Thursday, October 31, 2019

Dulzura Essay Example | Topics and Well Written Essays - 500 words

Dulzura - Essay Example Additionally, the free verse allows the persona to speak in disjointed thoughts because of the confusions and doubts that characterize her lover who is unable even to pronounce her name correctly. This is demonstrated by the last stanza where the persona laments â€Å"Say my name. Say it/The way it’s supposed to be said (Cisneros 1).† Epic form, on the other hand, is notable in each of the three stanzas especially the specific messages they communicate to the reader. In stanza one, the persona is pleading for love in Spanish; stanza two she wants her lover to feel her compassion while stanza three is an affirmation of the love. However, Cisneros is also sensitive to the use of alliteration to establish a rhythmic effect as noted in the last stanza in the use of the words ‘know’ and ‘knew.’ These words are meant to illustrate struggles the persona is undergoing when recalling a past love affair. Notably, the poet equally uses blank verse as a means of defying regulations of writing poetry and, thus, communicating her message of desolation over broken love. Blank verse, for example, is exemplified in the first stanza in the use of small letters in the last lines of that stanza unlike the other lines. Cisneros notes that â€Å"lullabied, mi bien/querido, that loved† to demonstrate the futility of clinging on to a certain love affair now gone. Imagery, however, is a testament of the need for the poet to illustrate his message using flowery and colorful words that portray the pain of the persona. Contrastingly, this is only possible through the use of repetition to generate rhythmic effect as noted in the usage of ‘I want’ to expose the feelings of the persona in the poem (Cisneros 1). Similarly, repetition adds more emphasis because it consistently tells a certain angle of narrative within the poem and, hence, allows the reader to formulate varying mental i mages

Tuesday, October 29, 2019

Child Trafficking and Sexual Exploitation Essay Example for Free

Child Trafficking and Sexual Exploitation Essay CHAPTER 1 INTRODUCTION 1.1 Background of the Study The Optional Protocol on the Sale of Children, Child Prostitution and Child Pornography to the Convention on the Rights of the Child defines child prostitution as a commercial sexual exploitation of children whereby a child sells his or her body for sexual activities in return for remuneration or any other form of benefit provided to the prostitute or to another person (United Nations General Assembly, 2000). According to worldwide estimations by the International Labor Organization, out of the 12. 3 million people victim to forced labor, 1.39 million are victims of commercial sexual exploitation, 40-50% of who are children (ILO, 2004). Nowadays, we have an increasing rate of child prostitution that is still considered as the worst form of child labor in Asia. UNICEF estimates that 1 million children are lured into sex trade in Asia every year. These children are exploited by local men and foreign tourists having an average of 5 to 10 clients per day, generating $5 billion per year wherein 40% were sold by parents and 15% by their relatives (Willis, 2002). Japan and South Korea had been two of many Asian countries that currently face the problem of child prostitution. Together with its increasing trend, countries like Japan and Korea have been continually making its effort in solving this problem with a common goal in reducing and in a long run eliminate commercial sexual exploitation of children to protect their rights, welfare and create a better future for upcoming generatio ns. 1.2 Statement of the Problem This study is a comparative analysis on child prostitution in Japan and South Korea. This will provide data on the causes and forms of child prostitution within these countries and the laws and protocols implemented in both countries to fight against child prostitution. Moreover, this paper gears to answer some core questions: 1. What are the primary causes of child prostitution in Japan and South Korea? 2. What are the different forms of child prostitution in Japan and South Korea? 3. What are the laws and protocols signed in solution to fight against child prostitution in Japan and South Korea? Was it able to address the problems regarding child prostitution? 1.3Significance of the Study This study will give way for the analysis in  the difference on the condition of child prostitution in Japan and South Korea. In addition to that this would be able to differentiate how Japan and South Korea face this common problem of child prostitution that in turn will lay an overview of the prevalent obstacle almost all of the countries is facing and battling nowadays. This would lead to the identification of several factors that makes child prostitution very prevalent these days that is very important to be able to address these issues to secure children’s rights and welfare. This would identify specific actions and efforts of the government in both countries to solve child prostitution issues in their respective places that would somehow extend some concern towards the identification of important factors that is needed to be considered in solving this particular dilemma not only in the studied places but also to other countries as well. This study aims to lay possible strategies that must be implemented in other countries to solve this current problem regarding child prostitution. 1.4 Scope and Limitations of the Study The researcher aspire to have a comparative analysis of child prostitution in Japan and South Korea as a requirement on Political Science 60- Introduction to Comparative Government and Politics under Prof. Marilou F. Siton-N anaman and the Department of Political Science, Mindanao State University-Institute of Technology. This paper limits its study within the countries mentioned and this study is set to answer the ahead mentioned core questions pertaining to both countries involved. The study underwent a month of data gathering using books, newspaper and reliable internet sources such as e-books. Online sources for data were primarily used. 1.5Conceptual FrameworkCHILD PROSTITUTION JAPAN SOUTH KOREA CAUSES CAUSES FORMS FORMS LAWS LAWS IMPLEMENTATION IMPLEMENTATION EFFECTS EFFECTS Figure 1 – Conceptual Diagram of Child Prostitution in Japan and South Korea  Child prostitution in countries like Japan and South Korea are caused by several major factors that make it more prevalent these days. In order to take action with the said dilemma, the identification of the forms of child prostitution is very vital in order to formulate and develop laws that would identify grounds and address cases that violate the rights of the children. Through proper implementation of these laws child prostitution are being reduced to secure children’s welfare and rights. 1.6 Operational Definition of Terms Prostitution- the act or practice of engaging in promiscuous sexual relations especially for money or other benefits  Remuneration- payment or compensation received for services or employment  Sexual Exploitation- the use of a child for sexual purposes in exchange for cash or in-kind favors between a customer, intermediary or agent and others who profit from the trade in children for these purposes—parent, family member, procurer, teacher Forced Labor- is any work or services which people are forced to do against their will under the threat of some form punishment. CHAPTER 2 REVIEW OF RELATED LITERATURE In this chapter, related studies and previous works pertaining to child prostitution in countries that discusses relevant major information related  to the comparative study of Japan and South Korea are discussed. The demand for sex drives child sex trafficking globally, while poverty, domestic violence and abuse, discrimination and the desire for a better life make children vulnerable. Children are especially vulnerable to being trafficked because they are often poorly educated, easy to overpower and easy to convince that they must do what an adult tells them to do. Children may also be in a position where they believe they must help to support their families and may be sold or sent abroad by family members to do so. Street children, children in refugee camps, children whose family and community life has been disrupted and do not have someone to look out for them are all especially vulnerable to human trafficking and prone to sex labor (http://ecpat.net/EI/Publications/Trafficking/Factsheet_South_Korea.pdf) Date Accessed: October13, 2011. According to the study conducted by the International Labor Organization through its Action against Trafficking and Sexual Exploitation of Children Programs in Thailand, Philippines, Colombia , Costa Rica and Nicaragua in 2001 that poverty is one contributing factor to the sexual exploitation of children and that is an increasing reality in both Latin America and Asia (ILO_IPEC, 2001). A series of Asian economic crises in the closing years of the 20th century have had a clear impact on the numbers of children being exploited both for labor in general and sexual exploitation in particular. Children living or working on the streets, young domestic workers and child workers in sweatshops and transportation sector—all â€Å"placed† in these vulnerable situations as a multi-faceted response to poverty – are particularly vulnerable to sexual abuse and exploitation. In many countries including Thailand and Philippines, the movement of children from villages and rural areas to cities in the guise of earning money for the family is a major factor in trafficking and sexual exploitation (Thematic Evaluation on Trafficking and Sexual Exploitation of Children, 2001). ILO-IPEC research report of August 1999 indicated that there was an increase of 20 percent in the number of minors working in prostitution in Thailand between January 1998 and January 1999. This coincides with the aftermath of the economic crises in Thailand (International Programme on the Elimination of Child Labour,2001). This report has already touched the importance of trying to develop  qualitative indicators and impact measures for the specific needs of evaluating trafficking and sex exploitation-related programming. Child prostitution and pornography is viewed as an increasing serious problem in Japan. Shihoko Fujiwara, representative of Polaris Project Japan, a nonprofit organization that provides support to children and women who are victims of sexual abuse and trafficking, stated that child pornography and child prostitution cases detected in Japan exceeds 5,000 annually, and the number is rising year by year. One of the reasons for the increase,† she said, â€Å"is that a growing number of children have become involved in the business through the widespread use of the Internet† (Shimbun, 2010). In 1998, Interpol estimated that nearly 80% of the worlds Internet-based child pornography websites originated in Japan. Although the Japanese government passed legislation in 1999 that effectively cracked down on child pornography providers, Japan continues to be a major producer and patron of child sex tourism. In a recent press conference to announce the release of the State Department’s annual Trafficking in Persons Report which analyzes human trafficking worldwide and documents governments’ responses to it, Secretary of State Colin Powell and Director John Miller both expressed their particular disappointment with Japan – a country which, despite the immense resources available to it, was failing to take appropriate steps to end child sex tourism and other forms of human exploitation. As one of the largest economies in the world, Director Miller censured, Japan’s lackluster response is impermissible: â€Å"Japan does not comply with the minimum standards. We believe that there has been a tremendous gap in Japan that has a huge problem with slavery particularly sex slavery a tremendous gap between the size of the problem and the resources and efforts devoted to addressing the problem (Jordan,2004).† The Trafficking in Persons Report of 2010 indicates that the men of South Korea create demand for child sex tourism in their surrounding countries. Technology such as the internet has helped increase accessibility of child sex tourism in the Republic of Korea. Some South Korean men arrange for children from the Philippines, Thailand, and China as sources of sex (Trafficking in Persons Report, 2010). Prostitution in South Korea is a strictly controlled illegal industry, but according to The Korea Womens  development Institute, the sex trade in Korea was estimated to amount to 14 trillion Korean won ($13 billion) in 2007, roughly 1.6 percent of the nationsgross domestic product. The number of prostitutes dropped by 18 percent to 269,000 during the same period. The sex trade involved some 94 million transactions in 2007, down from 170 million in 2002. The amount of money traded for prostitution was over 14 trillion won, much less than 24 trillion won in 2002 (Prostitution in South Korea, 2010). In 2003, the Korean Institute of Criminology announced that 260,000 women, or 1 of 25 of young Korean women, may be engaged in the sex industry. However, the Korean Feminist Association alleged that from 514,000 to 1.2 million Korean women participate in the prostitution industry. In addition, a similar report by the Institute noted that 20% of men in their 20s pay for sex at least four times a month, with 358,000 visiting prostitutes daily (Stiephensoun, 2010). CHAPTER 3 RESEARCH METHODOLOGY This chapter summarizes and explains the methods used in the research which includes its design, setting and treatment of data.  3.1Research Design The research design used for this study is the descriptive-comparative design. The researcher employed a descriptive type of research using books and reliable online sources. This paper also employs a comparative analysis between the two countries being studied. 3.2Research Setting This comparative analysis study focuses in two countries namely: Japan and South Korea. Both countries are located in Asia. The two countries have certain distinction in economic status but both are considered as two of the countries in Asia that has a high rate of child prostitution. Japan is an island country in East Asia. Located in the Pacific Ocean, it lies to the east of the Sea of Japan, People’s Republic of China, North Korea, South Korea and Russia, stretching from the Sea of Okhotsk in the north to the East China Sea and Taiwan in the south. The country is of 6,852 islands. The four largest islands are HonshÃ… «, HokkaidÃ… , KyÃ… «shÃ… « and Shikoku. Japan has the world’s tenth-largest population, with about 127 million people. South Korea is located on the southern half of the Korean peninsula and lies in a temperate climate region with a predominantly mountainous terrain. It is neighbor to China to the west, Japan to the east and North Korea to the north. Its capital, Seoul, is the second largest metropolitan city in the world. South Korea has a population of over 48 million, making it the third most densely populated country in the world after Bangladesh and Taiwan. 3.3 Data Gathering Procedures The method used in data gathering was mainly book searching and online surfing. The data being gathered by the researcher are books with ISBN, books in PDF form with an author and websites form the internet, published on 2000-2011. Research was done from the month of July 2011-August 2012. 3.4 Treatment of Data The researcher purely gathered data from printed books, pdfs, e-books and online source. This research paper is a comparative study, has a qualitative presentation of data and descriptive type of analysis. CHAPTER 4 FINDINGS AND ANALYSIS This chapter will discuss the condition of child prostitution problem in Japan and South Korea, identify and differentiate the strategies they are using to address and solve this problem. Furthermore, this chapter attempts to stress some analysis on child prostitution of the ahead mentioned countries. The discussions will be classified according to certain topics. 4.1Primary Causes of Child prostitution The principal cause of child prostitution is poverty, however extreme poverty isn’t a reason in itself, it operates in function of the imposition of other factors such as; economic, social and ethnic despair, discrimination against women and girls, massive urbanization, disintegration of the family and of traditional community systems, ignorance on the part of the majority of parents, commercialization of the status of individuals and more (How to fight the prostitution of minors, 2001). Japan, known to be one of the most developed  countries is a destination place for traffi cking women and children for sexual purposes. Children from Latin America, Eastern Europe and Southeast Asia, in particular Indonesia, the Philippines and Thailand are being transported to Japan to work as sex slaves (http://www.humantrafficking.org/countries/japan) July 29,2011. In the other side, South Korea has also become a source, transit and destination country for women trafficked for sexual purposes from China, the Philippines, Russia and Thailand; it also experiences internal trafficking of Korean children. South Korean children are trafficked for commercial sexual exploitation in the United States, Japan, Hong Kong, Guam, Australia, New Zealand, Canada, and Western Europe (Lee, 2005). Poverty is being identified as one of the major factors of child prostitution between countries. Japan and South Korea, both being considered as developed countries was more of being receiving regions in terms of child prostitution. Children mainly females mostly from neighboring developing countries such as Thailand, Philippines, Malaysia and etc. are being brought to Japan to work in different entertainment bars. A very common factor other than poverty that makes child prostitution prevalent nowadays is the presence of internet which is very accessible anywhere and anytime. Thousand of sites catering sexual services from women and children are found to be growing rapidly creating a very harmful dynamic industry that contributes to the big problem both countries are facing. 4.2Different Forms of Child prostitution In Japan, matchmaking or dating websites have become a well-known channel for commercial sexual exploitation of children in Japan. Many underage Japanese schoolgirls fall prey to ‘enjokosai’ (‘compensated dating’) by using ‘deaikei’ websites: through which they can make their contact details available, and use pagers, computers and mobile phones to arrange ‘dates’ with customers who are older and often married. Research has shown that many such girls do not engage in ‘enjokosai’ out of poverty, but rather to be able to purchase brand name clothes, bags, shoes, mobile phones, etc., which, according to them, boosts their self-esteem. They often come from dysfunctional families or experience problems at school (Liddy,2006). The form of child prostitution in Japan differs from that found in other East Asian countries since poverty is not  only the overriding factor. Child pornography is a notable problem. Japan is the most biggest producer of pornography in the world and the Parliament had refused a law banning the production of child pornography, citing â€Å"business reasons† (Antaseeda,1998). According to the Asia Pacific Trafficking in Women and Prostitution in Asia in 1996 the sex industry accounts for 1% of the Gross National Product and equals the defense budget in Japan. If matchmaking and pornographic websites are proven to be popular in Japan, in South Korea Saunas and Tea Houses are the main places of child prostitution. Serious intention to solve child prostitution should have banned all the pornographic sites and matchmaking dating sites long time ago. Conducting symposiums to teachers and parents in order to monitor the daily internet content their child or student had been grasping is a must. They could filter those sites with sexually suggestive content. Entertainment bars, saunas and tea houses that cater sex trade should be raided regularly by assigned proper government agencies. The biggest problem is that the business men that run this sex trade around the country are also the people behind the powerful illegal groups within Japan and South Korea. Even regular government police should be active enough to know and act when they notice something illegal going on when they do rounds on places at night. There are many ways to solve child prostitution; it just has to entail sincerity in implementation and consistency in acting against the problem. 4.3Laws and Protocols to fight Child prostitution In Japan, Law Punishing Acts Related to Child Prostitution and Child Pornography, and for Protecting Children and its Supplementary Provision, 1999, 90 revised in 2004.Articles 4 to 7 punish acts related to child prostitution and child pornography. Trafficking of children for prostitution or pornography is punished under Article 8 with one to ten years’ imprisonment (Human Trafficking for Sexual Exploitation in Japan,1999). In 2006, the Internet Association Japan, the Ministry of Internal Affairs and Communication, the National Police Agency and information technology (IT) experts collaborated to draft guidelines on operating a hotline. The Internet Hotline Centre provides the public the opportunity to report illegal or harmful information found on the internet (Internet Association Japan, 2006). Japanese law now prohibits engaging in, facilitating, and/or soliciting the prostitution of a child; consistent with international law, a child is defined as a person under 18 years o f age.(Law on Punishing Acts related to Child Prostitution and Child Pornography, and on Protecting Children, 1999). According to the 2003 Deai Kei Site Regulation Law,40 minors are prohibited from accessing ‘deai-kei’ websites (matchmaking websites that facilitate prostitution of children), however no penalties apply. The adults who send communications for this purpose are fined, up to one million yen (approx. US$8,550). Children are usually referred to a Family Court for counselling and protective measures, according to the provisions of the Juvenile Law. After the Deai Kei Site Regulation Law was enacted, access to the ‘deai-kei’ websites and obvious calls for compensated dating, especially those made by children, were drastically reduced for a while; but more disguised soliciting calls have appeared since (Ikemura,2005). A Cybercrime Task Force division was established in 2004 to improve action against online child pornography and online crime. Working in cooperation with the Office for Juvenile Protection, the Task Force acts as the contact point for international cooperation, advises the local police on investigations, prepares draft laws/amendments and policies on information technologies security and raises public awareness on the issue (National Police Agency of Japan,2005). In Korea, child protection issues are handled by the National Youth Commission, which has set up a number of committees to coordinate action against CSEC( Commercial Sexual Exploitation of Children), comprising both government agencies and NGOs. An example is the Committee on Combating the Sexual Exploitation of Children. In South Korea, many NGOs working on children’s rights rely on state funding to operate and their financial dependence on the government has prevented them from engaging in a more critical dialogue regarding the actions that need to be taken. In 2004, The South Korean government passed an anti-prostitution law, prohibition of prostitution in South Korea, made it illegal to buy or sell women. South Korea brought in a tough anti-prostitution law in 2004, punishing clients with fines and throwing pimps in prison. In 2007, courts prosecuted 35,000 clients, 2.5 times higher than the number of those who were caught buying sex in 2003 (Stiephensoun, 2010). South Korea developed a National Plan of Action on  Children, which is part of the Five-Year Social and Economic Development Plan (1998–2002)12 and the Five-Year Basic Plan forYouth Protection (2002–2006), which tackles crimes against children, including commercial sexual exploitation(National Youth Commission,2005). In March 2004, the Task Force for the Elimination of Prostitution completed the Sex Trafficking Prevention Plan, which includes measures to protect the rights of victims of forced prostitution and to tackle, through various routes, the facilitation of prostitution (for instance, through the use of the Internet and mobile phones). The Task Force introduced the‘John School’ system, where men who have solicited prostitutes (or are suspected of having done so) participate in rehabilitation programmes instead of receiving a criminal sentence (Jeong, Bong-Hyup,2005). The Illegal and Harmful Contents Report Centre – an independent legal institution that deliberates on reported illegal and harmful Internet content – cooperates with the National Police Agency, National Youth Commission, NGOs, Internet service providers and foreign organizations (Internet 119 Website, 2005). The Republic of Korea ratified the Act on Protection of Youth from Sexual Exploitation. This law defines â€Å"youth exploited obscene materials† as forms of pictures, such as film images, video, computer, or other communications media â€Å"with the appearance of youth,† and including sexual acts (The Office of the United Nations High Commissioner for Human Rights,2006) Both countries have successfully formulated series of laws and protocols in order to act against rampant child prostitution. Japan and South Korea together with its government and non-governmental offices conducted successful conferences in order to draft laws that would possibly cure the problem on child prostitution. Looking into the deeper perspective, identifying the problem and formulating a plan on how to solve a certain social and economic issue are only the first steps to the real fight against child prostitution. Even a particular country formulated thousands of polices for a social or economic problem, if none of those polices or laws was implemented in an effective way then it would waste the whole effort laid to create those policies. Hence, the success of formulated laws depends not on the number of laws being formulated but on how it is truly and effectively implemented and the effects on those policies in a certain  country or society. Japan made its serious efforts of trying to eradicate child prostitution by raising public awareness by having symposiums and local and international conferences. Japan shared information and developed practical regional measures through the Bali Process, and hosted â€Å"The International Symposium on Measures to Prevent the Commercial and Sexual Exploitation of Children in Southeast Asia† in 2003 and many more. Japan integrated international cooperation by supporting projects under the United Nations that includes having such interagency collaborations and institutional arrangements with government organizations like the National Police Agency and Ministry of Foreign Affairs in conducting investigations and took administrative measures for them to more effectively trac e illegal groups that runs bars and entertainment businesses on child prostitution. Japan also stressed out the protection of child prostitution victims by conducting a specific program which gives them shelter and protection. Government organizations contact private shelter to cater the needs of the victims and the government communicates with the country and return these victims to safe return in their respective areas (Paredes-Maceda,2006). By the end of 2008, the Government of Japan had demonstrated increasing commitment to take effective action against trafficking and child prostitution in Japan as a destination country. A watershed was the adoption in December 2008 of the National Plan of Action against Trafficking and Child prostitution. Other announced measures, including the tightening of visa controls and support for the repatriation of victims, may also lead to more controls against trafficking and child prostitution and to improved protection and rehabilitation of victims in their countries of origin (Jordan,2008). According to the CATW Fact Book, Kyodo News in 1998 trafficking and child prostitution laws exist but not enforced. In South Korea, government and non-government organizations as well went hand in hand in banning as much as possible all the pornographic sites. Even sites with suggestive content were banned. Though as recently as 2001 the government received low marks on the issue, in recent years the government has made significant strides in its enforcement efforts. Child trafficking was outlawed and penalties for prostitution increased; the 2004 Act on the Prevention of the Sex Trade and Protection of its Victims was passed,  toughening penalties for traffickers, ending deportation of victims, and establishing a number of shelters for victims. As of 2005, there were 144 people serving jail time for human trafficking (Scofield, 2004). Japan and Korea extended its efforts in solving child prostitution by collaborating through international organizations like the United Nations, as well as local governmental and nongovernmental agencies, but there had been a great discrepancy in the number of arrested individuals compared to the number of people that truly engages to the sex industry. The number of people that engages to child prostitution in Japan alone from entertainment bars, matchmaking websites to porn sites are counted as more than a hundred thousand employers with illegal child victims yet the number of individuals that are caught every year was only a little more than a hundred often times little less than a hundred, that also goes in Korea, there are a lot of people that is involve in child prostitution but the number of imprisoned employers are far little compared to the original number of involve individuals in child prostitution. In addition to that, as mentioned above Japan may have formulated laws and policies but it is rather suggested than imposed. It means whether the citizens follow or not the said law they wouldn’t be directly responsible for it, thus, the laws wouldn’t serve its ultimate purpose on solving the problem of child prostitution. Based on the gathered data, the two countries differed on the level of how they implement laws. Korea is observed to be more empowered and strict in implementing laws against child prostitution. Meanwhile, Japan also considers a lot of factors in implementing the laws. Japan is known to promote more the idea of growing population in solution to its current trend of decreasing population within years. Hence, as a realization we must take into consideration first wider contributing factors on looking how a country face and manage certain problems. Both countries successfully decreased the rate of child prostitution within years with its respective programs and policies. They have enforced laws and strategies that is designed not only to solve a particular problem but also to consider other related factors. CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.1CONCLUSIONS As shown by the data and information gathered, it shows that the main root of child prostitution in Japan and South Korea is poverty that leads to unavailability of quality education for children and the urge to work in order to provide their own families daily income for basic necessities in everyday living. In both countries, Japan and South Korea, children were taken from different countries like Philippines, Thailand, Malaysia, Russia, China and other countries to work on the sex trade industry. Most of them are illegally trafficked from different neighboring countries in order to seek work. The wide use of internet also is a considered as a growing concern in dealing with child prostitution. There are different forms of child prostitution; from pornographic sites and matchmaking sites, child pornography, exploitation through saunas, tea houses and entertainment bars. In Japan and South Korea, there are a lot of laws formulated and signed in order to battle against the problem re garding child prostitution. Governments collaborated with international organizations such as the United Nations as well as nongovernmental and governmental local offices to effectively implement the laws created that would solve the problem regarding child prostitution. Japan and South Korea differs on the level on implementation on their policies. In Japan, the formulated laws are more suggested than imposed; while in South Korea they observe stricter rules and limitations entailed with higher penalties and responsibilities. Since South Korea was able to more effectively implement their policies compared to Japan their rate for child prostitution through years is going lower than of Japan. It might not solve immediately the problem regarding child prostitution but both countries had been successful in lowering their rates in child prostitution. Looking into the deeper perspective, efforts to eliminate child prostitution must entail proper implementation and assessment to provide an accurate picture of the situation so that effective policies and programs can be developed and appropriate solutions be enforced. In the other side, eliminating child prostitution may not solve the problem but may also lead to a more big dilemma as children may transfer to other activities that are just as harmful or perhaps more harmful work condition in order to still seek ways for living to be able to provide their own families basic necessities. 5.2Recommendations Having known through this study that proper implementation of laws plays a big role for a success  of a policy. The researcher would like to open some points for further study regarding with more appropriate laws be formulated in order to protect the interests and welfare of poor children who are always the victim of sex labor and also give way for a better procedure and methods in implementing such formulated laws for it to serve its ultimate purpose and since poverty is seen in this study as the primary cause of child prostitution the researcher would like to further suggest of creating or formulating programs in where the children or the youth would be appropriately given the equal chance to be given quality education for them to be informed with their own rights to avoid abuse. They should implement enforcement to continue to improve efforts against child trafficking, especially to strengthen their ability to identify child victims of trafficking in sexual exploitation and ensure investigation and prosecution of traffickers. Provide training to law enforcement, prosecutors and judges on th e issue of commercial sexual exploitation. Hence, there would be a need to conduct further researches on child trafficking for sexual purposes to identify the scope of the problem, current trends and provide information on traffickers and at-risk groups or victims this information will strengthen prevention and awareness. In addition, data collected should be disaggregated between children and adults and must include information on the child’s age, nationality and possible background information. The Agenda for Action against Commercial Sexual Exploitation of Children provides a detailed framework and categories of actions to be taken by governments in partnership with civil society organizations and other relevant actors for combating commercial sexual crimes against children. Broadly, these actions are focused on: 1) Coordination and Cooperation; 2) Prevention; 3) Protection; 4) Recovery, Rehabilitation and Reintegration; and 5) Child Participation. The Agenda for Action is thus the formal and guiding structure used by governments that have adopted it and committed to work against Commercial Sexual Exploitation of Children (National Women’s Education Centre, 2005). Consequently, child prostitution may be reduced if there would be changes in economic development that would raise family incomes and living standards, every state as much as possible must provide widespread, affordable, required and relevant education, formulation and proper implementation of anti- child prostitution laws and most of all the need to change the public attitude  toward children that would elevate the view on the importance of educating the youth and giving also the importance of their individual rights for future generations to come.

Sunday, October 27, 2019

Analysis of the Internet of Things

Analysis of the Internet of Things The Internet of things is a term coined by Massachutes Institute of technology (MIT).The term describes a vision of the internet in the future where all things or objects are on one network. These things will contain: A Unique identifier Its own individual digital presence- it will know who and where it is. The ability to process or exchange information Can store data about itself Is capable of participating in or making decisions relevant to its own destiny on a continuous basis? The term Internet of things covers the whole infrastructure such as the hardware, software and services supporting the networking of physical objects. (European Commission, 2008) A Brief History of the Internet The first development to the present World Wide Web was Enquire. This contained a project management tool that allowed pages of notes to be linked together and edited. (Anderson, 2007). Eventually, after the evolution of various technological and software developments was the World Wide Web created. With a browser/client that could view and edit pages of marked-up information (HTML). The edit function only really materialised in later browsers: Viola WWW and Mosaic (the current Netscape browser.). Web 1.0 Introduced in 1994, web 1.0 consisted of an individual source (e.g. Website or a file) publishing information which could be viewed or downloaded by a client. This was a straight client-server network, so those individual clients were not able to fully interact with the source. The main purpose of web 1.0 was to push information to a relatively passive audience. (Castelluccio, Michael, 2008). This passive audience would consist of users who would create their own websites. So, the majority of web 1.0 websites contained HTML tags scattered all across the web but without the ability for users to add to the website unless they understood HTML. This left internet interaction exclusive to people who were HTML literate. Web 2.0 In 2008 web 2.0 became the associated term for the uprising of new products and services on the internet. The term was created four years previous by Dale Dougherty, vice president of OReilly Media Inc.2 Evolving from web 1.0, 2.0 represented a more peer to peer environment. This concept emphasized more the individual user having the ability to upload content (pictures, music, and videos) to a website. These websites took the form of blogs, wikis, podcasts, RSS feeds and social networking sites. This user interaction coupled with improvements in networking technology, has made the internet more personal and accessible. According to (Anupriya Ankolekar et al, 2007), Web 2.0 is distinguished mainly from Web 1.0 by the following characteristics: Community: Web 2.0 offers multiple users to work together and to share information. So the website is more effective than that of just having one contributor to the site. Each contributor gains more from the system than she puts into it. Such community website examples would be the music file sharing service Napster and an event calendar Upcoming. Mashups: Services from different sites can be brought together, in the creation of a new website such as using Google maps in your website. Ajax: The base for the previous two characteristics, Ajax creates responsive user interfaces. Asynchronous JavaScript + XML, AJAX for short is a number of technologies ranging from CSS and XHTML for standards based presentation to XML for data retrieval and data interchange to JavaScript for binding everything together (Garrett, 2005). The traditional Web application model was based on the users actions on a web interface triggering a HTTP request to a web server. And in turn the server sending a HTML page back to the client. This lead to stop/starting of information as it goes and comes back to the user. Ajax prevents this by having an ajax engine being placed between the client and server. Instead of a webpage the browser loads an ajax engine made of javaScript code. This engine creates a asynchronous connection with the user independent of the server. Every action which would normally result in an HTTP request generation now turns into a JavaScript call to the AJAX engine. Web 3.0- The Semantic web Web 3.0 or a semantic web is being proposed as the natural progression for the development of the Web. A definition from Paul Anderson in an article in the American scientific explains that the semantic web is about the shift from documents to data- the transformation of a space consisting largely of human-readable, text oriented documents, to an information space in which machine readable data, imbued with some sense of meaning is being exchanged and acted upon. This machine readable data would consist of metadata. Defined by (NISO 2004) Metadata is structured information that describes, explains, locates, or otherwise makes it easier to retrieve, use, or manage an information resource. Metadata is often called data about data or information about information. RDF There are current technologies which are being developed by the W3C (World Wide Web Consortium) which aims to bring development towards a Semantic Web. These technologies such as RDF (Resource Description Frame work) can be used to give meaning to the metadata on the World Wide Web. RDF according to (Berners-lee et al, 2001), encodes a triple (object, subject, verb) using XML tags. These tags are hidden labels that annotate web pages but these tags have no meaning to the document. With RDF, the document makes decisions that things (people, webpages) have properties (is an author of) with certain values (another webpage). He goes on to develop that these objects can be identified by an URI (Universal Resource Identifier), the best known being a URL (Universal Resource Locator). The triples produced by RDF form webs of info about related things. And with URI encoding the document, the URI makes sure that this information is not just words but is tied to a unique definition that everyon e can find on the web? Ontologies But how can a machine differentiate between these terms/objects? OWL or Web Ontology Language is a formal language which represents ontologies (intelligent agents) in the semantic web. These intelligient agents will help relate various types of metadata from the RDF. According to (Berners-lee et al, 2001) ontologies have taxonomy and a set of interference rules. Taxonomy: Defines classes of objects and relations among them. And can express a large number of relations among objects by assigning properties to classes and allowing subclasses to inherit such properties. Interference Rules help distinguish similar terms, for example that an address from Sligo it, being in Sligo, must be in Co. Sligo, which is in Ireland. (Berners-lee et al, 2001) explains the computer doesnt truly understand any of this information, but it can now manipulate the terms much more effectively in ways that are useful and meaningful to the human user ?. With the ability to perform this function more accurate web searches can be produced, as the searches are based on a precise concept instead of using vague keywords. Turn to the Internet of Things The possibilities of the semantic web can give a base for the IOT to be developed, due to the quick, intelligent and personal nature of semantic technologies and to the fact that URIs can point to anything. This includes physical objects, which through RDF can promote their functionality (What they do and how they are controlled) (Berners-lee et al, 2001). (Artem Katasonov et al, 2008) suggests that for the IOT to happen the semantic base or (middleware) must be decentralised. This is suggested due to the high volume of devices connected to the internet, administrators will have it difficult in managing such a wide variety of unscalable information and media. There will be a need for self-manageable complex systems. They also go on to argue that semantic technologies firstly, will function as the basis of heterogeneous components and the integration of data across many domains and secondly, will be used for the coordination of the intelligent agents representing those resources. As previously mentioned in the last section, intelligient agents can roam as a middleware between the heterogeneous component and an autonomous software agent. (Artem Katasonov et al, 2008) defines the role of the agent as having the ability to monitor the state of the component, make decisions on behalf of the component and to discover, request and utilize external help if needed. The agents offer a more flexible system, one in which networks will be monitored easily as information will be already processed. What are Things? The IOT will be based on these intelligent objects which will all communicate with the each other and the end user. These things as previously stated will be individual entities which can interpret and communicate with the internet. They will have an active part within the internet and have the ability to share information about themselves and their environment. (European Commission, 2008) gives a few examples of objects which do menial tasks but use very smart systems and advanced network connections: Retail Example Mobile Phones will have the ability to be used as credit cards, travel passes and to gain information from the internet. With the use of NFC (Near Field Communications) technology could this be possible. They estimate that there will be 1billion by 2015. Another example given is a fully automated warehouse, where items are checked in and out. Orders can be passed directly to suppliers automatically. All the cause of RFID (Radio Frequency Identifiers) attached to goods and products. Manufactures can view the market needs in real time, this saves time and energy leading to the whole process being more environmentally friendly. E-health Example RFID and sensor technologies will help in early diagnostics of patients help doctors make more informed decisions and it will produce alerts if a patients health deteriorates. All information will be gathered through lightweight, intelligent sensors on the patient or by possible smart dust (microscopic computers) within the patient. Energy Example Through a network of sensors can temperature and lighting be dynamically controlled. This helps intelligent houses to reduce energy consumption without the loss of an individuals comfort. Environment Example The IOT will have an effect on how certain conditions (traffic, weather, air particles, water pollution, and the environment are monitored and examined. RFID Radio frequency Identification tags typically are small devices that can be embedded in or attached to objects for the purpose of identifying the object over a radio channel (Karjoth et al, 2005). RFID consists of a reader and a tag. Uses of RFID technology RFID has been in use now for many years. It started being used in World War II, by British planes to help them discover their own aircrafts using the Identification Friend or Foe (IFF) system. In the 1960s it was used by Los Alamos National Laboratory to gain access control to there company. People in the company wore RFID badges so they could be identified. This helped limit access to important areas in the company and also made it harder for badges to be forged. Since then RFID has being used to identify animals, track airline luggage, locate lost items, prevent theft and make toys more interactive. Recently, a few multi-national companies have shown an interest in this technology such as Wal-mart, Tesco, and the US Military. The main aims according to Roy Want is to make the cost of tags decrease, streamlining the tracking of stock, sales and orders (Want, 2006). With the ability to store information and to connect with tags over a digital communication network, RFID can track the journey an object makes between the factories, warehouses, vehicles, and stores (Want, 2006). RFID Tags The tag, when attached to an object can be identified by the reader over a radio channel. Tags can be read easier and faster than that of normal barcodes, usually within the range of a few meters. An RFID tag contains two main components: An antenna which is a flat, metallic conductive coil which has the potential to be less than half a millimetre in size, is used to send and receive radio waves. An antenna can be printed, etched or stamped on a plastic foil or silicon chip which (Karjoth et al, 2005) defines as a substrate. The second component the silicon chip is a microchip or Integrated Circuit (IC). According to (Plaggenborg, 2006), the smallest IC is 0.15 mm x 0.15 mm and is 7.5 m thick. Both the antenna and IC are attached to a plastic tag. The main types of RFID tags are active, passive and semi-passive. Active tags contain their own internal power source. The word active is due to the fact that it uses an active radio frequency transmitter to communicate in a session with the reader. This gives active tags a better read range than passive tags, covering hundreads of meters. It can communicate through difficult environments such as water or heavy metal, which Plaggenborg states is impossible for passive tags. He goes on to say that active tags have a greater amount of memory and are more secure because of their more advanced IC processing capabilities. Passive tags use electromagnetic waves from the reader to attract a connection to the tags antenna. Power is transferred from the reader to the tag through the electromagnetic waves. Because it does not need its own battery passive tags can have an unlimited lifespan (in theory). But a passive tags response is limited by the readers signal strength. The tags response or backscatter is limited by its range which is around four to five metres. Because of there simple design and low cost (five cent a tag), passive tags are mainly used in the retail industry. Semi-passive tags contain both a small battery and require waves from the reader to send a response. The small battery within the tag is used for the ICs logic and to give a response to the reader through the antenna. Due to the small battery these tags have a short lifespan, they are more delicate and are very expensive. Classes of Tags Tags are separated into different classes depending on there functionality. This framework which was developed by the Auto ID centre and later by EPC (Electronic product Code), 1separates tags into five different classes. From class one to the greater functionality of class five. Tag Memory A tags chip is either read-only memory (ROM) or read-write. Data which is embedded onto the chip at its manufacturing stage that can only be read was called class 0 tags. Tags can be used with static random access memory (SRAM) to produce what is called a Write Once Read Many (WORM) tag. The unique id in this tag type is permanently stored on the chip.12 Read-only chips are mainly used for tracking. Read-write allows the ability to change the chips ID and also to add some data to the tags memory. Information can be programmed onto read-write chips but these are very expensive. EEPROM (a technique for erasing memory and overwriting it) can also be used for this process. Also chips can be manufactured in such a way that the ID is cannot be altered but that information can still be written to memory. Passive tags can store from 32 bits to 128 kilobytes of data. Since active tags have their own battery they can afford to store more, some tags having the ability to store up to one megabyt e of memory.13 Frequencies (Plaggenborg, 2006) states that there are four frequency bands, each with their own characteristic in regards to communication. For example low frequencies can penetrate such conditions as water and metal but are much slower than that of high frequencies. High frequencies are faster but with the defect that they cannot penetrate the conditions mentioned. RFID operates on an unlicensed spectrum space called ISM (industrial, scientific and medical). The ISM frequencies vary on which country you are in. There are two distinct systems in regards to its physical properties to which RFID communicates from the tag to the reader. Low frequencies and high frequencies use near field communication through the process of inductive coupling from a magnetic field. The reader creates a magnetic field between itself and the reader. The reader induces an electric current in the tags antenna. From this, the reader gains the tags ID and also gives power to the tags IC. The reader learns the tags ID, by varying the load on the antennas coil which changes the current on the readers communication coil.12 Ultra High frequency and Microwave frequency use far-field communication. It uses the physical property of backscattering, which is the process of the reader sending a continuous signal frequency that is reflected back by the tags antenna. The tag encodes the reflected signal with information using modulation (i.e. changing the amplitude of the waves returned).12 RFID uses a frequency spectrum similar to that of wireless and Bluetooth networks and hybrid tags are currently being developed for them to communicate.12 Standards As with any established product and technology, RFID has many proposed standards. Standards provide many benefits such as universal procedures for all and interoperability between technologies. There are a number of bodies in the development of RFID Technology ISO EPC global ETSI FCC 12 (Plaggenborg, 2006) states the point that the main areas to which standards have being proposed are Air interface protocols These are ISO standards ranging from ISO 18000-1 to 7 and are concerned with how tags and readers communicate. EPC has its own set of standards similar to ISOs 18000-6 (860-960 MHZ range). These EPC tags are not interoperable with each other and are not interoperable with the ISO standard. So EPC are working on a new set of protocols (GEN 2) that can work with the class 0 and class 1 passive tags and should be closely aligned with the ISO standard.12 Data content and Encoding This is concerned with data formatting or organisation, numbering schemes (Plaggenborg, 2006). Conformance- This is the testing of products to see if they meet the standards. Applications- How standards are used on certain labels13 Electronic Product Code Is a unque code which is contained within an RFID tags memory. It is much the same as the barcode scheme UPC for identifying physical objects. EPC is differs from UPC as it has the capability to identify every single product item individually. For example when a shopkeeper scans a barcode the code relates to the type of product he is scanning (this packet is a packet of Jacob biscuits).If he scanned another packet of Jacob biscuits he would get the same result. In contrast, if he scanned an EPC tag he would be able to identify not just the make of the product but the individual product he is scanning. So this time when he scans another packet of Jacob biscuits, (that is not the original packet) it will come up with a different result. EPC uses a 96 bit number to identify a product. This gives it a huge scope of numbers for product identification as opposed to UPC. As shown in figure 3 The EPC code consists of many components. The header identifies what coding scheme is in use. There are many different schemes to which Matt Ward gives three examples Global Trade Identification Number GLTN, Serial Shipping Container Code SSCC and Global Location Number GLN.15 The Manger number defines the company that produced the product (Manufacturer). The object class identifies the actual product. The Serial number refers to the individual item/product. EPCs 96 bit code according to Matt Ward can identify 268 million companies, each manufacturer can have 16 million object classes and 68 billion serial numbers for every individual object. Matt Ward in his paper (Ward et al, 2006), also discuss about the EPC Network Architecture. He explains, clearly how RFID tags do not work in isolation but are part of an overall system be it a supply chain or any kind of logistical recording. He notes how the RFID tag can work as the primary key in representing a product within the database. A vision of this technology is being developed which is called the EPC Network Architecture. The architecture consists of many tags being connected through their readers to an organisations database or back-office enterprise system. In the previous chapter we observed the possible middleware for the Semantic web. Well here are the key technologies which (Ward et al, 2006) suggests are appropriate for supporting the massive increase of information that will result from in an RFID system. Savant is as he puts it is the middleware software system that links reader devices and processes the information streams from tags. It acts as the gateway to the enterprise systems and database applications, providing filtering, aggregation and counting of tag-based data. (Ward et al, 2006) ONS Object Naming Service much like the Domain Name Service (DNS) on the World Wide Web helps translate the EPC code into a Uniform Reference Locator. This is where it looks up the location of where the tags associated database is. Physical Mark up Language (PML) is an XML-based language which uses a standard vocabulary for describing physical objects, observations made by the RFID readers of these objects and observations made about the readers themselves and there exchanging of data throughout the EPC network (Ward et al, 2006). It uses two main vocabularies: one for communication between Savant and the enterprise applications and a second (Core PML) for communication throughout the EPC network. (Seong Leong,2004) (Ward et al, 2006) notes indirectly about the IOT when he mentions of the possibilities of IPV6 as an alternative to EPC coding. IPV6 is a communication network standard which delegates the addressing and routing of data packets through a network. It is an improved addressing protocol from that of IPV4 which has the capacity up to 4 billion addresses. IPV6 can give 430 quintillion addresses for every inch of the worlds surface.15 But Ward explains that for a tag to have an IPV6 address, it would no longer be used as an assigned permanent identifier on objects. Saying this he highlights the fact that the U.S. military are investigating and planning to use IPV6 tags in the near future. RFID Readers Readers can be handheld or a fixed device. Examples of handheld readers are similar to that of barcode readers, but readers can be placed in PDAs or mobile phones. Class 5 tags are actually designed to be readers; they can read and exchange information with other tags.15 Fixed readers are used for electronic tolls or can be placed within walls or ceilings. Readers communicate with a tag to gain its id number. When the reader is held close to a passive tag, the tags antenna consumes the energy from the reader which in turn powers the IC. The IC responds information back. This depends on the type of tag. There are two main types of readers: ones in which the reader can only read information from the tag. These usually operate with an EPC class 1 tag. The other type is readers which can write information onto the tag. This depends on if the memory on the tag is read/write. According to (Ward et al, 2006), Readers are becoming more sophisticated and are beginning to act as an entry to th e internet through supporting TCP/IP technologies and other such protocols as DHCP, UDP/IP and wireless 802.11. RFIDs Relevance to the Future of the Internet From the research into this area we have seen that RFID has the components to develop a network of communicating things. Because RFID can both send and receive data about an object within various conditions e.g. underwater, through walls etc. We can communicate with solitary objects and their position, condition and other relevant information for whatever purpose they were placed on an object. Through examining various papers on this topic, most come to the conclusion that RFID as a technology is not attractive enough of a proposition for companies to develop at present. RFID is too expensive to be added too or implemented in a manufacturers product. Currently, you can get the cheapest RFIDs at 5 cent each.13 Matt Ward sees RFID tags as a stepping stone to ubiquitous computing. There will not be a fully fledged IOT but one in which will be developed systematically. He proposes that the internet will be extended to a level below computational devices, which consists of simpler devices/items. As the RFID technologies become more accepted in the market place, there will be more of a demand for tags that can achieve greater amounts of tasks. Similar to the pre requites we defined in section two, Matt notes the technological developments needed for their relevance in the internet of things. Firstly, each of these items must be able to identify itself to other items and to the network in general. This is provided for by the introduction and development of RFID technology. Secondly, these items should include some element of embedded computational power in order to act with some level of intelligence. Thirdly, they will need to have some sense of their physical environment and geographical location. Continuing developments in computational science and electronics, particularly work on miniaturisation, tiny operating systems and wireless communication will make this vision increasingly realistic (Ward et al, 2006) Near field communication This is a new development in RFID, one of which uses near field coupling signalling between devices in the 13.56 MHZ band.11 This standard has the ability to read existing passive tags and aims to develop them to communicate with peer devices at a 20cm locality. It was set up by the Near-field communication forum. The NFC standard aims to streamline the discovery process by passing wireless Media Access Control addresses and channel-encryption keys between radios through a near-field coupling side channel, which, when limited to 20 cm, lets users enforce their own physical security for encryption key exchange (Want,2006). He also mentions how through this two way authentication process can a more reliable connection be made then that of Wireless and Bluetooth. Reliable in the sense that it would not form any associations with devices that arent local. Sensory RFID Many commentators believe the next development of RFID will be an enabled sensory function. This will give tags the ability to make measurements about its surrounding environment based on such gauges as pressure, temperature, flow-rate and speed vibrations.15 These devices will be connected to the internet by radio frequencies or through wireless communication systems. Due to the batteries capacity, active tags would seem to be more qualified for development.13 Plaggenborg describes in his developmental paper of RFID about Mitsubishis research team who developed location aware objects with light sensitive RFID tags. This consisted of an RFID reader with a projector to give precise feedback of a products location. The device is aimed at the products in question. It projects a pattern over the product and each pixel shows a different code. This code with its identity is then communicated back to the handheld device. It then uses an (x, y) coordinate to visually give the user feedback. As we can see, its not impossible for this technology if creatively used to be developed further. Distributed Memory The amount of memory a tag can store could be limitless if the tag can store and recover its information from a local database. But the tag could not be able to implicitly recover the information all the time. For tags to work more effective, it will need to utilise its self storing capability. Currently a tag can store from 200 to 8,000 bits.12 believes that tags in the future will have the ability to store more information. Leaving to more distributed information being placed in our surroundings. Standardisations for the IOT If the IOT is going to happen then interoperability is a must. There are currently a number of groups who are working on low power wireless communication standards between objects. ZigBee, 6LoWPAN, Z-Wave, and Bluetooth Low Energy are the main standards for this type of communication. But the base of communication for the Physical layers for Zigbee and 6LoWPAN is IEEEs 802.15.4. IEEEs 802.15.4 Developed and maintained by the IEEE 802.15 working group, 802.15.4 is a low power wireless personal area network (LoWPAN) standard. Released in 2003, it was the first low power-radio standard.18 It is used as a specification for the physical (PHY) and medium access control (MAC) layers. To gain a complete protocol stack other standards are needed to define the higher layers. According to (Orrevad, 2009), the physical of the protocol uses three different frequency bands: 868-868.8 MHz within Europe which allows one communication channel, 902-928 MHz within North America that allows ten to thirty channels and 2400-2483.5 MHz range for the rest of the world and uses up to sixteen channels. This standard aims to work with multiple low cost nodes of a long lifespan. To achieve an IOT such attributes would have to be viable. But this low cost/ low power solution, limits the capability of both the microcontroller and the LoWPANs links. The throughput is suggested to reach the 250Kbps limit . And the frame length is only 128 bytes. It uses short 16-bit link addresses, as well as IEEE EUI-64 addresses, to reduce header overhead and memory requirements. LoWPANs make contact over multiple hops. Microcontrollers which work with this standard usually have about 8 Kbytes of data RAM and 64 Kbytes of program ROM. The main features of IEEE 802.15.4 highlighted within (Orrevad, 2009)s informative paper are the fact of its use of carrier sense multiple access with collision avoidance (CSMA/CA) which avoids collisions, sharing a single channel with multiple users by using direct sequence spread spectrum (DSSS), with the ability to sleep it gives appropriate energy efficiency and through its use of guaranteed time slots (GTS) it can guarantee sensors transmission if they are critical in nature. Frames Frames contain a certain patterns in which other devices can understand. Differerent frames have different uses. There are four types of frames defined in the IEEE 802.15.4 standard : Beacon, used by a coordinator to transmit beacons A data frame, for different data transfers An acknowledgement(ACK) frame, used for a confirmation of successful frame transfer A MAC command frame, used for handling all MAC transfers between entities The beacon, ACK, and MAC frames are mainly used for lower layer signalling. Headers Headers in the IEEE 802.15.4 standard consist of the physical layer (PHY) and medium access control (MAC) layer headers which contain different features that can be set when sending a packet. Maximum physical layer packet size including overhead is 102 octets.19 He adds, if you add link-layer security you add an extra 21 octets for an AES-CCM-128 encryption. This leaves 81 octets available for the higher levels of the protocol stack. IPV6 integration IPV6 is the newest version of the Internet protocol, which was created in the late 1990s as a solution to the limited numbe

Friday, October 25, 2019

Saint Augustine’s View on Sexuality Essay -- Religion

Saint Augustine’s View on Sexuality The famous bishop of Hippo, St. Augustine, is claimed as a cornerstone of Christian theology by both Catholics and Protestants. Many of his views are regarded by Christians as authoritative interpretations of the Bible because they have withstood heated debate throughout the centuries. Christians ought to ask, however, whether such allegiance is justifiable in all cases. Augustine's idea of sex after matrimony, for example, is very narrow, restricting actions and emotions married Christians today consider part of the beauty of intercourse. A logical assertion then, is that Augustine's view of sexuality, as delineated in many writings, is a response to his life of sensuality prior to salvation; therefore, his idea about the intent for sex within marriage stems more from his former sin than from Biblical perspective. St. Augustine's sordid lifestyle as a young man, revealed in Confessions, serves as a logical explanation for his limited view of the purpose of sexuality in marriage. His life from adolescence to age thirty-one was so united to passionate desire and sensual pleasure, that he later avoided approval of such emotions even within the sanctity of holy union. From the age of sixteen until he was freed of promiscuity fifteen years later, Augustine's life was woven with a growing desire for illicit acts, until that desire finally became necessity and controlled his will. His lust for sex began in the bath houses of Tagaste, where he was idle without schooling and "was tossed about†¦and boiling over in†¦fornications" (2.2). Also during that time, young Augustine displayed his preoccupation with sexual experience by fabricating vulgarities simply to impress his peers. In descript... ... Anderson, Douglas L., ed. Augustine. Nashville: Broadman Press, 1979. Augustine. The Confessions of St. Augustine: Books I-X. Trans. F.J. Sheed. New York: Sheed & Ward, 1942. Babcock, William S., ed. The Ethics of St. Augustine. Atlanta: Scholars P, 1991. Battenhouse, Roy W., ed. A Companion to the Study of St. Augustine. Grand Rapids: Baker,1955. Halsall, Paul. "St. Augustine: From 'On Marriage and Concupiscence.'" Internet Medieval Source Book. Oct. 1998. 3 Nov. 2000 <http://www.fordham.edu/halsall/source/aug-marr.html>. Hooker, Richard. Early Christianity: Augustine. 6 Jun. 1999. 3 Nov. 2000 <http://www.wsu.edu:8080/~dee/CHRIST/AUG.HTM>. Oates, Whitney J., ed. Basic Writings of Saint Augustine. 1948. 2 vols. Grand Rapids: Baker, 1980. Rist, John M. Augustine: Ancient Thought Baptized. New York: Cambridge University Press, 1994.

Thursday, October 24, 2019

Comparison of Homelessness in the U.S and South Africa Essay

The term homelessness has a very wide scope and many different agencies and governments attempt to define it differently. The homeless committee of the city of Montreal adopted some definition of the homeless. Casavant (1999) further translates the definition as â€Å"a person with no fixed address, stable, safe and healthy housing for the next 60 days, an extremely low income, adversely discriminated against in access to services, with problems of mental health, alcohol and drug abuse or social disorganization, and not a member of any stable group,† (para 9). Comparison of homelessness in the U. S and South Africa Having established a fairly clear definition of the homeless, it is paramount therefore that the three types of homelessness be pointed out. First are the chronically homeless whose case is more severe than the rest and they face other problems like drug abuse or mental illness. The other groups are known as the cyclically homeless who have forfeited their homes due to some situation arising from for example a prison term or released unemployed detainees. The last category are referred to as the temporarily homeless, who lose their dwellings for a very short period of time due to circumstances such as floods, drought and clashes displacement (Casavant , 1999) . The United States of America does face the homelessness issue like any other nation. Statistics on the number of homeless people in the United States of America is never fixed and is ever fluctuating because of the cyclical, nomadic and temporary nature. From recent studies done, the numbers do range between 650,000 to 2. million people depending on factors that have been analyzed above (McCarty, 2005). The 2004 U. S conference of Mayors study gives the following information regarding the numbers and ethnicities involved. According to the survey that was carried out in all the cities, it was established that the number of homeless people in the United States gradually increased at a rate of 7% per annum in numbers. Of the entire population 41%, were men. 40% of the population was composed of families while only a meager 14% were women. The youth comprised of only 5% of the population. By ethnicities, the African American population took the big bulk of people with approximately 49% composition. 35% were whites, 13% Hispanics, 2% Native Americans and 1% Asian. According to the survey, also the veterans or old people accounted for 10% of the population (McCarty, 2005). South Africa on the other hand gives a different picture as compared with the United States. The biggest cause of homelessness in South Africa was the adverse effects that were brought along the apartheid era. The number of people that were living in shacks was put to be between 5 million and 7. 7 million (Nduru, 2010). South Africa is a multi racial nation with both the black community and the white community coexisting together. The black community comprising of ethnicities such as Zulu, Xhosa, Ndebele and others comprise about 80% of the population while the whites and red heads comprise around 19% of the population according to the Africa community survey of 2007. It has been established that most of the population living in shanty towns is the black community. In fact, around 80% of South Africa’s population lives below the poverty line and a very huge gap do exist between the rich and the poor (Sherwood , 2003). Conclusion We have observed that the causes and the number of people being affected by homelessness do differ in great detail between the two countries. The United States though a very big country with a huge population accounts for lesser number of people without adequate shelter. Also, the United States’ distribution of homeless people across the ethnicities is a lot fairer than South Africa’s where the biggest of proportions lies among the black community.

Wednesday, October 23, 2019

Naturalistic Observation

Naturalistic observation is considered as one of the basic methods in psychological research and study. This fundamental research methodology is known to divulge and aid the psychologist in his or her critical analysis of the human behavior and characteristics while in socially acceptable public domain in his or her course of interacting with other individuals in their aspect of addressing their sociological needs. In this aspect of human interaction, psychologist try to significantly analyze the human nature as shown by their actions both involving the verbal and non-verbal communication style and how individuals manifest their motives while adhering to the social values and cultures pertaining to public communication. Naturalistic observation is commonly an actual observation of subjects mainly while they are in their course of social interaction specifically while they are in the public place. In the course of implementing this method, the researcher must also observe social values and cultural manners thus preventing any offensive act during the observation. In addition, the concept of personal privacy and inappropriate intrusion should also be constantly observed while the researcher is observing the subjects. All of these limitations must be implemented while the researcher observed the subjects in an isolated nature keeping his or her presence unnoticed and ideally absent to the personal space of the subject during their interaction. The only aspect to be focused on in this project is the psychological behavior of the subject as manifested by their very intricate details such as gestures, voice, reaction, facial expression and impression and others. Project: Naturalistic Observation In this aspect of applying the method of naturalistic observation during an actual psychological study, this author conducted a personal project using the said methodology. In this study, the researcher particularly this author will try to support the psychological hypothesis postulated by Aronson (et al, 2004) and Lesko (2000) regarding the psychological behavior and actions of individuals during an actual social interaction. This hypothesis will significantly govern the psychological observation project and will guide the researcher in establishing an interactional pattern as observed through the subjects. In this observation, the researcher presumptively hypothesized that the dominant speaker in the first part of the conversation will likely speak more frequently in the later part of the conversation. The chosen subjects are a man and a woman both Caucasians who are dining in a restaurant and are observably conversing with each other regarding a specific matter which both of them can relate. It is very apparent from the observable verbal and non-verbal aspect of their communication that the topic they are conversing is very critical as they both stresses their own involvement and awareness to it. Verbal recording is not very likely in this situation as an attempt to push this is prevented by the environment and the situation at hand however, few notes of recorded key words denotes that they are talking about a legal and ethical issue in their work environment. Words mentioned such as â€Å"management†, â€Å"chief-of-executives†, â€Å"a settlement bargain† and â€Å"what the labor union ought to do† will denote that they are both involve in the same job and in the same issue they are both probably working with. This will suggests that the situation is likely an informal meeting between the two, possible from different party, to discuss some important details regarding their business issue or a settlement for the resolution of their topic. This is established to be informal by the researcher as suggested by their attire as they are into casual wear. In non-verbal observation, the actions and gestures of the subjects will denote that they are with a professional background as their etiquettes and manners are significantly refined for the matter (Aronson et al, 2004; Lesko, 2000). In addition, their gesture mainly the speaker, at their specific chances, will suggests a clear and direct emphasis on his or her point thus suggesting that their topic is indeed of high importance (Lesko, 2000). This concept is further followed with the high intention of the other to listen carefully and then reply with his or her personal opinion on the matter with a language that is concise and direct to the point. The observed intonations and voice volume is noticeably well modulated suggesting that both of the subjects as well versed in the field of the topic and that they are cautious of offending the other. With critical and empirical observation of the subjects, this researcher has noted that the man seems to be speaking more frequently while the woman speaks primarily in response to the man’s idea. This factor suggests that the man has the part of proposal or he is the one with the main intention for the meeting, which is likely established by him. The verbal aspect of the woman can thus be regarded to be as a commentary or a supplementary mean in this conversation making her the character that the proposal is focused with. In the aspect of considering the hypothesis that is previously stated, the man is postulated to speak more frequently in the following period. And in the observed subjects, the man is indeed noted to have spoken more frequently than the woman, which establishes the hypothesized interactional pattern in the social behavior of the observed individuals. Conclusion As observed in the conducted naturalistic observation, it has been determined by this author that social interaction of individuals are indeed influenced by their natural nature and motives manifesting through the creation of the dominant speaker and the other being the receiver. The person who has the greater aim and intention in each social interaction who is more likely than one who established the said meeting has the greater possibility of becoming the main speaker in the conversation. On the other hand, the other party becomes the main receiver as his or her speech becomes supplementary or commentary with that of the other. Thus, in social interaction, it is very likely that one party manifest as the dominant side to guide and focus the conversation as he or she has the greater intention in the said interaction. Bibliography Aronson, E. & Wilson T. D. & Akert R. M. (2004). Social Psychology. Prentice Hall, NY, USA. 5th Edition. Lesko, W. A. (2000). Readings in Social Psychology: General, Classic and Contemporary Selections. Allyn and Bacon, Boston, USA. 5th Edition.