Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Social and political responses by the U.S. government after the attack on 9/11
Don’t take our word for it - see why 10 million students trust us with their essay needs.
George W. Bush's Executive Order of Homeland Security
As we move steadfast into the twenty-first century we are confronted with more complex and compromising issues affecting the intricately connected global system. New forms of aggression and threat are the faces that greet policy-makers as they spend countless hours configuring ways to counter future attacks such as terrorism or massive drug trafficking within and across national borders. Instead of submitting ourselves to the tyranny of chance, which cruelly deals out futures blighted with catastrophes that can remain vivid in our memories, President George W. Bush has issued a mandate in an attempt to regain control over future acts of aggression such as terrorism in the United State; he issued the Executive Order of Homeland Security as that initial step.
In the Executive Order, it states the functions of this cabinet: " The functions of the office shall be to coordinate the executive branch's efforts to detect, prepare for, prevent, protect against, respond to, and recover from terrorist attacks within the United States" (Sec 3). It clearly states that an act such as terrorism is something not accepted by United States nationals and for anything in relation to it will be handled accordingly. It also makes it clear that terrorism is seen as an irregularity, in consistent with proper conduct and a threat to state power. To be able to exercise these newly established rules and standards; the state must demonstrate some degree of control in power in its implementation process.
The Executive Order Establishing Office of Homeland Security Council puts forth an agenda on countering terrorist acts; it is done to prevent untold a...
... middle of paper ...
...important tool in an attempt to grab the wild reins of chaos, without such an order, it is quite possible for there to be an encore presentation of September 11, and from that, a large cartel of illicit drug transfer can take hold on society. The Executive Order can be seen as a wide-ranging tool in combating terrorism. As mentioned before, terrorism does not exactly fit the mold of what is considered part of the illicit economy, but its actions in planning could be. Although the order makes a clear distinction of its purpose of countering terrorism, it can imply otherwise. The order can be seen as so clear in its language, but at the same time so vague in its meaning, this it seems, would allow for room for action to be taken by the United States against any possible threat, with this flexibility, it will allow security actions to be executed without hindrance.
HSPD-5 is shortened for Homeland Security Presidential Directive 5. This directive states that the United States should be able to operate under a singular national incident management system. Its’ objectives ensure “… that all levels of government have the capability to work effeciently and effectively together…coordination with private and non-governmental sectors for adequete planning, equipment, training, and exercise activitites and to promote partnerships…the gathering of appropriate information and providing it to the public, the private sector, State and local authorities, Federal departments and agencies…” ( Weekly Compilation of Presidential Documents, 2003).
Host: On September the 11th 2001, the notorious terror organisation known as Al-Qaeda struck at the very heart of the United States. The death count was approximately 3,000; a nation was left in panic. To this day, counterterrorism experts and historians alike regard the event surrounding 9/11 as a turning point in US foreign relations. Outraged and fearful of radical terrorism from the middle-east, President Bush declared that in 2001 that it was a matter of freedoms; that “our very freedom has come under attack”. In his eyes, America was simply targeted because of its democratic and western values (CNN News, 2001). In the 14 years following this pivotal declaration, an aggressive, pre-emptive approach to terrorism replaced the traditional
Flashbulb and “flashbulb-like” memories are controversial. A person could be confident their memory is correct, yet it could be completely false. For the purpose of this paper, I decided to take one of my own private flashbulb memories, when my grandma died, and analyze what I remember. This special memory may be completely accurate, or may have been rehearsed so many times that certain details have become misrepresented.
Cloud computing has greatly influenced many aspects within the growing technology sector. This innovative approach has altered the way many businesses and individuals use technology. While there is no one clear definition of cloud computing, the National Institute of Standards and Technology (NIST) defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Mell & Grance, 2011). It is composed of three service models: Infrastructure as a Service (IaaS,) Platform as a Service (PaaS), and Software as a Service (SaaS), and four deployment models: Private cloud, Community Cloud, Public Cloud, and Hybrid Cloud (Mell & Grance, 2011). Its main objective focuses on providing computing and software vaguely at a substantial level in the form of a utility service. With this goal in mind, cloud computing has opened the door for many opportunities to cloud service users, particularly small businesses, while emphasizing vast benefits to include cost savings, efficiency, convenience, broad network access, flexibility, agility, scalability of infrastructure, limited need for disk space, sustainability, and reduced complexity. Though there are a number of substantial advantages, there are also negative aspects that need to be considered. This paper will cover the underlying advantages and disadvantages of the cloud computing service and propose a recommendation as regards to whether or not businesses and individuals should integrate the service into their systems based on the research ...
Flashbulb memories are memories of highly emotional events so shocking that it creates a strong, ‘accurate’, vivid memory about the event. Intense events such as the assassination of a president can cause a person to remember even the tiniest bits of details like where or what the person was doing when the event occurred due to the emotions associated with the event. However, just like any memory, flashbulbs are inaccurate and reconstructive. Talarico and Rubin (2003) had the aim to determine whether flashbulb memories contained more details compared to normal memories after certain periods of time. Three groups of 18 participants recalled events of 9/11/01 on varying time spans and took a questionnaire on four different points of time (1, 7, 42, and 224 days after the attack). The researchers also tested the participants’ memories of ordinary events that took place around the same time as the attack and found that the flashbulb memories remained very vivid throughout the study and the participants felt extremely confident in their accuracy of recall. With the ordinary memories, the subjects were unsure about the accuracy and were less vivid with the detail (even though objectively they could remember no more details about 9/11). The details of their memories were compared to the first survey taken within the first 10 days after 9/11 and there were several differences that were found. A year after the event, only about 2/3 of what people remembered was accurate. The study showed that despite feeling as though highly emotional events or flashbulb memories are accurate and clearer to remember, they are no different from ordinary memories and the details can fade away over time. Brown and Kulik (1977) who actually coined the term ‘flashbulb memory’, had the idea that dramatic events can cause a physiological branding of memories of the events. 80 participants; 40 Caucasians and 40 African Americans, were asked to recall what they could remember about 5 highly
Cloud computing is becoming one of the key words of the IT industry. The cloud is a metaphor for the Internet or infrastructure of communication between the architectural components, based on an abstraction that hides the complexity of infrastructure. Each part of this infrastructure is provided as a service and they are normally allocated in data centres, using hardware shared computing and storage (Buyya et al. 2009b). To use the service, users need only take their machines operating system, browser and Internet access. All computing resources are available on the Internet. Therefore, the user’s machinery does not need to have high computational resources, as a result reducing the cost in the acquisition of machinery. All hardware can be used to perform a task that is appropriate to its processing power. New hardware features can be added to increase processing power and work with existing resources.
The world today is becoming more technologically advanced. Internet use is becoming a more integral part of businesses today. A new way that businesses have started to utilize the internet as a business tool is through cloud computing. “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” (NIST, 2011). This network provides a business with the ability to have a common remote third party connection which they can perform all necessary accounting work. All accounting work that is processed and completed on the cloud is referred to as cloud accounting. The reason businesses use the cloud is to store and organize information that a company obtains to place in a common location. It can be related to a file cabinet that can be accessed from anywhere connected to the internet.
There is a lot of buzz about “the Cloud” and what it can and cannot do for IT departments. A wide range of products and services are lumped into the phrase “Cloud computing.” While the strict definition of a cloud speaks mainly to a collection of easily deployed virtual servers, it also encompasses vendors of outsourced exchange servers, preconfigured CRM applications, web-enabled word processing applications, and online backup services (Gohring, 2013).
“At its most basic, cloud computing is moving applications accessible from our internal network onto an internet (cloud)-accessible space. We're essentially renting virtual machines in someone else's data center, with the capabilities for immediate scale-out, failover, and data synchronization. In the past, having an Internet-accessible application meant we were building a website with a hosted database. Cloud computing changes that paradigm—our application could be a website, or it could be a client installed on a local PC accessing a common data store from anywhere in the world. The data store could be internal to our network or itself hosted in the cloud.” (Duchene, 2010)
The cloud model comprises five essential characteristics are on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured services. It also offers main three service models such as software as a service (SaaS),platform as a service (PaaS), and infrastructure as a service (IaaS )and four deployment models are public, private, community, or hybrid. The cloud architecture must illustrate the platform and software compon...
Cloud computing is convenient and user-friendly. It offers benefits such as the ease of software maintenance. No CD is required to install the resources and users do not have to worry if their software is out of date. Servers and capacity planning are also not required with Cloud computing. It does not require any equipment outlay and you do not need to guard against obsolete hardware. Cloud computing applications can also be access anywhere on your computer or mobile. Redundancy and disaster planning is also taken care by your cloud provider. With all these benefits cloud computing has to offer, many businesses have started to use cloud computing today. However there is also bound to have disadvantages.
This essay is fundamentally about what is cloud computing, types of cloud computing and its history, risks, disadvantages, advantages and future impacts.
Once users register themselves in the cloud, they have an easy access to information and content using mobile devices from anywhere with an internet connection. The cloud can significantly lower the expenses for using Information Technology (IT). Traditional desktop software costs users and companies a lot in terms of finance and in adding up the licensing fee for multiple users. However, cloud computing providers share their complex infrastructures and servers, as well as offer to maintain and upgrade their services. Users only pay for the storage they use and they do not need to take additional efforts to maintain and upgrade their applications, which saves them money. There are one-time payment, pay-as-you-go and other scalable options available, which makes it very reasonable for individual users and the company in question. This is available at much cheaper rate. Plus, Services in the scalable systems of the clou...
Cloud computing is a new dimension information technology (IT) and paradigm, which main aims to provide cost effective, reliable, customized and well guaranteed dynamic computing environment on “Pay-per-use” basis for the clients or end users....
Strategies for deterring terrorism will undoubtedly become more sophisticated overtime, and there are a number of immediate steps that could greatly improve our ability to deter terror. First, the United States needs to improveits ability to conduct strategic communications to convey a coherent and consistent message to terrorist networks. Tactical denial policies require not only that the United States develop the ability to thwart terrorist attacks, but also that it clearly communicates that capability to terrorists. Washington must clearly and consistently broadcast the message that terrorism will fail