Thursday, November 28, 2019

Unmet Needs of Generation Y Essay Example

Unmet Needs of Generation Y Essay Introduction Born in the mid-1980s and later, Generation Y employees are in their 20s and are just entering the workforce. With numbers estimated as high as 70 million, Generation Y (also known as the Millennials) is the fastest growing segment of today’s workforce. As companies and firms compete for available talent, employers cannot ignore the needs, desires and attitudes of this vast generation. We have identified five different unmet needs faced by Generation Y after many interviews. They are mainly materialism, the inability to approach supervisors easily, inflexible working hours, presence of a communication barrier between older and younger generation and no sense of belonging. Our interview questions was carefully constructed using the SPICE framework and as a result, have garnered ideal results. After conducting the interviews, we researched the different needs and found solutions. Our next step was to link the solutions to the POEMS framework. Lastly, we have identified the HR functions that can be used in a company to solve the unmet needs. Interview Questions 1. What is your age? (Identity) 2. Are you working? (Social) 3. If yes, describe your job and what attracts you to work there? (Identity) 4. If no, what did you work as previously? And what is your reason for leaving? (Identity) 5. If you could change one aspect of your job, what would it be? E. g Increase pay, more benefits etc. (Emotional and Physical) 6. How did you get the job? (Physical) 7. Does your job allow you enough time with family/friends? (Social) 8. Do you use technology in your workplace? E. g. laptops , softwares, machinery etc. (Physical) 9. Do you feel a sense of belonging in your company? Identity) 10. Do you bond well with your colleagues? (Communication) 11. Are you able to approach your supervisor/manager easily? (Communication) 12. Do you feel stressed when you are working? (Emotional) 13. If yes, do you have anyone to talk to about this in your workplace? (Emotional) 1) Materialism in Gen Y Our first identified unmet need is materialism in Gen Y. Materialism is c ommonly defined as a preoccupation with or stress upon material rather than intellectual or spiritual things. This is a phenomenon that has exploded with the coming of the Gen Y population. We will write a custom essay sample on Unmet Needs of Generation Y specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Unmet Needs of Generation Y specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Unmet Needs of Generation Y specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This is not to say that materialism was never present before Gen Y but has instead increased due to various reasons. One reason why Gen Y is so steeped in materialistic tendencies is due to consumerism. Nowadays, marketing efforts are being aimed at kids to make them more materialistic in order to bring in more sales. Results from various studies suggest marketing efforts aimed at youngsters may indeed be robbing children of their childhood and making kids more materialistic, and it can have long-term negative consequences on shaping values. Another reason why Gen Y is becoming increasingly materialistic is due to a lack of self-esteem. Recent studies have shown a direct link in materialism in Gen Y and a direct correlation to their self-esteem. Between the ages of 12 and 13 children try to compensate for low self-esteem through material goods that they think will make themselves feel better, or that they think will raise their status among their peers. This reason is further compounded by itself, as many problems may arise and often do when young people embrace this culture of materialism. Lacking the means to acquire the much-valued material things, some individuals develop low self-esteem. This is particularly true of those of younger age. Research indicates that there is a direct correlation between low self-esteem and materialism: as self-esteem decreases, materialism increases. Additionally, there are those who, also lacking the means to acquire the desired material belongings, turn to illegal activities to procure the funds to satisfy their unhealthy materialistic tendencies. The unhealthy desire for material possessions and the illicit activities it inspires has landed an exorbitant number of black youth in prisons both in Canada and in America. These possibilities are just two of the potential negative effects of materialism. In order to instill positive values in their children, parents have to be cognizant of the negative influences that pervade our society, especially media influence. When they learn to understand the extent to which the mainstream media bombards the youth with enticements, parents will be better able to help them stave off the constant pressures they face on a daily basis. Recent research also suggests that young people of today are much more materialistic than their counterparts of the past were. All too common, among black youth, there is a palpable materialistic obsession the roots of which anyone can trace back to a popular music video—be it a new designer label or a new blackberry phone. Among many young people, the sense of self-worth is contingent on their possession of the aforementioned material objects. Such is the extent of influence that the media often has on young minds. It is very easy for a young person to become impressed by the constant exposure to the glorification of material belongings. The mainstream media is incessant in its parade of materialistic conceits. Young people are constantly being told that they need to have those designer jeans or that new must-have cell phone model in order to gain the respect of their peers. Whether it is a music video or a reality show, the materialistic culture prevails. It is, then, little wonder that many of them tend to view the world through a materialistic paradigm. To solve this problem, the human resource department identified is the Compensation and Benefits department. First thing Comp has to do is to understand the Gen Y demographic. They have to understand their needs and their wants to be able to manage and retain them. For example, staff in the Comp department can make the benefits and wages more attractive to Gen Y employees specifically. Also, they could appeal to Gen Y employees by giving them perks and benefits such as company cars and discounts at company-sponsored stores. 2) Unable to approach supervisors Another unmet need we have identified is Gen Y’s problem with approaching supervisors. It is known that Generation Y is the youngest group to exist in the workplace environment. Therefore, being underdogs taking roles often at the bottom of the work chain, they often have problems communicating effectively with their superiors. Since they reside at the bottom of the chain, they fear confrontations as they are afraid that they may unintentionally, through one way or another make blunders, which may threaten their immediate future. Some examples of such blunders are over asking, asking poorly, saying the wrong things and breaking the status quo. Over asking is that problem of repeatedly asking the same or similar questions in the workplace. This may cause problems in the future when working together as it may leave a negative impression. When an underling asks a superior the same question repeatedly over a short period of time, the superior may feel flustered and frustrated at the asker, leaving a negative impression of said asker on the answerer. Generation Y, with being at the bottom, feels that leaving such at impression maybe detrimental and hence, fears confrontations in this aspect. Asking poorly is also a cause of concern to this issue. Asking poorly refers to asking questions that the answerer may feel is ‘common sense’. By asking such questions, superiors may feel irritated with the Gen Y worker. They may then even come to resent giving them opportunities. This is a very common among Gen Y as since majority of them are new to the job, they have yet to know the regular customs at the workplace and hence, may not know the ‘common sensual’ course of action and as a result, come across as ignorant and poorly educated rather than inexperienced which they are. With them fearing such an event occurring, the Gen Y workers as a result, fear approaching their supervisors. Another problem of fearing confrontation would be causing misunderstandings at the workplace by saying incorrect or even inappropriate things at the work place. Example of such things can range from making rude or snide remarks unknowingly or providing incorrect input for work related items. At times, as Gen Y, being inexperienced at workplace politics, they may make inappropriate remarks at other people without knowing it. The reason for such is due to the fact that, different years may have different lingo and other people from other generation may feel insulted by what may be a regular passing comment from another colleague. For example, the word ‘gay’ has changed over many generations. Decades ago, the word meant happy, years ago, the word meant to not be in the social norm, whereas, now, it has homosexual meanings in context. So when they break the barrier down to speak, they are afraid of causing such tension. Finally, breaking the status quo is another problem that they may potentially face that also contributes to the fear of confrontation. In office politics, there is a certain order in the hierarchy or a chain of command. This means that there is a certain order in which, information can pass through. For example, with three levels, being the Gen Y lowly employee, his boss and his boss’s boss, the employee must observe the chain of command and is not able to talk to his boss’s boss without first going through his boss. Based on the unmet need of confrontation, the problem should be taken in and solved by the human resource function of welfare and compensation benefit. On the poems structure, this tends to be more on the people side as it is a form of inter-personal interactivity that is unachieved. To help with this problem, human resource needs to firstly, be more observant on the newer and younger employees to ensure that they are able to get along and speak comfortably with fellow employees in the office regardless of age gap. Human resources can also take a more forward approach in organising perhaps bonding activities in which, perhaps the hierarchy is temporarily reversed and they are at the top. Even a buddy system can be introduced where maybe an older and younger worker are paired up and given time to bond to allow easier interaction between the workers from different generations. Better interaction policies can also be given. For example, ideas could perhaps be introduced through an online portal where the new gen y workers can be given a chance to submit ideas without the fear of being criticised. An open door policy can also be implemented where maybe, at a certain time of day, a manager would set aside time to allow workers to speak to him about work or non-work related matters. A portal can also be introduced, this one being in the sense that common work protocols are stated clearly and give the new gen y workers some reference to the procedures that they are required to follow to prevent overstepping certain boundaries. ) Flexible working hours Thirdly, workplaces are more demanding than ever in terms of hours and performance. Thats creating a rising tide of resentment among the Gen Ys flooding into the workforce. Gen Ys know what they want — and its not the all-work-and-no-life dynamic of their Boomer parents. We have watched our parents waste away in drab cubicles and count the days to retir ement, Call me idealistic but isnt work supposed to be part of life? Do I have to accept the idea that real life begins when I punch out at 8 p. . each day? Gen Ys want a rewards remix, according to Bookend Generations, a study from the Center for Work-Life Policy. Instead of the traditional plums of prestigious title, powerful position, and concomitant compensation, they value challenging and diverse job opportunities, stimulating colleagues, a well-designed communal workspace, and flexible work options, with 89% of Ys saying flexible work options are important consideration in choosing an employer. One successful flextime approach is Citis Work Strategies. This program started as a model for tomorrows green, cost-effective, and employee-friendly workplace but soon turned beneficial to many interested in flexible work arrangements. Realizing that in some instances Citi was wasting resources on office space that no one was using, the division suggested using office-sharing, hoteling at satellite offices, and work-from-home arrangements to reduce the organizations real estate portfolio while offering a new type of workspace arrangement. The program has since evolved to encompass part-time schedules, remote work, flexible start-and-stop times, compressed schedules, and job sharing. Employees apply through a formal process that requires them to fill out a work plan describing how they will do their job in its new flexible format, the potential impact on clients and team members, and the technology they need — such as webcams, instant messaging, and teleconferencing — to support their new approach. At the same time, managers are training to lead and supervise remote teams. Citis annual employee surveys show that the flex-work participants are consistently more engaged, more likely to stay, and more likely to recommend Citi as a great place to work. For these new 20-something workers, the line between work and home doesnt really exist. They just want to spend their time in meaningful and useful ways, no matter where they are. Generation Y is forcing companies to think more creatively about work-life balance. The employers who do are winning in the war for young talent. Research reveals that job hopping is not an end in itself but something young workers do when they see no other choiceOld assumptions about what employees value in the workplace dont always apply with Gen Y. Friendship is such a strong motivator for them that Gen Y workers will choose a job just to be with their friends. It feels normal for Gen Y employees to check in by BlackBerry all weekend as long as they have flexibility during the week. Today more than half of Suns employees work remotely from anywhere but the office. Understanding Generation Y is important not just for employers. Older workersthat is, anyone over 30need to know how to adapt to the values and demands of their newest colleagues. Here is a summary of the key findings: Gen Y represents approximately 20% of the economically active population of Singapore. Gen Ys in Singapore are confident, restless, tech-savvy and prefer an unconventional approach. Gen Y’s biggest fear is losing their family while their bosses and colleagues feel Gen Y’s biggest fear is to lose their job. Statistics show that 27% of Gen Y respondents have yet to identify their profession of choice, 57% of Gen Y respondents earn less than SGD 1500 and spend less than SGD 500, tobacco/alcohol, mobile phone and food are listed as top three items that Gen Y prefer to spend the most and that 45% of Gen Y respondents would prefer a Gen X supervisor. Also, Gen Y’s are mostly intrinsically motivated and Gen Ys score low in the General Role Stress index. Parents, non-Gen Y colleagues and bosses have conflicting perceptions about Gen Y than Gen Y themselves, which could be a threat! In summary, Singapore Gen Ys or the millennials make up 22% of our resident population, working out to 833, 300, with the female gender, topping the male cohort by about 20,000. They are wired, connected to virtual social sites, salivate for information, empowered, able to multi task, independent and the lists goes on and on. These are functional behaviours that will excite any HR recruiter. They too, carry a â€Å"dark side†. They can be easily bored, and demand instant gratification. ) No sense of belonging Next, a good manager must be fully identified with their sense of belonging in the company, institution, which provides service, as well as all its human resource integration, by achieving this, empathy, trust, achievement is required. However, there are many managers who have no sense of belonging with the company where they work and the organ ization is seriously affected, since it has not been built that trust is expected to manifest in development of the company, its development, where it is envisioned that all staff are fully committed to the organization. It is written that there is a degree of willingness that everyone has to follow the logic of coexistence or common sense, the more secure you feel that person within a group, the higher your sense of community and so Therefore the person will be more willing to follow rules. The sense of belonging is not only the assurance that the person gets when they feel that occupies a place within a group. In some cases, to feel a sense of belonging as Patricia Oliveira comment, this is taken into account, that human societies are always ongoing relationship with other neighbouring or rival, or integrated into larger ones. Also in most of them can set different smaller factions that are integrated within it with different interests subordinated to the common goal while in some associations, having achieved its initial objective is necessary to establish new goals and objectives that give meaning to their existence. The natural tendency towards disorder that produces human associations for retention must be a certain degree of sense of belonging to the same except for those who are not members. The same occurs in companies where there should be well-defined group cohesion, each member who integrates this fully identified with a sense of belonging. Oliveira notes that the pride of belonging to an association, a club, a business, a group of friends or family are what make these are not diluted. Another feature that ensures the health of a human organization is the existence of good communication, fast and fluid within it. A crucial piece in any society is the leader. In many cases this person represents the best and the worst of the organization you represent. Where you lead, manager, in our case, must show their membership, commitment, identification with the group. The leader holds the key to sense of belonging follow by members. Of course, to do so, this will be assessed all aspects that have generated confidence, security, respect, union commitment, responsibility. Aspects, which said the group and they have respected and are part of it, reaffirming their sense of belonging and permanence. Furthermore, Ana Tania Vargas comment, the strength of the sense of belonging in many cases remains, as a latent emotional, related to those features of collective identity that still maintain the leader sense for the subject. Therefore, the sense of belonging is a primary element of belonging and personal identification, collective and productivity in a company, group, friends, etc. Is a concrete expression of commitment to specific traits and characteristics of the culture that synthesize profiles of cultural identity in particular ways, for what is important in strategies for development promotive role. It should be added that the study of the processes of identity and sense of belonging, it is necessary to consider the many possibilities of organizing and sorting generated in these processes, that form intra-and out group practices, clearly sets and define the possibilities of collective action and the complexity of delimitation and structuring of the universe of their own cultural elements, ensuring for themselves the existence of the group, giving passes to the innovation process, appropriation, alienation to suppression of the brand values from out group. In the case of the Venezuelan reality, which manifests a number of external factors, including the impact of the state through its policies, regulations, laws, has influenced a determinant in the company and this has been the reality test ownership of management to the organization where they work, considering the reaction of many owners, managers, who have given way to insecurity, fear, no sense of belonging with actions that have undermined confidence and this has affected the way membership, both by management, as all members of the company. In other terms, this situation has reduced the many; sense of belonging that must be rescued all depends as has been consolidating the organizational culture at the time. DFID Project Colombia listed that the sense of belonging or membership is the personal satisfaction of each individual in the organization, its recognition as a human being, respect for dignity, fair compensation, recognition, development opportunities , teamwork and fair assessment, not only are components of organizational climate, it represents permanent elements of organizational culture. In order to provide or create a sense of belonging, companies must offer training opportunities, encourage creativity within job scope and provide both local and overseas exposure. To retain staff, all SYSTEMS Save Yourself Time, Effort, Money, and Stress must be in place. And there must be constant innovation so a company is assured of scalability and growth. Attainable short, medium and long-term targets should be set so there is no doubt as to direction. And there must always be a target to strive for. CONTINUOUS learning and skills upgrading must be part of a companys policy to retain employees. Every persons demands and expectations are different and change over time. SMEs have an advantage that some MNCs cannot offer a challenge and work experience that can motivate. Besides career advancement, staff welfare and the working environment must be priorities. SMEs should also try to offer a good lifestyle/work-life balance to retain talent on a long-term basis. For example, Grand Teams strategy to keep talent includes a shareholding scheme. To make employees feel they are working for their own future and career development, we let them own a portion of the company. 5) Communication barrier Lastly, the presence of a communication barrier between generations. In order to be an effective communicator we not only need to know how to adapt to different personality types, but we also need to understand the different generational issues that can create conflict in the workplace. The dynamics we experience today are unique to our era: younger generations have made a dramatic shift in work values leading to harsh judgments and criticisms within the work environment. Ultimately, this conflict of generational values hinders performance of individuals and weakens overall team success. We need to begin first by seeking to understand. If we can begin to understand what is important to each generation, we can then learn to see things in a wider perspective and begin to build bridges of communication between the gaps. With better understanding comes better communication, which leads to heightened tolerance and ultimately to successful collaboration between the generations. There are four groups in all. Firstly, the Veteran age group is generally comprised of those who are 55 and older. This generation is post-war and their nature is to be loyal to a single employer for a lifetime and in turn, they expect the same degree of loyalty back. Because this generation did not grow up with material wealth, in most cases, they tend to be frugal and do not understand the need to use debt to build business or the need for anyone to have debt at all. In the workplace, they show up on time and they take orders well they do as they are told because they respect their boss, as well as their elders. Secondly, the Baby Boomer age group is comprised of generally the ages 35 to 54 and is the children of the Veterans. This group grew up with little in the way of toys or nice clothes and vowed to give their children everything they couldnt have as children. In most cases, baby boomers grew up earning an allowance and understood the principle of working hard to earn a living. In general, they left home at the age of 18 and survival was a real issue. If a baby boomer was told to do something at work or else be fired he or she would do it because they were afraid of not being able to pay the bills. In the workplace they have a mentality of work, work, work, and then you ie. Lastly, Generation Y is divided into two groups. The first comprises of people 22 and younger. They are likely called generation Y because that is the question they ask most, Why? These are also the children of baby boomers and so far, are one of the most creative generations we have seen in a long time. Generation Y want to work where they are allowed creative expression, a flexible approach and control over their own hours. In the workplace, they show little loyalty because they already know they will have about 10 careers in their lifetime. They get bored very quickly and need more incentive to work than just a paycheck. Another group of Generation Y comprises of the ages 23 to 34 and are also the children of the baby boomers. A majority of this group grew up with both parents working and saw their baby boomer parents get laid off or witnessed them being miserable in their jobs. This helped shape their current value system, which is, I am going to have a life first and work will come second. This group is pushing for flex hours, 4-day workweeks, paid sabbaticals for education and paid parental leave for both fathers and mothers. In the workplace, you cannot threaten them to do something or they will get fired because they dont care. Most of them live at home until the age of 26 and do not experience the same survival issues as those of their baby boomer parents. Their main goal is to have fun at work, make a buck, and have a life. So why should employers care if employees in the different generations respect and understand each other? In a word: Retention. The costs associated with employee turnover are enormous (e. g. training, loss of employee morale, advertising for applicants, interviewing, productivity, etc. . Gravett and Throckmorton estimate that costs to replace an employee may total up to 150% of the employees annual salary, depending on skill level. In addition, the knowledge and talent that will be lost due to the retirement of the older generations without appropriate transition among generations could be financially devastating to companies. The employees coming into the labor force (Generation Y) are powerful in numbers and will be needed to make up for the shortage due to the retirement of the Radio Babies and the Baby Boomers. If employers dont help breakdown communication barriers now, they will find themselves short of talented workers when they are really needed. So what are the obstacles to bringing employees from the older generations together with employees from the younger generations for knowledge sharing? Competing personal desires that differ by generation, coupled with a lack of trust are difficult barriers to overcome to allow for knowledge sharing to take place. For example, Radio Babies (born 1930-1945) are ready for retirement and need to be provided an incentive to stay. Whereas, Generation Y (a very large generation) is not afraid of change and in fact, enjoy variety. A lack of fear regarding change and an enjoyment of variety, are important personal desires that employers must recognize. Identifying the driving personal wants of the generations is the first step to help foster knowledge sharing. Once the personal desires of the different generations are recognized and addressed accordingly (e. g. flexible work schedules for individuals ready to retire, creating a rotational job change for young professionals, etc. ), the focus should shift to identifying communication barriers. Individuals from the younger generations often feel that older generations do not respect or trust their ideas and therefore, leave the younger generation workers feeling undervalued. The older generation frequently perceives that the younger generation lack work ethic, and respect for authority and institutional practices. These perceptions (whether true or not) will lead to an inability to communicate. It is essential for an employer to identify the cause of the mistrust (which is almost always the root of any lack of communication) and work to build trust. We feel that this unmet need falls under the jurisdiction of Training and Development. This HR function will allow the workers to undergo training through either outside or inside sources and this will develop Gen Y and the older generation’s communication skills. Next, using the POEMS framework, we also have come out with several solutions to the respective letters. Under People, we feel that both generations should try to overcome this barrier together. As the saying goes, ‘it takes two hands to clap’. Not only Gen Y but also the older generations should try and overcome this barrier. With both sides working together, it will be much easier overcoming this barrier. Moving on, for Environment, having a conducive environment will make the people be more willing to put in more effort into trying to overcome this barrier. It has been proven that a more joyous and happy environment will lead to people being more willing to work together in harmony to a common goal. For Media, we can use it to increase awareness of this problem and as a result, will help solve this problem. How does this work? By raising awareness, people will be more inclined to try and solve the problem if it is at hand or do preventive measures to make sure that it does not occur in the future. Lastly, companies may send some employees to attend classes outside to improve communication skills as part of Services. Reflections Setting up a time slot for the interview was not an easy task. With the Gen Y interviewees busy work schedule, it was a hassle to even get a time slot with them. When it came down to doing the actual interview, the process was much more difficult to carry out. The interviewees, despite earlier agreements, showed to be quite reluctant in giving the interview. During the assessment, the interviewees showed many signs of disinterest unconsciously, examples include yawning, stretching and being disoriented. The interviewee also answered in short brief answers, giving answer that is very short, and a sign of impatience. `they were generally helpful, clarifying when needed but only when asked to. Overall, the experience was relatively fresh and enjoyable.

Monday, November 25, 2019

The History of Internet and Internet Security

The History of Internet and Internet Security Introduction The internet has turn out to be part of our lives that is easy to forget the inventors who had a vision of what worldwide networking could grow to be and toiled to make it ensue. According to a research done, the internet, which started as a minuscule and restricted community, is now diverse and accessible from all parts of the universe.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More As a result, the issue of internet security is a serious matter because a local problem can be a worldwide incident within a second. Therefore, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. The history of internet According to Vacca (2009), the development of computers at approximately 1950 was the genesis of the histor y of the internet. At around 1970, the internet began as ARPANET and it was a project funded by Advanced Research Project Agency (ARPA). The broad objective of the project was creation of a network that will not cease to function even if one of its components failed. Therefore, the creation of the internet was in such a way that it had a capacity to resist attacks like viruses, intrusions and incidents. Additionally, the main aim of the internet was openness, flexibility, and not security because people needed to share information hence there were no restrictions. The ARPANET led to development of internetworking which involved amalgamation of different networks to form a system (Speed, Juanita and Korper, 2010). As more sites linked with ARPANET, the significance of the internet increased. For instance, ARPANET was initially a government and university site but at around 1970 it became public and many people could access and use it for research. As a result, the incidence of securi ty violations increased but people did not consider it as an attack because they trusted each other. In the year, 1982 access to ARPANET expanded with the development of Computer Science Network (CSNET). Besides, at around 1987, there was emergence of commercial Internet Service Providers (ISPs). Therefore, Speed and Juanita (2009) state that the ARPANET came to a halt at around 1994 due to commercialization of the internet. The commercialization permitted people to carry out commercial traffics on the internet.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since 1994, the internet has had a significant impact on the people’s lifestyle (Shoniregun, 2010). For instance, people use the internet to send text messages, make phone calls, shop and watch movies. In a recent research, Rhee (2010) states that people use the internet to find information. Additionally, most of the researche rs and educationists belong to an online discussion forum where they share information with people from different parts of the world. Therefore, the internet keeps on developing because of the relevant information that it contain. In a survey done, Poole (2008) states that in 1994, the internet carried approximately one percent of information flowing in a two-way telecommunication and by the year 2000 the percentage had risen to ninety-eight. This led to an increase in internet insecurity. For example, Cliff Stoll identified an internet incident and it motivated him to publish a book that created awareness on the existence of destructive use of the internet. The history of internet security Garfinkel, Spafford and Shwartz (2008) state that a virus called vienna was detected in 1987. After the detection, a man named Ralph Burger dissembled it and published the result in a book. The published information led to creation of many viruses. In 1988, many of the research centers internet c onnections in the United States were under attacks. For instance, Ferguson, (2009) states that a virus which was intended to infect computers in order to determine the number of connections ended up exploiting the UNIX vulnerability. Therefore, the virus spread swiftly infecting many computers thus making them unusable. In a research done in 1988, Einar (2008) explain that the WANK worm attacked the VMS system of the internet leading to exploitation of vulnerabilities of the programs that assist in sending and receiving of mails. Additionally, in 1994, an intrusion tool that interfered with the user name and password came out. This interrupted the security of data saved in the internet. For example, a person could log into any internet system and tamper with information.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More Additionally, in 1995, Citi bank detected a virus that made them loose four hundred thousand dollars to a man called Levin (Cheswick and Bellovin, 2009). Since then, people have detected many viruses that cause great harm to computers and organizations. They include, amoeba, boza and strange view viruses. In 2007, information technology specialists identified a storm worm that spread as an email attachment. Once a person opens a received email, he or she became part of the infected computers and spread the infection to others. As a result, many computers lost their functions. Therefore, computers are susceptible to attacks and people need to have information about internet security. The principles of information protection The three principles of information protection are confidentiality, veracity as well as accessibility. Cheswick and Bellovin (2009) state that information loose confidentiality when unauthorized person read and copy it. Some information like medical records and research data are vital and th ey require privacy. Therefore, it is the obligation of the organizations to ensure that client information is confidential. In the event that someone alters information in a way that is not supposed to be, there is loss of veracity. This is common in networks that are not secure. For instance, Einar (2008) states that integrity is lost when there is intentional or accidental interference with information. Since veracity is imperative for financial as well as critical safety data, people should ensure that they institute information protective measures. Lastly, loss of accessibility occurs when authorized people cannot access information (Ferguson, 2009). This lead to a situation called denial of service because people cannot get relevant information that facilitates the running of the organizations or businesses. For that reason, many organizations authenticate and authorize their information so that it is available to those who require. Authentication is a recognition process that allows specific people to use the internet. It involves the use of password, fingerprints or smart cards. On the contrary, authorization is a procedure that helps to establish if a system can execute a certain task. As a result, authentication and authorization allow authorized people to perform certain computer activities hence reducing the prevalence of cyber attacks. The significance of internet security According to a recent research, it is easy for unauthorized people to access information if the network environment is insecure (Garfinkel, Spafford and Shwartz, 2008). Additionally, it is very hard to determine the attackers. In a situation where the internet users do not have important data stored in the system, the attacked computer become useless.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Besides, it act as a source of infection transmitting viruses to other computers while permitting unauthorized people to access the organization information. The free access leads to loss of integrity and confidentiality of information because it becomes easy for people to alter the organization data. Moreover, Poole (2008) states that network attacks put the computer system at a compromise. For example, information concerning the computer hardware, network connections, software, configuration and authentication are valuable for the attackers. This is because it enables them to access the files as well as the programs hence decreasing the security of the system. Additionally, attackers who access the password of an organization network always alter the important files leading to loss of integrity and availability. Furthermore, all computers with internet connections are vulnerable to attacks like viruses, intrusions and incidents (Rhee, 2010). The organizations that are mostly affec ted include banks, insurance, universities, brokerage houses, hospitals and the government. Besides, the attack interferes with the running of an organization in a number of ways. To begin with, the organization loses a lot of time trying to repair the damage as well as recovering from the effects of the lost data. This lead to decrease in production, increase in expenditure and a loss of market opportunity as the organization can no longer fit in the competitive business environment. Therefore, computer users need to understand internet security incidents. Internet security incidents Incidents are activities related to the internet that have negative implication on the security. This is because they violate the internet security policies. Shoniregun (2010) states that internet security incidents vary in shapes and sizes and they come from any site although some originate from a specific system. Additionally, they spread fast resulting to massive destruction of systems within a shor t spell of time. Furthermore, it is hard to determine the source of the internet security incident because anyone can cause an intrusion accidentally or intentionally. For instance, Speed and Juanita (2009) explain that a student who has created software, a person with an evil intention or someone who want to search for information about a particular company can cause an intrusion. Additionally, an incident can also come from a fired employee or a consultant who accessed the information of an organization. Most of the times the intruder may want to seek political attention, logical challenge, entertainment as well as fiscal gain. According to a research done in various parts of the world, it is possible to classify the different types of incidents into several kinds. Speed, Juanita and Korper (2010) explain that probe is a type of incident that usually occurs when one tries to access a system of find information about it. For instance, probing is trying to log into an account that i s not functioning. Although probing may be due to inquisitiveness or misunderstanding, it can cause a vital security event. On the other hand, a scan is a type of probing that one accomplishes using a programmed tool (Vacca, 2009). A scan can be due to an error but most of the time it is an attack of a vulnerable system by an intruder. Additionally, account compromise is a type of incident where unauthorized person gain access in to someone else information. This can lead to data loss or theft of computer services. On the contrary, Vacca (2009) states that root compromise is a type of incident that is similar to account compromise. The only difference is that in root compromise the intruder is able to change the look of the system as well as hide the track of their intrusion. As a result, it becomes hard for the owner to trace the source of the intrusion. Moreover, a root compromise can lead to development of a packet sniffer, which is a program that enable an intruder to access dat a as it move over the internet. For instance, a packet sniffer can capture the user name or password of a person as information move around the internet connectivity. Speed, Juanita and Korper (2010) state that Denial of Service (DoS) attack is a kind of incident in which the intruder try to make the internet functions unavailable to the intended customers. The intruder achieves this incident by disrupting the network or manipulating the data. Furthermore, other types of incidents include trust exploitation, malicious code and attacks of the internet infrastructures. The development of the internet security incidents As technology continues to advance, internet intruders gain more information about attacks resulting to an increase in the number of incidents (Shoniregun, 2010). For example instead of attacking a vulnerable system, they examine the source of the code to determine the weaknesses found on computer programs. The source can be unprotected internet programs. Once in posses sion of the code, the intruders use it to determine the weaknesses of the programs. As a result, they can target the network infrastructures like the routers and the firewalls and conceal their functions. For example, an intruder can log into a system and the site owner does not detect due to lack of reflection of his activities on the system logs. This is because they use Trojan horses to mask their activities from the network owner. As a result, no one can trace the cause of the altered information. In a survey done, Rhee (2010) states that, intruders keep on identifying new and complex ways of attacking the internet as they become more stylish. For instance, intruders have a technique of determining a new connection to the internet thus making it susceptible to cyber attacks. Additionally, they use intrusions like packet sniffer to capture all information circulating in the internet thus confidentiality and integrity of data is lost. According to the survey, the percentage of the attack keeps on rising as the years go by. Besides, in 1996 approximately thirty three percent of the computers had a root compromise attack. This shows that intruders keep on attacking the internet because they have diverse knowledge about it. Additionally, any person regardless of his or her knowledge on computer system and the internet can use the software to accomplish the attack (Speed and Juanita, 2009). This means that any person with a burning desire can attack a system even if he or she does not possess technical skills. It is unfortunate that the intruders use the systems used to assess the vulnerability of a program to attack a system. As a result, the intruders can use minimum effort and time to identify weaknesses, alter information or attack a system. Therefore, many companies have developed software packages that assist in exploitation of vulnerabilities. The package include network scanners, tools for cracking passwords, modifying configured files, reporting check s ums, concealing activities and amending the logs into systems. The vulnerabilities of the internet to attacks Poole (2008) states that internet is vulnerable to attacks because the designers did not consider security. Hence, it is difficult to defend the network. Moreover, the extensive use of the internet for research and communication complicate the protective measures. For example, an attacker needs not to be present at a particular area for him or her to accomplish his or her mission. This means that one can compromise the integrity, confidentiality and availability of information from any part of the world and within the shortest time possible. Many people place a lot of trust in the internet without being aware of the risk. This is because they do not know what can happen to their information as well as their systems. Besides, they have a strong believe that they have sufficient protective measures. As the technology keep on changing, attackers also develop new ways of attacki ng the internet (Garfinkel, Spafford and Shwartz, 2008). As a result, it is vanity to believe that protective measures are always effective. Besides, the achievement of confidentiality as well as integrity is difficult because an internet may have a security compromise whose origin is a site that the organization has no control over. For example, a packet sniffer may be in a specific country but the attacker can access information found in different parts of the world. The fast growth as well as widespread internet use contributes to the vulnerability of the internet to attacks. This is because many people use complex services yet they do not safely design, configure, or maintain them (Ferguson, 2009). For example, as people hurry to procure new products through the internet, the system designers do not make sure that the network is free from vulnerabilities. Hence, intruders gain quick access into the system and interfere with the procurement and selling processes. Lastly, the grow th of the internet has led to an increase in demand of information technology specialists and engineers. Due to shortage of these people, inexperienced people address the maters of internet security resulting to an increase of vulnerability to attacks. Types of internet vulnerabilities Einar (2008) states that a fault in the computer software or the design of the protocol renderers a system vulnerable. Protocols are procedures that facilitate communication between computers. In the event that a fault exists, the computer is vulnerable to intrusion. For instance, intrudes usually target the Network File System because it lacks authentication. Additionally, designers usually leave out security component during the development of software. Therefore, the integration of security into the software takes place later after its procurement. Since the added security was not part of the initial software, it interferes with its function leading to an increase in vulnerability. Moreover, a faul t in the implementation of protocol as well as the software increases the vulnerability of the computer system (Cheswick and Bellovin, 2009). For example, the implementation of the protocol for sending messages may be in such a way that allows attackers to alter the internet and permit the system to perform unintended tasks. This attack leads to exploitation of the system as well as the software. Besides, Einar (2008) states that any fault in network configurations increases vulnerability of the computer system. For instance, a network configuration may require that people separate password from the rest of the system. In case the separation does not take place; an attacker can access authentication information and intrude the computer. The improvement of internet security Two ways are imperative in improving the security of the internet and according to Ferguson (2009); they deal with policies and procedures as well as the technology. To begin with, procedures involve the measures that people should take to prevent an attack. On the other hand, policies help in the decision making process. For example, it helps people to determine the type of defense program to use as well as the internet configuration process. Therefore, policy entails the description of a secure information environment and guidelines for reacting to an internet threat. On the other hand, security technology assists people to secure their systems as well as information from the attackers. Security technology focuses on different areas but the most common are operational and cryptography (Garfinkel, Spafford and Shwartz, 2008). Operational technology ensures that the available data is secure. On the other hand, cryptography facilitates privacy, integrity and originality of information. Cryptography is a system that prevents attackers from using the captured information (Poole, 2008). This is because attackers can modify the information of an organization and cause havoc. Therefore, encryption and decryption processes are imperative in enhancing the privacy, integrity and originality of information. For instance, a sender can encrypt a message with a password that the receiver knows. The receiver will then use a similar password to decrypt the message. This process ensures that there is maintenance of confidentiality of the message because without the corresponding decryption password, one cannot read it. Operational technology involves the use of passwords, firewalls and tools for monitoring and performing security analysis (Rhee, 2010). To begin with, the use of password prevents unauthorized people from gaining access into the internet. Secondly, firewalls ensure that people who do not attain the security criteria of an organization do not access the network. Thirdly, monitoring tools facilitate continuous monitoring and evaluation of the internet to ensure that people are confident about the security. For example, the monitoring tool can destroy viruses and malicious programs that can create harm to the computer. Finally, tools for analyzing security are significant in determining the vulnerabilities of the systems. The way forward In order to improve the internet security, research is of great importance because it will ensure availability, authenticity as well as integrity of information. As a result research need to be done about the internet protocol, detection of intrusion, engineering of software, computer system survival, web programs and computing paradigms (Vacca, 2009). This research will assist in detection of the current internet security problems and recommend the way forward. To begin with, Speed, Juanita and Korper (2010) state that there is little change in the internet protocol, therefore, people need to address the weaknesses of the computer in order to develop sophisticated procedures. The weaknesses include, lack of confidentiality, authenticity and integrity. Therefore, designers need to develop protocols that facilitate pr otection of information from unauthorized people. An example of such protocol is the use of cryptography to prevent intruders from accessing information. Additionally, research about intrusion detection is imperative because it will help people to know when the internet systems are under attack (Speed and Juanita, 2009). Therefore, researches need to focus on extensive analysis of the detection of anomaly as well as recognition of pattern. The detection of anomaly involves recognition of the usual behavior of the internet followed by determination of the abnormal characteristics. This is achieved through collection of data for a long period of time and it assist in the development of an intrusion detection device. On the other hand, recognition of pattern entail determination of network activity that is similar to an intrusion attack. Although this method is useful for the detection of future intrusions, it does not apply to new attacks. Therefore, information technology specialists require developing detection tools that can function at present and in future. This mean that extensive research on intrusion detection processes is imperative. In a recent research, Shoniregun (2010) explains that many designers develop software systems that lack security measures. In the event of integrating security measures to the software, weaknesses develop and the system becomes vulnerable to attacks. This is because breaching of systems becomes simple despite the efforts of rendering them invulnerable. Therefore, the concept of internet security should be present during the software development process. Moreover, computer system survival is the ability of a machine to function during an attack (Rhee, 2010). This mean that computer designers need to develop machines that are reliable. Therefore, researchers need to undertake research about software engineering. The research should involve testing dependability as well as fault tolerance of the machine. This will assist in th e detection of weaknesses of the current machines and development of sophisticated computers that withstand intrusions. As a result, computers will be in a position of detecting threats while still performing the normal functions. This mean that people will not suffer from the consequences of lost data. Additionally, Poole (2008) states that downloading information from the internet put ones computer at risk of an attack. This is because most of the internet programs do not have security measures. Furthermore, attackers usually target internet programs like entertainment and tamper them. When one downloads it to his or her computer, the machine gets an attack and stops its normal function. In order to prevent this problem, web designers need to develop programs with security functions. This will ensure that the downloaded information is safe for use. For instance, some internet programs like java have security measures. Therefore, internet users need to have knowledge on secure inte rnet programs. Conclusion In conclusion, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. This is because knowledge about the concept of internet security as well as the different types of intrusions is imperative for the development of a sophisticated protective measure. Therefore, information technology specialists should strive to understand the history of internet and internet security as it would help them curb the current problem of insecurity. References Cheswick, R., Bellovin, D. (2009). Firewalls and Internet Security: Repelling the Wily Hacker. New York: Springer. Einar, E. (2008). Internet Security: Hacking, Counterhacking and Society. London: Jones and Barlett Learning. Ferguson, R. (2009). Internet. Oxford: Oxford Publisher. Garfinkel, S., Spafford, G., Schwartz, A. (2008). Practical UNIX and Internet Security. USA: Oreilly and Associate s Inc. Poole, H. (2008). The Internet: A Historical Encyclopedia. London: Academic Press. Rhee, M. (2010). Internet Security: Crytographic Principles, Algorithms and Protocols. New Jersey: John Willey and Sons. Shoniregun, C. (2010). Synchronising Internet Protocol Security. New York: Springer. Speed, T., Juanita, E. (2009). Internet Security: A Jumpstart for Systems Adminstrators and IT Managers. New York: Digital Press. Speed, T., Juanita, E., Korper, S. (2010). The Personal Internet Security Guidebook: Keeping Hackers and Crackers Out. New York: Digital Press. Vacca, J. (2009). Practical Internet Security. New York: Springer.

Thursday, November 21, 2019

Technology and Innovation management Essay Example | Topics and Well Written Essays - 500 words

Technology and Innovation management - Essay Example The best example for the creation and disappearance of industries due to the emergence of new technologies is manifestation of the many technological changes in the music industry. The topic also defines strategic management as an ongoing process upon which an organization aligns itself to meeting the challenges brought out by the changing environment. I have learnt that this part of the topic is much related to IT networking administrator, my place of work. As an IT networking administrator, I see the dynamic nature of technology and innovation as something that will require me to constantly keep in touch with it. Consistent with the tenets of strategic management, as an IT networking administrator must implement policies that will lead to meeting the objectives of the group. Part II of the topic is concerned with how firms create new technology, processes or products to meet their internal objectives. The topic asserts that though process innovation is difficult to implement, firms should strive to develop or make improvements in their systems and process to make it a reality. Further, the topic points out that leadership, engagement, and extension are the main elements necessary for effective implementation of an innovation. As noted by Ashton, Metzler & Associates (n.d) an IT networking administrator need to be in a position that is up to date with the current innovation. As an IT networking administrator, I see myself as a leader who needs to integrate leadership qualities, engagement and extension into my day-to-day operations for my career to be successful. This part of the topic asserts that planning process is normally affected by the external method used by a given business. In addition, the topic points out that for proper implementation of an innovation, a firm requires to address the four primary elements, which include execution, leadership, integration and

Wednesday, November 20, 2019

Things about me that might surprise people Essay

Things about me that might surprise people - Essay Example Going out with my friends is indeed a pleasure for me so that I try my best to join them in every activity they invite me in. I love shopping with my friends, going to the mall, checking the latest fashion there is in store for us. I also love to watch movies with them which we practically do almost every time we meet. This gives us much time to know each other more as we talk about our favorite movies, actors and other things we enjoy. Spending much time with my friends allowed me to discover that we have so much in common, our likes and dislikes as well as people we would like to meet. People usually see me as outgoing and indefatigable because of this so, I guess they would be surprised to know that I am the extreme opposite of what they see in me. I usually easily get tired so that I sleep a lot to get my energy back. Whenever I get the chance to take a little rest, even a ten minute nap would be much appreciated and often times welcomed. I believe that people are a treasure that I need to keep so I consider myself sentimental in many ways. I value time spent with friends, I keep their gifts in a rather special place which I call my treasure box. In a world where friends come and go, life is fast-paced and yesterday usually seems to be a thing to be forgotten once you are in a day called today, I guess people will be surprised to find a person like me, still exists. I am basically a simple person whose sentiments are more on things that are considered back numbered.

Monday, November 18, 2019

Privacy Laws related to Information Technology use Research Paper

Privacy Laws related to Information Technology use - Research Paper Example In this regard, it is arguable that the privacy of individual data depends on the ability of organizations to employ security measures for the protection of individual information and private data (Kerr, 2004). The various online companies and websites such as Facebook, Google, LimkedIn, Yahoo and Skype are mandated by the law to protect the privacy of individuals. Regardless of the provisions of the law, it is notable that many online organizations and companies have disclosed private information to third parties such as advertisers who use it without the consent of the holders of the information. Sensitive information such as financial records, bank and credit card details are also protected by the legal framework. This is due to the need for the security of personal data and the consequent prevention of possible fraud (Gillmor, 1998). The modern computing and transactional environments are characterized by online shopping and banking. This means that the users of the online bankin g services are predisposed to the risk of disclosure of their private information to organizations (Messmer, 2001). Additionally, digital records of employees within various organization is at a risk f unauthorized access and use. ... that organizations and individuals are protected from unauthorized use of private information by internal or external intruders to information systems (Miller and Tucker, 2007). The law also protects individual information from misuse by government agencies and the media (Sullivan, 2005). According to the fourth amendment, individual data and information must be kept private and free from unauthorized access and use (Lock, Conger and Oz, 1998). This illustrates the role of the law in ensuring that organizations keep the information on their employees and clients as private as necessary (OConnor and Matthews, 2011). Infringement of the privacy of individual information is thus a legal felony (Thibodeau, 2001). Sometimes governing authorities such as the police perform thorough surveillance of a suspect’s private information and activities. Regardless of the justification that the governing authorities give for the infringement of individual privacy, such actions are legally wro ng (Lock, Conger and Oz, 1998). The emergency of creative, innovative and up to date technological tools represents the challenge which many individuals and organizations face in trying to achieve adherence to information privacy laws. Nonetheless, the application of information systems within organizations and institutions is attributed to the increased challenge of securing private information (Canoni, 2004). However, organizations have laid security policies which are geared at promoting the enforcement of legal framework on the privacy of private information (Bernstein, 2007). Information security policies play a significant role in defining the procedure of access, retrieval, modification and use of private information with a view of ensuring preservation of individual rights to privacy

Friday, November 15, 2019

Vegetarian vs Meat Eater Comparison Contract

Vegetarian vs Meat Eater Comparison Contract Diet plays an important role for our body health. Choosing the right, healthy and balance in diet is very important for everyone. One way to stay healthy is by adopting a vegetarian diet. A vegan diet is a plant-based diet that includes only natural foods and does not include meat at all. It can also be considered as a cruelty-free act to the nature because by switching and adopting a vegetarian diet, human societies will be able to alleviate the needless suffering and deaths of countless animals. The average American meat-eater is responsible for the abuse and death of about 90 animals per year. Human beings do not need to eat meat in order to maintain a good health. This is because they can also get all the nutrition and their food needs from meatless product. Vegetarian diet is currently increasing in popularity and the number of vegetarian is rising so quickly because they have seen many significant effects that contribute to a better health. According to a 2006 Mintel survey, 6% of the population, which is about 3.6 million people, is vegetarians, and 10% eat no red meat which somehow showed that UK has the largest proportion of vegetarian in its population among the European country. (The Number of Vegetarian, n.d.) As whole, over half of the world population is vegetarian. They start to care about animals and stand up for the animals right. In fact, a vegetarian diet offers many benefits to human beings that are guards against disease, physical benefits, conserve natural resources, nutritional benefits, and improve the environment. A vegetarian diet is considered as healthy as it has shown to guards against diseases. According to new medical research, a person who adopts plant-based diet is one third less likely to suffer from diabetes and cardiovascular diseases such as heart diseases and stroke. People tend to stand a better chance of not developing the high blood pressure and bad cholesterol that might affect their health problem. According to a study from German Cancer Research Center in Heidelberg, vegetarians have more effective and strong immune systems to kill tumor cells in the body compared to meat eaters. (Dworkin 1999). There are several risk factors of metabolic syndrome, which are high blood pressure, high glucose levels, high triglycerides which are fat levels in the body, and having a big waistband. Dr Rebecca Reynolds, a reader in endocrinology and diabetes at University of Edinburgh Centre for Cardiovascular Sciences, said: Metabolic syndrome is very prevalent in Scotland because it linked in with obesity and Scotland has some of the highest obesity rates in Europe. Studies have shown that Mediterranean style diet is also beneficial to our body health because people who are vegetarian consume more fruit, vegetables and olive oil. (Newbury 2011). Improvement of cardiovascular health can be done by the consumption of nuts and wholegrain, at the same time; it can also eliminate the consumption of meat and dairy products. A British study indicates that a vegan diet reduces the risk for the biggest killer heart disease and Type 2 diabetes. On the other hand, according to the American Dietetic Association, vegetarians tend to have a lower risk of getting obesity, breast cancer, and prostate cancer other than cardiovascular disease and diabetes. Obesity is very common especially in America. According to former Surgeon General C. Everett Koop, 70% of all Americans are dying from different types of diseases which directly tied to their eating habits. (Dworkin 1999). This is beca use in the American diet, there are too much of carbohydrates, proteins, oils, fats, and sugar. A very clear and obvious example is their morning breakfast that includes of sausages, chicken ham, french fries, fried eggs, and accompanied by milk or orange juice. Sausages and chicken ham are processed food which made from animal meat. As we know, processed foods are extremely bad for our health because it contains of preservatives, toxins, and unnatural fillers that will cause kidney failures if we over consume it. Studies have shown that a diet high in animal products and dairy products which contain huge amount of hormones and saturated fat can cause breast cancer. However, theres a huge connection and relationship between vegetarian diet and breast cancer. A vegetarian diet can help prevent and even reverse it, which is taking a diet low in sugar, dairy products, and meat but high in leafy greens, fruits and vitamin D. Vitamin D is an immune system booster that has the special abi lity to attack breast cancer cells by preventing the cancer cells from multiplying to more and more cancer cells in the body. Vitamin D is a key component in helping the body responds to many different kinds of assaults and stimuli, says Robert Heaney, Ph.D., professor of medicine at Creighton University. (Biggar 2009). Vitamin D can be obtained from natural foods such as mushrooms, soy milk, and dark leafy green vegetables. Research found that consumption of isoflavone containing soy products such as tofu during childhood and adolescence protects women against the risk of breast cancer later in life. (Am Clin 2009). Vegetables and fruits also contain phytochemicals that help destroy tumour in the body. (Biggar 2009). A Harvard Medical School study of more than 90,000 women revealed that the women who often consume meat everyday are twice as likely to develop breast cancer as those who did not often consume meat. (Sloan 2008). Too much of meat consumption will also lead to certain degenerative diseases such as Parkinsons, Huntingtons, and Alzheimers disease when human being start to get older. As the famous saying goes like this, you are what you eat. Subsequently, vegetarian diets can reduce the risk of getting diseases that can affect body health and cause death. Vegetarian diet is much better than diet that contains meat because of physical benefits. Several population studies showed that people who adopt a vegetarian diet tend to have lower body mass index (BMI), which is the indicator of weight and fat of the body. This is normally associated with high intake of fibre and low intake of animal fat. Vegetarians may also have a higher metabolic rate compared to meat eaters. In a study of lacto-ovo vegetarians, one of the types of diet, resting metabolic rate (RMR) was 11% higher in vegetarian compared to meat eaters. This was partly due to a higher level of plasma norepinephrine which results from higher intake of carbohydrate and lower fat intake of vegetarians. (Mangels, Messina Messina 2004). Vegetarians will usually have better and good-looking skin textures. For instance, nuts such as almond, pumpkin seed, sesame seed, sunflower seed, vegetables that contain vitamin A and E play a big role for this part. A remarkable reduction in blemis hes and improvement in the skin texture can be seen once a meat eater changes to a vegetarian diet. Vitamin A and E are actually effective and strong antioxidants that can help neutralize free radicals in our body. A vegetarian diet is especially beneficial to female or woman who wants to look younger and live a healthier lifestyle because it prevents the aging and damage of the skin. Fruits that could improve the skin condition are tomatoes, watermelon, cucumber, apples, and papaya. Tomatoes are rich in vitamins A and contain iron. It is a strong antioxidant that helps fight cancer as well. Cucumber is a natural cooling and brightening agent of the skin. You can simply consume it or slice it into pieces and put it on to the face. Apples and papaya contains vitamins and high in fibers. These fruits are very useful for people who have constipation problem and high cholesterol. In addition, several studies indicate that people who adopt vegetarian lifestyle live an average of 3 to 6 y ears longer than those who do not. According to a study from Loma Linda University, vegetarians live about 7 to 15 years longer than people who are not vegetarian. (Dworkin 1999). This can be proven with the example of monk. Buddhist monks are vegetarian and they do not consume meat at all. This is because in their belief and religion, killing and eating the animal is a sin and its cruel. It will also go against their beliefs and religion. Therefore, there is no doubt that monk who adopts vegetarian diet for the rest of their life would normally live longer than normal people. Some monks are even as old as 100 years above. Besides, nail health is considered as an indicator of a persons body health. You can see the persons health by looking at their fingernails. People who are vegetarian tend to have a healthier and longer nails, which indicates that they are healthy. People who normally consume meat and have lesser intake of vegetables tend to have a shorter and yellowish nails. Thi s indicates that their health is at risk. Research showed that vegan diet helps reduce the suffering from Premenstrual Syndrome (PMS) for female. The diet includes reduction of meat consumption but increase in consumption of complex carbohydrates, leafy green vegetables, fruit, cereals and whole grains. (Cornforth 2009). A vegetarian diet also helps to stop allergies for a certain people. Researchers found that people report lesser personal problems such as runny nose and asthma when they switched to a vegetarian diet. This is basically due to the reduction of common food trigger that contains hormones and toxins such as meat, dairy and eggs. As a matter of fact, a vegetarian tend to be thinner than meat eater. Harvards long-term Nurses Health found that thin people have only one-third the risk of getting asthma compared to meat eaters. (Barnard, n.d.) For instance, if overweight people adopt a vegetarian diet, they are more likely to lose their weight and alleviate asthma because p eople who are thin normally do not have asthma problem. All of these are the results and physical benefits that can be gained from a vegetarian diet. Furthermore, a vegetarian diet does not only beneficial to human beings in terms of health; it also contributes to conserve natural resources. The meat industry is very wasteful of natural resources. Approximately 10 pounds of plants are needed to be fed to the animals in order to produce one pound of meat, which is also one of the inherent problem of eating meat. (Bronk Su 2006). Thus, 70% of grain grown is almost used to feed the animals in America, which means much more food is being consumed to support the animals than would be needed if more people were vegetarians. (Bronk Su 2006). Due to the extreme and increasing growth of animals feed, the meat industry require a huge amount of water in order to grow the grain and feed the animals. Vegetarian author John Robbins calculates that it takes 168, and 229 pounds of water to produce one pound of maize and rice respectively. (Vidal 2010). On the other hand, a pound of beef requires approximately 8000-9,000 litres of water. Pigs ar e one of the thirstiest animals in the world. An average-sized of pig farm in North America with about 80,000 pigs requires nearly 75 million gallons of fresh water to feed the pig in a year. (Vidal 2010). In contrast, a large sized of pig farm with more than millions of pigs may requires the water as much as a city. When the demand for meat increases, the uses of water in the meat industry and farming land will rise as well. Consequently, there will be lesser source of water available for the crops and also drinking for human beings. (Bronk Su 2006) say that almost half of the water that is consumed in the America is mostly being used by the meat industry and the groundwater is being withdrawn 25% faster than it is being replenished. In order to conserve energy in terms of water resources, the best choice and option is to adopt a vegetarian diet. This is because when people start by vegetarian diets, they will consume lesser meat in their daily diets. As a result, lesser amount of water will be used to grow the grains and the number of animals to be fed by the meat industry will greatly be reduced. This can also be said to conserve water resources because there will be a sufficient amount of water to provide to both human beings and animals in the world. Other than that, vegetarian can also conserve energy in terms of oil. Oil crisis is one of the major problems faced by human beings in the world currently. (Bronk Su 2006) also say that 8 times as much fossil fuel energy is being used in the production of animal protein as is used in the plant protein production. There are actually some reasons for this. In fact, fuel is needed for manufacturing pesticides and fertilizers to grow grains and crops for animal feed. Besides, fuel is needed for transportation in the meat industry and also the operation of machinery in the farming industries. In this case, it is said that about 400 gallons of fossil fuels are being used in order to produce foods for the average meat-eating for the American each year. (Bronk Su 2006). Therefore, it is the truth that vegetarian diet can actually help to conserve natural resources in terms of water and fuel. Critics of vegetarianism claim that being a vegetarian is not good for our body because a vegetarian diet is lack of animal fat, protein, each of the 9 amino acids, iron and calcium, which scientific evidence showed that human need these nutrients for an optimum health. It is true that vegetarian diet could not afford to provide animal fats and other essential nutrients that our body somehow needs it. Yet, a vegetarian diet offers much more other extra nutritional benefits to our body compared to a diet containing meat. It does not mean that you need to consume meat in order to achieve an optimum health level. A carefully planned vegetarian diet can still provide an optimal health for everyone. There is always another alternative ways to get it. For example, vegetarian foods such as nuts, seeds, and dark leafy greens provide magnesium that aids the absorption of calcium. Nuts such as almonds are a great source of protein for vegetarian other than providing vitamin E, calcium, magnesi um and zinc. In addition, almond can helps lower the cholesterol level especially for the elders. According to a study from Health Research and Studies Centre, they found out that almonds are even better than olive oil in lowering LDL cholesterol. (Top ten vegan super foods 2009). Other than that, seeds such as pumpkin seeds contains high amount of amino acids, calcium, potassium, magnesium and tryptophan. Tryptophan is one of the essential amino acids that aids in the production of serotonin in our body. Serotonin is actually one kind of hormone that can make us feel happier and lively. It is considered as happiness hormone despite it is not really a hormone. This is because it sort of activates our brains and able to makes us to be more lively and energetic than normal. Several studies has shown that pumpkin seeds contain one kind of special compound called phytosterol that helps enhance and improve the bodys immune system. (Top ten vegan super foods 2009). By adding pumpkin seeds into our daily diets, it can also help to reduce the inflammation on our body. We can also get the source of protein from several vegetarian foods such as beans, tofu and other soy products. In order to gain a classic combination that provides complete protein, a vegetarian is advised to eat beans and grains together to get the optimum result. This is because beans actually do not contain the complete amount of protein in it. Certain brand of tofu or soy milk is fortified with extra beneficial nutrients such as calcium and potassium for the need of a vegetarian. Soy protein has been shown to have as much proteins as in meat. (American Heart Association, n.d.). Food type Total Kcal/100g* Protein (g)* Kcal from protein Beef 310 22.5 90 (29% from protein) Wheat(flour wholemeal) 310 12.7 51 (16% from protein) Source: Collins Gems Calorie Counter (averaged for raw meat) (Patel, n.d.) showed the amount of daily requirement for energy in terms of calories and protein based on the table as shown above. An assumption of calorie requirement for normal active lifestyle is made, which is 2400 Kcal every day. Experts say that 10% of calorie should come from the source of protein. As 1g of protein generates 4 Kcal, it is said that human being requires 60g of protein every day. (Patel, n.d.) Based on the table above, wheat provides 51 Kcal of calorie from protein which somehow reached the amount of daily requirement for energy. In contrast, the calorie in beef is much higher than that, which is 90 Kcal. This is considered as too much of calorie for a normal healthy diet. Moreover, a vegetarian have a higher risk of having iron deficiency compared to a meat eater. For meat eaters, iron can be found in meat products such as red meat, liver and egg yolk. However, we can also get it from the plant sources such as dried beans and spinach. Hence, it is not necessar y to consume meat in order to get iron. Plant-based diet alone can already provide as much nutrient as what meat can provide to us. It is also not a healthy way to get protein just by eating meat alone. You will get surprise when you get older because all those symptoms of diseases would appear due to a long-term of meat consumption. One of the arguments put forward to support the view that vegetarian diet could not contribute much towards saving the environment. Although this statement may be true, but there is no doubt that a vegetarian diet can actually save the environment and make the world a better place to live in. A vegetarian helps to reduce the destruction of rainforest and save the wildlife habitat. Malaysia is a clear example of country that has rainforest. Rainforest is very important in the world. This is due to several reasons such as regulating the global climates; regulate the cycle of water, and the absorption of carbon dioxide from the atmosphere. The environmental community has recognizes global warming as one of the gravest threats to the planet. (Mohr, n.d.). Unfortunately, mankind in this century have become more and more obsessed with the earning of maximum profits. People only think of earning as much as they could. As a result, rainforest is being cut down and enormous of fires are used to burn down these forests in order to have more space to raise the cattle before the meats, typically found in hamburgers and processed meat, are being sold out in the market. Approximately a football field of rainforest is being destroyed in order to produce 257 hamburgers for the population every second! (Animal rights and Vegetarianism, n.d.). By switching to a vegetarian diet, we can actually save a lot of animals and also their habitat. Hundreds of thousands of animals are innocently being killed by human every year. Some corporations even inject certain chemicals, hormones, or veterinary drugs into the body of the animals so that they could grow faster and reproduce more. This is to enhance their production and gain more profits. For examples, chicken and beef cattle are injected with growing hormones. What goes beyond the doors of the corporations and industries are extremely terrible and insane. Animals are regularly being butchered alive on speeded-up conveyor lines. These innocent living things are forced to be killed for human use and purposes, where in fact human have no right to do that at all. If people still continue to kill huge number of animals just to feed the human beings, one day, these animals will extinct forever and our next generation will have to pay the price for what human being are doing right now. Like the quote that says, When the buying stops, the killing stops. A vegetarian diet also reduces water pollution and land pollution. In the modern and high technology society, a large amount of grains are sprayed with different types of fertilisers such as herbicides and pesticides by factories in order to feed the cattle. These two chemicals are very harmful and acidic. Extreme amount of acidic chemical will destroy the top soil and leak into rivers and grounds. Over 4 million acres of cropland are lost to erosion in the US every year due to plundering farmlands to fatten animals. (Animal rights and Vegetarianism, n.d.) When these ch emicals flow into the oceans and seas through the river, this causes the deaths of millions of fishes. Other than that, meat industry contributes significantly to global warming as well. For example, methane that is released by bacteria in the rumens of cattle worsens global warming. This is because methane is a relatively potent greenhouse gas that will raises global temperature. Burning down of forest will also release carbon dioxide gas into the atmosphere. As a result, this would cause the temperature to rise and global warming worsens from day to day. Thus, a vegetarian diet can reduces the production of carbon dioxide into the atmosphere. The damage to the environment does not stop at cattle or chicken, the fishing industry also somehow contributes to the degradation of environment. What does this means? It actually means that many different species of fishes are being caught away by fisherman faster than they can reproduce. (Bronk Su 2006). This damaged the ecosystem of the oceans and sea, which in turn, affect the whole environment and worsen global warming. Approximately 300,000 different types of sea animals such as whales, dolphins and porpoises are being killed every year before their meats are being sold in the supermarket. (Bronk Su 2006). Thus, by switching to a simple and easy vegetarian diet, we can actually conserve the environment and preserve the natures biodiversity without spending too much money or figure out the other alternative ways. All in all, a vegetarian diet contributes a lot to humans lifestyle, eating habits and the environment and there are numerous of benefits of it. Basically, animals and human can actually get the nutrients required for the body from plants, and not by animals itself. Human are actually getting the nutrients from second-hand sources if they eat meat. If they eat the animals, all the toxins, hormones and chemical will automatically go into the stomach which is hard to be expelled and removed from the body. The truth is that a vegetarian diet even contains sufficient beneficial nutrients for the body which they have been mistakenly claimed to be lacking in, especially protein. (Health Benefits, n.d). As a matter of fact, the anatomies of herbivores, carnivores and human are compared which shows that man is actually vegetarian by nature. (Doshi, n.d.). The comparison can be shown in the table below. Carnivores (meat-eating) Have claws for killing Sharp front teeth for tearing meat Stomach acid is twenty times strong Perspire through tongue Herbivores (plant-eating) Have no claws No sharp front teeth Weak acid in stomach Perspire through skin Humans Have no claws No sharp teeth Weak acid in stomach Perspire through skin The above table has clearly shown that human beings are naturally a vegetarian and should not be a meat eater. This has strongly support the fact that vegetarian diets is much better and healthier than a diet that contains meat. In order to produce meat for meat eaters, human need to kill billions of animals to fulfil the need of population in the world. However, human do not need to kill a plant to obtain vegetarian food. This is not only an act of kindness to the animal, which is a living like human being; it also shows the appreciation to the nature and conserves the environment.

Wednesday, November 13, 2019

Summary of 1984 by George Orwell :: 1984 by George Orwell

What do you think a normal human being needs to have a good, hearty life? I believe that you need the freedom of thought, the rights of love, the right to express yourself on paper, and freedom of speech. In Orwell’s world of totalitarianism you don’t have any of these freedoms. You are to obey the party and do nothing but obey the party. The only way of temporarily escaping totalitarianism is through conspiracy and lies. The characters in 1984 give us readers an idea of how INGSOC ruins lives and makes the very idea of conspiracy hopeless. Winston Smith is your â€Å"average Joe† in Oceania. He struggles with how to determine what is true or not. Winston is a fatalist because, â€Å"no matter what he does, he believes that the party will eventually kill him. At the beginning of the book, Winston buys a diary from a junk shop, which is against the party’s will because he buys the diary he is committing a crime against the party. Simply by purchasing the diary made no difference if he wrote in it or not he would still be killed. On pg. 19 of the book Orwell wrote, â€Å"Whether he wrote DOWN WITH BIG BROTHER, or whether he refrained from writing it, made no difference. Whether he went on with the diary or whether he did not go on with it, made no difference. The thought police would get him the same.† This shows Winston’s sense of fatalism. While in the shop where Winston bought the diary, he spies a piece of coral enclosed in glass. He immediately takes an interest in it and decides to buy it. This piece of coral symbolizes his ability to connect to the past. Winston’s first inclination once he sees Julia following him is to kill her, and smash her head on the cobblestone. Winston thinks to himself, â€Å"I could keep on her track till they were in some quiet place, and then smash her skull with a cobblestone. The piece of glass in my pocket should do the job.† By smashing the piece of glass into Julia’s head Winston would be destroying two things. One is Julia and his hopes of having a decent life but his obsessive desire to know the truth and the second is the piece of coral which is Winston’s way of linking the past to the present. Winston is afraid that Julia could be part of the thought police.

Monday, November 11, 2019

21st Century Racism in Canada Essay

Racism in Canada is one of the least publicised problems modern Canadian society has faced in the Twenty First Century. With the majority of the Canadian and world public holding the census that Canada through its lax immigration policies and political reform, is far from a racist state. This belief is a falsehood that has either been achieved through white lies from history textbooks or a lack of endeavor to uncover the real racial issues that permeate through out Canada. Canada has been and is a racist nation that continues to not face the fact that racism is alive and well in Twenty First Century Canada. Racism towards slaves coming to Canada in search of solace from the racist United States was not an uncommon occurrence in the mid 1800’s before the American civil war. Halifax was the last stop on the Underground Railroad, although what African Americans were coming to was a whole different story. The popular depiction is of slaves that were granted freedom and loved and welcomed into society, as evidenced by this television advertisement. (YouTube) The truth was a lot harsher. In Halifax the majority of freed black slaves resided in â€Å"Africville†, the atrocities of which are not widely known but are still keenly documented. In order to turn â€Å"Africville† from poor black slum to profitable industrial land, the city of Halifax erected a hospital for diseased WWII veterans nearby along with leaving massive mounds of toxic garbage to be incinerated in the same vicinity. (Taylin) â€Å"Africville† is not mentioned in Canadian history books nor do most people across Canada know of its existence. It was nothing short of genocide of people that Halifax felt did not deserve the rights any other Canadian citizen would take for granted. Racism towards black immigrants and natural-born Canadians was not and is not limited to â€Å"Africville† or even Nova Scotia for that matter. Don Oliver a Canadian senator pointed out how most Canadians do not know about great black Canadians. Portia White was a classical musician that was known the world over, and Elijah McCoy’s  invention of modern lubrication for industrial purposes were so famous that it is thought the catch phrase â€Å"The real McCoy† could have been named after him. (Oliver) History books as well as the public because of overt racism tend not to celebrate the successes of black Canadians. Although there are very notable exceptions especially in music such as popular rapper Drake and R&B singer The Weeknd, by and large only in sports and music are the successes of black Canadians prevalent in mainstream media. There have been numerous studies done to show the effect having colored skin has on every day life in Canada. Carlos Teixeira found that black Portuguese Immigrants faced significant disadvantages in housing in comparison to people who were not of color. The Study showed that in the rental market of Toronto, people of color could expect to pay on average 30% higher rental rates versus white counterparts of similar Portuguese descent. He further concluded that people of Asian descent also were subjected to the same treatment. (Teixeira) A further study where over 6,000 mock resumes were sent out showed that applicants that had Chinese, Pakistani or Indian sounding names got 40% less call backs than those with English sounding names. Although it should be seen that this study was conducted in Toronto and a different result perhaps not as favorable towards English sounding names could have been found in Quebec or other parts of Canada. The key point is if racism exists in Canada’s most multicultural city, how widespread and to what severity is racism in the rest of Canada. (Oreopolous, Dechief) The Canadian armed forces are noted world wide as one of the top armed forces, and are known to pay the second highest salary behind only the Australian army. However the racism that Mr. Fowler and Mr. Coward experienced while serving was clearly targeted towards their color. (CBC NEWS) It is impossible to fathom the l ow level of respect garnered for these men who put their lives on the line every day to defend a country that does not give them the respect they deserve simply because of their color. It should be noted that their case is still in the process of being investigated so any judgment as to whether they were subjected to racism cannot be confirmed. A study into Canada’s judicial system showed alarming results that independent juries are more likely to find black defendants guilty approximately 40% of the time more frequently than defendants of other races. This is worrying as it could have significant ramifications for Canadians of African descent residing in  Canada. (Pfeifer, J. E. , Ogloff, J. R. P.) This combined with recent findings in 2011 that black prison populations have risen by 52% since 2000, means that this issue has gone unresolved. Points should further be raised that the majority of the black prisoners are young and are spending their formative years in prison. This could have a knock on effect where they find it hard to integrate properly into society and influence more friends and such and could land themselves back behind bars. This could lead to many defendants getting â€Å"caught in a cycle of criminality†. (Crawford) The facts show that with the current education, welfare and societal norms in place, more and more black youth are behind bars than before and it is thought they will only end up back behind bars. The racism of minorities is probably most controversial when analyzed in the context of the abo riginal peoples of Canada. This is because they were originally not a minority but rather a majority as Canada is technically their land. The aboriginal people have been subjected to racism since the very beginning and the facts show it. â€Å"Aboriginal life expectancy is lower; they have fewer high school graduates, higher unemployment, almost twice as many infant deaths and spend more time in jail. They have lower incomes, enjoy fewer promotions in the workplace and remain, as a group, the poorest in Canada.† (Hutchings) The Indian Act was used to create â€Å"Indian Agents† which acted as sort of police for the aboriginal peoples but in truth denied them basic rights, such as the right to sit on juries, vote or permission was needed to do mundane tasks such as wearing traditional garments off the reserves. It was policies like these that truly segregated the aboriginal people from the mainstream consciousness and must have caused a chasm of sorts to exist between aboriginals and non-aboriginals. To combat this chasm between aboriginals and non-aboriginals Duncan Campbell Scott and the department of Indian affairs came up with the policy of enfranchisement. At first voluntary but later forced enfranchisement was used to basically strip Aboriginals of their Indian status. Getting university degrees, becoming doctors or ministers meant enfranchisement. In short it was trying to send the message that once Aboriginals became civilized and held positions of power and respect within the community they should no longer be looked at as Indian. Furthermore in a sexist as well as  a racist policy any Indian woman who married a non-Indian man would lose her status as an Indian as would her children. Duncan Campbell Scott went on later to state: â€Å"Our object is to continue until there is not a single Indian in Canada that has not been absorbed into the body politic, and there is no Indian question and no Indian Department.† (Hutchings) It was clear from that quote alone that the Canadian governments views on Aboriginals at that time was that they should not exist and should be absorbed into the community. Canada would later give up the goal of enfranchising Aboriginal peoples after the â€Å"Lovelace† case that was brought before the International Court of Human Rights led to the United Nations condemning Canada for its discriminatory policies. It would be 1985 when Canada would pass bill C-31 to remove the discriminatory parts of the Indian Act. The Indian Act also gave the Canadian government the power to erect residential schools. Schools where pupils were malnourished, had to work to make up for inadequate funding and were taught â€Å"dumbed-down† subject material so that â€Å"To this end the curriculum in residential schools has been simplified and the practical instruction given is such as may be immediately of use to the pupil when he returns to the reserve after leaving school.† (Hutchings) This led to segregation of Indians and non-Indians from a very young age. The worst part about residential schools however was the physical and sexual abuse that went underway up until the 1970’s when schools started closing. Children’s tongues would be nailed down for speaking native languages, as well as having semi regular checks of genitalia. The abuse was so widespread and gruesome that the Canadian government pledged over three hundred and fifty million dollars to help the Aboriginal peoples that attended the residential schools. The Canadian government continues to however maintain the Indian Act, which by sheer existence is a blatant act of racism. The act itself means that Aboriginal peoples are treated in a different way than other Canadian citizens, there is no other first world country in the world that has policies that differentiate people based solely on the race. Canada is often seen as very welcoming towards the Asian peoples with a  recent study by the Canadian Immigration showing that by 2031 it is predicted that white people will be in the minority in cities of Toronto and Vancouver. (Young) This however was not always the case with the infamous â€Å"Chinese head tax† that was invoked on Chinese immigrants. The tax rose from fifty dollars to five hundred dollars during the period of 1900 to 1903. This is inexcusable and blatantly targeted those not just of Chinese descent but rather â€Å"Orientals† in general. (Greengrass) The racism towards the Chinese reached a high on July 1, 1923 when the Chinese Immigration Act was invoked. It is more commonly known to Chinese Canadians as â€Å"Humiliation Day†. The act meant that only selected classes of Chinese immigrants would be granted entry into Canada, namely Diplomats, students, children of Canadians and Investors. Canada was now openly using racist policies to pick and choose which class of a certain race of people they wanted to enter their country. Only in May of 1939, was the Chinese Immigration Act receded. In general South East Asian’s were subjected to not being granted entry in Canada simply because of their race. Between 1914 and 1920, only a single Indian was admitted into Canada because of the racist immigration policies in place. The discrimination against Indians came to a head when The â€Å"Komagatu-Maru† passenger vessel was denied entry into Vancouver even though there were three hundred and seventy six Indians on board having sailed all the way from China. (Greengrass) It is quite possible that the worst treatment towards â€Å"Orientals† was in fact towards the Japanese that called Canada home or were otherwise refugees. During the period of the second world war, in 1942 Japanese Canadians were forced to live in camps, the living conditions were only slightly better than the camps that the Nazi’s had built. (Greengrass) The Japanese people were subjected to a comparable fate as Jews would have felt in Nazi Germany, however there was no extermination or genocide on the scale of Nazi Germany. All in all, the biggest conclusion should come through a key exclusion. There is no racial prejudice that has been recorded towards that of â€Å"White Aryan† Canadians. Canada is a racist country and has clearly been one for some time. Although the Canadian government has apologized and tried to make amends the clear sentiment still permeates through the people. It is something I personally felt while residing in Ottawa. Whether Canada likes it or not, by the year 2031, whites will no longer be of the majority in the two biggest cities in  Canada. This brings a certain comfort as change is coming and there seems to be no way to halt it. Those who remain and insist on fielding racist views will be forced to change or may face racism on themselves. Although no two wrongs make a right, it is probably of no comfort to racist Canadians that history does repeat itself. I personally am of the belief that should Canada grow to appreciate what makes different cultures unique and create a â€Å"fusion culture† whereby different customs are integrated into Canadian customs, Canada as a whole will benefit. Works Cited Crawford, Alison. â€Å"Prison Watchdog Probes Spike in Number of Black Inmates.† CBCnews. CBC/Radio Canada, 15 Dec. 2011. Web. 21 Apr. 2014. . Greengrass, John. â€Å"A HISTORY OF RACISM IN CANADA’S IMMIGRATION POLICY.† Peoples Commission. Peoples Commission, 13 May 2010. Web. 21 Apr. 2014. . Hutchings, Claire. â€Å"Canada’s First Nations: The Legacy of Institutional Racism.† Canada’s First Nations: The Legacy of Institutional Racism. Tolerence, 04 Feb. 2012. Web. 29 Apr. 2014. . News, CBC. â€Å"‘Systemic’ Racism in Canadian Forces Needs Inquiry, Veterans Say – Nova Scotia – CBC News.† CBCnews. CBC/Radio Canada, 13 Mar. 2014. Web. 21 Apr. 2014. . Oliver, Don. â€Å"What It Means to Be Black in Canada.† The Mark News. The Mark News, 14 July 2011. Web. 21 Apr. 2014. . Oreopoulos, Philip, and Diane Dechief. â€Å"Why Do Some Employers Prefer to Interview Matthew, but Not Samir? New Evidence from Toron to, Montreal, and Vancouver.† Metropolis British Columbia Centre of Excellence for Research OnWorking Paper Series N/A 11-13.N/A (2011): 1-68. Http://mbc.metropolis.net/assets/uploads/files/wp/2011/WP11-13.pdf. Web. 21 Apr. 2014. â€Å"A Part Of Our Heritage – Underground Railroad.† YouTube. YouTube, 09 May 2007. Web. 21 Apr. 2014. . Pfeifer, Jeffrey E., and James R. P. Ogloff. â€Å"Ambiguity and Guilt Determinations: A Modern Racism Perspective1.† Journal of Applied Social Psychology 21.21 (1991): 1713-725. Print. Tavlin, Noah. â€Å"Africville: Canada’s Secret Racist History | VICE Canada.† VICE. VICE, 04 Feb. 2013. Web. 21 Apr. 2014. . Teixeira, Carlos. â€Å"Journal of Housing and the Built Environment, Volume 23, Issue 4 – Springer.† Journal of Housing and the Built Environment, Volume 23, Issue 4 – Springer. Springer Science + Business Media B.V., 12 Sept. 2008. Web. 21 Apr. 2014. . Young, Ian. â€Å"Chinese Numbe rs in Vancouver, Toronto to Double by 2031.† South China Morning Post. South China Morning Post, 06 Apr. 2013. Web. 29 Apr. 2014. .