Entries by Student

write my assignment 6246

Many notable characters, songs, and movies that were previously set to enter into the public domain have not as of yet due to repeated extensions of the copyright laws that have extended protections. Many of the Disney characters, including Mickey Mouse, Donald Duck, and Goofy, among others that were created in the early part of the 20th century, would have long since entered into the public domain if not for subsequent changes in the law. Other works, such as A. A. Milne’s Winnie-the-Pooh and Hemingway’s Three Stories and Ten Poems would also be public domain items and available to the world at nominal or no cost, yet are not due to changes in the law. Is this fair? How long after the death of an author should copyright protections continue to exist before works become part of the public domain and freely accessible to all?

 

"Not answered?"


Get the Answer

write my assignment 19397

Hello, I am looking for someone to write an essay on Childhood Obesity in the USA. It needs to be at least 750 words.

The World Health Organisation explains obesity as the accumulation of excessive or abnormal fat in the body. This excess fat is weakens ones health. The body mass index is pivotal in determining whether one is obese. A child is obese when he has weight above the normal weight estimated for his age and height. The World Health Organisation state that, in order to assess a child’s healthy weight, it is crucial to make a comparison basing on the weight of other children having a similar age and of the same gender. The centre of disease and control provide growth charts utilised by physicians in monitoring the growth of the child. The world health organisation state that children between the age of 2-19 who have a BMI greater or equal to 95thpercentile is obese (Who.int, “Childhood Obesity”).

The American heart association fact sheet indicates that among children aged between 2-19, 1 out of 6 are obese. Statistics estimate that 17.8% of the obese population are boys, whereas, 15.9% of the obese population are girls. The figures quoted by the CDC illustrates that, the proportion of children between the ages 5-17 years considered to be obese has risen in 2008/2009 compared to 1973/1974. In 2009-2010, 16.9% children and adolescents in the states were obese. Statistics show that obesity is prevalent among boys than girls (CDC.gov, “NCHS data brief.”).

There are varied reasons explaining the causes of obesity. The main cause is the unhealthy diet observed by many children coupled with low physical activity. Sedentary lifestyles such as watching TV, spending hours on mobile phone and plating video games are activities common among children of the 21 century. These activities have replaced active exercises such as swimming, playing ball or biking.

 

"Not answered?"


Get the Answer

write my assignment 11342

Changchang is a first-year international student who is missing the comforts of home and family, and she is finding it challenging to communicate with others. Changchang is attending all her classes and seeking help with regards to her academic success when needed. She understands the material in her classes but it takes her longer to learn due to primarily working in her second language (English instead of Chinese). According to the situation described above, what statement best describes Changchang’s stressors?

AChangchang’s absolute stressors involve culture changes and language barriers whereas her relative stressors are family, connection, and school stressors.

BChangchang’s absolute stressors involve culture changes, language barriers, family, connection, and school stressors. There are no relative stressors.

CChangchang’s culture changes and family would be classified as eustress while language barriers are distress.

DChangchang’s relative stressors involve school stressors, culture changes and language barriers whereas her absolute stressors are family, and social connection.

 

"Not answered?"


Get the Answer

write my assignment 31317

1) With Modern Surveillance technologiesthe government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission.

Annotated Bibliography

Source #1

Giroux, H. A. (2015). Totalitarian paranoia in the post-Orwellian surveillance state. Cultural Studies, 29(2), 108-140.

The source “Totalitarian paranoia in the past-Orwellian surveillance state” (Giroux, 2015) objects to discover the public privacy threats arise by government spying. The source then explains the impacts of surveillance and says that people are deprived of their freedom of thinking and speech because of the institution of being tracked. It says that the latest information and communication technology devices like microphones, internet, videos, cameras, and text messages provide more facility to surveillance organizations than customers. Private and public space is easily violated and even a third party keeps records of a person’s shopping choices and personal messages from social media. Finally it says that we are leading a surveillance culture by a surveillance state.

This source changed my research approach and provided me multiple valid points which I further used in my paper. For instance, the use of biometric bracelets that tells the attention of students sitting in the hall. It cleared my position by saying that this surveillance is against freedom and democracy which gave people the right to keep their things private. It helped me explain the fact the NSA is a threat to privacy and freedom. Companies can spy any customer or individual because they run their own data-mining setup.

Source #2

Schaefer, A. T., & Claridge-Chang, A. (2012). The surveillance state of behavioral automation. Current opinion in neurobiology, 22(1), 170-176.

The source “The surveillance state of behavioral automation” aims to explain the latest use of behavioral data. It says that even complex behaviors can be analyzed and observed. The behaviors include comprehensive observation of animals and humans behavior. In a behavioral study, psychology is also attached, and the techniques include a blend of these domains. The tracking, sorting, and motion capture methods help in automation, which is the physiology of animal transformation.

I found this source during my research, and it helped me in explaining my argument clearly about behavioral automation. The method and approach used in the source to describe the surveillance state changed my approach to research. I found this source when I was searching for the reasons for the huge significance of behavioral data. It helped me in understanding the current atomization in behavioral studies. It also identified the latest techniques that can improve observation and experimentation in various neuroscience aspects.

Source #3

Sorell, T., & Draper, H. (2012). Telecare, surveillance, and the welfare state. The American Journal of Bioethics, 12(9), 36-44.

The source “Telecare, surveillance, and the welfare state” (Sorell & Draper, 2012) explains how surveillance and telecare are being provided to people and their role in the welfare of the country. It explains in detail these terminologies and the processes they use. The major argument supported in this source is that people do not like being tracked by a party. The concept of the surveillance state is becoming ubiquitous in America, and telecare is playing an important part in it. Telecare is promoting the freedom and independence of customers, by providing those services at their desired locations.

I found this source during my research process, and it helped me in explaining my point clear to those who exclude telecare from the surveillance state. Surveillance states can support independence, where people are tech-savvy, and technology is solving their problems. The source also explains how surveillance can intervene in an emergency. This source directs me in the research approach and guided me in explaining my argument, in a highly cohesive and comprehensive way. I used this source to explain telecare benefits for independence and its contribution to making a surveillance state.

Source #4

Taylor, J. A., Lips, M., & Organ, J. (2008). Identification practices in government: citizen surveillance and the quest for public service improvement. Identity in the Information Society,1(1), 135.

The source “Identification practices in government: citizen surveillance and the quest for public service improvement” (Taylor et al., 2008) aims to explain the concept of the surveillance state. It says that the government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. We can summarize that the information collected is used in the public sector ranging from license making to pensioner records.

I found this source at the beginning of my research, and it strengthens my position by supporting my argument. At the start of my research I was completely biased about information capitalism and I was only seeing one side of the picture which argues companies are breaching the privacy of people, and they have no right to collect information without the permission of its users. This source clearly depicts the positive aspects and applications of information collected by users. With the help of this source, I was able to explain the point that this information is shared with the government, where it is distributed to other departments like police, etc.

Source #5:

Zuboff, S. (2015). Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75-89.

The source “Big other: surveillance capitalism and the prospects of an information civilization” (Zuboff, 2015) aims to inform readers about the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission. The high use of Google gave it the benefit of a high amount of data, which assists Google to design predictive products first hand. In the end it explains the agreements, communication, and personalization of Google, and says that many of the users are unaware of the fact that they have lost control of their personal data, which is further used for their digital benefits and services.

I found this source during my research and it helped me in explaining my arguments. I was unsure about how enterprises use institutional logic, and this source cleared my position regarding behavioral data and personal data, which companies collect based on using their institutional logic which allows them to hack and violate the privacy of customers. This source helped me to understand how companies and businesses control behaviors of customers now, which was opposite in the past. This big data, although it is providing large facilities, on the other side it is intervening in customer’s own matters, which is not liked by many people. This source changed my research approach by providing the argument that surveillance capitalism should not be considered completely evolved, and many aspects of it needed to be carefully examined.

2)

In the present enhanced technological scenario, surveillance tasks are being done using state-of-art Information Technology techniques and tools and these are used to extend and augment traditional surveillance systems. In addition to this augmentation, latest Information and Communication Technologies (ICT) are being used in digital domain under the name ‘surveillance capitalism’. Government is predominantly using surveillance techniques either by intelligence services or law enforcement and these are normally justified with an appeal to the “greater good” and protecting citizens but their use is always controversial. Majority of citizens are upset with these mass surveillance actions as their privacy is lost and feel their fundamental rights are denied. Government is sometimes harsh on citizens to implement security activities to protect nations. Now the basic the argument of the public is a trade-off between privacy and security of citizens and nation is not inevitable but is shaped by surveillance employed as a technology-supported security practice, reinforced by securitization under Federal and State security laws.

In view of the above the Agenda or Topic of the project is to study and discuss the ethical implications which surveillance, privacy and security call upon us to pay more attention to are those of our own choices, both individual and collective, and choices of government to protect ourselves, information data security and nation’s security without diluting the spirit of these three by adhering to prevailing Federal and State Laws.

Related Quotes & Bibliography:

“Government classifies far too much information, frequently in violation of applicable laws governing what information may and may not be classified.”

Barry Eisler, author, and former CIA officer spoke at the Association of Former Intelligence Officers opposite ex-CIA and NSA director Michael Hayden. Barry Eisler has served under active positions in the CIA’s Directorate of operations and now live in San Francisco Bay Area.

https://boingboing.net/2016/03/01/on-whistleblowers-and-secrecy.html

“Free speech has occupied an exalted position because of the high service it has given our society. Its protection is essential to the very existence of a democracy. . . . It has been the safeguard of every religious, political, philosophical, economic, and racial group amongst us. . . . [Free speech] has been the one single outstanding tenet that has made our institutions the symbol of freedom and equality.”

William O. Douglas, the longest-serving justice in the history of the Supreme Court as he served from (1939-75), and he also wrote books on this experience and observation from his travel diaries as well

https:// we are at a crossroads. The technology is available for two great options: The massive surveillance state or the renewed freedom of a deeply-involved citizenry thinking independently and holding the government to the highest standards”

Oliver DeMille is an American author, educator, and public speaker. He is the founder of an educational model known as TJEd and the co-author of Leader Shift. His work mostly is related to education and Orrin Woodward is also considered as a co-author for this.

https:// currently are and always have been real and material consequences of state surveillance that place the physical well being of individuals at risk”

Jonathan Hofer is a senior studying political science at the University of California, Berkeley.

https:// we want to live in a society where we live totally naked in front of the government, and they are totally opaque to us”

Edward Joseph Snowden is an American whistleblower

https:// have an always expanding, omnipresent surveillance state that’s constantly chipping away at the liberties and freedoms of law-abiding Americans.”

Ronald Lee Wyden is an American politician who is currently serving as the senior United States Senator for Oregon

https://

 

"Not answered?"


Get the Answer