Saturday, December 28, 2019

Linguistic imperialism in Brazil Essays - 1349 Words

Linguistic imperialism is a concept used by scholar Robert Phillipson, he mostly spoke about the imperialism of the English language, although this concept can be applied to all the world’s major international languages with imperialistic origins, when the original population had to adopt the invader’s language because of the benefits that accrue to the speakers of the languages when the dominant language has been imposed (Phillipson 31). Linguistic imperialism in Latin America started with the ‘discovery’ and the occupation of the New World by the European powers. Spanish and Portuguese language were imposed on the local populations and therefore many indigenous languages vanished. This essay will especially focus on Brazil and the†¦show more content†¦Therefore, the preservation and propagation of Portuguese as a national language was and still is a matter of national security (Rajagopalan 2008: 179). From the colonial period until today the pol itical dimension of language and linguistic dimension of politics are both related to the notion of power. Language is concerned with power politics or machtspolitik (Rajagopalan 2008: 180). According to Joseph ‘language is political from top to bottom’ (Joseph xi). During the colonial period, from 1500 till 1822, the Portuguese did not promoted their own language in Brazil, in contrast to the French and British colonisers. The French were single minded in the prosecution of their language and they were consicious of a ‘civilizing mission’ (Phillipson 111). Whereas the Portuguese main goals were not related to missionary or civilizing mission, they were primarily interested in wealth and resources. At first they were not planning to actually live in Brazil, therefore language policy was not their first concern. However this changed and more white, Portuguese men settled down in Brazil and due to the lack of European women, married the local women. In present Brazil 38.5% of the population is mulatto (CIA World Factbook), which is a mixture of black and white, as a result of these mixed marriages. The new ‘mulatto’ generation mainly learned to speak the language of the Tupinambà ¡ tribe, who were living along the Atlant ic CoastShow MoreRelatedGlobalization: the Americanization of the World?3228 Words   |  13 Pagesof the world, â€Å"the rise of the rest† is diminishing its role and the United States is no longer solely holding the reins of globalization. Andrew Bacevich’s assertion is that the idea of the American empire differs only in form from traditional imperialism. Its function, enriching the mother country, is precisely the same but employs a variety of techniques to make this less evident. The United States embraces its role in history of exerting power only as a last resort. Only when circumstances totallyRead MoreHegemony and Discourse : Negotiating Cultural Relationships Through Media Production8970 Words   |  36 Pagesgroups such as the Kayapo in Brazil and the Warlpiri in the Australian Outback have developed substantial video archives through work that was inspired and supported through outside assistance (cf. Turner, 1990a, 1990b, 1992a, 1992b; Michaels, 1986, 1994). James Weiner (1997: 197) has noted that indigenous peoples ‘have utilized visual self-representation as a mode of empowerment, political assertion, and cultural revival in the face of Western cultural and economic imperialism’.1 In d escribing these shiftsRead MoreHindi Nibandh on Advantages of Mobile and Disadvantage17790 Words   |  72 Pages For critics of this persuasion, India surely seems a lonely land. A country with a millennial history of Hindus, Christians, Jews, Muslims and Buddhists living peaceably together; a country of hundreds of dialects in which so many. Indians are linguistic foreigners to each other, and happily, tolerantly so; a country that welcomes foreign seekers (of yoga poses, of spiritual wisdom, of ancestral roots) with open arms; a country where, outside the elite world of South Delhi and South Bombay, I haveRead MoreThe Philippine Architecture: Spanish Colonial Period18287 Words   |  74 PagesVerde islands. The Treaty was finally signed following complex diplomatic negotiations between ambassadors and barristers from both Kingdoms. Modification of a demarcation line dividing the world between Spain and Portugal resulted in the birth of Brazil as its eastern end fell within the Portuguese zone. This document is essential if we are to understand American history and economic and cultural relations between Europe and America. Therefore the treaty became an important reference not only toRead MoreRastafarian79520 Words   |  319 Pagesadherent of Rastafari and a social scientist, refers to the imposition of European values on the black masses in Jamaica as â€Å"cultural imperialism.† Cultural imperialism occurs when one group imposes its deï ¬ nition of reality, via â€Å"theories, concepts and ideas—meta-physics, epistemology, ethics and even aesthetics—on another.†6 According to Semaj, cultural imperialism in Jamaica was even more effective than physical and economic oppression. While these overt forms of oppression met constant resistanceRead MoreOrganisational Theory230255 Words   |  922 Pagesthe ultimate challenge to organization theory? Introduction What is postmodernism? Postmodernism: the core elements Postmodernism and organization theory Poststructuralism and postmodernism Three key thinkers of postmodernism Jacques Derrida: the linguistic turn and deconstruction J.F. Lyotard and the nature of knowledge Foucault: postmodernism, discourse, knowledge and power Organizational culture The challenges of postmodernism to organization theory Problematizing normal science Problematizing truthRead MoreDeveloping Management Skills404131 Words   |  1617 Pagesand recognize that most of his former attitudes and behavior were actually criminal from this point of view. For example, a priest who had dispensed food to needy peasants in his mission church had to â€Å"recognize† that he was actually a tool of imperialism and was using his missionary activities as cover for exploitation of the peasants. Even worse, he had used food as blackmail to accomplish his aims. The key technique used by the Communists to produce social alienation to a degree sufï ¬ cient to allow

Friday, December 20, 2019

Intellectual Property Rights An Analytical Study Essay

INTELLECTUAL PROPERTY RIGHTS – AN ANALYTICAL STUDY IN THE INDIAN CONTEXT Abstract Intellectual property rights are the rights given to persons over the creations of their minds. These rights make the creator/ inventor as the owner of the product/work. IP protection is intended to stimulate the creativity of the human mind for the benefit of all by ensuring that the advantages derived from exploiting a creation benefit the creator. This will encourage creative activity and allow investors in research and development a fair return on their investment. The World Trade Organization (WTO) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS Agreement) which came into force in 1995, brought with it a new era in the multilateral protection and enforcement of IP rights. It lays down minimum standards for protection and enforcement of intellectual property rights in member countries which are required to promote effective and adequate protection of intellectual property rights with a view to reducing distortions and impediments to international trade. As per the agreement, all member countries including India are to abide by the mutually negotiated norms and standards within the stipulated timeframe. Accordingly, India has set up an Intellectual Property Right (IPR) regime and is well established at all levels whether statutory, administrative or judicial. In this context this paper focussed on the conceptual analysis of Intellectual Property Rights in theShow MoreRelatedThe Role Of Intellectual Capital Information On The Narrative Sections Of Corporate Annual Reports1678 Words   |  7 PagesAdvanced Financial Accounting ACCU9AA Student No.: 1931783 13 November, 2014 Coursework Essay Why would companies choose to disclose Intellectual Capital information in the narrative sections of corporate annual reports? Word Court: Page Court: 7 Introduction The importance of Intellectual Capital information (IC) has been increased in the current economic. It refers to intangible resources which create company value (Ashton, 2005). Human capital, structural capital and relationalRead MoreFeasibility Analysis947 Words   |  4 Pageslegal, operational, schedule, and market. Due to Blackberry’s history of challenges in the marketplace, the study focuses on likelihood of risk, magnitude of risk’s impact, and risk avoidance. This analysis is to assess the strengths and weaknesses of this project, determine if it is a viable idea, and present recommendations on if and how this project should proceed. Decision Rights and Project Selection Our organization utilizes a IT governance as collective decision and guidance about IT policiesRead MoreFrench Revolution1740 Words   |  7 Pagesfeudalism by heralding the arrival of democracy.There were many significant themes, which arose due to the impact of thisRevolution, which have been the focus of interest of the early sociologists.These significant themes included the transformation of property, the socialdisorder, caused by the change in the political structure and its impact onthe economic structure. A new class of power holders emerged - thebourgeoisie. THE INDUSTRIAL REVOLUTION The Industrial Revolution began around 1760 A.DRead MoreEssay on Why I Want to Study International Relations628 Words   |  3 PagesDebating since middle school made me concluded that I want to study international relations and I hate debating yet I love story-telling. What I don’t like about debating is not only because we have to be ruthless for the reason all that matter is how we win the motion from the other side without taking concern of other party’s opinion, but also the win-lose situation that debate forced. What I like about story-telling is not only it is fun since all that matter is everybody should put their bestRead MoreThe Assistant Director : The Real Estate Agent, The Owner And The Clinical Research Scientist Essay985 Words   |  4 Pageschange in people’s lives are the best kinds. However, jobs that offer a generous income and qualified, well-rounded coworkers are also important to her. Based on this, her work values line up with altr uism, economic return, associates, variety and intellectual stimulation. Although, she wishes â€Å"the field of early childhood education was valued as important as some of the other fields and feels that it should be compensated as such.† She still finds a sense of fulfillment when she â€Å"watches the childrenRead MorePublic Policy And Public Policies1331 Words   |  6 PagesStudying public policy is important because as a citizen of a democratic country, people have not only the opportunity but also the duty to take part in civic activities. Therefore, it is of paramount importance that the citizenry understands the analytical, practical and ethical capabilities necessary to take part in public matters. All citizens should know that taking part in civic duties is a responsibility that one carries for a lifetime. The government plays a crucial role in global affairs, theRead MoreBattery Nanotechnology Essay3779 Words   |  16 Pagesmodels and analytic techniques, r ecommendation of ISO standards are also discussed. An environmental arrangement is mentioned in order to decrease the excess and for the security of the environment. At last a discussion on the protection of intellectual property is discussed. TECHNOLOGY PLANS Technology plan is expected for an organization. Technology Plan will present the accurate management of resources according to the main concern. Creating something new can be termed as innovation. ThereRead MoreEssay on Shade Of Citizenship: Race, Citizenship In Modern Politics1064 Words   |  5 Pageswhen it comes to the census and its racial undertones. The census can be defined as the scientific method of collecting data as records for the government or state use for the proper control of public properties. However, what completely alters the whole process is its highly comparative analytical stance adopted which inserts in elements of difference. The census is a crucial political instrument for good governance in the proper administration and organization of data collection of the populationRead MoreThe Influence of National Culture on Plagiarism1530 Words   |  6 Pagescreative implementation of thoughts towards analytical problem solving. Education aims at the initiative concept of building individual skills relevant in carrying out different tasks and assignments. This aim is however threatened by the increasing number of academic plagiarism among university students. plagiarism justifies academic dishonesty, disrespect, unfairness and irresponsibility because it breaches other peoples intellectual property rights. It devalue s the integrity of academic qualificationsRead MoreImpact Of Protection Of Designer Products3018 Words   |  13 Pagesdifficult. As one of the studies also suggestsâ€Å" the designers of the small scale businesses in UK and globally do not have the time or the financial resources to take a legal action in case of infringement of their product as a major challenge. (Macdonalad, 2012) (Macdonalad, 2012) † It helps support the author identifying the gap in the research study. There are various crimes involved with e-commerce such as cyber thefts, frauds, defamation infringement of intellectual property rights etc. However, this

Thursday, December 12, 2019

Computer Security Breaches Hack case

Questions: 1.Search the web for news on computer security breaches that occurred during September-December 2015. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions? 2.Research about hack case on the web which happened between 2012 and 2016 (For example, one very popular hack case is JPMorgan chase hack case (2015)) and prepare a report focusing on What was the problem,Who were affected and how and How was the attack carried out? Answers: 1.Computer Security Breach VTech is a company that is based out of china and provides its customers with the electronic toys. It manufactures and produces these products. The company had to experience security breach in November 2015 and in this attack, a lot of customer information was hacked by the security attackers. Description of the Problem VTech had to face a severe breach of its information security in 2015 that led to the unauthorized acquiring of 4.8 million records associated with its customers. The records that were hacked belonged to the information of the parents and the children with their details such as login information, parent names, children names, respective email addresses, account security questions and likewise. However, the hackers failed to get their hands on the credit card and payment information of the users (Carolina, 2015). Mode of Attack There are numerous security attacks that have been created that lead to the risk to the information and data. In case of VTech, attackers acquired the organization records by making use of SQL injection as the attack type. SQL injection is an information security attack that is performed with the aid of malevolent SQL queries and statements. These statements are written in such a manner that they lead to the extraction of information from a particular database on which these are targeted. The attackers used this attack to extract the information of the records of the parents and the children that had their accounts on the database of VTech. There are numerous operations that can be executed on the database with the help of a query language such as SQL. SQL injection attack that could successfully be executed violated the confidentiality and integrity of the information that was present in the database of VTech. There are various reasons that are associated with the successful execution of any of the security attacks. One of the major reasons that is normally observed is the presence of loopholes in the security infrastructure of the organization. Due to the inadequate security measures that were associated with VTech, the attackers could succeed in obtaining the unauthorized entry in to the companys database. Proposed Solutions With the invention of numerous security risks, there are various countermeasures that have also been developed in order to put a check on these risks. The case is the same with SQL injection attacks as well as these can also be detected, prevented and controlled with the use of adequate measures. It is necessary to enhance the basic security of the organization before moving on to the advanced security measures. Some of the basic security measures that could have prevented the attack on VTech include the access control management along with the multi-step authentication. Increased authentication would have led to the verification of the identity of the user at various steps which could have prevented the illegal entry to the database. Dynamic SQL statements also increase the risk of SQL injection attacks and should be avoided to prevent the same. It should be made sure that the queries are often parameterized in nature and there is an increase use of stored procedures (Tajpour, Ibrahim, Masrom, 2011). Some of the SQL injection attacks can only be applied to certain versions and releases. These specific attacks can be prevented with the use of patches and upgrades. Database administrators should therefore ascertain that timely patching is done to avoid the attacks associated with specific versions. Another significant step that should have been taken is the definition of user roles, user privileges and user access. The database of a particular company is accessible to huge number of users. It is not recommended to make a generalized access for all the users. However, user types shall be defined and the access and privileges should be provided as per the type of the user. Many of the security threats and risks will be avoided with this practice including SQL injection attacks. It is also observed that the employees of an organization pass on the information to the other parties which use the information in an incorrect manner which may cause severe adverse impacts. Defining the user roles will also reduce the frequency of the insider attacks. Another major step that may be taken is reducing the attack window and the attack surface to not leave any scope for the security attack to take place (Dehariya, Kumar, Ahirwar, 2016). Firewalls can also be install ed to avoid the entry of the malicious SQL statements in the database. Installation of firewalls is one of the basic security steps that shall be taken by every organization (Kolhe Adhikari, 2015). There are various tools that have been developed by the technocrats to monitor the networks and carry out reviews and audits in an automated manner. These tools record all the activities that take place over the database or a network. The records and the logs can be reviewed by the database administrators and experts to get an idea of the malevolent activities (Zhang, 2011). 2. JPMorgan Chase Hack Case Hack cases are common in the world of technology and there have been numerous such cases in history. JPMorgan case is one such case that had an impact on the bank itself along with a total of eleven other entities comprising other American banks and financial corporations. The case took place in 2014 and went on till 2015 and has been recorded as one of the most severe cases in the past. Definition of the Problem The hack case that took place at JPMorgan happened in 2014 which had an impact on over 83 million records. These records covered 73 million households along with 8 million small-scale businesses. The case took place in 2014 and went on till 2015 and has been recorded as one of the most severe cases in the past. The information that was hacked comprised of the name of the customers, email addresses of the customers, phone numbers of the customers and many other details. The hackers could not succeed in acquiring login details associated with the users (Leyden, 2014). Parties that were affected The hack case that took place at JPMorgan has an impact on the bank along with eleven other U.S. banks and financial organizations. The information that was hacked comprised of the name of the customers, email addresses of the customers, phone numbers of the customers and many other details. Some of the organizations and parties that were affected included Fidelity Investments group, Citigroup, Regions Financial Corporations, HSBC Holdings and many more (Kitten, 2015). These parties had many projects and dealings with JPMorgan and there were various information sharing activities that continued between these parties and JPMorgan. Personal details and information of millions of users was impacted in a negative manner because of the hack case that took place. Mode of Attack Multi-step authentication is a necessary step to make sure that the security of the system is maintained. JPMorgan also attempted to enhance their security framework by incorporating multi-step authentication in their security mechanisms. There were certain errors that were associated with the step as the network engineers failed to complete the process and left an open-ended server. It led to the enhancement of security vulnerabilities and acted as a threat agent for the attack. The attackers took advantage of the security loophole and did not go through the latest authentication system that was installed at the organization. Possible Countermeasures With the invention of numerous security risks, there are various countermeasures that have also been developed in order to put a check on these risks. The case is the same with hack case at JPMorgan as it could also have been detected, prevented and controlled with the use of adequate measures. The primary cause behind the security attack that took place at JPMorgan was the carelessness and operational error made by the networking team of the project. It should have been made mandatory at the organization to include the auditing processes, review sessions and testing activities in order to validate and verify the errors in the project activities. The network server that was left open-ended by the networking team then would have been identified by the review team and the error in the network server would have been rectified in a timely manner. It is extremely important to control the user access and privileges that are associated with a particular system. It is not recommended to make a generalized access for all the users. However, user types shall be defined and the access and privileges should be provided as per the type of the user. Many of the security threats and risks will be avoided with this practice including the one that took place at JPMorgan. Firewalls should have also been installed to avoid the entry of the malicious entities in the system of the organization. Installation of firewalls is one of the basic security steps that shall be taken by every organization (Bella, Bistarelli, 2005). There are various tools that have been developed by the technocrats to monitor the networks and carry out reviews and audits in an automated manner. These tools record all the activities that take place over the database or a network. The records and the logs can be reviewed by the database administrators and experts to get an idea of the malevolent activities. These network monitoring tools along with Intrusion detection and prevention systems should have been used at JPMorgan as they would have created alerts for the system experts and would have provided them with an idea of the deviations the attackers had attempted on the system to acquire information. Security of the system along with the associated components such as front end and back end is extremely important. The information that is present in the system of the organization is critical in nature and its exposure to the unauthorized entities can be extremely negative for the organization. Every organization should therefore make sure that the steps are taken to avoid the security risks by enhancing their security architecture. References Bella, G., Bistarelli, S. (2005). Information Assurance for security protocols. Computers Security, 24(4), 322-333. https://dx.doi.org/10.1016/j.cose.2004.10.004 Carolina,. (2015). Hackers Steal Parents, Kids Data in a Massive Data Breach on Toy Manufacture. HackRead. Retrieved 03 April 2017, from https://www.hackread.com/hackers-steal-toy-store-parents-kids-data/ Dehariya, H., Kumar, P., Ahirwar, M. (2016). A Survey on Detection and Prevention Techniques of SQL Injection Attacks. International Journal Of Computer Applications, 137(5), 9-15. https://dx.doi.org/10.5120/ijca2016908672 Kitten, T. (2015). Charges Announced in JPMorgan Chase Hack. Bankinfosecurity.com. Retrieved 03 April 2017, from https://www.bankinfosecurity.com/chase-hackers-indicted-a-8673 Kolhe, A., Adhikari, P. (2014). Injection, Detection, Prevention of SQL Injection Attacks. International Journal Of Computer Applications, 87(7), 40-43. https://dx.doi.org/10.5120/15224-3739 Leyden, J. (2014). JPMorgan Chase mega-hack was a simple two-factor auth fail. Theregister.co.uk. Retrieved 03 April 2017, from https://www.theregister.co.uk/2014/12/23/jpmorgan_breach_probe_latest/ Tajpour, A., Ibrahim, S., Masrom, M. (2011). SQL Injection Detection and Prevention Techniques. International Journal Of Advancements In Computing Technology, 3(7), 82-91. https://dx.doi.org/10.4156/ijact.vol3.issue7.11 Zhang, X. (2011). Discussion on the Detection and Prevention of SQL Injection. Advanced Materials Research, 287-290, 3047-3050. https://dx.doi.org/10.4028/www.scientific.net/amr.287-290.3047