25:0 Firewall(config-pmap-c)#set connection timeout tcp 2:0:0 Firewall(config-pmap-c)#exit Firewall(config-pmap)#exit Firewall(config)#service-policy tcpmap global Now we will run a DOS attack on the server after the security is enabled and check what will be Wireshark output. The below image shows that the attacker PC is still able to ping the web server, after we have enabled DOS security, but it is able to ping because, this is a normal ping. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 16 The above image represents the wireshark capture between the Internet router and the firewall, which clearly shows that syn flood attack is happening from source 20. 1. 1. 100 to destination 10. 1. 1. 100, and we can see hundreds of packets flooding 10. 1. 1. 100 in less than a second.At the same time the above image shows the wireshark capture between the firewall and web server, which clearly explains that all the syn-flood packets have been dropped by the firewall as soon as they reach it. At the same time we can obser ve normal ping packets which came from th e attacker pc which have been passed by the firewall. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 17 Inference: The above simulation experiment shows that the firewall before the corporate network has stopped one of the most common attacks over servers, i. e. the DOS attack, using Modular Policy Frame work, which can be used to define intersting traffic and the actions to be taken on that traffic. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 18

Friday, January 10, 2020

Rhetorical Analysis Jane Welty Essay

Jamaica Kincaid grew up in a world where everything she owned wasn’t hers. While she may have physically owned it, mentally she did not. As her world of Antigua was being eaten alive by England, Kincaids family loved every bit of it. In the essay, On Seeing England for the First Time, Jamaica Kincaid uses several literary elements to explore her negative feelings towards England and England’s influence in Antigua. Three of the main elements used in the essay are structure, ethos, and diction. Structure plays a role in the power of this essay by the way the author presents ideas. Kincaid employs the method of increasing importance to bring her points home. By beginning the essay with herself in a classroom the reader gets a firm foundation of setting, time, place, etc. She describes seeing the map of England and the very first thoughts that go through her head. She then tells about the people that got to wear it and where they wore it and how it effected her life. With each story Kincaid tells, she is also using increasing importance in conjunction with ethos to make the reader feel as she did. She tells further stories about her childhood experiences that make the reader feel England’s oppression and begin to hate what was happening themselves. She tells of her fathers hat and how he wore it everyday from the second he got up to the second he went to bed shows exactly how much some people cared for England and how they were falling under its spell. The reader feels as though England is forcing this upon them and emotions are felt towards the subject. Each story gets more relevant and more powerful, causing increased importance and increased hatred. A third method used in the essay is diction, which is used to show how great the oppression of Antigua had become. Almost everything in Antigua was made in England, ranging from socks to the idea of eating a large breakfast. England had encompassed almost everything in Antigua and most of the people had fallen to it. Kincaid repeats the phrase and idea â€Å"Made in England.† She tells of this being on almost everything she owned. She says, â€Å"Those words, ‘Made in England,’ they were written on the box the oats came in(,)†¦ on the box the shoes I was wearing came in; a bolt of gray linen cloth†¦ my  mother had bought†¦(, and) so were my socks and undergarments.† She applies â€Å"Made in England† to cars, hats, food, and ideas. She tells of her fathers hat that was â€Å"Made in England,† Even ridiculing England to call say that the hat was made of the wrong material. Kincaid describes the hat to be made of felt, the wrong fabric for the climate and time of year. In a way this relates to the overall subject of England not being right for Antigua. Kincaid feels as though England is something that Antigua is â€Å"wearing,† and incorrectly at that. Jamaica Kincaid was just a poor soul trapped under the sway of the English culture. While many others didn’t even realize the change, Kincaid saw it happening all around her. She closes the story by telling of how she would need to know how to correctly draw a map of England for every test she was ever going to take. She tells how at the time it was a simple statement, but how it would grow to her erasure, as it had many others. She was there to see her world being erased and refused to let that happen to herself, which is why she wrote this essay. She told of the the oppression using literary strategies in order to make her hatred fully known to readers, something she did quite well.

Thursday, January 2, 2020

America’S Criminal Justice System Today Is Constantly Being

America’s criminal justice system today is constantly being questioned and scrutinized by citizens. America’s Criminal Justice system is based on morals and beliefs. These original morals and beliefs didn t come out of anywhere. Europe was a huge influence on America and our criminal justice system. Throughout the years the system has evolved along with our country. America s Criminal Justice system started during colonial America, with the early colonists coming from England, France, and the Dutch Republic. Our original morals for our law system were pulled from the English Common Law System. The English common law system was a set of rules to solve issues that arose within society. Common law is a strategy that focuses on past†¦show more content†¦These laws were effective. However, rising populations and colonists moving further west made politicians recognize that without a system to implement and enforce these laws they would be ineffective. The first part of this system was to add sheriffs Sheriffs would follow up on complaints or information of criminal activity throughout their communities. However, Sheriffs were paid mostly from tax collecting. Corruption easily to snuck into the system as sheriffs would be paid to assist in controlling land owners. Next to come along were the judges. Judges were rarely professionals, most were political or religious leaders believing their role in the community was to enforce God’s will. Serious crimes were handled by multiple judges and legislative courts. Legislative courts covered territories throughout the country, not states. This meant they held more power. These courts rarely met up, slowing down the judging. What would a judge be without a court? Courts were established during the 17th century. The courts would hear the altercations between locals. Unfortunately, legislative courts were not very useful when handling legal business. The legislative courts had mor e than one judge and were rarely able to set up meetings. At that time the legal process included a crime being reported, then a judge would look at the evidenceShow MoreRelatedAugust Vollmer: Criminal Justices Studies And Modern Policing1316 Words   |  6 PagesAugust Vollmer: Criminal Justices Studies and Modern Policing Innovator America’s justice system has come a long way. It is because of the great leadership of our forefathers that brought us this far. There are several traits a great leader must exhibit, and one is innovation. Innovative leaders specifically in America’s criminal justice history and their actions, created the modern justice system that lives on today. This paper will profile one of the great leaders in American law enforcement historyRead MoreCriminal Justice as Entertainment Essays999 Words   |  4 Pagespopular, with constantly elevated ratings over time. More than a quarter of all prime time shows from the 1960s to the 1990s have centred on subjects of crime or criminal justice, which comprise the biggest single subject matter on television today, across all types of programming (Weigel and Jessor, 1999). Drawing on Carlsons (2001) review of the literature, we observe that these studies have characteristically enclosed five main interconnected areas: knowledge of and information on the system, complianceRead MoreConsequences of the Juvenile Justice System1136 Words   |  5 Pagesremember criminals start off as eager children that are ready to learn. They need to be taught positive behaviors. As we look into the court systems we see: so many judges trying to reach justice; we see so many police officers arresting citizens on the streets; and of course, we have the prosecuting attorneys cleaning up the streets, sending criminals to jail. We love the justice system keeping us safe, right? I am going to argue in this paper, first, how negatively effective the legal system is withRead MoreRacism In Racism1248 Words   |  5 PagesWe all read a large amount of literature in our lifetime,e and treatment with racism in the criminal justice system. Throughout the novel we are shown the issues of death penalty, racial profiling, inequality, mental illnese to empathize the correuption many people throughout the united states are either not awareabout or simply turn a blind eye to because they don’t have to face the injustice. When reading this novel my attention was directly drawn to the racism many people go through whe it comesRead MoreA Critique Of America s Correctional System1444 Words   |  6 PagesA Critique of America’s Correctional System: from prisonization to reform Imprisonment is a rising social issue in America. To put in a numerical perspective, America at only 4% of the world’s population of 7.1 billion is surprisingly the world’s largest jailer at an overwhelming 22 % of the global prison population (Lee 2015). Currently the prison system costs American’s nearly 70 billion dollars (Borowski 2015). With this amount of federal funds going towards housing and feeding inmates, questionsRead MorePlea Bargain1613 Words   |  7 PagesAdministration of Justice in America and Canada’s criminal trials. Accused criminals are giving up the rights to a fair trial, to indeed plead guilty, in order to receive a much lesser charge, more comfortable prison, or even to agree to testify against someone else. Fewer than ten percent of criminal cases brought up by the federal government even make it to the federal courts to be tried before juries each year. â€Å"According to one legal scholar, every two seconds during a typic al workday, a criminal caseRead MoreA Historical Journey through the American Conscience: The Public and its Courts 1564 Words   |  7 Pages America has long taken pride in being a nation of idealism and of freedom. Still, while these values have remained constant, other areas of the American mindset have evolved repeatedly over the brief course of America’s history. Nothing could illustrate this change more than the complex, developing, relationship between American citizens and their criminal justice system. Each era of American history shows the mindset of its time through the courts. From the extreme Puritans, and their deeply spiritualRead MoreIs It Necessary For Law Enforcement?1707 Words   |  7 Pagescharacter, their ability, or truth that someone or something has shown over a period of time or over experiences. Trust makes for a sense of being safe or of being free of fear, enough so that one s focus can be on other matters (Spirithome, 2005). Key elements of this definition are its dependence on the foundation of character, its ability and a sense of being safe. Trust is also a public good, according to noted sociologist Giovanni Sartor (Sartor, 2003). Sartor stated if there was no trust, co-operationRead MoreRacism And Chattel Slavery Has A Unique History Within America2204 Words   |  9 PagesThose who are patriotic proud Americans, would love to believe that their government and criminal justice system is fair and equal in every way. Even when one learns about the government at a young age in public school, they are told from a whitewashed Eurocentric male point of view that those who make the laws and run the government (who are white men), do it for the greater good of the American people, that they honor fairness/equality, and fought for the freedom of all Americans. However, whenRead MoreThe Effectiveness of Prison Education Rehabilitation Essay example1627 Words   |  7 Pagesrather than to take the revolving door that alw ays leads back to the same place. Perhaps the most important factor to consider when measuring the effectiveness of prison Education Rehabilitation is the recidivism rate. In his book, The Treatment of Criminal Offenders, Michael Dow Burkhead writes, â€Å"Understanding recidivism is important for our purposes because the effectiveness of treatment is usually determined by measuring and comparing recidivism rates† (13). Recidivism rates are a good indication