Blog

Cyberbullying Harms Caused By Social Networking Sites

Cyberbullying Harms Caused By Social Networking Sites

Cyberbullying Harms Caused By Social Networking Sites

Cyberbullying can be defined as the use of information and communication tools to perpetuate intentional or deliberate, repeated behavior which is hostile by a group or group of individuals with ill motives of causing harm to others. Until recently this has not been a subject of discussion albeit heartedly because it was not all that serious. But with the advent of the internet and subsequent advancement of technological tools like notebooks, tablets and mobile phones, cyberbullying has evolved to a very challenging issue in our lives now more than ever before (Smith, 2009). The advancement of social networking sites has also made the matters even worse. This includes such sites like face book, tweeter, LinkedIn, my space just to mention but a few. Cyberbullying mostly occurs in chat rooms, blogs, emails, texting and more commonly social networking sites. For the sake of this article I will mostly dwell on cyberbullying caused social networking sites.

Negative effects of cyber bullying

The effects that cyberbullying can have on an individuals greatly differs from one person to another. This is dependent on a number of factors like age, experience, knowledge, emotional maturity among many other variables. The most common emotional effects that have been reported to have occurred to individuals include depression, anger, sadness and frustration. It is important to note here that the effect that cyberbullying can have on one individual, is not the same effect it can have on another. This is because we all perceive what happens around us very differently (Smith, 2009).

Smith goes further to indicate that physical effects that have been reported include attempts to harm one self, physical harm and even suicide cases have been reported in some extreme cases! Thus it is evident that cyberbullying is a serious challenge facing our generation, more delay to act will pronounce disaster especially to our young people. Psychologically bullying through social networking, have been known to bring about low self esteem, psychosomatic symptoms and even withdraw feelings. This is because the way we feel when and individual bullies you on face to face scenario is more or less the same when he uses social networking sites. In fact the effect can be even far outreaching because social networking sites can reach a wider audience over very short time. For instance if some one hacks your face book account and posts obscene updates, it will reach to all your friends who are on line irrespective of where they are at the blink of an eye! It will in turn be very difficult for you to explain to them what had happened.

There are other harms of cyberbullying that are indirect or are just consequences of the same. One is the fact that it can lead to one dropping out of school (if one is schooling) or from work. This is especially true when the bullying is diminishing and has become public. This will often lead to poor performance in whatever occupation an individual is involved in. On the same note the bullied person can opt to turn violent and harm other people who are near him. Thus as much as this is indirect, it can lead to serious consequences (Smith, 2009).

Conclusion

In conclusion, I can say cyberbullying is a real threat to our lives now than ever before. In fact it has become more serious even than face to face bullying. This is due to the fact that whereas in face to face you can identify an aggressor who is bullying you and take a necessary step, in cyberbullying the aggressor is anonymous. The ability to reach a wider audience, more enduring nature of written word makes the matters even worse. Thus there is an urgent need for us to seek all possible ways to protect ourselves from this new wave of crime.

Reference

Peter Smith (2009). An investigation in to cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyber bullying. Oxford university press, London.

This is available on line at:

http://www.scribd.com/doc/46845428/Cyberbullying-In-Social-Networking-Sites-Blogs-Legal-Issues-for-Young-People-Schools.

Posted in Uncategorized

Needle-Free Diabetic Care

Needle-Free Diabetic Care

Needle-Free Diabetic Care

Student’s name

Institutional affiliation

Needle-Free Diabetic Care

Introduction

According to World Health Organization statistics of 2014, diabetes has a prevalence rate of 8.5% with 422 million people suffering from the condition globally. Diabetes is a condition of metabolic disorder that causes an individual to have higher than normal blood glucose levels. The condition is mainly caused by inadequate production of insulin in the body or the inability of body cells to respond to the insulin produced in the body. Diabetes occurs in two types; Type 1 and Type 2 diabetes. Some of the symptoms of diabetes include weight loss, hunger, thirst, fatigue, impaired vision, hyperglycemic conditions, and excessive urine excretion. If patients fail to respond well to oral treatment, insulin therapy is often the first option in the line of treatment. To diagnose diabetes, blood pricking is the procedure employed in analyzing the levels of blood glucose in a patient’s body. Pricking one’s finger with a lancet can be a painful and uncomfortable experience for many people and it often leads to less frequent testing and poor management of blood levels. If phobia of needles is an obstacle that keeps many people suffering from diabetes from observing their medication protocol, then needle-free injection devices are a game-changer. Although needle-free injections come with their fair share of challenges, they are a step in the right direction in ensuring millions of people battling diabetes access effective and patient-friendly treatment. This essay highlights various innovations in medical technology in the provision of needle-free diabetic care including Eversense, D base, GlucoTrack, NovioSense, GlucoWise, SugarBeat, and Occuity Indigo. The paper also touches on the advantages and disadvantages of needle-free diabetic care in general.

Eversense

To begin with, eversense is one of the recent developments that companies around the world have come up with to facilitate the non-invasive monitoring of glucose. Eversense is an implant developed to continuously monitor the level of glucose in an individual’s blood. It was developed by Senseonics, a US-based company. Worth noting, the device has to be initially deposited under the patient’s skin by a doctor. However, it has a sensor that is capable of lasting a period of three months before it can be replaced. Eversense uses a polymer that responds to blood sugar levels enabling it to measure the amount of glucose within the interstitial fluid (Kojic, Goyal, Lou, & Corwin, 2017). The device is put under the skin in the upper arm of a patient. It sends data in real-time to a transmitter which shows the number of glucose levels in the patient’s blood. The eversense device was approved by the Food and Drug Administration (FDA) in 2018 which struck a deal to distribute it with Roche. There was a six-month version which was approved in 2017 in Europe and FDA is set to approve the version by the end of 2021. Senseonics is currently in the process of developing an eversense device capable of lasting a year.

D-Base

D-base is another needle-free development in the treatment of diabetes. D-base is a blood sugar monitor which is the size of a shoebox. The D-base monitor is a development of DiaMonTech, a German-based firm. The monitor measures the level of sugar in a patient’s blood through beaming infrared lasers on a finger’s skins causing the glucose to convert light to heat. Then, depending on the level of heat increase on the patient’s skin, the device is able to calculate the level of glucose. The increase in heat is too small for the user to notice it. In 2019, the D-base devise was approved for use by medical professionals in diabetes centers and clinical trials in the European Union. The German-based developer company is now in the process of developing a similar device for use in the US market. Furthermore, DiaMonTech is also working to develop smaller versions including a small sensor for use in wearable devices and a handheld D-pocket device.

GlucoTrack

Glucotrack is another recent innovation in the management and treatment of diabetes. It is a development of Integrity Applications, a US-Israeli Company. GlucoTrack monitors sugar levels in a patient’s blood using a combination of electromagnetic, ultrasonic, and thermal waves. The sensor is often clipped on a person’s ear to enable it to provide readout. Worth noting, the monitor device is used by adults that suffer from type 2 diabetes and is marketed mainly in Europe. Integrity Applications is aiming at expanding its market in the United States. The company is in the process of developing second-generation GlucoTrack devices that will feature wireless earless clip sensors that will be paired with smartphones..

NovioSense

NovioSense is another medical technological innovation in needle-free diabetic care. This is a Dutch-based startup that is seeking to develop a sugar-based monitor placed under patients’ lower eyelid to enable it to send measurements of glucose levels to a smartphone directly and in real-time (Ji, Gao, Chen, Wang, Ma, Ran, & Shan, 2020). The monitor has a flexible metal coil that is two centimeters long containing nanosensors inside. The coil is in turn covered with a layer of soft hydrogel for protective purposes. The coil measures glucose levels in tear fluid by the minute and uses a similar enzyme technology as the glucose strip tests are based upon. Results from a clinical study show that the monitor can be compared to the Freestyle Libre in terms of accuracy. In 2020, NovioSense was acquired by a private equity firm based in the United States and is licensing the technology to various players within the diabetes treatment space.

GlucoWise

Glucowise is another development that is worth recognizing in the field of needle-free diabetic care. Although it is still under development, it is a sensor that measures the amount of glucose levels in the blood. It does this by simply positioning it on the patient’s skin between the forefinger and thumb. It then sends measurements in real-time to a smartphone application. Its developers hold that it is more accurate than other wireless monitors because it employs specific radiofrequency waves to calculate the amount of glucose levels in a patients’ blood. MediWise is the firm behind this device. In 2018, the UK-based firm was taken over by Metamaterial Technologies, a Canadian specialist for smart materials and photonics. Metamaterial Technologies has since continued with the work of developing GlucoWise. In July 2021, the company commenced human trials of a GlucoWise version that blends machine learning and an array of wavelength sensors to attain more accurate results.

SugarBEAT

SugarBEAT is another device that has proved useful in needle-free treatment. It was developed by Nemaura, a United Kingdom-based Biotech Company. SugarBEAT is a skin patch which is replaceable and is often attached to a transmitter. SugarBEAT non-invasively measures the level of glucose in the blood of a patient (Yale, Dulude, Egeth, Piché, Lafontaine, Carballo, & Guzman, 2017). It does this by passing across low-level electric currents on the skin and draws samples of interstitial fluid located just beneath the skin. The transmitter is rechargeable and it sends data to the patient’s smartphone via Bluetooth thus making it possible to monitor the reading with an accompanying application. Worth noting, SugarBEAT has already attained marketing approval within the European Union. The device is set to gain FDA approval later in the year.

Occuity Indigo

Occuity Indigo is another innovation to diabetes treatment that takes literally, the expression of the eyes being the window to the soul. Occuity Indigo is a glucose meter which is eye-focused. Instead of measuring fluid in tears as did their counterparts, the developer opts to look at the eyeball as it is a stable and transparent environment whose level of glucose relates with the levels in the blood. The Occuity Indigo device sends faint beam lights to the eyeballs and calculates the amount of light which bounces to the device. It can measure the level of glucose in the eye depending on how much the returning lights refract. Occuity continues to fuel the advancement of monitoring technologies with Seedrs crowdfunding campaigns. The company is also in the process of developing another device capable of screening people at increased risk of suffering from diabetes among other health problems in the future.

Advantages and Disadvantages of Needle-free Diabetic Care

Needleless syringes are effective in diabetic care and treatment because of various advantages. To begin with, needless syringes help eliminate the phobia of needles that patients struggle with. Because no needles are required, there is reduced psychological resistance to diabetes treatment. Needleless syringes increase compliance with medication particularly for young children that suffer from diabetes. Additionally, insulin treatment is not easy for patients as they have to deal with injections and holding their tummy on a daily basis which is quite an uncomfortable experience. However, the use of needless syringes makes it fun. Another advantage of needle-free diabetic care is that it is safer as there is a reduced likelihood of needles breaking (Xing, Xie, Xu, Liu, He, Yang, & Ji, 2019). Furthermore, the use of needleless syringes minimizes the risk of treatment as well as the cost and trouble of disposing of medical waste. This is because some patients carry serious infectious diseases. Additionally, needleless medication saves on money and medicine. This is because the body of needle-free injectors can be reused repeatedly and by different individuals which greatly improve the economy as it completely eliminates injection change. Additionally, needleless syringes eliminate the formation of induration which forms in the injection site following repeated injections. On the downside, needless syringes are more costly than conventional syringes. Additionally, there is the worry of the liquid not being injected successfully since the injection process is rapid and mild which is contrary to the traditional syringe. Another disadvantage is that the needless syringes are large in volume compared to the traditional syringe making them more complicated to and use.

Conclusion

In closing, needleless approaches to diabetes care are more effective when compared to convectional ways of administering medication. In recent years, there has been various innovations in medical technology in providing needle-free diabetic care including, Eversense, D base, GlucoTrack, Novio Sense, GlucoWise, SugarBeat, and Occuity Indigo. Although they have their fair share of disadvantages, they have proved effective because they have eliminated the use of needles, a mode of treatment that is notorious for evoking fear among patients. Diabetes patients tend not to follow their medication because of the process of injecting insulin that they must undertake on day-to-day basis. Needless syringes help in saving money and medicine and eliminate the formation of indurations at the injection site. Needlessness syringes are effective for self-injection but they have the downside of having a larger volume compared to traditional syringes. Needleless syringes are also more expensive and may take time for the patients to its use. In the future, there is a need for developers to undertake mass media sensitization to improve the confidence of people in needleless diabetic care. This will make its use more effective as a result of increased uptake.

References

Kojic, N., Goyal, P., Lou, C. H., & Corwin, M. J. (2017). An innovative needle-free injection system: comparison to 1 ml standard subcutaneous injection. AAPS PharmSciTech, 18(8), 2965-2970.

Ji, L., Gao, L., Chen, L., Wang, Y., Ma, Z., Ran, X., & Shan, Z. (2020). Insulin delivery with a needle-free insulin injector versus a conventional insulin pen in Chinese patients with type 2 diabetes mellitus: A 16-week, multicenter, randomized clinical trial (the FREE study). EClinicalMedicine, 23, 100368.

Xing, Y., Xie, X., Xu, J., Liu, J., He, Q., Yang, W., … & Ji, Q. (2019). Efficacy and safety of a needle-free injector in Chinese patients with type 2 diabetes mellitus treated with basal insulin: a multicentre, prospective, randomized, crossover study. Expert opinion on drug delivery, 16(9), 995-1002.

Yale, J. F., Dulude, H., Egeth, M., Piché, C. A., Lafontaine, M., Carballo, D., … & Guzman, C. B. (2017). Faster use and fewer failures with needle-free nasal glucagon versus injectable glucagon in severe hypoglycemia rescue: a simulation study. Diabetes technology & therapeutics, 19(7), 423-432.

Posted in Uncategorized

cyber warfare

cyber warfare

Cyber Warfare

Name

Affiliation

Cyber Warfare

Cyber warfare is any felony that is commited using a computer or any other computer related device for example the internet. It spans from cyber fraud activities to a simple act like downloading a music file from the internet. It also include activities like creating a program that will create disturbances to the users of a particular group of computers and also posting text and pictures on the websites that will corrupt the minds of some individuals. When somebody information of a company that is suppose to be confidential is also considered as a cyber-warfare (Waxman, 2011). This activity is a great challenge in 2030 globalization vision for many organizations.

There are very many cyber warfare that can be commited using the computer or with the aid of a computer. The most appropriate way to look at it in detail is identifying them by the types and level of cyber Warfare. Cyber Warfare are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The scope of cyber Warfare is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed like printer cartridges.

The other Warfare is SQL injection. This is a unique Warfare that targets the web pages of the system application. It cuts down the communication between the database and the system application interface (Debeck, 2011). This Warfare is common in organization where system implementation is taking place. An example is a situation where an Warfare alters the name of the database and hence disconnects it from the user interface (United Nations Office for Disarmament Affairs, 2010). The best measure that can be used to curb this is by limiting the number of the people who has the right to manipulate the database activates and also the punishment that individual that uses a computer to physically hurt another person or tries to commit a felony with an aid of a computer is made severe (Stytz & Banks, 2010). There was also a provision of extensive security to media group that gave hand to the police while carrying out the investigation while the vulnerable Warfare that were frequent were blacklisted so that more security concern were availed in those areas.

Another Warfare that is very rampant is abuse of system access rights. This kind of Warfare is mostly executed by the employees in a company in and intention of vengeance or sabotage. Detecting such issue is cumbersome since the intrusion will be taking place internally and hence task tracking may be a challenge. The employees use his or her right to access the system to make alteration and modification of data with the intension of financial gains for example in an employee in the IT department of a water providing company can reduce the consumption figures of some specific accounts then liaise with the holders of those accounts for payment.

To combat all frauds that are related to inappropriate billing, the people that are authorized to enter the company’s data concerning the customers must exercise the professional ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the vetted individuals execute their duties do not deteriorate with time. In addition, a rotational exercise should be in place to stop these individuals from getting acquainted with other employees in other departments and hence conspiracy is avoided. To stop this kind of Cyber Warfare, the company should put in place a tracking system which will compare each consumption figure with the average of the previous five or more months and hence gives an approximate value. In addition, the data security manager should utilize the advantages that the windows active directory has. The Microsoft windows group policy is applied in grouping the different categories of users that are suppose to get access to some particular information. It is a key component that gives specific setups for particular group of users.

Another type of Warfare that that mostly affects the system users who gives commonly known username and password as default credential is unauthorized access via default credential. A good example of this is where the system administrator in an institution put the name of the college as both username and password. This is very vulnerable to Warfare’s because they capitalized the idea of using the default credentials that are related to the institution such as setting the password of accessing the wireless network of Aberdeen College as aberdeencollege. Anyone who knows come within the coverage and has the intention of cracking this password can succeed. To avoid this, the default credential should be unique as in; it should not be related to the name of the institution or the company.

The other Warfare is the violation of acceptable system user policies. In some companies, the system once logged in by the user will remain on till logged out. A user can negligently abandon the system while logged in and go out, this can give an opportunity to unauthorized person to access the system and facilitate any harmful event like altering the data with the intention of causing an embarrassment to the company or the owner. An example of this is where somebody forgets to log from his email account and another person comes and send abusive or vulgar mails to some group of people. This can be detriment to the user’s attribute because everybody believes that the message comes from the rightful owner of the account. To eliminate this Warfare, everybody should be careful while using such system by ensuring that the log out process has been affected anytime you can to quit from using the system.

Nation State

A Nation state is a regional political group for which there is an autonomous composed Government. A Nation state is a state whose essential unwaveringness is to a social character toward oneself, which we call a Nation or nationality, and is currently the transcendent type of state association. Nation states have sway and authenticity. The importance of the Nation state is that, once merged around a specific nationality, it is a stable type of state association. It is the sole structure in which the development of popular government is conceivable and which does not tend to grow its territory (Arendt, 2009). This stable environment ended up being vital for the rise of present day money related, mechanical and innovative civilization in Western Europe in the seventeenth and eighteenth hundreds of years. The main noteworthy contenders were supreme China, which was innovatively exceedingly inventive however did not turned into a mechanical public opinion until current times, and the early Islamic Caliphate, which was likewise mechanically and socially imaginative yet was prevailed over by military and tribal states and afterward declined.

Until Nation states showed up in the sixteenth and seventeenth century, government was by rulers whose power did not determine from the individuals whom they administered, who were termed their “subjects”. States decided in that way had seven separate structures, individual guideline, religious government, city state, theocracy, military state, tribal state, and domain. The key capacity of such a ruler was to attain peace and request, by judging debate and instituting laws by which question could be evaded. This could just be performed if his (infrequently, her) power did not determine from his subjects, and to strengthen that power the idea of authenticity emerged, which characterized a right to govern autonomously of any protected framework. Authenticity must be sure keeping in mind the end goal to be compelling, and a debated authenticity was undesirable and may offer ascent to civil war.

Individual guideline was the ordinary first type of nation state association, very nearly constantly acknowledged by a genetic line. It was for the most part underpinned by a religious approval, truly the ordinary wellspring of profound quality. Theocracies emerged when religious power got to be stronger than particular tenet, in spite of the fact that the two may be joined together. City states emerged in Europe, likewise when particular tenet was powerless, so as to endeavor the included worth possible in terms of professional career. Before the included quality from exchange and industry was accessible to states, the main manifestation of riches was the surplus possible from farming. Particular states accordingly had an innate propensity to try to enlarge their domains, by success, legacy, or different means, and along these lines regional realms emerged. In a few states, the armed force picked up control of its own recruitment and advancement and set up a free military rank, which we call military standard. In a few states with a pastoral hinterland, pastoral tribes built a type of tribal government, additionally for the most part underpinned by a religious assent. In spite of the fact that the center of most regional domains were close to home states, they have additionally been theocracies, city states, military states, and tribal states (Favell, 2010).

The stronghold of a Nation state involved the exchange of authenticity from a ruler not responsible to those he administered to one responsible to the Nation. This emerged as the improvement of riches from enhanced agribusiness, exchange, and industry made a common public opinion. The civil pop culture looked for a common personality, through dialect, religion, regular social associations, and imparted encounters and diversions, and along these lines turned into a Nation. We can distinguish three stages in the improvement of every Nation state. Stage I was the advancement of a nationality inside a plainly characterized pre Nation State. Stage II was the exchange of authenticity from the ruler to the Nation, by some type of disobedience to the ruler or statement of nationality. Stage III was the outflow of that authenticity by a lawful methodology called a Constitution, under which the administration could be named and evacuated, its powers might be wrangled about and affirmed, and both the legislature and private case are liable to law. Most present nation states have made the move to Phase II and of these an expanding number, maybe a greater part; have made the further move to Phase III.

At the point when Nation states emerged they expanded their national riches by taking part in more across the board exchange, and had a common longing to procure exchanging stations. Thusly, exchanging or pioneer domains emerged, which rivaled one another as new exchanging open doors showed up. There were accordingly two sorts of realm, regional and exchanging. From the perspective of the subject people groups, exchanging domains were likewise not established despite the fact that the center state may be. Despite the fact that at the begin of the twentieth century the world’s wealthiest states were Nation states, they were few in number and most of the world’s populace were liable to realms, either regional or exchanging, all of which have now been isolated into states of which the extraordinary greater part are Nation States.

Globalization

Globalization is a standout amongst the most discussed issues of the day. It is all around on TV, on sites, learning diaries, work gathering rooms and in association’s meeting rooms. Strikingly, for so generally an utilized term, there does not seem to have an absolutely concurred definition. One of the much of the time utilized definitions is that globalization alludes to the developing reconciliation of social orders over the world, it has taken numerous structures, and it is hard to talk about it in a general manner. However, the greater part of the times the term is utilized is to allude to the budgetary mix of the world markets. Thusly our principle dialog will be on the monetary joining of the world and what negative impacts of globalization are, particularly the negative impacts Palast (2002) contends that globalization bankrupts the world’s poor, advancing the rich and pulverizing nature’s domain, while few supporters see it as a quick approach to widespread peace and success.

Numerous created nations began to change in the 1980’s after the burden of World Bank and IMF structural modification approaches. Backers would contend that this liberalization would help budgetary development, which will diminish neediness and that nations with more open markets will have encountered higher development rates that those with protectionist strategies (Ades &Glaeser 1999). However, Manenji (1998) contends that unregulated facilitated commerce, driven exclusively by business sector strengths, in that while it has raised expectations for everyday comforts for some individuals, particularly in created nations, it has not done so for the poorest. Following 20 years of exchange liberalization, destitution in numerous nations has not fallen. For instance in horticulture where the poorest make the majority of their living, nourishment imports are halfway in charge of pulverization of little agriculturists, for instance Malawi which creates rice which it sold in most South African nations now need to battle with rice which is sold at much less expensive rates, which is foreign from Asia.

Global exchange foodstuffs is expanding much speedier than nourishment creation; it took off as an aftereffect of exchange liberalization under the IMF, WTO and World Bank. As an outcome more land in creating nations is constantly utilized by expansive multinational organizations to develop nourishment for the fare market, which has suggestions for sustenance creation for nearby individuals. The cost of numerous farming wares, for example, espresso and tea are at close to unequaled lows. This has an expansive hindering effect on poor agriculturists, for the reason that purchasing foreign made sustenance costs are low to the point that there is no good reason for develop them.

Consequently a percentage of the ranchers are currently forsaking espresso and tea developing for pill development and these pills are, no doubt unlawfully transported to the West and destroying the lives of many individuals, which causes the western governments to use limitless measure of cash to battle this issue and blaming creating nations for corrupt conduct by not doing what’s necessary to avert drug development. Inside the created world we can say that the development of medication creating plants, for example, the opium poppy is not a satisfactory thing to do, yet reprimanding those nations of corrupt conduct and rebuffing them monetarily and politically won’t take care of the current issue. Hence the Governments must thoroughly consider contrasts in social circumstances, technique and why it has happened and get to the base of the issue, when this will be carried out it will be clear to see that there is nothing to do with ethics however with circumstances those nations are continuously pushed into. For associations and nations not handling the issues in just ways is basically getting to their decision for one set of movements over an alternate set of activities. The way that distinctive parts of the world have diverse good practices shows none, of these that they are all just as great nor that any of them is fundamentally improper (de George, 1978). There is nothing the matter with that; however, there is nothing right with that either.

The ideal approach to manage globalization is frankly about it. Globalization brings open doors yet it likewise brings dangers, actually, when neediness falling largely there could be local builds about which public opinion needs to be concentered. Particularly for the creating nations, with their potential absence of recourses for state-of-the-art enactment, it is paramount to recollect that not everything that is lawful is correct. Lawfulness is frequently just the moral least. Subsequently where national principles are deficient, the organization would need to implement their higher gauges and not exploit them. Business is a piece of our public and morals has put good to go as in any viable a piece of social life (de George, 1978).

Recommendations

The following recommendations will help prevent the world from cyber warfare:

The recommendation that I give concerning the security issues that are brought about by all the cyber related issues is that any weakness that can give the Warfare a room to get access to any computer or internet-based materials should not be left. In addition, severe punishment should be put in place for anybody that is convicted with any cyber warfare activity so that the others may fear to engage on it (Knapp & Boulton, 2006). In addition, any other party that handles any internet related information that is meant to be used at any event should be vigilant because some of the employees in these places conspire with the warfare in accomplishing the Warfares. This can be done by applying group policy settings in the computers that those users that do not need to get access to such sensitive information are locked out.

The last layer of the group policy object is used by the administrator to lock down the computers that those particular users operate by applying policy setting to each user (United Nations Office for Disarmament Affairs, 2010). The properties of multiple local group objects are derived from the processing order. The processing order of the three layers differs. The third layer contains specific user settings that are set to one user on a computer that he/she uses.

One way of ensuring this setting is by redirecting the desktop components that you do not want those specific users to get access. The other way of doing this is by redirecting the start menu and giving the computer a different start menu for example that of windows 9x/NT.

Moreover, the investigation department that deals specifically with cyber warfare should be established and all the laws and regulation governing the cyber warfare must be redefined such that any sign of cyber related warfare is punished.

Conclusion

Basing on the rate at which the technology is evolving, the future of Cyber Warfare, Globalization, and change states to Nation State is unpredictable. This is because the people who engage themselves in cyber warfare and Globalization are also professionals in the field who could be having the intension to cause harm or could be some who are trying to text their prowess in technology and as a result execute a felony. In general, the best way to combat the whole thing is by ensuring that everybody who interacts with the computer becomes conscious and practices the professional ethics as cyber warfare can destroy the world.

References

Ades, A and Glaeser, E (1999) Evidence on Growth, Increasing Returns and the extent of the Market, Quarterly Journal of Economics: 114(3), pp.1025-1046 

Arendt, H. (2009). The Decline of the Nation-State and the End of the Rights of Man.

De George, R (1978) Ethics, free enterprise and Public policy, Oxford: Oxford University Press. 

Favell, A. (2010). Integration nations: the nation-state and research on immigrants in Western Europe. Selected Studies in International Migration and Immigrant Incorporation, 1, 371.Palast, G (2002) The best democracy money can buy, London: Pluto Press. Manenji, F (1998) the effects of globalization on culture in Africa in the eyes of an African woman, www.wcc-coe.org/wcc/what/jpc/effglob.html Mohamad, M (2002) Globalization and Developing Countries, www.globalpolicy.org/globaliz/define/1009malaysiamp.htm

Debeck, C. (2011). The Correlates of Cyber Warfare: A database for the modern era.

Dipert, R. R. (2010). The ethics of cyber warfare. Journal of Military Ethics, 9(4), 384-410.

Stytz, M. R., & Banks, S. B. (2010). Addressing Simulation Issues Posed by Cyber Warfare Technologies. SCS M&S Magazine. n (3).

United Nations. Office for Disarmament Affairs. (2010). Cyber warfare and its impact on international security (No. 19). United Nations Publications.

Waxman, M. C. (2011). Cyber-Warfare and the Use of Force: Back to the Future of Article 2 (4). Yale J. Int’l L., 36, 421.

Posted in Uncategorized

NavareSpring 2020

NavareSpring 2020

Navare/Spring 2020

Final Research Paper Assignment

First Draft Due: Sunday, April 19 at 11:59 p.m. in Dropbox marked “Research DRAFT”

Final Draft Due: Monday, May 4 at 11:59 p.m. in Dropbox marked “Research FINAL “

Assignment

For your final paper, you must write a 5 or more page argumentative research paper. The paper should include an introductory paragraph, several supporting body paragraphs, at least one counterargument/refutation paragraph and a conclusion. I cannot emphasize enough that this must have an ARGUMENTATIVE THESIS!

For this assignment you may choose one of the following topics to write about or a topic of your own choosing as long as you get approval from me on your chosen topic.

Covid-19

Spanish Flu and Covid-19

Main objective and beginning steps include researching and comparing/contrasting 1918 flu (aka: Spanish flu) with Covid-19 to formulate an argument. Some arguments might include lessons we could/should have learned from the Spanish Flu, ways we can continue to combat current pandemic, best practices regarding current pandemic…etc. Some references to get you started:

– https://www.vindy.com/news/local-news/2020/04/lessons-from-1918-pandemic-stick-for%E2%80%88covid-19-in-2020/- https://www.cnbc.com/2020/03/26/coronavirus-may-be-deadlier-than-1918-flu-heres-how-it-stacks-up-to-other-pandemics.htmlThe Politics of Covid-19

Main objective and beginning steps include researching political party responses, criticisms to the pandemic, including individual politicians and their responses to the outbreak (may also include how they responded and/or did not respond), to form an argument. Some beginning stages and articles may include the following:

– https://www.theatlantic.com/politics/archive/2020/03/covid-19-red-states-politics-daily/609211/- https://www.washingtonpost.com/nation/2020/04/06/tybee-island-kemp-coronavirus/Employment, Economy and Covid-19

Some articles to get you started in formulating an argumentative thesis.

– https://www.dol.gov/agencies/whd/pandemic- https://www.statnews.com/2020/04/06/the-certified-recovered-from-covid-19-could-lead-the-economic-recovery/- https://www.weforum.org/agenda/2020/04/coronavirus-covid19-united-states-economics-employment-businessScience of Covid-19

Some articles to get you started in formulating an argumentative thesis.

– https://www.weforum.org/agenda/2020/04/covid-19-latest-scientific-developments/- https://www.nytimes.com/2020/04/01/world/europe/coronavirus-science-research-cooperation.htmlEducation and Covid-19

Some articles to get you started in formulating an argumentative thesis.

– https://www.insidehighered.com/digital-learning/blogs/learning-innovation/teaching-and-learning-after-covid-19- https://www.universityworldnews.com/post.php?story=20200324065639773Abuse and Covid-19

Some articles to get you started in formulating an argumentative thesis.

– https://www.wsaw.com/content/news/Child-abuse-reports-fall-by-20-in-Wisconsin-amid-COVID-19-pandemic-Experts-fear-unseen-crisis-569372721.html- https://www.fbi.gov/news/pressrel/press-releases/school-closings-due-to-covid-19-present-potential-for-increased-risk-of-child-exploitationRubric

Expectations for this assignment include the following:

MLA/Research

-Valid, credible sources; at least 5-7; plan to use ONE per paragraph (or more)

-Correct MLA formatting (header, page numbers, last name, double-spaced…etc.)

-Proper MLA Works Cited page (in alphabetical order…etc.)

-Proper in-text citation (last name and page number, mention of author in-text and page number where appropriate)

-Proper use of quotation marks and quotations, when appropriate

Coherence

-Clear argumentative thesis, support, counterargument, conclusion…etc.

-Use of topic sentences

-Compete paragraphs (5ish sentences each)

-Transitions between paragraphs

-Logical organization of argument

Grammar and Mechanics

-Keep it clean: use correct, complete sentences, commas, parallel syntax…etc.

-Correct use of capitalization

-Correct spelling…etc.

Posted in Uncategorized

Cyber War And Theft Of Intellectual Property The Threat That China Poses To The United States

Cyber War And Theft Of Intellectual Property The Threat That China Poses To The United States

Cyber War And Theft Of Intellectual Property: The Threat That China Poses To The United States

Abstract

Over the recent past, there have been massive developments concerning the use of computer technology and the internet to conduct surveillance upon enemy nations or rival countries by other opposing powers. This paper discusses the recent developments in cyber space warfare and the role of china in the current threats that have placed the United States of America and the world as a whole on high alerts. The paper posits that there are steps the Chinese government has refused to take regarding the level of internet usage to access foreign intellectual content. Instead of working together with the USA and other governments to reach an agreement on the way they can exchange military intelligence, for example, the Chinese have reportedly hacked into the systems of other governments and helped themselves with this intellectual property. This paper discusses some of the most prevalent issues regarding Chinese IP theft as well as the characteristics of these thefts. The paper also analyzes the factors that will facilitate success and collaboration relative to China IP threats.

Introduction

In the recent past, there have been various threats as well as successful attempts by the Chinese to hack into the Computer intelligence systems of the United States government with the aim of stealing highly classified information regarding some of the core US operation schema. These recent threats are not the first of their kind, since the first IP theft cases can be traced back to as early as the 1970s. However, many researchers and scholars have given their opinions concerning the increasing cases of cyber attacks, with divergent opinions being brought into light. While some hold that theft of intellectual property of high value like military operations are acts of war, others argue that these are necessary evil that a country may indulge in to get trade secrets for the sole purposes of economic development.

Consistent research into the issue has revealed some cases of intellectual property thefts across history, and especially involving the US. What these researchers have failed to give the much deserved attention is the reasons why these IP thefts occur. Similarly, researchers have given only a small deal of research into the role of China in IP theft and its driving factor towards cyber war. The aim of this research paper, therefore, is to fill this information gap by offering an in-depth analysis on China’s case. In order to achieve this, the paper will corroborate information from both primary and secondary sources on the topic of discussion so as to offer balanced arguments. The writer holds the position that the degree of involvement of China in IP theft has reached the extent that it can no longer be ignored or wished away. China is becoming a threat to the security of data in the computer achieves of the US, and by extension, the entire world.

This paper is divided into various sections for ease of analysis or perusal in the following manner. This section, which is the first section, is the introduction, which offer insight into the content of the paper and the objective of study the second section outlines some of the most important issues that have so far come into play regarding the formulation of China IP threats. The third section analyses some of the most fundamental characteristics of China IP threats, and the fourth section discusses the factors that will facilitate success and collaboration relative to China IP/threats. The paper winds up in a conclusive summary which offers a preview of the discussion and the author’s thoughts on the same.

Global issues associated with formulating China IP/threats

The prosecution problem

Intellectual property refers to anything that is uniquely created by someone largely by the use of their mind (intellect) and, as such, has exclusive ownership rights. These rights are protected by the law and they extend to items such as music, art, literary content, inventions and discoveries, and symbols among others. In the computer world, they include programs, software, hardware, firmware and certain pieces of information that are otherwise classified to the owner(s). Today, most countries own huge archives of information regarding important functionalities of the government. The information can include anything from personal data of citizens, criminals, government, employees; to profiles of business organizations, their historical or criminal activities; to the country’s military and defense strategies.

Chinese hackers continue to plague the world with their persistent intrusion into foreign computer systems in search of secrets and other things known only to them. As General Keith Alexander testified during his Senate confirmation hearing as the first leader of US Cyber Command, the top government institutions are probed hundreds of thousands of times daily (Senate Armed Services Committee, 2010). These include the White House, CIA, FBI and Pentagon, among others, all of which are known for their huge banks of data. In 2006, Chinese hackers extracted an estimated 20 terabytes of data from government computers (Morozov, 2010). Private companies also are not immune from attacks. Earlier this year, Google moved from China to Hong Kong after tracing threatening cyber activity which affected at least 20 other U.S. corporations, to servers in China. As the Air Force takes on an expanding role in deterring and defending against foreign cyber threats, judge advocates find themselves increasingly responsible for providing cyber law expertise (Huntley, 2010).

To address this growing need, The Judge Advocate General’s School recently launched its first cyber-law course. The three-day curriculum included lectures on computer and network basics, cyber operations law, and current threats in cyber warfare. Air Force JAGs can now earn cyber law LLM’s. The Air Force Law Review likewise tackled the issue by publishing a master edition on a range of cutting edge cyber law issues

To provide context to the rapidly expanding field of cyber law, it is helpful to look more closely at the cultural environments in which hackers operate. It has been foldout that the hackers in china belong to organized groups with private communication channels. Understanding what might be called the “culture of Chinese hacking” enables scholars to contextually understand the threat of hacking as well as clarify some of the most crucial legal issues confronted in cyberspace.

Current Events

In recent years, American cyber attack victims have included an illustrious group: the U.S. State Department (2005), the Pentagon’s NIPRNET (2006), the US Naval War College (2006), a nuclear weapons laboratory at Oak Ridge National Lab in Tennessee (2007), the White House (2008), and NASA (2008) (Huntley, 2010). In one instance, hackers linked to China reportedly acquired information on NATO troop movements in Afghanistan; in another, the Joint Strike Fighter program was reportedly compromised (Sullivan, 2009)

While individual hackers can and do pose a threat to U.S. security, recent reports suggest a substantial organization within the Chinese hacker community. Last year, researchers discovered a cyber espionage network called Ghostnet, which was targeting computers in the foreign ministries and embassies of many Asian countries, as well as news media and non-governmental organizations. A virus linked to Ghostnet was able to spread to some 1300 computers in over 100 countries. To make the situation worse, the Ghostnet hackers, most of whom are based in China, were able to posses the control of the victimized computers temporarily (Morozov, 2010).

More recently, researchers have uncovered a cyber espionage network that compromised systems primarily based in India (Sullivan, 2009). This network, originating in Chengdu, China, acquired information from the Indian government, the United Nations, and the office of the Dalai Lama, including access to his personal e-mail. One of the most historical hacking of all time is attributed to the operation in which Indian hackers stole the information regarding NATO troop movements in Afghanistan. These breaches of security reflect the global effect of such attacks.

The rapid increase in cyber threats present judge advocates with numerous novel legal issues, such as the definition of a cyber “weapon” and whether harmful cyber activities constitute “attacks” under the law of armed conflict (Sullivan, 2009). Likewise, traditional JAG work in communications law, intelligence oversight, and information security law has been complicated by related cyber issues. One issue that is most significantly discussed currently is the issue of attribution in which the biggest question is whether the hacker can attribute his (or her) hacking activities to the government.

Attribution

In 2008, the U.S.-China Economic and Security Review Commission held a hearing on Chinese cyber threats, bringing together experts from throughout the national security community. The Commission’s report from the event concluded that “determining the origin of cyber operations, and attributing them to the Chinese government or any other operator, are difficult. Computer network operations provide a high degree of plausible deniability to the Chinese government (Sullivan, 2009). To the extent that uncertainty obscures questions of attribution in the cyber world, how are legal advisors to proceed?

Under international law, a state can be held responsible for the actions of a non-state actor if it can “effectively control” the non-state actor.12 Officers with the People’s Liberation Army Academy of Military Sciences elaborated on this point in 2007, explaining to an American delegation that attribution of hackers to the Chinese government would require that “the source… be clearly identified” (Goldsmith, 2009).

In the The Air Force Law Review, Major Arie J. Schaap argued that a more appropriate attribution rule in the cyber realm would allow for attribution where a state merely acquiesces to cyber attacks on foreign targets, despite having the means to prohibit and prevent such activity14 So conceived, if the Chinese government were to take a purely permissive stance on hacking, and if it demonstrated the capacity to prevent hacking originating within its sovereign territory, the argument might be made that the Chinese government could be held responsible for hacking originating in China. However, as discussed below, China has at least presented itself as neither purely permissive nor capable of preventing hacking (Sullivan, 2009).

Steps to criminalize hacking and publicize the prosecution of high-profile hackers creates at least a colorable argument that the Chinese government does not seek to permit hacking by non-governmental Internet users. Furthermore, reported attacks by Chinese hackers on Chinese business interests, many of which are closely connected to local government and party officials, suggests an inability to prevent some forms of non-governmental hacking (Sullivan, 2010).

It is perhaps too easy to argue that non-governmental hacking by private Chinese citizens cannot easily be attributed to the state, or that hacking by the People’s Liberation Army can be attributed to the state. A more concrete and vexing attribution problem arises when one looks more closely at the gray area between state and non-state in China’s sprawling military industrial complex. As part of its drive to modernize the PL A, the Chinese government has sought in recent years to draw on resources found in the civilian population. In 2003, for example, the Sixteenth Party Congress announced the policy of yujun yumin, or locating military potential in civilian capabilities. As a result, determining where the Chinese government ends and the civilian sector begin is an increasingly imprecise undertaking (Barboza, 2009).

Chinese universities are a case in point. Recently, researchers affiliated with major Chinese universities have published a number of articles on cyber security, including several examining vulnerabilities in U.S. infrastructure. One article, entitled “Cascade-Based Attack on the U.S. Power Grid,” looks at how an attacker might cause power grid failures in the United States. (Goldsmith, 2010). Another article, “Research of Attack Taxonomy Based on Network Attack Platform,” introduced a network attack platform capable of launching virus, Trojan Horse, and other cyber attacks (Goldsmith, 2010).

The status of personnel at universities is likewise a complicating factor. The Information Security Engineering Institute at the Shanghai Jiaotong University (SJU) is currently headed by Mr. Peng Dequan, former Director of the Science and Technology Commission of the Ministry of State Security, one of China’s principal foreign intelligence services Arie (2009). Through the revolving door between the academic and military communities is by no means unique to China, it does demonstrate the difficulties one would have clearly identified the source of Chinese cyber capabilities. Mr. Peng’s position as head of SJU drives this point home, given that the recent hacker attacks on Google were traced to computers at SJU (Sawyer, 2010).

If the university system and military industrial complex were not complicated enough, perhaps the best example of the difficulties of accurate attribution in China is the eight million member militia spread throughout the country, which researchers call “an operational nexus” between Chinese military operations and civilian information security professionals (Barboza, 2009). Directly accountable to the State Council and Central Military Commission, militia units are comprised of civilians from commercial firms in fields critical to national defense, including software design and telecommunications (Mulvenon and Sam, 2010). Local militia units in Ningxia, Henan, and Guangdong provinces have published online material describing unit missions, which include network, information, electronic, and psychological warfare (Weinstein, 2009). These militia units have sought out individuals with foreign languages and cultural skills, suggesting a mission not limited to territorial China (Weinstein, 2009).

Attribution of Chinese cyber attacks likely will become increasingly difficult for US officials. As we have seen, there are no clear lines distinguishing military from non-military actors in China. While this blurry line plays a role in how hackers operate, cultural factors also influence the world of the Chinese hackers.

HYPERLINK “http://ehis.ebscohost.com/ehost/detail?sid=e2e23b33-f1b9-45c5-92ff-4adc2220394f%40sessionmgr198&vid=1&hid=109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d” l “toc” o “Chinese Hacker Culture”Chinese Hacker Culture

Hacker War, a novel published online in 2008 by a number of Chinese e-publishing websites, offers a window into the often inaccessible world of Chinese hacking (King, 2009). The protagonist, Chen Yonghao, hears the call to arms after the accidental NATO bombing of the Chinese embassy in Belgrade, Yugoslavia. Rather than taking up traditional weapons, however, Chen organizes a group of citizen hackers through an Internet chat room — and the Chinese Hackers Union is born. The Union then launches a series of patriotic cyber attacks against those believed to be most responsible for the bombing: the United States government. The White House website is hit first. Chen hacks in and defaces the website, causing the site to be shut down as repairs are made. News of the hack quickly spreads, earning Chen and the Union respect and fame throughout the Chinese Internet community (Todd, 2009).

Scores of books similarly lionizing patriotic Chinese hackers have been published online in recent years, one indication that hackers increasingly enjoy an esteemed position in modern Chinese Internet culture. Hacker novels with names like Hacker Legend and I Am A Hacker are commonplace, putting Chinese citizens a click away from a fictional tour through the computer systems of the Pentagon, White House, and other popular U.S. targets. Perhaps recognizing the emergence of the hacker hero phenomenon, the Chinese government has recently ramped up efforts to reframe the issue and brand hackers as mere criminals. Recent headlines – including those in publications closely monitored by the Chinese government – tell of prominent hackers brought to justice by an increasingly tech-savvy Public Security Bureau (Jie, 2009). But for all the efforts of the Chinese government, hacking continues to be a growth industry in China, and its reach is global.

A culture of underground hackers feeds off easy access to and continual encouragement from websites and hacker fiction. In China, hackers have remarkably easy access to information guiding their activities. Four major search engines in China, Baidu, Google China, Google US, and Yahoo!-China, all produce links to hacker websites with a simple search of “Multiple line equation cannot be converted into text.” the most common Chinese term for “hacker.” These hacker websites include discussion forums where hackers compare accomplishments and describe how to hack certain networks (Branigan, 2009). With easy access to such information, new hackers can learn how and what to hack and receive encouragement for doing so.

Online novels are a wildly popular phenomenon in China and a major growth industry (Branigan, 2009). At times earning $10 per thousand characters typed, online authors of hacker fiction can be expected to keep pumping out their product, and legends of heroic hackers storming the distant walls of American network infrastructure will proliferate.

HYPERLINK “http://ehis.ebscohost.com/ehost/detail?sid=e2e23b33-f1b9-45c5-92ff-4adc2220394f%40sessionmgr198&vid=1&hid=109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d” l “toc” o “Chinese Law”Chinese Law

While China is not a member of the European Union Convention on Cybercrime, new laws passed in 2009 by the Chinese People’s Congress do appear to reflect an effort by China to adopt the core principles of the Convention (Branigan, 2009). The Convention requires that member states criminalize certain forms of cyber activity, including unlawful access, interfering with data or systems, unlawful interception, and computer fraud or forgery (Jie, 2009).

Two new Chinese laws criminalize illegal acquisition of computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of illegal control of computer systems (Branigan, 2009). Conceivably, the new law prohibiting the supply tools for the purpose of intrusion into computer systems could be the tool used to shut down many of the easily accessible chat forums and hacker fiction websites that provide instructions on how to hack systems of foreign governments. There is some anecdotal evidence that the Chinese government could be in the early stages of a crackdown on certain types of unlawful cyber activity; (Branigan, 2009) the Chinese government, for its part, claims to have “nabbed” just over 1,000 hackers under the new criminal laws, though such reports are difficult to verify.

China’s well known restrictions on free expression likewise permit the government to restrict hacker websites and literature. Under Article 225 of China’s Criminal Law, Chinese publishers are prohibited from publishing materials without first acquiring a license through the General Administration on Press and Publication (GAPP) (Todd, 2009). In addition to licensing restrictions, GAPP works with the Central Propaganda Department to regulate the content of publications. The Regulation on the Administration of Publishing (2001) empowers officials to punish authors and publishers for a number of infractions, including the vague prohibition on published material that “harms national security or national interests.” (Todd, 2009). A web search conducted from China for the Tiananmen Square Massacre produces a webpage with an error. Other taboo topics include the Dalai Lama, political independence of Taiwan, and ethnic conflict in Muslim regions of China. The Chinese government censors this material in the name of national security and national interest. However, hacker websites and hacker fiction that glorifies cyber attacks of the U.S. government remain largely unfiltered.

Chinese law enforcement has used this regulation to crack down on Internet books with unapproved content in the past, such as the 2007 sting resulting in the removal of over 300 online books featuring pornographic content (Jie, 2009). Together, China’s cybercrime and publishing laws equip law enforcement with strong tools to address hacking and other cyber threats. While the Chinese government possesses the legal tools to do so, it does so infrequently. One could argue that the smothering censorship applied to certain subject matter – such as the Dalai Lama or Taiwanese independence – and the relatively limited restrictions on hacker Internet discussion forums, websites, and even e-books, implies a tacit endorsement of Chinese hacker activities.

These uncertainties raise strategic questions of the first order: does China “harbor” hackers? Should the language of the War on Terror be applied in a future War on Cyber Terror? How could China demonstrate to U.S. satisfaction that it does not “harbor” hackers? Would an international organization tasked with cyber inspections – akin to the current nuclear watchdog regime – help resolve these issues?

The beginning of an answer may lie in what is known as the United States-China Joint Liaison Group (Liaison Group). Having evolved over the decade-plus since President Bill Clinton met with Chinese leaderships to establish stronger bilateral relations, the Liaison Group today serves as a primary vehicle by which the United States and China coordinate bilateral law enforcement operations on issues like transnational crime and intellectual property infringement. Headed by the U.S. Department of State and the Chinese Foreign Ministry, the Liaison Group has helped the two sides resolve a number of cases, including an anti-intellectual piracy operation over $500 million (Jie, 2009).

The Liaison Group could help resolve one type of attribution problem in particular: where the United States has been cyber-attacked and China wants to avoid responsibility (e.g., war). Through the Liaison Group, China can help the United States verify that, though the attacks originated in China, they were done by rogue elements or otherwise non-state citizen hackers. The Chinese side of the Liaison Group could get the Public Security Bureau to arrest the hacker and hand him over to the FBI, thereby verifying that no “armed attack” justifying American retaliation had occurred. Whether it takes the form of the Liaison Group or some other vehicle of coordination, the United States and China would do well to take quick steps to institutionalize a joint fight on cyber threats, thereby reducing the types of uncertainties and suspicions that have been the prelude to conflict throughout history.

HYPERLINK “http://ehis.ebscohost.com/ehost/detail?sid=e2e23b33-f1b9-45c5-92ff-4adc2220394f%40sessionmgr198&vid=1&hid=109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d” l “toc” o “Conclusion”Conclusion

Hacking is now a popular sport in China. The hacker hero is alive and well in Chinese popular culture and fiction. How the emergence of a Chinese hacker culture will influence the frequency and severity of Chinese hacker attacks remains to be seen. At the very least, Chinese hackers have an increasingly rich library of hacker fiction from which to plot their next attacks. Recent cyber attacks worldwide reflect a need to understand where these attacks originate. As we continue to develop technology, organization, and skills necessary to combat cyber threats, it is ironic that we rely ultimately on the Chinese philosopher Sun Tzu, who counseled in The Art of War to “know your enemy” (Weinstein, 2009). Doing so will better enable the Air Force to win the fight in cyberspace.

As the Air Force takes on an expanding role in deterring and defending against foreign cyber threats, judge advocates find themselves increasingly responsible for providing cyber law expertise. One issue presenting a challenge is attribution: when, if ever, can the victim of a cyber attack attribute responsibility to the host government of the hacker? (Weinstein, 2009).

Characteristics of China IP/threats

There are many examples of China-based IPR breaches. Huawei Technologies, for example, China’s leading telecoms-equipment maker, according to The Economist (“Special Report: China’s Champions,” 2005) was successfully sued by Cisco for IP theft in an American court. Huawei is one of the so-called state champions that the central government decided would be among the 30–50 of its best state firms to be built into globally competitive multinationals by 2010 (“Fear of China,” 2005). At home, these companies enjoy tax breaks, cheap land, and virtually free funding via the state-owned banks. Abroad, the Chinese government helps these state champions to secure contracts or exploration rights (“Special Report: China’s Champions,” 2005). Chinese car firms are pervasive counterfeiters of foreign models: one local favorite is half Mercedes, half BMW (“Fear of China,” 2005). So ahead of the game are the counterfeiters that Harry Potter books are published in China before J. K. Rowling, the author, has written them!

Amcham-China’s president maintains that “the problem [of IP theft] is growing faster than the enforcement efforts . . . and this problem of growing exports is really one to watch because that is going to reverberate against China on the international stage” (AmericanThere are many examples of China-based IPR breaches. Huawei Technologies, for example, China’s leading telecoms-equipment maker, according to The Economist (“Special Report: China’s Champions,” 2005) was successfully sued by Cisco for IP theft in an American court. Huawei is one of the so-called state champions that the central government decided would be among the 30–50 of its best state firms to be built into globally competitive multinationals by 2010 (“Fear of China,” 2005). At home, these companies enjoy tax breaks, cheap land, and virtually free funding via the state-owned banks. Abroad, the Chinese government helps these state champions to secure contracts or exploration rights (“Special Report: China’s Champions,” 2005).

Chinese car firms are pervasive counterfeiters of foreign models: one local favorite is half Mercedes, half BMW (“Fear of China,” 2005). So ahead of the game are the counterfeiters that Harry Potter books are published in China before J. K. Rowling, the author, has written them! Amcham-China’s president maintains that “the problem [of IP theft] is growing faster than the enforcement efforts . . . and this problem of growing exports is really one to watch because that is going to reverberate against China on the international stage” (American Chamber of Commerce China, 2006). Some analysts, Yang (2005) for example, argue that some allowance for cultural impediments on the Chinese side is called for to establish a tighter IP protection regime. The argument for tolerance is predicated on history: during the Qing dynasty (1644–1912), China ruled almost a third of the world’s population and oversaw a third of the world’s GDP. It can look back on a history of innovation, spanning the inventions of paper money, explosives, the printed book, and professional civil service (Maddison, 2001). Today, there remains more than a vestige of resentment among the Chinese people that their inventions attracted none of the royalties that they are now exhorted to pay to others.

Perhaps this period of IP piracy is an intermediate phase on the road to development, just as the United States a century ago exhibited similar behaviors. For example, Charles Dickens complained bitterly about the theft of his rights by American publishers (Edwards, 2007). The Budweiser brand, it is claimed, was systematically deconstructed and stolen in the nineteenth century from Czech brewer Budejovicky Budvar by a Czech émigré, and then reconstructed in the United States. As recently as 2009, the second largest court in the European Union confirmed a previous decision not allowing Anheuser Busch to register the trademark Budweiser in the European Union (“Court Has Supported Budvar,” 2009).

It may be expected that China will become more compliant about protecting IP when it gauges that it has enough of its own IP to protect (Kirkpatrick, 2005). Indeed, China now has a National Intellectual Property Strategy that looks to “improve the intellectual property system, actively work to create a favorable legal environment, market environment and cultural environment for the development of intellectual property in order to greatly improve China’s capacity to create, utilize, protect and administer intellectual property. This will provide strong support for the effort to make China an innovative country and develop a moderately prosperous society in all respects” (Outline of the National Intellectual Property Strategy, 2008). This phraseology disturbs other governments, as they expect China to use its IP portfolio to block entry and negotiate advantage in international markets. The potential is great. China is now a major source of innovation; for example, in 2008 there were 800,000 Chinese patent applications, 360,000 of which were for design patents.

Analysis of the China Cyber war situation

The research for this article involved a subset of 20 face-to-face interviews conducted in China, with a range of relevant players: CEOs of companies that hold multibillion-dollar asset portfolios based on heavy concentrations of IPRs, IP lawyers, IP consultants, management consultants, advertising agencies, branding consultants, and those who track down and prosecute counterfeiters on behalf of the IP owners. These interviews comprised a subset of a larger study involving 150 interviews probing the experiences of foreign companies in China.

The analysis illustrates that the methodologies employed by many foreign companies to ensure the integrity of their IP in China are seriously flawed. It is estimated that over 70% of cases, IP theft in China occurs as a result of companies having failed to take effective action, or having executed only partially effective steps to protect their IPRs. The data analysis of the CEOs interviewed suggests that the majority of companies are not taking effective steps to protect their intellectual property.

It is paradoxical that these foreign-invested enterprises (FIEs) have a myriad of governance rules, ranging from the use of cash through to the issuance of stock options, yet the critical group of intellectual assets known as IP is left largely unguarded. Given that employees are the most vulnerable IP leakage point, human resources (HR) policies in the majority of cases appear lax from the outset as they fail to make provision, as part of the recruitment process, for striking tight agreements regarding IP protection. As an IP lawyer explained, IP has legs: What we normally see in China is the leg. Where do the legs come from? The legs come from your employees. They’re the ones with access to the information.

They’re the ones with the access to your intellectual property. It’s not the patent office. It’s not the government that’s giving your secrets away. So once you’ve registered your IP, you need to go and take an approach which is employee based . . . you should get your employee’s contracts, take a look at them, and try to assess whether or not your IP is protected in those agreements and whether or

Posted in Uncategorized

Naval vs Civillian Pilot

Naval vs Civillian Pilot

Naval Versus Civilian Pilot

Introduction

In general, the term ‘pilot’ refers to a person who has undertaken formal training and certification to fly an aircraft. Depending on the type of training received by pilots, they can be categorized as either naval (military) or civilian pilots. A naval pilot is a military officer who receives specialized flying training within the naval forces (See Reference 1). A civilian pilot receives non specialized military aviation training in a non military training institution.

Naval Pilots

As a minimum requirement for acceptance into the naval pilot training program, the person must be the holder of a four year minimum college or university degree. The program considers both academic and physical strengths of potential candidates. Naval pilots undertake specialized responsibilities while on duty which require a lot of skillfulness. Some of these responsibilities include: obtaining surveillance material such as photographs from the enemy location; locating and neutralizing enemy targets and weapons such as submarines and carrying out rescue and escort operations (See Reference 1).

Civilian Pilots

The process of becoming a civilian pilot is less complicated. The applicant gets to decide the type of aircraft they will train for. The type of flying civilian pilots undertake upon successful completion of training is a choice they get to make. The pilot licensing procedure by the Federal Aviation Administration (FAA) provides civilian pilots options ranging from student pilots to more advanced levels such as airline pilots (See Reference 2). Civilian pilots transport cargo and people while others may fly aircrafts as a recreational activity.

Differences

The training naval pilots receive is of a more strategic and tactical nature. It is more intense and specialized on defensive flying in line with the duties the pilots are expected to carry out while on missions. Naval pilot training aims at making the pilot ready to handle any number of situations arising while flying to maintain safety from the skies. Civilian pilot training is not specialized. The safety risks and considerations are lower unlike those required for combative and defensive scenarios likely to be encountered by naval pilots.

Similarities

There are basic responsibilities of pilots irrespective of their training. Pilots are responsible for the safety of the cargo and persons they are transporting at all times. In the airspace, they are subjected to the same conditions. They are responsible for making critical decisions while in the air. This calls for adequate basic training which both naval and civilian pilots undertake during training (See Reference 3). Pilots in both categories are subject to the same basic rules and regulation from the FAA governing aviation in the United States.

Career Opportunities

Making a career change from one category to the other is possible after some training. However the Bureau of Labor Statistics explains that most civilian commercial pilots are former military trained personnel (See Reference 3).

Key Concepts

Aviation Training

Federal Aviation Administration

Aviation Careers

References

United States Navy: Naval Aviators

http://www.navy.com/careers/aviation.htmlFederal Aviation Administration: Become A Pilot

http://www.faa.gov/pilots/become/United States Department of Transportation: Pilots

http://www.dot.gov/careers/veterans/pilots

Posted in Uncategorized

cyber space in Korea and how the country is dealing with it

cyber space in Korea and how the country is dealing with it

Name

Instructor

ENG101F-1040

March 4 2010

No title yet

As a leading country in technology, Korea has a serious problem associated with the internet media and cyber space. Among others, cyber bullying with anonymous comments became the most severe problem that could not be ignored. Using many social networking systems, writing comments became a common way of expressing ones’ opinion. Nevertheless, this online culture brought out the disaster of a famous entertainer’s suicide. Entertainers become the most common target of internet bullying, which is especially done via comments. This does not only happen to famous entertainers, but also to ordinary internet users. To protect terrifying results, Korean online websites started to execute the ‘Internet real-name system’. The use of ‘Internet real-name system’ can give responsibility to the internet surfers since users have to use their own name in the internet.

‘Internet real-name system’ refers to using a real name while browsing the internet, which has been enforced since 2002 in South Korea. This solution was made not only to prevent personal damage, but also social damage caused by cyber bullying. When writing an opinion on the internet real-name system website, the user’s name is expected to appear on top of the posted statements. However, if a website does not have this section, another way for it to work is by making internet users only join as members after submitting their personal information. This can be done by making use of a member joining procedure. This system can be measured by three criteria to see if it brings out a positive effect on reducing the victim of a cyber bullying.

Cyber bullying solution should include and protect all the people who use the internet. The tragedy caused by cyber bullying can happen to anyone who uses the internet. Giving a deep affront to the other party does not happen by chance. It can happen to anyone on the internet, and there are no specific standards when one is a target of cyber bullying. Korea has the highest rate of internet diffusion rate, which is 95% of the whole nation. This also means that this system is applied to the 95% of the whole nation, which is a large percentage of the population. ‘Internet real-name system’ applies to all the website users since no one can use without submitting personal information before executing a search. This is a requirement for every user, and if one does not provide personal details, the system blocks one from moving to the next stage of the information search. With every posted statements and information blocked, every web user ought to follow this system.

When a web surfer logs in into a website, he or she is expected to become a member in order to view all the contents in that site. While filling the identification name and password, it is required that one provides private information. This private information includes one’s name, social security number and personal address. This means that ‘Internet real-name system’ includes all the web surfers. This procedure makes users exercise responsibility while writing and reading on websites. Since effecting responsibility on online behavior is the goal of this system, this shows how it would greatly diminish cyber bullying.

The main purpose of enforcing this system is to prevent slanderous internet posting especially comments placed under journals or online news. ‘Internet real-name system’ has to prevent the severe side effects of internet bullying. In Korea, a few famous entertainers and actors have committed suicide because of public opinions on the internet. Suicide is not the only effect cyber bullying has, as social phobia is also a serious symptom that celebrities experience. Social phobia is a critical symptom of mental problem. People with social phobias fear and avoid situations in which people may judge them and criticize their actions. It begins with the situation of over protection, and people with social phobia become very anxious and self-conscious in everyday social situations. This happens to the celebrities who are exposed to the public.

Recognizing their public evaluation from the online comments, celebrities can feel the extreme shame and embarrassment from the normal life cycle. This ‘Internet real-name system’ was held to cut the frequency of this damage. Malicious comments still exist, but not as ridiculously much as the time before using this system. With the real name on it, responsibility makes web surfers think twice before posting their opinions. It is clear that the internet real-name system is vital in providing internet protection to millions of users. Crimes committed on the internet are well propagated because one is able to hide his or her details. However, with this system in place, one is forced to fill in details and cannot commit crime freely. In other words, if one commits crime over the internet, authorities have a clear way of knowing the perpetrator.

As much as the system seems to offer maximum security, it has its flaws and disadvantages. One major disadvantage the system tends to display is that it is in the internet where hackers can access it. Technology is advancing and people have developed software that can be used to hack into one’s account and use their details. On this occurrence, hackers can easily utilize someone else’s name to commit crime. Thus, invasion of privacy can easily occur over the internet. Nonetheless, the system is still a complicated one and cannot be interfered with or tampered. Thus, it proves to offer the expected service without much interference. On the other hand, the system proves to display ones information without hiding, and this may be problematic to some people, for example, ghostwriters. These people may want to comment on something while their personal details are kept from the vicinity of the public. However, since the system does not allow one to browse without providing full personal information, such internet users are forced to preserve their opinions. Indeed all these are problems associated with this system, but it has proved to offer beneficial things than negative ones. Hence, its continuous use shows that it is a reliable system and has more merits than demerits.

Protecting people against harms brought about on the internet is a crucial thing in upholding a healthy society. The Internet real name software is a system that caters for the public, and helps in diminishing crimes on the internet. The internet is a vast world that is accessible to many people in the world. In addition, there is unrestricted freedom to post anything on the internet. This is the main reason as to the existence of various crimes on the internet. On the other hand, controlling people and the things they post on the internet is also a difficult thing to execute. However, the Internet real name software has changed all that, and it is capable of offering the much needed security and control of internet users.

Posted in Uncategorized

Nature versus Nurture. What Affects a Person More, Their Genes or Their Surroundings and the Way They Are Raised

Nature versus Nurture. What Affects a Person More, Their Genes or Their Surroundings and the Way They Are Raised

Nature versus Nurture: What Affects a Person More, Their Genes or Their Surroundings and the Way They Are Raised?

The debate concerning nature versus nurture, in regard to the effect of genes, surroundings and upbringing on an individual has always been a contentious subject. Each of the three factors plays a distinct role in a person’s developmental changes, in the course of his/her lifespan. However, many scholars approach the controversial subject by assuming a middle ground on the case (Fulton, 2009). The thesis statement of this paper posits that, nurture and nature are complementary and work mutually to structure a person’s manners.

It is essential to mention that, nature bestows a person with inborn characteristics whereas nurture structures these genetic aptitudes through the socialization process. Genetics’ role in an individual’s personality has been endorsed in studies related to psychology while, on the other hand, proponents of nurture posit that, a person is shaped by the environment, rather than genes. Proponents of nature, especially psychologists posit that an adult’s character is predominantly established by the set of genes that the person carries. According to Ridley (2009), a person is exclusively defined by genes, and the foundation of this life is to become a transmission avenue for the genes and guarantee their propagation. Several studies have demonstrated that genes affect a person’s appearance as well as, play a significant role in their attitude and behavior. Contemporary hereditary research, as well as medical studies in regard to adopted children and identical twins, demonstrates that numerous human qualities formerly undervalued as an upshot of childhood experiences and upbringing were anchored in genetic matrix but that explicit characteristics were initiated through certain situations (Fulton, 2009).

The interaction among the environment and genetics can be considered from a philosophical perspective. Several philosophers have raised the question as to whether humans inherit the ability to structure the objective information that is perceived by their senses, or they discern this entirely from their environment. According to Segal (2010), human beings congregate their understanding of the world exclusively through their senses’ experiences. The information is then shaped into an increasingly complex form through rationale. Human beings have an inherent capacity of observation, but the thoughts that influenced their conduct are created from their experiences. In contrast, other philosophers such as Immanuel Kant posit that human conduct and understanding is genetically constructed. Kant argued that while the understanding human beings have is derived from what their senses experience, humans have an inherent ability to categorize and discern from this information.

It is essential to reflect on an attribute such as leadership in this discussion since it presents a credible interplay between nature and nurture in a person’s life. Nature may be a fundamental aspect in the leadership qualities that a person possesses. At the same time, nurture may be an essential aspect in the leadership qualities that an individual possesses. Life experiences have been proven to strengthen an individual’s character in learning to be an influential individual. The individual may learn out of life experiences how to fight for their beliefs, as well as guiding other people to do the same (Ridley, 2009).

The more human behavior and development is understood, the more explicable it becomes that nurture and nature simply influence but do not independently determine the character a person. It is evident that there is no direct, fundamental relationship between an individual’s genetic makeup and their conduct, or between environment and personality. The possibility of exhibiting certain tendencies might be amplified by possessing a distinct gene, but it is not solitary driving factor. A human being’s socialization also significantly influences their decisions and character.

References

Fulton, T. (2009). Psychological Testing. Upper Saddle River, NJ: Prentice-Hall.

Ridley, E. (2009). Sex & Evolution of Human Character. Baltimore: Williams & Wilkins.Segal, D. (2010). Environment & IQ. New York: Rosen Central.

Cyber Security

Cyber Security

Cyber Security

Name

Institution

Year

Technology and internet coverage has been a major boost to globalization and connectivity among countries, individuals And companies. High internet speeds and high-tech communication devices has underhand in a new era of global online community. Today, companies are going global as they can now operate remotely from different locations. The area of online marketing and tele-health has added to the ease of operations across the world. However, amid these benefits lies a very troublesome issue of cyber security that is already threatening global security and economic stability. The European cyber data has shown that there are at least 2500 attempted and successful hacks that target major companies and health facilities within the European Union. The data also shows that the rate of hacks have grown steadily at a rate of 12.5% annually since 2014. These theft of customer and patient data has become the prime target for hackers that is raising very worrying concerns across the world.

Over the years, the increase in online crime has led to adverse threats to personal data of clients and employees. Still, theft of health data belonging to patients and health workers has become a major issue in today’s cyber security field (Kshetri, 2017). Governments in developed countries are trying to lay down policies and mechanisms to safeguard and improve cyber security in all fields. The issue of hacking of companies that deal with high number of personal data for clients has increased drastically in the past ten years (Van Schaik et al., 2017). The prime target for hackers have mainly been the online customer data, military, and patient data in health facilities.

Cybercrime mainly targets online customers and firms that engage in mass data transfer and sharing (Boeckl et al., 2019). For example, in the U.S alone, there are more than a thousand attempted hackings daily that the FBI is able to crack and prevent. Advanced countries are able to notice these issues but some go unnoticed that cause agony and financial loss to the victims. The prime issue when it comes to online theft is the loss of customer data that the hackers seek to sell on the dark online markets (Van Schaik et al., 2017). For example, the hackling of Yahoo in 2015 became a global concern that only showed the huge expense and loss the firms are bound to face in this issue of cybercrime. The loss of customer data from major companies has put the loyalty of the clients at risk making some of the firms collapse or reduce their online presence. The other perspective in cyber security looks at the inclusive approaches that have been put to address these issues (Kshetri, 2017). Today, companies and governments are hiring tech experts that seeks to safeguard and prevent these online hacks.

One of the major effects of cyber insecurity is the financial loss that victim companies an governments face. Records form the FBI shows that small firms that are yet to establish firm online security programs lose at least 25 Billion Dollars annually in the U.S (Srinivas, Das & Kumar, 2019). Globally, the financial cost of cyber insecurity that comes through hacking amounts to at least 600 Billion dollars. These figures only show a worrying trend that needs to be addressed to ensure that there is adequate cyber security for small and large firms. The way forward lies in the firms creating strong online security programs and cyber walls that will make it difficult for hackers to crack (Van Schaik et al., 2017).

The other target for hackers is the credit information of customers. The ecommerce field has been beneficial and at the same time risky for companies and customers. Cyber security in the area of ecommerce has been a major concern for governments and online sellers and firms (Srinivas, Das & Kumar, 2019). Credit card hacking and theft of customer data has become a major issue that has put ecommerce business at risk. The U.S. customers report almost 3 million cases of attempted credit card hacking annually (Kshetri, 2017). The data also shows that 90% of the credit card hackings occur when the clients make online payment for goods or services. The other area that has become a prime target for online hackers is the passenger data in air travel. The cyber criminals have noticed and utilized the field as almost all major airlines only accept online or card payments for air travel fares (Boeckl et al., 2019).

The online exposure of customer data has become a prime area for hackers where they seek to steal and sell the data to other online criminals. The whole affair has already put a major risk to the online business and payment systems particularly for international companies (Kshetri, 2017). Cyber security is targeted to become a multi-billion-dollar industry as the risks of hacking continue to rise. The exposure of online data from customers who seek online services is offering an outlet for criminals to conduct their activities. The rise of shady platforms like the Dark Web and Dark Web has worsened the fight against online hacking (Srinivas, Das & Kumar, 2019). These platforms offer an outlet and areas for criminals to conduct their activities putting more danger to customers and companies.

Governments are also victims of cyber insecurity mainly in the area of military and political stability (Kshetri, 2017). Studies have shown that militaries across the world face a major issue of data theft where the criminals seek to learn about the strengths and weaknesses. Today, the development of military hardware and technology has always faced the threat of online data theft by enemy nations (Boeckl et al., 2019). For example, the development of armed drones has always been a hit issue between Russia, China, and the U.S. military. The U.S. has accused China of stealing online data from its military that leads to the copying of the military hardware development (Van Schaik et al., 2017). This issue has increased the risk of more drift between nations and possibilities of conflicts.

Conclusion

Dealing with cyber security issues has to start with understanding the avenues used by criminals to conduct their activities. Online platforms have eased the way of doing business but on the down side, they offer a few challenges to customer security. Theft of customer data mainly for online companies has come at a huge financial and loyalty cost for the firms Victims of the cyber insecurity issues continue to rise and this puts more risk to online business. Governments are also facing acute challenges when securing the financial and military data from hackers. More collaborated efforts is required between governments, companies, and individuals in tackling tech-related hacking and online theft.

References

Boeckl, K., Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K. N., … & Scarfone, K. (2019). Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. US Department of Commerce, National Institute of Standards and Technology.

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038.

Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188.

Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547-559.

Posted in Uncategorized

Nature of Conflict and the Negotiation Process

Nature of Conflict and the Negotiation Process

Nature of Conflict and the Negotiation Process

Student’s Name

Course and Code

Instructor’s Name

Date

Introduction

Conflict is among the most genuine and raw human reactions in response to interactions and engagements with others. In fact, it can be said to be an indication of the different perspectives that are healthy for human-human interactions. Conflict arises from the different points of view regarding what is of value and importance to an entity. It also emerges out of priorities and the process of prioritizing. Different opinions and points of view yield power struggles. A power struggle is defined by Van Bunderen, Greer, and Van Knippenberg (2018) as a situation where different entities compete for the control of a particular element. For example, in negotiating for better employee benefits, union members and employers will likely be entangled in power struggles as each group competes for control of what is of value and priority. In this essay, the overall purpose is to provide a reflection on the nature of conflict within the negotiation process. It also looks at power struggles and how they end up being scenarios for negotiations and bargaining. Specifically, the NBC Universal Media case (02-CA-262640 JD(NY)-02-21) will be analysed regarding the decision, the conflict, the negotiation issues, and the outcome. Ultimately, power struggles birth negotiations and bargaining.

The Case

The NBC Universal Media case (02-CA-262640 JD(NY)-02-21) was tried remotely by administrative law judge Kenneth Chu on December 21, 2020. It was found that NBC Universal Media had engaged in unfair labor practices. The decision made was for the organization to compensate employees for the earnings and costs suffered. This was against the organization’s decision to rescind the 2020 merit wage increase. It was ruled that NBC Universal Media’s wage rollback was unlawful.

Before the pandemic, NBC News employees were not represented by a union until recently, which was a significant change. A group of editorial employees on the company’s digital side won union certification, signaling the beginning of a sea change in the media corporate culture. The New York NewsGuild has been designated as the bargaining unit for this contract. In opposition, NBC Universal Media was determined to protect its margins and shareholder bottom lines from the effects of the pandemic by rescinding all wage increases for a specific group of employees. The company went further to carry out this policy without adequately involving the employees and their bargaining platform. The conflict was regarding the Union of NBC Universal Media employees, NewsGuild, was denied an opportunity to bargain over the changes to the pay structure that has traditionally defined the relationships between the employer and the employees. According to an administrative law judge, NBC Universal Media should have given NewsGuild a chance to bargain over the pay structure changes before going public with the decision. An administrative law judge for the National Labor Relations Board raised concerns about the decision to rescind the wage increases. NBCUniversal violated labor laws by implementing pay changes without giving the NewsGuild a chance to bargain, as required by the National Labor Relations Act. It is important to note that NBC is not the only company that has had to make difficult pay decisions as a result of the pandemic. power struggles led to the issue being taken to the National Labor Relations Board. NBC employees now have a say in wage negotiations, thanks to a successful organizing drive in 2019, and the company can no longer unilaterally cut wages without a CBA in place.

The negotiation issues are quite straightforward. NBC employees affected by the decision to rescind wage increases wanted a chance to bargain through their union. The issue is that NBC’s executives had made an executive decision and policy that was not up to debate. The style of breaking the news and the consequent ramifications for the workers led to a need to at least provide a counter offer in relation to the percentage or merit wage increase that should be expected by the employees. The employees, through their union, had offered and were willing to table a discussion on the need for wage reductions due to the adverse effects of the COVID-19 pandemic. They even requested to discuss the issue multiple times yet the management refused. There was a power struggle between the employees and the management, with the latter attempting to bulldoze its way on the decision to rescind merit wage increases that have been a part of the organization for a while making a tradition. Overall, the main issue is the obligation by NBC to bargain with the workers’ union over all matters relating to their welfare, whether there have been severe financial effects or otherwise. In their brief to the National Labor Relations Board, NBC presented that their position on the matter was not aimed at unlawfully or unfairly affecting the welfare of union members. However, the issues and ensuing conflict point to an effort by the media company to subvert the collective bargaining representative.

Evaluation of Conflict Present in the Case

In the NBC workplace, the type of conflict present was labor relations with a particular emphasis on the need to retain the right to bargain and the collective bargaining representative of the employees through their union. The main issue is that NBC ignored its obligation to listen to what the employees and their bargaining platform, NewsGuild, had to say and the counter offer they were willing to present on the issue of the decision to rescind merit wage increases. Therefore, there was industrial conflict that led to labor disputes.

Industrial action is a term that refers to a situation in which employers or employees take collective actions to exert necessary pressure on other collective bargaining parties so as to accomplish their objectives. The term is frequently used interchangeably with labor dispute. Conflicts of interest can cause people, groups, and organizations involved in the industrial relations system to engage in disagreements of varying intensity as a result of their involvement. The relationship between business owners/shareholders/managers and their employees/unions/workers is frequently tense. At any level of industrial relations, whether subtly or explicitly, conflicts can arise. Theft, go-slows, work-to-rule, output reductions, noncooperation, and industrial action are all examples of conflict among employees (strikes, lock-outs, boycotts). Industrial conflict can result from disagreements over values and objectives, as well as differences in power, status, and distribution relationships. If you want to put it another way, industrial conflict is the place to look for both conflict and peace in the workplace. Various explanations for the emergence of industrial conflict have been proposed, ranging from Marxism that is focused on the working class to explanations that link industrial conflict to a clash of economic interests between employers and employees.

How the Negotiation Process Helped Resolve the Conflict

In the event of a disagreement, it is common for the conflict to escalate, with each side accusing the other in ever-more-aggressive terms (Kearney & Mareschal, 2017). A lawsuit could end up being filed, which would permanently harm the relationship. Most of the time, both sides in a negotiation are well-aware of their goals and are willing to compromise in order to achieve a mutually beneficial outcome for all parties involved. The goal of negotiation is to reach an agreement between disputing parties by exchanging information and ideas. Conflicts and problems are frequently resolved through negotiation. It occurs when people are trying to solve a problem by talking to one another. Negotiations are commonplace in the workplace, from securing a raise to drafting a sales agreement. In the case presented above, the negotiation involved a conflict-resolution approach. In this approach, the National Labor Relations Board was used to negotiate between NBC Universal Media and NewsGuild. A distributive negotiation approach was taken. Jeong et al. (2019) define it as an approach to negotiation where the success of one party depends on the failure of the other party. It is also called a zero sum or a win-lose style of negotiation. In a distributive negotiation, the focus is on a single point of contention. NBC Universal Media was unwilling to let the employees practice their right to collective bargaining. Conflict arose due to this. As a result, the court ordered the organization to compensate employees for the earnings and costs suffered. This was against the organization’s decision to rescind the 2020 merit wage increase. It was ruled that NBC Universal Media’s wage rollback was unlawful. The negotiation process brought an end to the contention on whether NBC employees had a right to bargain the salary reduction policy. It also set precedence for media house executives in future to consider the right to collective bargain for all employees.

References

Jeong, M., Minson, J., Yeomans, M., & Gino, F. (2019). Communicating with warmth in

distributive negotiations is surprisingly counterproductive. Management Science, 65(12), 5813-5837.

Kearney, R. C., & Mareschal, P. M. (2017). Labor relations in the public sector. Routledge.

National Labor Relations Board (NLRB). Case 02-CA-262640. JD(NY)-02-21.

https://apps.nlrb.gov/link/document.aspx/09031d45833853d0

Van Bunderen, L., Greer, L. L., & Van Knippenberg, D. (2018). When interteam conflict spirals

into intrateam power struggles: The pivotal role of team power structures. Academy of Management Journal, 61(3), 1100-1130.

Posted in Uncategorized