Correlating higher order thinking skills among high school students with their performance on a government assessment

Correlating higher order thinking skills among high school students with their performance on a government assessment

correlating higher order thinking skills among high school students with their performance on a government assessment

by

Sean M. Lennon

Spring semester, 2004

In partial fulfillment for ORLD 611

Quantative Research

CHAPTER I

Introduction

Background Information

With enacting of No Child Left Behind (NCLB), states are now mandated in testing students enrolled in public schools. Data from testing must be published and schools are to be held accountable for continued failing marks (Goertz & Duffy, 2003). NCLB is a continuation of a trend widely accepted and advanced by a majority of states within the last few decades. In 1994 Congress enacted the Improving America’s Schools Act, later improved by the NCLB, initially mandating the testing of students. The movement of accountability and testing has continued to expand into other curriculums, grades, and subjects. It appears that testing, at least in the moderate future, is here to stay.

The accountability of the testing is also expanding, incorporating students, teachers and school systems. High-stakes, usually referring to a single, or series of tests used to advance or graduate students, is also gaining in prominence. Students must illustrate proficiency of knowledge in the content area of the assessment and under new NCLB guidelines show improvement from year to year (Goertz & Duffy, 2003). Common in these assessments is proficiency in application, more recognized as ‘performance based skills’, where the subject taking the test must show ability to use pertinent knowledge to answer questions. This testing style is considered more applicable in assessing higher knowledge skills but more challenging to prepare for. The priority is magnified when the stakes are higher.

Need

Proficiency in taking performance based assessments can be a challenging task for an educator. The problem is twofold; first you must give the student the basic knowledge so it can be remembered, second you must teach the student how to use the knowledge correctly. Compounding the fickleness of human memory the teacher must now deal with another human variable; that of cognition. It is assumed that modeling higher order thinking techniques, usually classified by the original Bloom’s Taxonomy, is one of the most effective ways to teach these skills (Gray & Waggoner, 2002). This assumption has never been tested nor identified as effective. The question of this experiment hopes to asses this problem. Does the use of higher order thinking skills relate to a higher score on a performance based assessment?

Because of the accountability of high-stakes testing educators must strive for the most effective way to teach students. Students must not only pass these assessments but must excel at them and to repeatedly do so year after year. Teachers, restricted by time, class size and disruptions must find a way to give the student the best opportunity to pass. The repercussions for failing affect the teacher as much, if not more than, the student taking the test.

Significance

This experiment can be of great interest to teachers and school districts preparing for a high-stakes assessment. Performance based measurements rely upon the student to illustrate actual mastery of the knowledge. This action is a higher order thinking skill, originally defined by Bloom as comprehension, application, or analysis depending upon the nature of the particular question (Krathwohl, 2002). Under the newer version of Bloom’s Taxonomy these skills are listed as verbs; students must apply, analyze or evaluate (Krathwohl, 2002). Either model list possible thinking skills commonly utilized within a high-stakes test.

Educators, usually crunched for time, fail to incorporate many techniques and activities that foster and generate such skills. Traditionally, knowledge or simple memorization was the staple form of teaching. Today we see the limitations of this as many graduates have trouble assimilating into the workforce. They don’t know how to ‘do the job’. Most children have been taught to memorize, then are praised with grades highlighting this simple task. This leads to difficulty in a world where getting the job done is rewarded over simply knowing how to do it.

Testing has incorporated these skills forcing changes in the weight of content and pedagogy. In some cases this change might possibly be for the better. The reality for the teacher, however, is more realistic and less noble than then we would like to believe. Grading on the tests has become more important than the actual thinking abilities of the students. The assessments can only measure gradable outcomes, a limitation of all testing. Students’ actual abilities are more abstract and un-testable, and are ignored in the scramble to teach only testable outcomes. If the two could be correlated then the issue would be mute. Does utilizing higher order thinking skills and applications increase the performance on a high-stakes assessment? Does it help in cognitive ability as well?

Research Question

The research question has been modified to test this commonality in the social studies curriculum. Does the use of higher order thinking skills help on the performance of a government high-stakes assessment? It is generally perceived that the answer would apply across curriculum or content areas, but this would be too large and cumbersome of a study. Eventually this theory will probably be tested. At this point, however, the focus is narrowed to high school students enrolled in a government class. These students will take the Maryland Government Assessment at the end of the semester. Will higher order thinking help them on their upcoming test?

Relevance to Educational Leadership

This research, in lieu of the trends in testing is highly pertinent today. The knowledge is applicable to test creators, school districts, and educators including teachers of pedagogy as well as classroom teachers. The research will give insights into the effectiveness of higher order thinking on test performance, in turn possibly driving reform for curriculum modifications. Most educators and professionals believe such skills are crucial in the teaching process. This research will hopefully explain if higher order thinking activities should be incorporated and expanded.

Limitations

The limits on the research focuses on random error associated with human subjects and the possible systematic errors found in the survey instrument. To deal with random error the population sample has been enlarged to encompass all, or as much as possible, of Easton High School’s junior class. This population consists of approximately 225 students representing the average demographic consistent in the American public high schools system. Students in Academic Government classes, a mandatory eleventh grade course, will be asked to participate. Error can occur if too few volunteer or the volunteers do not represent the proportionate population. To offset this possibility each volunteer will be rewarded with an ice cream or similar ‘treat’ immediately after finishing the experiment.

The questions on the instrument itself can also be a source of error or bias. Enough questions must be used to indicate statistical validity and to reduce error but too many can generate student apathy or multiple treatment interference. The number of questions on the assessment is set at fifteen. Each question will be of multiple choice design, consisting of four possible choices. The instrument will be formatted for consistency.

Other possible sources of error would include the instructional block and the higher order exercises. To validate these, the instruction will be reversed engineered from the questions. The data will be constructed from the content asked from the questions themselves. Social studies content specialists at the Maryland Department of Education will establish content validity. The higher order thinking exercises will be created from research. Face or content validity will be established through experts at the state department or through local universities.

CHAPTER II

Review of Related Literature

Assessment Movement

To understand the correlation of higher order thinking and assessments we have to understand the history, process and impact of such testing and how it has affected, and continues to affect the educational process. The earliest known form of testing dates back to 210 B.C. China where candidates had to pass an examination for a career in civil service. Students would be tested on their knowledge as well as their reasoning skills based on the canon of Confucius (Madaus & O’Dwyer, 1999). According to Madaus & O’Dwyer (1999) the emphasis on reasoning and its subjective scoring would see this test dropped in favor of assessments using more objective scoring. This issue of scoring students for a grade has continued through to modern times.

In Europe’s early Middle Ages testing was used for membership into craft guilds as well as being used for entrance into the priesthood or for knighthood. By the reformation the use of such testing would be incorporated by colleges and universities. Evidence of reference guides used towards high-stakes examinations have been discovered, illustrating the use of set standards and the curriculums created to meet them (Madaus & O’Dwyer, 1999). This trend would continue in America, most notably through the great American educator, Horace Mann with his quest for school reform in mid 19th century Boston (Madaus & O’Dwyer, 1999).

Mann saw the need for written examinations of students and for school and educator accountability of their scores. Though his reasons were political in nature, common in most school reform, he was instrumental in starting what would eventually become the modern American public school testing movement (Madaus & O’Dwyer, 1999). Other notable contributors would follow; Francis Kelly the inventor of the first norm-referenced assessment, Alfred Binet who introduced the 1st successful intelligence test in 1905, Francis Kelly again, in creating the concept of the multiple choice assessment in 1914 and finally Arthur Otis, who in 1917 created the Army Alpha, the first group administered intelligence test for American soldiers heading to Europe during World War 1 (Madaus & O’Dwyer, 1999). The movement continues today with high-stakes testing, performance assessments and standards.

By the end of World War 2 many critics saw a discrepancy in the skills of young graduates to what was needed in the workforce. Due, in part to the hysteria surrounding the Cold War between the United States and the Soviet Union this issue would be seen as a problem of national security (Rich, 2003). Competitiveness within this nation and against the other nations in the world was be scrutinized, the skills of our young would be seen in terms of strength or weakness. This is the advent, or beginning of the achievement testing movement. As a nation we take worry in low scores and are concerned with countries that score competitively or better than our children (Rich, 2003).

According to Gunzenhauser (2003) this has led to a default philosophy in education or a narrow focus on test scores rather than the subjects the tests are actually supposed to measure. In other words, the tests meant to be a part of the system instead drives the system (Gunzenhauser, 2003). Actual control of curriculum now moves away from teachers, the schools and districts to whatever agency that creates or monitors the assessment (Vogler, 2003). Regardless of the reasons or impact testing has become part of the American psyche and is here to stay (Rich, 2003). An offshoot of this, also influenced by criticisms and concerns, has been the call for established state or national content standards and the creation and utilization of performance based assessments.

Standards Movement

The focus for national standardization of content areas originated with the National Education Goals, a consensus of agreement by the nation’s fifty governors in creating series of outcomes and initiatives in response to educational reform (Nash, 1997). Through this initiative, the National Council of Education Standards would be created. Funding would be established through the Department of Education and the National Endowment of the Humanities (Nash, 1997). By 1994 the Geography for Education Standards Project completed the standards for geography. In that same year the Center for Civic Education completed for civics and the National Council for the Social Studies finished for social studies. The National Center for History in the Schools would complete the standards for history in 1996 (Buckles & Watts, 1998). In 2000 legislation signed by President Clinton mandated states to adopt some form of standardization, either with the previously completed national sets or they had to create and implement their own.

Controversy has surrounded this movement almost since its inception. Critics, from teachers to college professors, educational leaders and historians to everyday Americans have been outraged by the selections used for each standard. Problems about what to teach, what not to teach, and the weight and prioritization of certain issues have developed with no clear consensus or outcome found (Nash, 1997). What to teach has become increasingly controversial as states mandate successful completion of tests for graduation and grade promotion. As subject matter narrows towards testable outcomes and objectives, content areas become limited and in some cases discarded entirely. What curriculum, therefore, is deemed more valuable than others? The answer to this question appears to be in the nature of the assessment being utilized (Vogler, 2003).

Most experts agree that multiple assessments, in some form or another, are the only fair and impartial way to assess the learning of a child or individual (Olson, 2001). If states utilize more than one test the limitations in curriculum will not be as severe as in areas using just one test for student promotion or graduation (Olson, 2001). The problem surrounding multiple testing, however, is one of syntax; is multiple testing taking the same test more than once, or is it taking multiple tests? Or taking a test that includes grades from other subjective outcomes, or possibly a combination of tests including other subjective outcomes? What form the program will take depends upon the state, the stake of the student (i.e.: being used for promotion, graduation or has no passing requirement), and the grade being assessed (Vogler, 2003).

Many states differ in the way they test their students. Federal guidelines set testing to one in every educational ‘block’, consisting of elementary, middle and high school. Most will test more frequently than this minimum. (Goertz & Duffy, 2003). Testing will vary from state to state, and year to year but almost all use some form of criterion and norm referenced assessment. This type of test looks at performance as well as knowledge (Goertz & Duffy, 2003).

Curriculum reform, created in response to the standards movement and in itself conceived from the assessment movement has come full circle to its original preposition; to teach our children the necessary skills to augment the workforce (Rich, 2003). Has testing of our children driven improvements in education? In itself the answer is probably no but as a series of reforms and programs the new generation of curricula and assessments has utilized performance outcomes, objectives based on student thinking and problem solving. By passing on knowledge then teaching how to use it in a real world setting students are given a better chance for success (Evans, 1999). Tests that utilize application or thinking concepts in answering a problem have been used long in history but were abandoned due to subjectivity of grading (Madaus & O’Dwyer, 1999). Despite limitations in grading, these types of assessments are coming back as is the demand for the curricula that incorporates them. As it was in the forties and fifties we need a skilled and intelligent workforce, not only for economic justification but for security reasons as well. How can we continue to be a super power if we can’t teach our children? How are we going to survive if they can’t think? In our zeal to measure performance we initially moved away from such measurements and are just now beginning to address thinking and application both through assessments and in the classrooms.

Higher Order Thinking

The application of higher order thinking skills in the classroom can be problematic for many educators. Thinking is physiological but is applied in more of an abstract way, especially in terms of pedagogy. It remains maddeningly complex in categorizing and formatting as well as in applying to the classroom. In 1949 Benjamin Bloom, then associate director of the Board of Examinations of the University of Chicago, wanted to create an open, easily accessible ‘bank’ of test questions with open access to professionals who could use them. This ‘bank’ of test questions would make it easier, cheaper for schools and programs in creating and implementing tests (Krathwohl, 2002). Bloom enlisted specialists in measurement, meeting approximately twice a year for six years before finishing the final draft of what would eventually be known as Bloom’s Taxonomy. Originally titled the ‘Taxonomy of Educational Objectives: The Classification of Educational Goals” this would be used as a classification system of higher order thinking skills (Krathwohl, 2002). The skills were listed in ascending order from lower to higher starting with knowledge, considered to be the lowest form of thinking. Next would be comprehension, then application, analysis, synthesis and finally evaluation (Krathwohl, 2002).

Bloom’s Taxonomy would quickly incorporate itself into the assessment movement. Test creators, implementers and advocates would push for questions based on Bloom’s classifications. These questions, referred to as performance based questioning, would assess the students’ ability to take knowledge then to apply it. Classroom educators would respond by incorporating the skills into their teaching, though few would be adequately trained in its use (Ivie, 1998). Today Bloom’s Taxonomy is a staple of teacher education despite being infrequently used in the classroom. Most educators still teach to the lower thinking skills of knowledge due to lack of training, available resources, ease in application, and their comfort level (Evans, 1999).

Researchers with expertise in medicine and psychology would expand and define the physiological nature of thinking. New research would revise Bloom’s original table and extend beyond it. David Ausubel, author of a different higher thinking theory, based his research on the cognitive memory and comprehension techniques commonly utilized in the brain (Ivie, 1998). Ausubel saw higher thinking extending beyond simple memorization but unlike Bloom tried to conceptualize the actual process, and to give definition to his concept. In his view Bloom’s Taxonomy did not go far enough in helping people to actually apply the skills (Ivie, 1998). Ausubel saw higher order thinking in terms of organization of information categorized into a series of relationships from general to specific with the use of logic and reasoning in applying it. Consistent with other research, a student best learns through proper organization of new ideas and the use of practice (Kauffman, Davis, Jakubecy & Lundgren, 2001). If an educator is cognizant of the process than he or she can utilize it through best case teaching strategies (Ivie, 1998).

Howard Gardner in 1983 would take a different approach to thinking. Gardner believed people had different strengths in cognitive thought and be best be served to that strength, albeit through the use of higher or lower thinking skills. He originally proposed eight different categories of thinking styles differentiated by verbal/linguistic, logical/mathematical, visual/spatial, musical/rhythmic, bodily/kinesthetic, naturalistic, interpersonal and intrapersonal (Gray & Waggoner, 2002).

Another work has combined Bloom’s Taxonomy with Gardner’s Multiple Intelligences in forming a matrix incorporating all of the domains and skills of both. This matrix follows Bloom’s order from lower to higher intelligence skills but allows freedom in using the different strengths as defined by Gardner (Gray & Waggoner, 2002). The matrix is designed to be user friendly and can be incorporated into lesson plans and teaching formats.

A revised edition of Bloom’s Taxonomy has been published, utilizing newer concepts of metacognitive application. A previous criticism of Bloom’s table was in its difficulty in applying easily into the teaching process. The definitions of skills were considered more subject based than action. Each skill, not being defined as a verb, led to difficulty in definition and use, and the vagueness of its listed characteristics caused confusion (Krathwohl, 2002). In the revision the table is separated into two; the first being the structure of knowledge, the second the structure of the cognitive process. In the knowledge chart skills are divided into factual knowledge, conceptual knowledge, procedural knowledge, and metacognitive knowledge. In the metacognitive chart the skills are broken into remembering, understanding, applying, analyzing, evaluating and creating. Like the original these categories are in ascending order of lower to higher skills (Krathwohl, 2002). Included in the revision is a simple to use matrix, similar to the Bloom’s/Gardner matrix, written for use within an educational setting. This is a useful and handy reference for a teacher wanting a visual aide in applying higher order thinking skills into the lesson (Krathwohl, 2002).

Conclusion

In 2001 President Bush signed The No Child Left Behind (NCLB) Act into law. Considered a momentous achievement in reforming the public school system NCLB is one of numerous changes that have swept the nation since the close of World War 2 (Goertz & Duffy, 2003). The testing of subjects to assess their skills and knowledge is nothing new, nor is the accountability of testers or those who prepare them a novel idea. The difference today is in the scope and breadth of this reform. The assessment movement, born from national pride and desire to compare our children against the world was the catalyst for the climate seen today. Materializing from this reform would be the standards movement, created in the hope of implementing a uniform, high set of lessons, objectives and measures for teachers to apply in helping students pass the newly implemented assessments. Running parallel with this was the call for higher thinking, both in research and classroom application. Eventually these movements would coalesce into the standard reform movement familiar to us today.

But does it work? The Improving America’s Schools Act of 1994, signed by President Clinton mandated state assessments for elementary, middle and high schools. These assessments had to be aligned with established national standards or standards defined by the state. 48 states soon implemented state controlled assessments in reading and math; the two remaining also assessed but allowed the measurements to be controlled by the individual districts (Goertz & Duffy, 2003). 46 of the 48 states administering these assessments utilized either criterion referenced or criterion and norm referenced testing and all of the states publicized the results. NCLB continued this trend of accountability but did not start anything new. Under this new legislation states must create assessment programs based on preset standards. All but two already had done so. Accountability must show improvement. IASA in 1994 had mandated data to be used in tracking low performing schools (Goertz & Duffy, 2003). The trend is more aggressive but is it worth the time and money?

New research illustrates a possibility that it does. Carnoy and Loeb (2002) in an analysis of two databases looked for correlation between states that used high stakes assessments and those that did not in outcomes not tested in these assessments. The researchers looked at improvements in math and reading in grades four and eight, high school retention rates, and ninth grade passing rates. The indicators for retention and passing were inconclusive but the math and reading showed improvement (Carnoy & Loeb, 2002). The data is too new, and statistically small to make any conclusive proof yet it looks like assessments lead to possible student improvements in some domains. It is no doubt these programs will continue to develop and to be implemented.

CHAPTER III

Method

Experimental Design

The testing will occur in a block of time consisting of the entire 2004-2005 school year at Easton High School located in Easton, Maryland. The school offers nine government courses throughout the year, excluding the advanced placement classes which will not be tested. Classes are in a block scheduling format, consisting of 88 minutes in length which gives ample time for the experiment to be conducted. The length of the period allows for possible variability as well as unforeseen situations in the treatment and the measurement. The school uses a homogeneous grouping format meaning students are not placed into specific classes based upon ability or other demographic variables. Class size averages about twenty five students per class, allowing for the approximate number of 225 possible students tested. Random variables already exist due to homogeneous grouping. In testing all of the students in a year the percentage of sampling error can be reduced. The only concern in the sample population is within the control groups.

There will be three assigned control groups selected by the researcher based on demographic variables found within each class. The experiment is measuring the impact of higher thinking skills on the performance of students taking a government assessment. The primary control group, control group #1, will be assigned by the researcher. This group will be extended the same instructional block and posttest as the experimental groups but will be withheld from the higher thinking skills instruction. This variability will be measured through the assessment. Control group #2 and #3 are included to reduce possibility of random and systematic error and testing bias. Control group #2 will be the only group pre-tested with the assessment, offered the instructional block, and then tested again. This group will measure possible testing bias and instrument reliability as it is the only group that will see the instrument twice. Control Group #3 will be offered the posttest only, hopefully defining the baseline score or measurement (See Appendix).

Survey Instrument

The instrument consists of fifteen multiple choice questions pertaining to the information covered in the instructional block. The time of the instrument is limited to less then twenty minutes to prevent subject apathy and neglect. The questions selected were once used on the Maryland State Government Assessment but have been retired. Presently they are allocated for teacher instructional purposes and are published on the Maryland Department of Education website. Parallel forms reliability and Survey Rating Reliability has already been established through state wide testing. I am asking department officials to actually assign the fifteen questions to me based on their expertise which will establish content validity.

Instructional Block

The instructional block is a pre-selected section of curriculum already published

to my web site. The actual lesson used will depend upon the exact questions released by the state. The instructional block is situated to last no more than thirty minutes to prevent subject apathy and to allow time for other variables within the 88 minute period. The treatment will be the same for all the groups; I will teach the lesson using my style and the exact same notes, information and within the same allocated time. The information will be in visual form by projecting the web page onto the classroom screen then offering verbal lecturing to the subjects. Using both extends auditory and visual stimuli, focusing on the two dominant learning styles usually taught within high school classrooms.

Subjects

The subjects will incorporate approximately 80% of the junior class at Easton High School for the selected year. The percentage not tested will include approximately five percent that took the class in a different school or different year and students enrolled in the advanced placement government course. The latter group comprises fewer than fifteen percent of the testable population. Groups tested include all pertinent demographic groups found in the Talbot County region. This includes, but not limited to, Caucasians, African Americans, Hispanics, and other populations. Talbot County is representative, or very close to, representing most of America in terms of race population found in public schools. Other variables, such as socio-economics, will be determined through testing.

Analysis Procedures

The experiment is looking for differences in performance on a high-stakes government assessment through the use of teacher applied higher order thinking applications. To determine any causal effect the experiment will give the exact lesson to multiple classes, with some receiving higher order thinking activities. The control groups, classes that will receive no higher order instruction, are utilized to measure differences, to determine baseline(s) and to minimize error. The population is large enough to reduce bias and to give a more representative sample of the typical 11th grade American public school students. The mean (M), median (Mdn), standard deviation (SD), and percentage (P) difference will be calculated from all the experimental groups against the three control groups.

CHAPTER VI

References

Buckles, S. & Watts, M. (1998). National standards in economics, history, social studies, civics, and geography: Complementarities, competition, or peaceful coexistence?. Journal of Economic Education, 29(2), 157-166. Retrieved February 12, 2004, from ProQuest database.

Carnoy, M. & Loeb, S. (2002). Does external accountability affect student outcomes? A cross-state analysis. Educational Evaluation and Policy Analysis, 24(4), 305-331. Retrieved September 15, 2003, from ProQuest database.

SEQ CHAPTER h r 1Evans, C. (1999). Improving test practices to require and evaluate higher levels of thinking. Education, 119(4), 616-619. Retrieved February 1, 2004, from ProQuest database.

Goertz, M. & Duffy, M. (2003). Mapping the landscape of high-stakes testing and

accountability programs. Theory into Practice, 42(1). Retrieved February 12, 2004, from ProQuest database.

Gray, K. C. & Waggoner, J. E. (2002). Multiple intelligences meet Bloom’s taxonomy. Kappa Delta Pi Record, 38(4), 184. Retrieved February 13, 2004, from ProQuest database.

Gunzenhauser, M. & G. (2003). High-stakes testing and the default philosophy of education. Theory into Practice, 42(1). Retrieved February 13, 2004

Posted in Uncategorized

Run the World (Girls)

Run the World (Girls)

Name:

Professor:

Course:

Date:

Run the World (Girls)

Music is a powerful tool that people use to pass across any message that they want. Music is an important part of a people’s culture, and this is especially true for the African-American culture. The black community has many prominent names in all genres of music, such as hip-hop, rap, RnB, jazz, among others. Beyonce is arguably one of the biggest musical names of our times. Since she began her singing career as part of the musical trio Destiny’s Child and later branched out on her own, she has made a name and fortune on her own right. She has several albums and songs to her name that have been released over the years. Her album ‘Homecoming’ released in April 2019 showcases Beyonce’s powerful vocals, enchanting performance, and a strong message, especially for the black community. One of my favorite songs from the Homecoming album is ‘Run the World (Girls)’ which brings a message of empowerment to women.

The video for the song is enchanting, to say the very least. At the start of the video, Beyonce and a group of women come out to face a group of men. The women then start to sing that they run the world. Their moves are perfectly choreographed. The girls are all dressed like they are prepared for a fight, and there is even a lion in one scene. There are also scenes showing a barren landscape and debris strewn all over, showing that there was a fight. Beyonce sings while a car blows up behind her. She also has on some fierce make-up that makes her look dominating.

The song is about women and their strength that gives them the power to run the world. The opening lyrics of the song are, “Girls, we run this mother, yeah!” (Beyonce) This shows that the women are asserting themselves, especially to the men standing in front of them. The women all look quite feminine with their dressing, make-up and hair, but they show up ready for a fight. This is something that women have to do every day; they have to fight for their positions at work, at home, in business, and in all other areas of their lives. The powerful lyrics show that they know the power they have, and they can run the world.

Beyonce emphasizes the power that women have. Although they may no use their physical power, they have other traits that help them rule the world. The lyrics, “”My persuasion can build a nation. Endless power Our love we can devour. You’ll do anything for me” (Beyonce) is a perfect example of this. Women are quite persuasive, and they use their feminine qualities as well as their love to put across their message. All the people in the world will do anything for women, especially the men. In society, women take on the traditional role of motherhood, being a wife, and bearing children. No matter how far we have come, many still hold on to these beliefs, and women are forced to struggle to get equal treatment in other areas (Utley 23). However, Beyonce sings that women are more than capable of handling all their responsibilities, both at home and in school (Chatman 931). According to her, women are “strong enough to bear the children then get back to business.”

Beyonce lauds women for their struggle and achievements in education and their hustles. She sings, “”I’m reping for the girls that’s Taking over the world Help me raise a glass for the college grads.” (Beyonce) This lyric encourages women never to lose hope and get the education they need so that they can take charge of their own lives as well as the world. In addition to this, Beyonce appreciates the women who work hard to maintain their own lives and make their money. She uses the phrase “That’s in the club rocking the latest/ Who will buy it for themselves and get more money later” (Beyonce) to show that women should not be afraid to spend their money and make even more. Women are also careful to look their best because it makes them feel good. Beyonce also recognizes the hard work that women put into their work, saying, “I work my nine to five, better cut my check! This goes out to all the women getting it in you on your grind”(Beyonce) they are willing to put in all the hours and work to achieve what they need, and they expect to get paid for it.

The song ‘Run the World (Girls)’ from Beyonce’s ‘Homecoming’ album passes across a powerful message for women and especially African-American women. Beyonce is an icon in the black community, and she often sings about issues affecting her people. ‘Run the World’ appreciates the many struggles that women have to go through in their lives. The phrase ‘Run the World’ encourages women to harness their strength and courage and take charge of the world around them. The music video carries this theme perfectly with the women in the video dressed for a fight, and vigorous choreography. The beats of the song have a high tempo showing the upbeat message and the high energy in the song. Beyonce talks about women and the different roles they play in the family, business, and their places of work. Women are strong enough to have children and still go back to work. They always work hard and strive to look their best. The song is a tribute to the power of women and the social position they hold in the world.

Works Cited

Beyonce “Run the World (Girls)” 18 May 2011. Retrieved from www.youtube.com/watch?v=VBmMU_iwe6UChatman, Dayna. “Pregnancy, Then It’s “Back To Business” Beyoncé, black femininity, and the politics of a post-feminist gender regime.” Feminist Media Studies 15.6 (2015): 926-941.

Utley, Ebony A. “What does Beyoncé mean to young girls?.” Journal of Popular Music Studies 29.2 (2017): e12212.

Posted in Uncategorized

Sacrifice and Love in ‘Casablanca’

Sacrifice and Love in ‘Casablanca’

Name:

Professor:

Course:

Date:

Sacrifice and Love in ‘Casablanca’

The 1942 film ‘Casablanca’ directed by Michael Curtiz is a romantic drama revolving around World War II. Rick is the main character in the movie, played by Humphrey Bogart. At the time, Casablanca was a bustling city with immigrants from all parts of the world on transit, mostly to the United States. Rick is an American expatriate who runs a popular café in Casablanca frequented by many patrons. Rick is a politically neutral man who keeps to himself, never interacting with the patrons in his café. However, as the film progresses, the story of Rick’s past emerges with the arrival of Ilsa Lund in Casablanca. The film is a story about war, love, and the struggle to find happiness and freedom. While ‘Casablanca’ is essentially a film about love and freedom, it also shows that the pursuit of these goals comes at a great sacrifice.

At the beginning of the film, Rick is shown to be an eccentric man whose sole focus is on running his bar. Amid the war, he never takes any political stand telling people that politics is not his business. However, in the past, Rick had been a gunrunner and fought for the Loyalist side during the Spanish War. A crook named Ugarte lays his hands on some valuable letters of transit that would allow the bearers to travel to any destination. He plans to sell them and asks Rick to keep them safe before the sale. However, Ugarte is arrested and dies before he can sell them, and Rick keeps them in his possession (Plath 12). Ilsa Lund, Rick’s former lover, and her husband Victor Laszlo arrive in Casablanca soon afterward. On seeing Ilsa, Rick is angry because she left him without explanation in Paris. Victor wants to purchase the letters, but Rick refuses due to his history with Ilsa. Ilsa sneaks into Rick’s café and explains to him the circumstances of their separation, and also confesses her love for him. Rick finally agrees to help Victor, giving Ilsa the impression that she would remain in Casablanca with Rick. He dupes Captain Renault, and Laszlo and Ilsa escape to America.

Ilsa made a sacrifice in leaving Rick in Paris. Before meeting Rick, Ilsa had been married to Victor but thought that he was dead. She kept this information secret from Rick the whole time they were together. In the film, Ilsa and Rick had planned to leave Paris together. In the scene showing their separation, Rick stands on the train platform on a rainy day. He keeps looking around, waiting for Ilsa to arrive, but she never does. When the train master announces that its three minutes before the train departs, Rick looks anxiously at his watch. Sam arrives with a note from Ilsa, telling Rick that she would not be coming, but that she cared deeply for him (Movie Predictor 46:03). Rick looks crestfallen, knowing that Ilsa would not show up, and he is forced to leave Ilsa alone. This particular scene shows the sacrifice that Ilsa made in leaving Rick, although she loved him. Just before the planned departure, she found out that her husband was still alive and made up her mind to stay and nurse him back to health.

The final scene of ‘Casablanca’ shows the sacrifice that Rick made in letting Ilsa leave with her husband Victor ( Movie Predictor 1:36:01) Rick made an agreement with Captain Renault that would have the captain arrest Victor for possession of the letters, while Ilsa and Rick remained in Casablanca. However, on reaching the airport, Rick tells Ilsa that she would be leaving with her husband. Despite the fact that Rick loved Ilsa, he knew that it was the best thing for her to go with her husband. At first, Ilsa is confused to find her name among the list of those flying because she thought she was staying in Casablanca. She grabs Rick by the lapels of his coat, protesting his decision. This scene in the film shows that Rick sacrificed his love and a life with Ilsa just so she could be safe with her husband. Although Rick loved Ilsa, he knew that she agreed to stay with him so that her husband could be safe (Robertson & v 15). Rick could have kept her, but he chose to allow her to leave. Additionally, Ilsa was ready to sacrifice her life with Victor just so he could get the letters of transit and leave Casablanca. Ilsa knew that her husband’s life was in danger, and she would do anything to keep him safe, including faking love for Rick and letting Victor leave without her.

In conclusion, the film ‘Casablanca’ is mostly about love and the sacrifices that people are willing to make for those they love. Rick and Ilsa were lovers from years before, but they were separated by circumstances. Ilsa had been married but assumed her husband was dead. Upon learning that he was still alive, she sacrificed the new happiness and love she had found with Rick to nurse her husband. The romance between Rick and Ilsa endured for many years, shown in how affected Rick is by Ilsa’s appearance in Casablanca. Ilsa and her husband Victor are trying to escape, and Rick sacrifices his love for Ilsa so that she can be happy with her husband. Love is very rarely a simple thing, and people must be willing to make difficult choices and sacrifices for the wellbeing of their loved ones, as Rick and Ilsa do in ‘Casablanca.’

Works Cited

Movie Predictor “Casablanca| 1942” YouTube. 19 February 2019. Retrieved from www.youtube.com/watch?v=gUKVorB3Ll8Plath, James. Critical Insights: Film-Casablanca. Salam Press, 2016.

Robertson, James C., and James Robertson. The Casablanca man: the cinema of Michael Curtiz. Routledge, 2013.

Posted in Uncategorized

Schindler’s List (2)

Schindler’s List (2)

Name:

Professor:

Course:

Date:

Schindler’s List

The Holocaust is one of the most horrific events in human history, between 1939 and 1945, Nazis systematically murdered more than six million Jews in Germany and neighboring countries, wiping out nearly two-thirds of Europe’s Jewish population. Film is a powerful storytelling tool, and Steven Spielberg recreates the terrors of the Holocaust is the critically acclaimed film, ‘Schindler’s List.’ It is difficult to recreate the scale of suffering and death that happened during the actual event, but the film represents a stellar performance by all those involved to provide audiences with a most realistic view of what happened. Spielberg uses color and different camera angles to highlight specific themes and ideas in the film.

Oskar Schindler is the main protagonist in the film. He is a German businessman interested in setting up a factory in Krakow. He bribes the Nazi soldiers to allow him to set up an enamelware factory, and keep his workers in their jobs even when most Jews were being shipped off to concentration camps. Schindler employs the services of an accountant named Itzhak Stern, who helps him get investors for his business. Schindler and Stern run a successful operation, with Jews working in the factory due to their lower labor costs. Schindler bribes the German armed forces by telling them that his factory supports the German war effort, and his workers remain working. However, as the war continues, the Germans lose their ground, and Second Lieutenant Amon Goth is instructed to transfer all the Jews to the Auschwitz concentration camp. Wanting to save as many lives as possible, Schindler offers Goth a huge bribe to keep his workers and relocate his factory to Brunnlitz (Tabraiz 12). Schindler witnesses the brutal clearing of the Jews from the ghetto, which leaves many of them dead. This violence and death affect him profoundly, and he tries to save as many Jews as he can. Schindler spends all his wealth on bribes to German officials and runs out of money by 1945. This coincided with Germany’s surrender having lost the war, and Schindler is to be captured as a war profiteer and Nazi. Before feeling, he bribes the German officials not to kill his workers, and the grateful Jews give him a signed letter attesting to the fact that he saved many Jewish lives.

One of the most remarkable features of Schindler’s List is its lack of color. Only very few scenes in the movie were shot in color, and this was intentional on the part of the film director. The Holocaust ended in the year 1945, and recreating events form that time would prove to be very challenging. Spielberg decided to use black and white to make the film more realistic and achieved his goal perfectly. Most of the scenes were shot on location in Poland, where the actual events happened. Although the Holocaust happened more than seventy years ago, viewers watching Schindler’s List feel like they are transported back in time to the time of the real events in the movie. This feeling allows audiences to immerse themselves in the events of the Holocaust and sympathize with all the people who suffered and died (Tabraiz 15). The lack of color also shows the draining of life during the film. Millions of people died during the Holocaust. Color is a sign of life and happiness, both of which were destroyed during the Holocaust. The black and white nature of the film captures the bleak mood of the film.

Another notable feature of the film is its use of color in specific scenes. One of the scenes with color in ‘Schindler’s List’ is the opening scene. Here, audiences see a Jewish family in prayer. The lit candles symbolize light, faith, and hope as the family engages in the religious ritual. At this time, the Jews are still free to practice their religion. However, as the scene progresses, the candles burn out, and the color disappears with the flame. The draining of color from the scene is a sign of hopelessness and death that is to come as a train transporting Jews to concentration camps appears. The girl in a red coat is one of the highlights of the film that emphasizes the use of color (Ott & Burgchardt 25). One day while riding a horse, Schindler witnesses the inhumane eviction of Jews from their homes. One person stands out from the crowd, a little girl in a red coat roaming the streets. Schindler follows her movements as she goes into a house and hides under the bed. Schindler later sees the same girl in a pile of dead bodies. The red coat is a symbol of bloodshed and the death of innocent Jews. Another prominent technique is that the film is the use of camera angles to convey certain ideas. In the opening scene, the camera pans to the fading candle of the flame in a close-up shot. The smoke from the candle then turns into smoke billowing from a train (Goodman 276). This symbolizes the transition from peace to war and death.

In conclusion, Spielberg does a stellar job of telling the story of the Holocaust to audiences in later times. The film reminds people of the truly ghastly acts that human beings can be capable of, and how the actions of one man saved many. Schindler sacrificed all his wealth to save his workers, and this leaves people to wonder how many more lives would have been saved if others like Schindler, stood up to be counted. Schindler’s List is a powerful and unforgettable reminder of human cruelty, but also human kindness. Works Cited

Goodman, Nancy R. “Opening the Mind to Trauma Through Oscillations of Focus: Learning From the Film Schindler’s List: Nancy R. Goodman.” The Power of Witnessing. Routledge, 2012. 273-279.

Ott, Brian L., and Carl R. Burgchardt. “On critical-rhetorical pedagogy: Dialoging with Schindler’s List.” Western Journal of Communication 77.1 (2013): 14-33.

Tabraiz, Anas. “The holocaust as film and literature in Schindler’s List.” Creative Forum. Vol. 21. No. 1-2. Bahri Publications, 2008.

Posted in Uncategorized

Short Essay Question Two

Short Essay Question Two

Name:

Professor:

Course:

Date:

Short Essay: Question Two

President Truman’s decisions to drop atomic bombs on the Japanese cities of Hiroshima and Nagasaki during the Second World War faced some questions and criticism, although the president defended his decision. The reason why the president decided to drop the bombs is that the Japanese refused to surrender unconditionally, as demanded by the United States. The war had been raging for years, and the Japanese showed no signs of surrender to put an end to the war. Japan declared war on the United States and attacked US fleets at Pearl Harbor (Donohue 12). They were also interested in American-owned assets in the Pacific region, and this is why they angered the US.

The United States was keen to maintain its position as a World Super Power, and thus it could not take such threats and aggravations lying down. During the last days of the war, the Japanese showed signs of relenting, yet the United States still decided to drop atomic bombs. One reason for this was to punish Japan for its grandstanding and refusal to surrender and end the war. Another reason for the bombings was that the United States wanted to show the world that any attacks would be met with a fierce retaliation, such as the atomic bombs.

President Truman had several options, one of them being accepting the conditional surrender of Japan. Another option was to wait for the weakened Japanese troops to surrender with time, and also demonstrating the atomic bombs to Japanese leaders before the actual bombings (Walker 24). All these would have been a sign of weakness, according to the US. It is difficult to judge if President Truman was right in his decision. The main issue was that the bombs were too severe of retaliation, and it affected hundreds of thousands of civilians. The effects of the bombs are still felt today in Japan.

Works Cited

Donohue, Nathan. “Understanding the decision to drop the bomb on Hiroshima and Nagasaki.” Center for Strategic & International Studies (2012).

Walker, J. Samuel. Prompt and utter destruction: Truman and the use of atomic bombs against Japan. UNC Press Books, 2016.

Posted in Uncategorized

Should We Tax the Rich More

Should We Tax the Rich More

Name:

Professor:

Course:

Date:

Should We Tax the Rich More?

The debate on taxing the rich more is a long-standing one with different points in support of the argument and others against it. Taxation is an essential part of the economy as it provides revenue for the government, which is then used to fund important projects in infrastructure, education, and healthcare, among others. Tax regimes are progressive, meaning the more a person earns, the more they are taxed. Taxes vary across states and localities. One main area of concern when it comes to taxation is the fact that the super-rich pay much lower taxes in proportion to their income and assets as compared to the middle and lower-income earners in the country. The current tax regimes have been a point of contention, with many arguing that the rich should be taxed more. 

Warren Buffet is one of the wealthiest men in the world, and his admission that he was subject to a much lower tax rate as compared to that of his secretary sparked a fierce debate. The fact of the matter is that the wealthiest individuals in the population really do pay less tax than the average citizen. The New York Times article titled ‘The Rich Really Do Pay Lower Tax Rates than You’ explores this claim in depth. The article uses data from a 2018 study across different income groups that shows that the 400 of the most affluent Americans paid significantly lower tax rates compared to other income groups in the country. Such information is shocking, given the vast difference in income among the groups. The current tax rates are a world away from those of the 1960s when the very richest people were subject to a higher tax rate than the rest of the population (Leonhardt 1). The main reason for this is the plummet in taxes, such as corporate and estate taxes. In contrast, the poor and mid-income earners have had to pay higher taxes in payroll taxes, while they do not benefit much from a reduction in estate and corporate taxes. 

Forbes author Howard Gleckman tackles this topic in the article titled ‘How Should We Tax the Rich?’ The article shares similar opinions with those of the New York Times article. Gleckman explains that tax regimes have become less progressive over the past few years, and says that the country should restructure its tax systems. He gives different areas where tax for the rich should be reconsidered. The rich have come up with ways to avoid taxes, and this is the reason why they pay lower taxes. One of the ways they do this is categorizing income as capital gains, which are subject to lower tax rates. He offers the main areas of consideration in taxing the rich, including reforms to the estate tax, introducing a wealth tax, taxing unrealized gains, and raising taxes on ordinary income and capital gains (Gleckman 1). 

The efforts to tax the rich more have often been met with stumbling blocks. An excellent example of this is the 2014 tax cuts by President Trump, which favored the very wealthy. Such a step is a step back from efforts to ensure proportionate tax rates for various income groups. Although President Trump touted the tax cuts as beneficial for job creation and for the middle-class, it has since become clear that the cuts disproportionately lower rates for the very rich. A Bloomberg publication titled ‘A Year after the Middle Class Tax Cut, the Rich Are Winning’ explores the intricate 2017 tax cuts. The consensus is that the benefits of the tax cuts on the economy will fade over time, leaving the very rich as the only beneficiaries (Steverman et al. 1).

In conclusion, there have been numerous studies and findings that show the disproportionate tax rates among the various income groups in the country. Tax regimes are supposed to be progressive, with the wealthiest paying the highest tax rates. However, in the case of the United States, the very rich pay lower tax rates, begging the question, “Should We Tax the Rich More?” 

Works Cited

Gleckman, Howard. “How Should We Tax the Rich?” Forbes. 11 September 2019. https://www.forbes.com/sites/howardgleckman/2019/09/11/how-should-we-tax-the-rich/#7caba3ac38bdLeonhardt, David. “The Rich Really Do Pay Lower Taxes Than You.” The New York Times. 6 October 2019. https://www.nytimes.com/interactive/2019/10/06/opinion/income-tax-rate-wealthy.htmlSteverman, Ben. et al. “A Year After the Middle Class Tax Cut, the Rich Are Winning.” Bloomberg. 18 December 2018. https://www.bloomberg.com/graphics/2018-tax-plan-consequences/

Posted in Uncategorized

Stealing, Theft and Robbery

Stealing, Theft and Robbery

Name:

Professor:

Course:

Date:

Stealing, Theft and Robbery

People in any society experience some form of crime, hence the need for law and order. Some of the most common crimes in the world are stealing, theft and robbery. Although many people use the terms interchangeably, there are some differences between the three. Stealing refers to the act or process of taking something that belongs to someone else. Theft and robbery are the legal terms used to define the crime of stealing, though there is one main difference. Robbery involves violence or coercion in the process of taking something, while theft does not involve force. In fact, one may not realize till much later that they have been the victim of theft, and a perfect example of this is identity theft. Due to the violence involved, robbery is taken as a more serious crime than theft under the law. Stealing, theft and robbery are common occurrences in society. In examining this topic, some relevant areas include statistics, punishment under the law, effects of the crimes and preventive measures.

Statistics from The Pew Research Organization sheds some light on violent crimes such as robbery in the United States. Data shows that violent crimes have been on the decline since the 1990s, with a 51% decrease between 1993 and 2018, according to numbers from the FBI (Gramlich 1). The report also indicates that non-violent crimes such as motor vehicle theft, burglary and theft are far more common than violent crimes. Despite the steady decline in violent crimes, many Americans’ opinions do not reflect this. For example, a 2016 Pew Research poll found that 57% of registered voters at the time believed than rates of crime were higher than the year before, despite the FBI reports showing a double-digit decline. Stealing, theft and robbery fall under the category of property crimes, which have similarly been on the decline. For example, in the year 2017, robbery rates stood at roughly 99 robberies per 100,000 people, and this fell to 87 per 100,000 people in 2018 (Gramlich 2). This is according to data from the Federal Bureau of Investigations.

Despite the promising outlook on cases of theft and robbery, identity theft remains a primary area of focus as instances of identity theft have become more common. Identity theft is a crime where a person obtains another’s personal information such as their social security number, then uses this information to impersonate the person for various reasons such as to obtain a loan, or pay for goods. The number of identity fraud cases is on the rise, mainly due to the digitization of all areas of life. With people working from home, shopping and placing orders online, and filling out various forms over the internet, their information becomes an easy target for hackers and identity fraudsters. Children have especially become an easy target for identity theft. In 2018, the Bureau of Justice Statistics reported 14.4 million cases of identity fraud (BJS). Javelin Strategy & Research focused on cybercrimes and compiled a comprehensive report on identity fraud in the year 2019. Although numbers dropped from 16.7 million in 2017 to 14.4 million in 2019, consumers bore a heavier financial burden. For example, the out of pocket costs on the victims as a result of the crime doubled to $1.7 billion from 2016 to 2019 (Ahmed 21). Additionally, 3.3 million of the consumers who fell victim to identity fraud were found to be liable or partly liable for the crimes against them.

Americans remain the most likely victims of identity theft than people from any other country, with more than 791 million identities stolen in the year 2016 alone. Statistics from a Javelin poll give more insight into why this is the case. 60% of consumers report feeling that their information is safe when using public Wi-Fi networks, which makes them more vulnerable to attack. 43% of adults admitted to shopping online over public networks, and 33% of American adults also reported sharing passwords and account names with others (Zhang 55). A majority of small business, 52%, have no cyber protection investments as they do not believe they could be victims of attacks. One of the verified ways of increasing protection online is the use of a VPN, but 75% of customers still do not use it. Account takeovers are the most prominent form of identity fraud, where fraudsters access a person’s account and change their security information such as passwords. EMV-chip-based credit cards are mostly responsible for the decline in fraud as skimmers cannot copy them.

There are many reasons why people would engage in stealing, theft and robbery, the most prominent of which is material gain. Most thefts and robberies are motivated by financial gain. An excellent example of this is the case of identity theft, where account losses resulted in the loss of $5.1 billion in 2017 alone. Theft is an easy way to make money, especially in cases where the victims do not realize the crime immediately. Identity fraudsters can sell the information they steal in the deep web to criminals who want to use it for different things (Zou et al. 8). Material gain is also the primary motivation for violent robberies. This includes robberies on stores, banks and other commercial businesses. Robbers target cash and other valuable items from these premises. Criminals also engage in theft and robbery just because they can. Some hackers and identity thieves gain access to other people’s information to prove their skill and ability to get away with it.

To avoid falling victim to theft and robberies, there are different things that people can do. The law also protects people by punishing offenders, but the first step to protecting oneself is to be vigilant and proactive. The most critical step in dealing with the issue of theft and robbery is the awareness that anyone can be a victim. With this in mind, people should take care to protect themselves as much as they can. For example, homes and business premises should have alarms installed that one can access in case of any violent attacks. People should learn basic tactics on how to deal with robbers, such as compliance to avoid further injury or harm. On the issue of identity theft, people should improve their safety online by using VPNs to protect their information (Zhang 42). They should also avoid using public networks when sharing sensitive information, such as social security numbers or credit card information. Companies and business should also invest in protecting consumers’ information. The Equifax hack in 2016 led to the stealing of information of millions of Americans, which is a potential avenue for identity theft (Zou et al. 11). Companies should thus take adequate and proactive measures to protect their customers’ data as much as they can.

Under the law, robbery and theft are serious charges depending on the seriousness of the crime. Most states have divided robberies into categories such as simple, aggravated, first-degree or second degree. These categories dictate the punishment that an offender receives. In most cases, robberies are felonies that attract at least a one-year jail term. Punishment depends on the violence of the crime, the value of property stolen, the offender’s criminal record, among other factors. Identity theft carries charges similar to those of robbery, depending on whether the crime is classified as a misdemeanour or felony. Different states have different statutes for identity theft. For instance, Arizona classifies the trafficking in a stolen identity as a Class B felony. Having a record of such crimes of ‘moral turpitude’ can have a significant impact on an offender’s life. For example, a person with such a criminal record will usually have a hard time getting employed as these records show up in a standard background check. Theft and robbery also adversely affect victims of the crimes. They lose their valuable items, some of which may never be recovered. Victims of identity theft experience some financial losses as well as access to their personal information which opens them up to other problems. Being a victim of theft or robbery also comes with psychological effects such as paranoia, fear, and trauma (Golladay & Holtfreter 751).

In conclusion, stealing, theft and robbery are serious crimes ranging from petty offences to more serious ones. Some of the most common kinds of theft and robbery include identity theft, home invasions and motor vehicle theft. Statistics from the FBI and Bureau of Justice Statistics show the trend of crimes over the years, with a general downward trend in violent crimes. Identity theft is one of the biggest concerns for consumers as people shift to online activity such as shopping and banking for convenience. Anyone can be a victim of these crimes, and people should learn some necessary forms of defences. All kinds of crime are punishable by law, but individuals must take proactive measures to keep themselves and their property safe.

Works Cited

Ahmed, Syed R. Preventing Identity Crime: Identity Theft and Identity Fraud: An Identity Crime Model and Legislative Analysis with Recommendations for Preventing Identity Crime. BRILL, 2020.

Golladay, Katelyn, and Kristy Holtfreter. “The consequences of identity theft victimization: An examination of emotional and physical health outcomes.” Victims & Offenders 12.5 (2017): 741-760.

Gramlich, John. “5 Facts About Crime in the US.” Pew Research Organization. 17 October 2019. https://www.pewresearch.org/fact-tank/2019/10/17/facts-about-crime-in-the-u-s/STATISTICS, BUREAU OF JUSTICE. “IDENTITY THEFT.” (2018).

Zhang, Joe. “Holster with protection mechanism facilitating Holstering and unholstering and protecting against theft and robbery.” U.S. Patent No. 10,041,762. 7 Aug. 2018.

Zou, Yixin, et al. “” I’ve Got Nothing to Lose”: Consumers’ Risk Perceptions and Protective Actions after the Equifax Data Breach.” Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 2018.

Posted in Uncategorized

Strong and Affordable Location Privacy in VANETS Identity Diffusion Using Time-Slots and Swapping

Strong and Affordable Location Privacy in VANETS Identity Diffusion Using Time-Slots and Swapping

Name:

Professor:

Course:

Date:

Strong and Affordable Location Privacy in VANETS: Identity Diffusion Using Time-Slots and Swapping

Vehicular Ad Hoc Networks (VANETs) need a way to help authorize messages, remove malevolent vehicles, and find valid vehicles. A public Key Infrastructure (PKI) can offer this operation using fixed public keys and certificates. However, the used of fixed keys allow an adversary to associate a key with a place and a vehicle, thus compromising the privacy of a driver. The use of Temporary Anonymous Certified Keys (TACKS) is a scheme management by VANET to improve diver’s privacy. The approach of this scheme efficiently hinders eavesdropping from associating different keys and gives timely revocation of participants misbehaving while sustaining less or the same overhead for car-to-car communication like the current IEEE 1609.2 standard used in VANET security.

The major concern for deploying VANET in the public is the achievement of effective and simple security mechanisms. Insecurity in VANET translates a broad system open to a number of security attacks such as suppression of real warning messages as well as propagation of false messages of warning, thereby leading to many accidents. The vulnerability of vehicles to security attacks in VANET makes security a major concern when coming up with such systems (Eckhoff).

Privacy is introduced into a VANET network system by using pseudonyms in the form of more block of private of public keys which are provided to the user. The keys are used for a short period and then become changed frequently. The keys are made in a way that they do not bear identity associated information but have the capability of being traced back to the user in the liability linked cases. The follow-up is usually done by Central Authorities (CA). Pseudonyms get used because they make sure that the vehicle a vehicle does not get attacked by an adversary or any other attacker and a message cannot be associated to its sender by other cars.

Instead of equipping vehicle nodes with a lot of pseudonyms, each node bears a time-clotted pool of pseudonyms with slot length t, so that p/t time-slots span the length period p. every single time-slot is assigned exactly one pseudonym, leading to p/t pseudonyms for each vehicle, and a single valid pseudonym for each arbitrary point in time. When a particular slot of time passes, a change of pseudonym gets initiated. This mechanism is usually achieved by use of clocks, which are synchronized with the Global Positioning System (GPS) signal.

The use of non-overlapping pseudonyms, similar to time-slots, implies that nodes in this scenario have the advantage of reusing pseudonyms. When the last time-slot—p/t the time-slot—has passed, time-slot 1 will get activated again, meaning that periodic time will then reload from the beginning.

A good choice of the values of p and t is very important to make sure security is realized. For instance, if t= 20 minutes and p is one week, then the pseudonym generated becomes valid, such as, Monday 7:00 a.m. till 7:20 a.m. it is vital for one to notice that the above pseudonym is then, in fact admissible on every Monday for the said 20 minutes. It is clear from the above scenario that place privacy that comes with time-slotted pool alone depends not only on the time slot-length (t) that determines the frequency of change for a node pseudonym, but also on the reliability of the periodic behavior of the node, such as, beginning the work-commute every Monday 7:00 a.m.

The exchange of pseudonyms can improve the privacy of drivers in VANET by complicating tracking for an attacker. When nodes have the ability to exchange pseudonyms in secrecy by use of encryption and keep third parties at bay from tracking nodes, which have exchanged pseudonyms, then a possible way of mapping authority also becomes admissible. The time-slotted mechanism allows only valid pseudonyms for a particular time-period to be exchanged; otherwise there is usually no guarantee that each car has exactly one pseudonym per time-slot (Chaurisia and Verma).

A node usually scan its surrounding ( such as speed, heading of its neighbors, and vehicle number) and then comes up with a decision on whether change of pseudonym if important or not, so that attackers cannot infer node pseudonyms simply after the swapping by elongating their expected place according to their last known speed and heading.

By a careful choice of limits of similarity, people can increase the possibility of both swap vehicles being unknown in terms of place. An adversary can then never know whether a pseudonym swap took place or not. The efficacy of this approach, of course, is greatly dependent on the positional and frequency accuracy of the beacons emitted by each car. The driver privacy achieved by use of this mechanism can be augmented by using silent time-slots, meaning two vehicles will not send beacons for a while after a possible swap of pseudonyms (Sun et al.).

An advantage that comes with time-slotted mechanism over pseudonym pool is its characteristic of making sure that, ideally, a car always has a pseudonym to take part in the ITS as provided it has received its p/t pseudonyms during the setup period. Whether a CA is not reachable or the vehicle was not used for longer period the car will not exhaust the pseudonyms because it has the chance of reusing old pseudonyms.

The mechanism also comes up with upper bounds of disk space and, importantly, the volume of traffic. This simplifies the make-up of the on-board units and cuts the costs of communication, bring affordability to the deployment of an ITS. The size of the pool of pseudonyms is cut to a value of p/t * s bytes and, importantly, workload of the CA no longer depends on the number vehicular nodes taking part in the network but on the ones entering it.

The use of GPS synchronized clocks and time-slots, by every node will make sure that nodes swap pseudonyms at the same time. Density of traffic and rate of penetration dependency increases traffic driver’s privacy. Further use of pseudonym exchange much improves the security of drivers (chaurasia and verma).

A common problem associated with the time-slot mechanism is that when cars swap currently valid pseudonyms—their current identifier—each vehicle will begin using the same pseudonym every p/t slots, due to the fact that a new slot n + 1 has begun, the pseudonym previously used in the slot will then be reactivated. This way, an adversary, or authority, is able to associate two positions to a single node. The current one (such as, Monday 7:00:00 a.m.) and the one from the earlier time the slot was active (such as, 7:19:59 a.m.). Moreover, each time a new vehicle gets into a time-slot for the first time, which will occur p/t times after being attached with the ITS device, the operator can associate the first place in this time-slot to a vehicle.

A diagram to illustrate the swapping of pseudonyms by two vehicles

References:

Eckhoff, Dacid et al. Strong And Affordable Location Privacy In VANETS: Identity Diffusion Using Time-Slots And Swapping. Gaimersheim: University of Erlangen.

Chaurasia and verma. Optimizing Pseudonym Updation for Anonymity in Vanets. Allahabad, Indian Inst. Technol., 2008.

Sun, Jinyuan et al. An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks. Knoxville: Univ. of Tennessee, September, 2010.

Chaurisia and Verma. Maximizing Anonymity of A Vehicle. Allahabad: Indian Inst. Technol., 2008.

Posted in Uncategorized

Sweatshops

Sweatshops

Name:

Professor:

Course:

Date:

Sweatshops

Globalization has opened up new opportunities for trade, and many companies have taken advantage of this to reduce production costs. American companies such as Nike, Apple, and many others have shifted their factories to developing countries, widely referred to as sweatshops. The debate around these sweatshops is a polarizing one, with supporters arguing that the factories offer poor people employment opportunities as a way out of poverty. On the other hand, opponents of the idea explain that sweatshops are exploitative mainly due to the low wages paid to workers, and therefore companies should raise wages or close shop in such developing countries. The main reason why companies choose to outsource production is because of lower costs. Developed countries such as the United States have high minimum wages, while developed countries do not have such laws. This means that companies can pay workers very little money in developing countries, which cuts the cost of production.

Outsourcing may be profitable for companies, but they have a negative impact on American workers. Low skill laborers stand to lose the most with outsourcing. Many of the outsourced jobs require very little training and skill, therefore having such factories in the country would offer employment opportunities for low-skilled workers. Because the majority of companies choose to outsource for economic reasons, such workers lose out on job opportunities. Outsourcing serves to lower the domestic prices of goods. The main reason for this is that lower costs of production allow companies to set prices lower. Other factors, such as lower taxes with outsourcing, further reduces the domestic prices of outsourced goods.

For the US government to reduce outsourcing, some policy changes required would be tax breaks and lowering the minimum wage (Sollars & Englander 19). Wages are the most significant impediment when it comes to setting up factories in the United States. Domestic law requires companies to pay employees a minimum wage that is comparatively much higher than those paid in developing countries. Most developing countries have no minimum wage laws, which allows companies to set their own wages for workers. Tax breaks would also be an incentive to reduce outsourcing, as companies would not have to pay as much taxes that further eat into their profit margins. Tax breaks involve lowering taxes that a company has to pay to reduce production costs.

From the two videos, the idea of sweatshops is quite different for different people. For example, the John Stossel video includes interviews from students protesting against sweatshops in developing countries. These students explain that sweatshops are exploitative, and take advantage of poor populations by paying them very low wages. On the other hand, people from these developing countries see sweatshops as beneficial to their lives, because the wages help them meet their basic needs every day. The video on the Apple factory in China presents the same idea. One point of criticism for the factory is that it employs teenagers, and workers live in a dorm as they cannot afford other accommodations (SocProf Jordan). Most workers have never even seen a working iPad, the item they work so hard to create every single day. The factory has also reported several suicides over the years. Despite this, people in the villages that the factory workers come from appreciate the employment opportunities brought by the sweatshops, and they believe that the factories have made their lives better. The conclusion from the two videos is that sweatshops are a good thing for foreign workers. Without these factories, the impoverished workers would have no other source of income.

Works Cited

SocProf Jordan. “Inside Look At Apple’s Chinese Sweatshops!” YouTube. 29 September 2013. https://www.youtube.com/watch?v=unrZw5qZzwsSollars, Gordon G., and Fred Englander. “Sweatshops: Economic analysis and exploitation as unfairness.” Journal of Business Ethics 149.1 (2018): 15-29.

Posted in Uncategorized

SWOT Analysis Tesla Model 3

SWOT Analysis Tesla Model 3

Name:

Professor:

Course:

Date:

SWOT Analysis: Tesla Model 3

Tesla is one of the most widely recognized companies in the motor vehicle industry, although it also offers services such as solar panels, power battery packs, and financial services. The company as founded in 2003 by current CEO Elon Musk along with four other cofounders. Since its inception, the company has grown exponentially, reaching annual revenues of $24.5 billion in 2019. Because of its dominant position despite being a relatively new energy solutions company, Tesla has become the subject of multiple SWOT analysis. Companies use the SWOT analysis to examine how efficient its business model is based on both internal and external factors. Companies rely on the objective results of this analysis in making important decisions. The 2020 Tesla model 3 brings innovation into the motor vehicle industry as it is powered by electricity and has various other features not available in other companies. Just like any other motor vehicle model, Tesla Model 3 has different strengths and weaknesses, as well as external opportunities and threats.

Tesla Model 3 has several strengths that position it as a top choice for customers. The first strength is the fact that it powered by electricity, which means car owners will spend less money. This model needs 34kWh per 100 miles, and the average cost of electricity is $0.12/kWh. This is a much cheaper option compared to, say, a Toyota Camry that consumes 30 MPG at an approximate cost of $2.40 per gallon of gas (Eisler 39). Tesla Model 3 users will cut down on their gas bills significantly. A second strength of the Tesla Model 3 it the fact that it is an electric model. With the current levels of concern and awareness about climate change, the Tesla Model 3 is definitely the best choice for environmentally-conscious customers. The world is trying to cut down on emissions from fossil fuels, and electric vehicles are a step in the right direction. The Tesla Model 3 also features impressive acceleration speeds from 0-60 mph in 3.5 seconds. The car’s battery is located under the floor, allowing for more stability. The car also has a driver-assist mode, which is not found in other cars in the industry. The Tesla Model 3 is the cheapest Tesla model available, with the Standard Long Range selling from $41,190 (Mas 11). One weakness of the Tesla Model 3 is that it is quite expensive compared to other cars available in the market. Although its high price tag is due to the fact that it is an electric model, many prospective customers still find it to be out of their price range.

Tesla Model 3 has a wide range of opportunities that it can take advantage of. The first opportunity is that Tesla is already the world’s leading seller of electric cars, and it should capitalize on its popularity to advertise even more. The company should also expand into other markets such as Asia to gain a wider customer base, given the fact that it is already quite popular around the world. Because it is the cheapest Tesla yet, model 3 should advertise its lower price tag to include customers who might not afford the other high priced models. As a company, Tesla has a lot of confidence in the market, as indicated by its stock price more than doubling since the start of 2020 (Eisler 41). As a highly innovative company, Tesla attracts customers on the lookout for something new and something modern.

Tesla Model 3 also faces threats from outside the company. One of these is about its driver-assist features. The company has been the subject of multiple lawsuits where the autopilot features failed in case of an accident. If the number of cases continue, the company could face financial setbacks. Tesla Model 3 is electric, and it faces threats from other competitors, such as alternative fuel vehicles (McCain 4). For example, a hybrid vehicle is more affordable and allows users to choose which type of fuel they want to use. The self-driving mode is still a cause for concern to the public, as well as the lack of regulations for autopilot modes in vehicles such as the Tesla Model 3.

Tesla should work towards converting weaknesses into strengths and threats into opportunities. One of Tesla’s Model 3’s weaknesses is its high price point compared to its competitors and other market players. To change this into a strength, Tesla should leverage the advantages of the model, such as cheap fuel, as it is powered by electricity. It should also focus on the innovative and environmental-friendly features in advertising. Tesla faces stiff competition from other manufacturers of electric vehicles which are much cheaper than the model 3. To convert this threat into an opportunity, Tesla should focus on increasing efficiency in its models. For example, the company should perfect its driver-assist technology to eliminate any malfunctions and gain public confidence. As innovation is Tesla’s main selling point, the elimination of such issues will position it as one of the most reliable electric vehicles in the market.

In conclusion, Tesla model 3 is an exciting entrant into the electric-vehicle market. The main point of attraction for the model is the fact that it is cheaper than other Tesla models, along with environmental-friendliness. As an electric car, the Tesla Model 3 is the top choice for consumers looking to play a part in reducing climate change. Although Tesla model 3 is quite pricy, its unique and innovative measures live up to the expectations.

Works Cited

Eisler, Matthew N. “A Tesla in every garage?.” IEEE Spectrum 53.2 (2016): 34-55.

Mas, Santiago Mas. Tesla Motors. SWOT analysis and corporate strategy. GRIN Verlag, 2018.

McCain, Cody. “A Strategic Audit of Tesla, Inc.” (2019).

Posted in Uncategorized