Friday, December 27, 2019

F-100 Super Sabre in the Vietnam War

The North American F-100 Super Sabre was an American fighter aircraft that was introduced in 1954. Capable of supersonic speeds, the F-100 was North Americans successor to the earlier F-86 Sabre which had seen great success during the Korean War. Though plagued by early performance and handling issues, the definitive version of the aircraft, the F-100D, saw extensive use during the Vietnam War both as a fighter and in a ground-support role. The type was phased out of Southeast Asia by 1971 as newer aircraft became available. The F-100 Super Sabre was also utilized by several NATO air forces. Design Development With the success of the F-86 Sabre during the Korean War, North American Aviation sought to refine and improve the aircraft.  In January 1951, the company approached the U.S. Air Force with an unsolicited proposal for a supersonic day fighter that it had dubbed Sabre 45.  This name derived from the fact that the new aircrafts wings possessed a 45-degree sweep.   Mocked up that July, the design was heavily modified before the USAF ordered two prototypes on January 3, 1952.  Hopeful about the design, this was followed by a request for 250 airframes once development was complete.  Designated the YF-100A, the first prototype flew on May 25, 1953.  Using a Pratt Whitney XJ57-P-7 engine, this aircraft achieved a speed of Mach 1.05.   The first production aircraft, a F-100A, flew that October and though the USAF was pleased with its performance, it suffered from several crippling handling issues.  Among these was poor directional stability which could lead to a sudden and unrecoverable yaw and roll.  Explored during the Project Hot Rod testing, this issue led to the death of North Americans chief test pilot, George Welsh, on October 12, 1954.   YF-100A Super Sabre prototype in flight. US Air Force   Another problem, nicknamed the Sabre Dance, emerged as the swept wings had a tendency lose lift in certain circumstances and pitch up the aircrafts nose.  As North American sought remedies for these problems, difficulties with the development of the Republic F-84F Thunderstreak compelled the USAF to move the F-100A Super Sabre into active service.  Receiving the new aircraft, the Tactical Air Command requested that future variants be developed as fighter-bombers capable of delivering nuclear weapons. North American F-100D Super Sabre GeneralLength:  50  ft.Wingspan:  38  ft., 9  in.Height:  16  ft., 2.75  in.Wing Area:  400 sq. ft.Empty Weight:  21,000  lbs.Max Takeoff Weight:  34,832  lbs.Crew:  1PerformanceMaximum Speed:  864  mph (Mach 1.3)Range:  1,995  milesService Ceiling:  50,000  ft.Power Plant:  Ã‚  1 Ãâ€"  Pratt Whitney J57-P-21/21A  turbojetArmamentGuns:  4Ãâ€"  20 mm  Pontiac M39A1  cannonMissiles:  4  Ãƒâ€"  AIM-9 Sidewinder  or  2Ãâ€"  AGM-12 Bullpup  or  2 Ãâ€" or 4 Ãâ€"  LAU-3/A  2.75 unguided rocket dispenserBombs:  7,040 lb.  of weapons Variants The F-100A Super Sabre entered service on September 17, 1954, and continued to be plagued by the issues that arose during development.  After suffering six major accidents in its first two months of operation, the type was grounded until February 1955.  Problems with the F-100A persisted and the USAF phased out the variant in 1958.   In response to TACs desire for a fighter-bomber version of the Super Sabre, North American developed the F-100C which incorporated an improved J57-P-21 engine, mid-air refueling capability, as well as a variety of hardpoints on the wings.  Though early models suffered from many of the F-100As performance issues, these were later reduced through the addition of yaw and pitch dampers.   Continuing to evolve the type, North American brought forward the definitive F-100D in 1956.  A ground attack aircraft with fighter capability, the F-100D saw the inclusion of improved avionics, an autopilot, and the ability to utilize the majority of the USAFs non-nuclear weapons.  To further improve the aircrafts flight characteristics, the wings were lengthened by 26 inches and the tail area enlarged.   While an improvement over the preceding variants, the F-100D suffered from a variety of niggling problems which were often resolved with non-standardized, post-production fixes.  As a result, programs such as 1965s High Wire modifications were required to standardize capabilities across the F-100D fleet.   RF-100 Super Sabre in flight.   US Air Force Parallel to the development of combat variants of the F-100 was the alteration of six Super Sabres into RF-100 photo reconnaissance aircraft.  Dubbed Project Slick Chick, these aircraft had their armaments removed and replaced with photographic equipment.  Deployed to Europe, they conducted overflights of Eastern Bloc countries between 1955 and 1956.  The RF-100A was soon replaced in this role by the new Lockheed U-2 which could more safely conduct deep penetration reconnaissance missions.  Additionally, a two-seat F-100F variant was developed to serve as a trainer. Operational History  Ã‚  Ã‚   Debuting with the 479th Fighter Wing at George Air Force Base in 1954, variants of the F-100 were employed in a variety of peacetime roles.  Over the next seventeen years, it suffered from a high accident rate due to the issues with its flight characteristics.  The type moved closer to combat in April 1961 when six Super Sabres were shifted from the Philippines to Don Muang Airfield in Thailand to provide air defense.   With the expansion of the U.S. role in the Vietnam War, F-100s flew escort for Republic F-105 Thunderchiefs during a raid against the Thanh Hoa Bridge on April 4, 1965.  Attacked by North Vietnamese MiG-17s, the Super Sabres engaged in the USAFs first jet-to-jet combat of the conflict.  A short time later, the F-100 was replaced in the escort and MiG combat air patrol role by the McDonnell Douglas F-4 Phantom II.   Later that year, four F-100Fs were equipped with APR-25 vector radars for service in suppression of enemy air defense (Wild Weasel) missions.  This fleet was expanded in early 1966 and ultimately employed the AGM-45 Shrike anti-radiation missile to destroy North Vietnamese surface-to-air missile sites.  Other F-100Fs were adapted to act as fast forward air controllers under the name Misty.  While some F-100s were employed in these specialty missions, the bulk saw service providing accurate and timely air support to American forces on the ground.   A USAF F-100F of the 352d TFS at Phu Cat Air Base, South Vietnam, 1971. United States Air Force Historical Research Agency As the conflict progressed, the USAFs F-100 force was augmented by squadrons from the Air National Guard (ANG).  These proved highly effective and were among the best F-100 squadrons in Vietnam.  During the later years of the war, the F-100 was slowly replaced by the F-105, F-4, and LTV A-7 Corsair II.   The last Super Sabre left Vietnam in July 1971 with the type having logged 360,283 combat sorties.  In the course of the conflict, 242 F-100s were lost with 186 falling to North Vietnamese anti-aircraft defenses.  Known to its pilots as The Hun, no F-100s were lost to enemy aircraft.  In 1972, the last F-100s were transferred to ANG squadrons which used the aircraft until retiring it in 1980. Other Users The F-100 Super Sabre also saw service in the air forces of Taiwan, Denmark, France, and Turkey.  Taiwan was the only foreign air force to fly the F-100A.  These were later updated to close to the F-100D standard.  The French Armee de lAir received 100 aircraft in 1958 and used them for combat missions over Algeria.  Turkish F-100s, received from both the U.S. and Denmark, flew sorties in support of the 1974 invasion of Cyprus.

Thursday, December 19, 2019

Marriage and Relationships According to Christians Essay

Marriage and Relationships According to Christians The principles that Christians believe should guide their personal relationships are: * Trust * Tolerance * Understanding * Forgiveness * Caring * Respect The first principle that I believe should play a large role in a Christian’s personal relationship is trust, without trust the couple’s relationship would crumble. The whole relationship must be based on trust. The second principle I think is tolerance no matter how many problems or bad past relationships a person has had the Christian attitude is to be nice and have patience with the other person. Understanding is also†¦show more content†¦2. Explain how, in the course of their marriage, a Christian couple would apply the beliefs you have mentioned. In your answer consider one or more situation(s) in which Christian belief would â€Å"make a difference†. Consider whether all Christian couples would respond in this way. I believe that Christian couples could apply their beliefs and make a difference to their marriage in many ways: The first belief that a Christian couple could apply to their marriage that would make a difference is trust without trust the relationship would fall apart each person in the marriage could apply trust to their marriage by trusting their spouse not to have an affair to trust someone they have to be honest with you e.g. if someone lied to the other then it would be a lot harder to trust them in the future because you would not know if they were telling you the truth. The second belief that would make a difference in a marriage is tolerance this is because one of the spouses could have a problem mentally or physically and you will have to tolerate this problem and the other person should already know this before entering into the marriage. They should also try to help their partner get through this challenge or help them get by. Each person should sit down and talk to the other and tell them what is troubling them and try toShow MoreRelatedDefinition Of Marriage On The Church And Beyond Essay1349 Words   |  6 PagesDEFINITION OF MARRIAGE Bibliographic Resource: Gary H. and Woolverton A. â€Å"Marriage Ministry by Design: Designing Effective Ministry to Marriages in the Church and Beyond† Bloomington: WestBow Press, (2012) 4. Annotation: Gary and Woolverton defined marriage as an agreement between one man and one woman that joins their lives legitimately, financially, inwardly, and physically. It can be characterized further as a social union between individuals that makes family relationship. HISTORY BibliographicRead MoreRitual and Vows of Christian Marrage and Their Influence on the Differing Ways that Couples Approach Marraige and Marital Breakdown1459 Words   |  6 PagesRitual and Vows of Christian Marrage and Their Influence on the Differing Ways that Couples Approach Marraige and Marital Breakdown Most people see marriage as a sacrament that should be intended for life. It is often thought of as a deep way of sharing between a couple. Most people get married because its a lifelong commitment, its a way of bringing up children in a secure and loving home, a way to control and direct the sex instinct and a way of gaining a friend andRead MoreCalvin Christian High School s Advanced Placement1667 Words   |  7 Pages In October of 2015, Calvin Christian High School’s Advanced Placement (AP) Government class conducted a poll in Walker, Michigan to better understand the citizens’ political views. The government class’s twelve students collaborated over the course approximately two weeks to create an unbiased poll with concise demographic questions and current political issues. The twelve students broke down into groups of four to formulate questions. After researching current topics and forming the questions,Read MoreThe Issue Of Same Sex Marriage1068 Words   |  5 Pagesallow same sex-marriage, many christians oppose and support it. It is the assumption that christians oppose same-sex marriage. Not all christians oppose same-sex marriage, many support it. The Bible has different forms of marriage. The inaugural version was Adam and Eve. There was polygamy, with or without concubines. The Moses version allowed divorce. Jesus then criticised the divorce process while encouraging a quality of relationship version. And then the kingdom of God makes marriage redundant. Read MoreBiblical And Contemporary Views Of Marriage And Family1618 Words   |  7 Pagescontemporary views of marriage and family Introduction In this postmodern society, it is not easy to establish a strong marriage and a strong family. One of the main reasons for this tendency is the changed view of marriage as a companionship grounded on individual s freedom and self-fulfillment rather than as a social institution designed to meet economic needs and provide a place for rearing children. However, as people tend to expect more personal freedom and fulfillment in their marriage, they ironicallyRead MoreThe Catholic And Christian Marriages905 Words   |  4 PagesCatholic and Christian marriages are very different in today’s society compared to many years ago. A traditional marriage is viewed differently in many ways, some of these changes are because of society. Such as many people do not view divorce as such a horrible act anymore, marriage is no longer just between a man and a woman, and many people find themselves getting married for the wrong reasons. Since these many changes have taken place the Christian and C atholic churches have converted many rulesRead MoreThe Divorce Of Christian People1282 Words   |  6 Pageshere? From the very beginning of time there has always been marriage. Marriage is first seen in the bible in Genesis 2:18, where God said that it is not good that man be alone. It is obvious because he put in in His word that God has always been about relationships and when he instituted the marriage of one man and one woman he believed that it was something that should last forever. Regardless of the intention that God had for marriage when he ordained it, too many people have made it to be somethingRead MoreChristian fidelity in marriage Fidelity, in the Christian viewpoint, is the strict fulfillment of1100 Words   |  5 PagesChristian fidelity in marriage Fidelity, in the Christian viewpoint, is the strict fulfillment of vows and duties or conjugal faithfulness. This definition seems uncomplicated, but to practice fidelity in a relationship, specifically marriage, is a commitment that many people would not comprehend in its’ totality. The Christian meaning of fidelity is perceived by the majority of society to be strictly in the corporeal sense only. As a Christian we are called to look upon not only the physical realityRead MoreTH131 Orals Reviewer1444 Words   |  6 Pagesbecause naming is a manifestation that God wants you to participate in developing the Creation with Him. It is an active, self-determined response to a general call rather than a passive acceptance of a specific call, which puts us in a dynamic relationship between the ekklesia and the kalloumenoi (L. O’Connell). *God created us individually, but his call to us was universal, made to the general public. It is in our response in which the call becomes specific - We answer in our own unique way, whichRead MoreEssay on Christian Marriage1487 Words   |  6 PagesChristian Marriage Introduction and background. Christian Marriage, also called Matrimony is a sacrament in which a man and a woman publicly declare their love and fidelity in front of witnesses, a priest or minister and God. The It is seen by all Christian churches as both a physical and spiritual fulfillment. Christianity emphasises that the sacrament of Holy Matrimony is a lifetime commitment. So they are no longer two, but one. Therefore, what God has joined together, let no one separate

Wednesday, December 11, 2019

Self and Community Self Value and Corporal

Question: Discuss about theSelf and Communityfor Self Value and Corporal. Answer: Introduction Human dignity teaches individuals that every human being on earth is entitled to the rights of satisfying their basic needs. It is the sense of self-respect, self-value, corporal or mental veracity and empowerment. It is the most significant form of human right and is the source of all fundamental rights. Human dignity is not based on an individuals race, belief, gender or any other factor. It is intrinsic to all human beings, absolute and free of the state. Human beings are direct representation of God, and they are Gods own children. Every human being has the aim of being good, either on purpose or accidentally. Human beings have the possibility of attaining their full potential by promoting and safeguarding the wellbeing of the society. The responsibility is not to put in commitment for individual betterment, but for a wider social responsibility. The way is to realize the responsibilities by contributing to common good in accordance with the requirements of others and to encourag e and assist social units in bettering life. The violation of human dignity generally happens in three ways humiliation, objectification and degradation of human dignity.It is considered as an act that reduces a person's self-respect, treats that individual just as a medium of goal accomplishment, and devalues that person. This process of human dignity strips off violation act a persons human characteristics and attributes and it makes that person feel inferior to others. Under these broad categories of human dignity violation comes different forms of devaluation of an individual torture, assault, bonded labor, labor exploitation, slavery and social exclusion. All these are direct exploitations of an individuals human rights. Bonded labor or debt slavery is a form of human dignity violation probably the least known one. It is the act of a person's pledging of his or her labor or services as a leverage for the repayment of his debt or any other form of obligation. The services that are required to repay that debt might be unspecified along with the services duration. Debt bondage can be passed on from one generation to another. It has affected millions of men, women and children all over the world and has occurred in different sector like agriculture, construction, textile and garment. At the core of debt bondage lies poverty, social exclusion and poor legislative implementation. In fact, a bonded labor touches everyones life, in all corners of the world. The worst affected are people who belong to a poor family. The International Labor Organization (ILO)has intended to eradicate this form of violation of human dignity and identified it as a form of slavery when an advantage is provided to pay off any deb t; the debt collector often increases the rates of repayment and makes it impossible for the person in debt to exit from the situation. These kinds of violation are mostly seen in corporate or individual loan lenders. According to ILO, around 19 million victims areoppressed and refugee workers and native peopleare mostly susceptible to this form of violation. Bonded labor is intended to abuse workers. It is exploited across a variation of businesses to yield goods for ingesting round the sphere. Bonded laborsubsists owing to the tenacity of poverty, extensive discernment constructing huge groups of people susceptible to manipulation and the being of individuals who are ready to abuse the distraction of others. Work passports for migrant workers are seized and fees are charged to provide jobs to such workers, especially in tech companies. Such fee payment leave the migrant worker trapped in the job to pay off his debts or make up for the loss. Other forms of bonded labor present in i nformation technology companies is overtime. Leveraging complaints about work productivity, workers are forced to work beyond their shift timings to make up for the loss, and for that, extra wages are also not provided. Notwithstanding the point that bonded labor is unlawful, administrations are seldom disposed to impose the rule, or to guarantee that those who earn from it are penalized. Extensive discernment against some public assemblies denotes they have narrow entree to fairness, schooling and means to exist destitution, the foremost causes the debt is engaged at all. Organisation slaves are existing globally today in every company, knowingly or unknowingly. These companies are actually contributing to the problem. The major cause of such violence regularly occurring in the society can be traced back to the ignorance about the issue. Studies have approached the issue with the use of technology and networking as means of opposition to the issue. These studies have suggested the use of expert knowledge for drafting anti-bondage techniques. Expert advice and their understanding of technology can be used to situate the activities carried out by preventers and law enforcement as network stabilisation methods. Companies, where such kind of slavery and bondage exists, can influence their associates and providers to stop such violations, and exercise social responsibility. Our aim ought to be to mould the society with no violence or bondage of any kind. Bonded labor seems to have transformed with time. Today it is not restricted to the old-style control equation in agronomy, where the lower rung folks are anticipated to execute tedious errands in exchange for definite survival. The predominant arrangement now is of debt bondage.Amid the pleas for mitigation grows the punishment for defilements, a devoted municipal level care officer eyeing the concerns, and instinctive addition of free bonded laborers as recipients in administration safety programs.The authorities must keep in mind not to let the freed laborers spiral back into the cycle of endless slavery. Bibliography Barrientos, S., Kothari, U., Phillips, N. (2013). Dynamics of unfree labour in the contemporary global economy.The Journal of Development Studies,49(8), 1037-1041. Campbell, G. (2015).Bonded Labour and Debt in the Indian Ocean World. Routledge. Novak, D. (2013). On Human Dignity. InDavid Novak: Natural Law and Revealed Torah(pp. 71-88). Brill. Shultziner, D., Rabinovici, I. (2012). Human dignity, self-worth, and humiliation: A comparative legalpsychological approach.Psychology, Public Policy, and Law,18(1), 105. Smith, K. T., Betts, T. (2015). Your company may unwittingly be conducting business with human traffickers: How can you prevent this?.Business Horizons,58(2), 225-234. Thakor, M. (2013). Networked trafficking: reflections on technology and the anti-trafficking movement.Dialectical Anthropology,37(2), 277-290.

Tuesday, December 3, 2019

Risk Analysis Techniques

Introduction Over the last two decades, financial systems have faced many challenges in terms of business risks and unforeseen market changes that lead to losses. These circumstances led to better insight and research into the risks that face financial institutions. Focus was put on three main areas of risk: Risk analysis, risk assessment and business impact analysis.Advertising We will write a custom essay sample on Risk Analysis Techniques specifically for you for only $16.05 $11/page Learn More Risk analysis entails identifying the possible threats to a corporation and finding out the loop holes that might expose the corporation to these threats. Risk assessment on the other hand entails assessment of the mitigation measures put in place to counter the threats against the organization or corporation. Business impact analysis deals with analysis of the overall performance of the organization (Risk analysis techniques 1997). The risks faced by financial institutions over the years have been liquidity, market, foreign exchange, interest rates and credit (Forlani 2002).These risks have been greatly reduced due to development of modern risk management techniques. These techniques are vital for risk management but bring along several advantages and disadvantages. It is therefore a matter of striking a suitable balance between the pros and cons in ensuring that the most effective risk management technique is employed. The paper puts into focus the risks, some the most common and effective mitigation techniques and their pros and cons. Risk of Foreign exchange The foreign exchange market is where financial institutions trade in different world currencies. Foreign exchange rate is the price at which one currency is exchanged for another. A foreign exchange rate of 75Kenya shillings to 1 US Dollar just means that you would have to pay 75 Kenya shillings to get 1 US Dollar. The value of one currency relative to other world currencies varie s subjectively rather than objectively because it is dependent upon speculation more than any fixed standards (BMO capital markets 2008). This variation in value therefore leads to currency risks because the import and export businesses in the countries in question are affected. A stronger US Dollar would mean higher product value for Kenyan exporters because they get more shillings for each Dollar; on the other hand, this would mean higher expenses for importers who would have to pay more for each Dollar.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Financial analysts try to analyze and predict these movements in the foreign exchange rate with their principle objective being to minimize any losses that may be incurred due to unfavorable movements in foreign exchange. This analysis ensures that company value in terms of liabilities, assets and cash flow is protected as this can also grea tly change with the prevailing exchange rate (Dew Wiltbank 2009). Profits could also be greatly increased with proper risk analysis. As illustrated above, an exporter in Kenya could hold his product when the value of the Dollar is at say 65Kshs and wait to sell when the Dollar gains value to say 78Kshs. This would mean an extra 13Kshs for every Dollar worth of product, gained purely out of speculation.It should however be noted that there exists the risk of loosing if the value of the Dollar drops to for example 55Kshs. Techniques are used to hedge against foreign exchange risk Non-Hedging Foreign exchange Risk Management Techniques This is a simple method of risk management where if the exporter and importer countries have currencies with relatively similar value, then they need not change their money into world leading currencies like the US Dollar (Money matters 2005). This reduces the currency risk associated with foreign exchange fluctuations. FX Forward Hedges This is perhaps the most direct means of hedging foreign exchange risk. Here, an exporter and importer get into contract to trade at a fixed forex rate for a given period with the facilitation of a financial institution. If a Kenyan exporter sells to an American importer goods worth 1 million Dollars at an exchange rate of 75 USD to 1Ksh, the Kenyan exporter may get into contract with a financial institution to deliver 1 Million Dollars in Exchange for payment of 75millionKshs over 90 days. This acts as a form of insurance to the exporter as within the given time frame, he can exchange his 1 million Dollars for 75millionKshs irrespective of what happens to the exchange rate. The exporter must however deliver the 1 million Dollars even if the American fails to pay on time (International Trade Administration 2008).Advertising We will write a custom essay sample on Risk Analysis Techniques specifically for you for only $16.05 $11/page Learn More Foreign exchange Options Hedges Foreign exchange options are used if a foreign currency deal is carried out without a specific date of completion or delivery. The option holder buys the right to buy domestic currency at an agreed upon exchange rate within the time period that the option is valid. The investor is protected against losses in case the foreign currency drops and has the option of selling the option back to the lender if the foreign currency goes up substantially (Miller 2007). The options therefore provide more flexibility than forward hedges but come with a higher cost. Credit risk Credit risk is the risk that a debtor of a corporation will not pay all or part of his debt within the agreed upon period (Ruefli, Collins Lacugna 1999).Analysis into these risk aims at reducing losses due by finding out as much as is possible to help the managers make informed decisions about whom to lend. Credit risk mitigation techniques There are many varying ways of reducing credit risks. Some common ones used by banks include checking loan repayment history, demanding some collateral and trying to recover as much from the debtor as possible incase they fail to pay up (when dealing with individuals) (Kidwell et al 2007). When choosing and managing loan portfolios, banks reduce credit risks by designing different loan products for different target clientele (Kidwell et al 2007).The banks could also put in place internal mechanisms to help them monitor their credit risks more accurately. Internal analysis by banks can greatly reduce credit risks because control measures can be expanded to include credit exposures that may come about by settling credit trades or by including properly measured credit settlement exposures under identical controlled environments in the control mechanisms (Selim McNamee 1999). Systems can be built to renew current and any future unsettled exposures and monitor them through the settlement process. This ensures that there is accurate and timely information that pertains to credit risk settlement exposure (Chang Thomas 1989).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More For international banks dealing with many currencies and trading across wide geographic areas, this can only be effective with the help of a merged risk management system (Settlement Risk In Foreign Exchange Transactions 1996). The banks then apply agreed upon credit controls to all their credit risk settlements which help them keep their credit exposure within acceptable limits. Banks can considerably cut credit risks without necessarily reducing the amount of credit trading by fine tuning their means of settlement (Miller 1998). Interest rate risk This risk lies in the fact that interest rates may change and affect the flow of cash in different financial vehicles (Fenzel Scholz 2008).Reinvestment income could also be adversely affected by changing interest rates (Kidwell et.al 2007).Dipping interest rates will mean lower returns for the lender. Interest risk analysis is aimed at minimizing vulnerability to changing interest rates to ensure that the organization makes profit and i f there are any losses, then they should be minimal (Kidwell et.al 2007).This risk is particularly two sided as if the interest rates go high, one party is bound to benefit as the other incurs losses due to reduced earnings. Mitigation Techniques used to reduce interest rate risk It is essential that the risk likely to be brought about by changing interests be fully understood for proper interest risk management to be effected (Henkel 2009).Organizations ought to put in place mechanisms to measure the potential effects of a change in the interest rates (Torben, Denrell Bettis 2007). Gap analysis, duration analysis and VAR are the most common methods used by organizations to measure this. Gap analysis is done by comparing the difference between assets earning interest and interest bearing liabilities during a given period. A greater difference is an indication that the organization is more exposed to interest rate variation (Baucus Cooper 1993) Duration gap analysis measures the du ration of the organizations assets and the duration of its liabilities; keeping a smaller difference between these two protects the organizations balance sheet in value subject to interest rate changes (Kidwell et.al 2007). VAR is the most often used method of measuring risk. It is a statistical representation of the worst economic loss expected from a change in market due to prevailing conditions, at a specific confidence level and period (Miller Reuer 1996) . For example 79% implies that 79 out of every100 observations won’t be more than the VAR number.The VAR results are presented as a % of the total capital to show the ability of the organization to take the computed loss (Bank of Jamaica 2005). Futures, options and swaps are some common derivative techniques used to help minimize interest rate risk and ensure profit or minimum losses. Financial futures contracts Financial futures are employed with the aim or reducing interest rate risks. The price of these futures goes up when the prevailing interest rates are low and subsequently drops when the interest rates rise. A good illustration of this is in the banking industry; when the bank risks a drop in profits due to rise in interest rates, it offsets this risk by selling financial futures (Palmer Wiseman 2007). Options on financial futures Caps, floors and collars on interest rates can be created by use of financial futures which act to reduce interest rate risks. A cap acts as a shield against increasing interest rates while a floor shields the organization against dipping interest rates(Kidwell et.al 2007). Caps put a limit to the extent to which the cost of a product can rise and a floor gives the lower limit of the product price. Though at a cost, this provides some of balance and ensures that interest rate losses are minimized. Swaps While options and financial futures mitigate against interest risks in the short run, swaps are better suited for mitigating against long term interest rate risk exposures. Swaps allow banks to trade funds at a variable rate for a fixed cost of funds (Juttner et.al 1997). As an illustration, if a financial institution speculates that interest rate will go up, they can get into a swap where they will pay at a fixed rate but receive floating. This ensures minimum losses and more stable earnings. Conclusion It was established that the main risks affecting most markets and financial institutions are credit risks, foreign exchange risks and interest rate risks. These risks could bring about huge losses both in reduced earnings and company value depreciation if not regularly and effectively managed. These risks have however been greatly reduced due to development of modern risk management techniques over the years. The most common and effective ones include swaps, financial futures, options and forward hedges. All these have been discussed in the paper and their pros and cons highlighted. Different financial institutions, individual investors and corporations all face the above mentioned risks at different degrees and situations; one situation may bring about losses to one party yet benefit the other. Although the risks are different and each party experiences them under unique circumstances, all parties need some degree of analysis to ensure that any losses resulting from these risks are minimal, if present at all. Different techniques are employed but financial institutions similar techniques to hedge against the risks. List of References Bank of Jamaica 2005. Web. Baucus, A Cooper, R 1993,’Estimating risk-return relationships: An analysis of measures’, Strategic Management Journal, Vol.14, no. 5, pp. 387-396. Chang, Y Thomas, H 1989,’ The impact of diversification strategy on risk-return performance‘, Strategic Management Journal, Vol.10, no. 3, pp. 271-284. Dew, N Wiltbank, R 2009,’Affordable loss: behavioral economic aspects of the plunge decision’, Strategic Entrepreneurship Journal, Vol. 3, no. 2, pp. 105-126. Fenchel, M Scholz ,W 2008,’Empirical analysis of the integration of environmental risks into the credit risk management process of European banks’, Business Strategy and the Environment, Vol. 17,no. 3,pp.149-159. Forlani, D 2002,’ Risk and rationality: the influence of decision domain and perceived outcome control on managers’ high-risk decisions’, Journal of Behavioral Decision Making, Vol. 15, no. 2, pp. 125-140. Henkel, J 2009,’The risk-return paradox for strategic management: disentangling true and spurious effects’, Strategic Management Journal, Vol. 30, no. 3, pp. 287-303. Juttner, D Hawtrey, K 1997, Financial Markets Money and Risk (4th edn). Addison Wesley Longman, Australia. Miller, D Reuer J 1996,’Measuring Organizational Downside Risk’, Strategic Management Journal, Vol.17, pp. 671-691. Miller, D 1998 ,’Economic exposure and integrated risk management’, Str ategic Management Journal, Vol. 19, no. 5, pp. 497-514. Miller, D 2007,’ Risk and rationality in entrepreneurial processes’, Strategic, Entrepreneurship Journal, Vol. 1, no. 1, pp. 57-74. Money matters PriceWaterHouseCooper 2003-2008. Web. Palmer, B Wiseman, M 1999,’Decoupling risk taking from income stream uncertainty: a holistic model of risk’, Strategic Management Journal, Vol.20, no. 11, pp. 1037- 1062. Risk analysis techniques. Web. Ruefli, T, Collins, J, Lacugna, R 1999,’ Risk measures in strategic management research’, Strategic Management Journal,Vol.20,no. 2,pp.167-194. Selim, G McNamee, D 1999,’ The risk management and internal auditing relationship: developing and validating a model’, International Journal of Auditing,  Vol. 3, no. 3, pp. 159-174. Settlement Risk In Foreign Exchange Transactions 1996. Web. Torben, J, Denrell, J Bettis, A 2007,’Strategic responsiveness and Bowman’s risk- return par adox’, Strategic Management Journal, Vol. 28, no. 4, pp. 407-429. US department of commerce ‘International Trade Administration’ 2008. Web. This essay on Risk Analysis Techniques was written and submitted by user Allie Frost to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Spying on The Home Front an Example of the Topic Government and Law Essays by

Spying on The Home Front by Expert Tutor Maya | 01 Dec 2016 To talk of overbroad and sweeping driftnets to intercept alleged messages of National concern, without means to assure the American citizens of a narrowly tailored measure to zero in on specific terrorist activity, in the name of a supervening State duty to fight imminent threats against the country, is to consent to unrestrained exercises of Police Power that are absolutely repugnant to the Constitution and its tenets. Need essay sample on "Spying on The Home Front" topic? We will write a custom essay sample specifically for you Proceed The protection of a private individual's Civil liberties is not subject to compromise. His rights to be left alone, to be free from State intervention and to be guaranteed a shield against State security entanglements are highlights of a democratic sovereign. The moment that the State trumps these rights under the justification that the present situation calls for drastic and unusual means to combat the enemy, the Constitution, which has been the shrine of liberty and freedom since its foundation, the very bastion of the people sovereign, is at once violated. Time and again, the courts have ruled against any form of intrusion into people's private lives. Federal laws, such as the FISA law, seek to discourage fishing expeditions, indiscriminate guesswork and blanket approaches to collect information among the populace (Spying on the Home Front, 2007). In fact, illegally obtained evidence sparked by warrant-less searches and investigation are deemed inadmissible in courts. This is because the law prevents the State to profit from its misdeeds. Indeed, a violation of such rights of a single person is already one too many. Therefore, to the issue whether or not it is in any legally and morally justified for the executive to set aside restrictions to its power made by the congress and the Constitution in the name of the "war of terror", the answer must be on the negative. On this point, the PBS special "Spying on the Home Front" reveals just how much the administration has brushed aside the legally recognized processes of investigation and surveillance to permit unprecedented access to personal communication among innocent American civilians. The National Security Agency (NSA) has been specifically designed to intercept dangerous communication with the hope of catching the criminals even before they take overt acts to carry out their plans (Spying on the Home Front, 2007). Accordingly, the agency at first followed the principle that investigations must exclude domestic correspondencesin other words it adopted a hands-off doctrine when it comes to civilians. However, in the last few decades and more so in light of the 9/11 terror attacks, the NSA, along with the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) used its expertise and tools to spy on the American people (Spying on the Home Front, 2007). A former NSA agent, confides that the agency has figured into several random acts of espionage of civilians without due authorization from the courts. The Watergate Scandal, for the first time, raises the issues on illegal intrusion activities done by the State. It is later discovered during the committee hearings that these agencies have been working together to look into documents, issuances, utterance and communications of a private nature, otherwise known as the Shamrock Operation (Spying on the Home Front, 2007). Consequently, this led to the drafting of a bill which sought to enjoin law enforcement and its specialized departments from tapping into phone lines and mail among others (Spying on the Home Front, 2007). Former NSA analysts Weaver and Connelly adumbrate the myriad ways that the NSA can sift through a mass of information across the Globe and collect them in databases for future retrieval. The exact metaphor used to describe NSA's capabilities is "sucking up voluminous information in the internet, phone and mail in one sweep in a process called full-scale data mining" (Spying on the Home Front, 2007). In this same process, NSA does not discriminate between illegal data and data produced by the average person. What it does is to grab at everything it can lay its hands on, and because the NSA has full access to co-terminal points of the web, this means that the amount of information that they can gather is almost just as every byte and nibble that is being produced in the entire network. Every person who is linked via the World Wide Web is no longer safe from the "Big Brother" tendencies of the State. Orwell's novel "1984" is a better metaphor to describe how the mandate of President Geo rge Bush to counter terrorism through intelligence efforts has spread in scope and extent far beyond what is originally intended. Speaking in behalf of and for the President, John Yoo argues that war changes everything; that by its nature, war "expands the power of the presidency and expands the power of the national government as a whole" (Interview with John Yoo, 2007). He invites us to rethink our traditional policies and take a shift in paradigm because the enemies that the state is against calls for an entirely different set of tactics. John Yoo, the mind behind the Patriot Act, is convinced that the power of the President can be expanded to cover new forms of state threats. He says that it is high time that Legislative and Judicial departments "pull down self-imposed restraints [] that had hamstrung our government from being able to track down and defeat Al Qaeda terrorist cells in our country" (Interview with John Yoo, 2007). In effect, what John Yoo is saying is that desperate times call for desperate measures. But where do you draw the line from desperation viz. restraint on certain liberties to abject disregard for a person's constitutionally protected rights? Another crucial problem in that sort of justification is that the agencies, whom the President granted full discretionary power in order that another terror attack can be prevented, have taken their obligation to protect the country far a-field the legal and moral provinces recognized by the Constitution, and turned it into a license to step on the private domains of the commerce of innocent civilians. As such, they comb the vast oceans of thought, information and conduct of every individual in one huge dragnet just to catch a number of criminals. A method deemed unconscionable to the average person and by the law. If there were anything that the terrorists have been more successful at other than the 9/11 attacks, is that they effectively set the United States into a flurry of acts that disregard the rule of law and the individuals. Indeed, terror of this kind on the home front surpasses any other, and the administration and state itself just happen to be the one perpetuating it. References Smith, H. & Young, R. (2007). Spying on the home front. 15 May 2007. PBS Special: Frontline. John Wilkes Studio. Retrieved February 12, 2008, from http://www.pbs.org/wgbh/frontline/film/homefront/. Interview with John Yoo. (2007). 15 May 2007. Retrieved February 12, 2008, from http://www.pbs.org/wgbh/pages/frontline/homefront/interviews/yoo.html.

Sunday, November 24, 2019

The Possible Careers For An ENFP Personality Type Essays

The Possible Careers For An ENFP Personality Type Essays The Possible Careers For An ENFP Personality Type Paper The Possible Careers For An ENFP Personality Type Paper Carl Jung, one of the most renowned psychiatrists in history and founder of analytical psychology, introduced the personality typology. According to Dr. C. George Boeree’s (2006) brief biography of Carl Jung, â€Å"Jung developed a personality typology that has become so popular that some people dont realize he did anything else. It begins with the distinction between introversion and extroversion† (n.p.). Boeree (2006) also discussed in his article the four functions that Jung believed are people’s preferences in dealing with the inner and outer world. These are sensing, thinking, intuiting, and feeling. These functions were developed later on by Katherine Briggs and Isabel Myers. In the book of Esther Cameron and Mike Green (2004), the authors described the Myers-Briggs Type Indicator (MBTI) as follows: The most effective tool for identifying personality type is the Myers Briggs Type Indicator (MBTI). This is a personality inventory developed by Katherine Briggs and her daughter Isabel Myers. The MBTI is based on the work of the Swiss analytical psychologist Carl Jung. The MBTI identifies eight different personality ‘preferences’ that we all use at different time- but each individual will have a preference for one particular combination over the others (pp. 43–44). These are the 16 personality types as enumerated by Myers and Briggs: ENFP, INFP, ENFJ, INFJ, ESTJ, ISTJ, ESFJ, ISFJ, ENTP, INTP, ENTJ, INTJ, ESTP, ISTP, ESFP, and ISFP (cited in Cameron Green, 2004). Each letter stands for the eight different personality ‘preferences’ which are: E-Extraverted I-Introverted, N-iNtuitive, S-Sensing, F-Feeling, T-Thinking, P-Perceiving and J-Judging (Cameron Green, 2004). As for my Jungian self-assessment result, I turned out to have an ENFP personality type. It stands for Extraverted iNtuitive Feeling Perceiving. According to Joe Butt’s (2005) functional analysis of an ENFP’s personality type, The physical world, both geos and kosmos, is the ENFPs primary source of information. Rather than sensing things as they are, dominant intuition is sensitive to things as they might be. These extraverted intuitives are most adept with patterns and connections. Their natural inclination is toward relationships, especially among people or living things (n.p.). Butt (2005) also pointed out one colleague of his as someone with, â€Å"such tremendous interpersonal skills that she put her interviewers at ease during her own job interview. She had the ability to make strangers feel like old friends† (n.p.). This description actually earned a nod in terms of relating it to how I view myself. I like having people around me, and likewise, I also enjoy being around people. I enjoy communicating with them and building friendships. This is absolutely one of the primary reasons why I initially intend to pursue a master’s degree in business administration (MBA). I know that having the skills naturally would not be enough to be successful in something that I am comfortable in doing. To better provide a visual of my type of personality, here are some common ENFP descriptions from The Sixteen Personality Types by Linda Berens and Dario Nardi (1999): Theme is inspiration, both of themselves and others. Talents lie in grasping profound significance, revealing truths, and motivating others. Very perceptive of others’ hidden motives and purposes. Interested in everything about individuals and their stories as long as they are genuine. Contagious enthusiasm for â€Å"causes† that further good and develop latent potential and the same zeal for disclosing dishonesty and inauthencity. Frequently moved to enthusiastically communicate their â€Å"message† (p. 40). These personal findings definitely validate the reasons for my life and career decisions. I am indeed a very sociable person, and I tend to find more consolation by being focused on the outer world. This is the reason why I would like to pursue my studies so I can further my career in people-oriented type of jobs. Nevertheless, it is also possible that some of the descriptions might not match the way I see myself, or most probably, I am not aware yet that I possess them. Remembering the Johari Window, where the 2nd quadrant encloses the things that others know about me but I am unaware of, I realized that some of the descriptions on the ENFP personality can be considered as â€Å"things that I am not aware that I have.† It is also rather interesting that there are famous ENFP personalities according to Butt (2005), including â€Å"Meg Ryan (When Harry Met Sally), Robin Williams (Dead Poets Society, Mrs. Doubtfire), Sandra Bullock (Speed, While You Were Sleeping), Robert Downey (Heart and Souls), [and] Alicia Silverstone (Clueless)† (n.p.). These personalities have a common interest- acting. Acting specifically deals with entertaining people, which justifies the research conducted about ENFPs as being oriented with the outer world. As an ENFP type, it is safe to conclude that my interest would also be related to this field, which is unquestionably correct. The question is: What pushes me into pursuing an MBA? Honestly, it is because of the fulfillment that it brings me. I am technically new to the 16 personality types, so it is quite hard to pinpoint the motivation that I have for my decision which is also relative to my ENFP personality. Fortunately, I was able to come across one of the closest ENFP description to my personality. For ENFPs the dominant quality in their lives is their attention to the outer world of possibilities; they are excited by continuous involvement in anything new, whether it be new ideas, new people, or new activities. Though ENFPs thrive on what is possible and what is new, they also experience a deep concern for people as well. Thus, they are especially interested in possibilities for people. ENFPs are typically energetic, enthusiastic people who lead spontaneous and adaptable lives (Martin, 2008, n.p.). Apparently, one of the primary motivations here would be the involvement to something new. The enthusiasm of people with an ENFP personality guides them into taking new heights and turns along their life journey. New things excite and trigger their thirst for adventure. No matter where their personality leads them, whether interesting or not, they decide in accordance to their courage and hunger for quest. The 16 personality types are effective in discovering the reasons behind people’s decisions. Although it does not promise accuracy, it is with no question that knowing one’s type of personality is necessary in helping someone understand him- or herself more. nbsp; References Berens, L. V.   Nardi, D. (1999). The Sixteen Personality Types: Descriptions for Self-Discovery. California: Telos Publications. Boeree, C. G. (2006). Carl Jung. Personality Theories. Retrieved October 6, 2008 from http://webspace.ship.edu/cgboer/jung.html Cameron, E. Green, M. (2004). Making Sense of Change Management: A Complete Guide to the Models, Tools Techniques of Organizational Change. London: Kogan Page Publishers Butt, J. (2005, February 25). Extraverted intuitive feeling perceiving. TypeLogic. Retrieved October 6, 2008 http://typelogic.com/enfp.html Martin, C. (2008). The sixteen types at a glance. Center for Applications of Psychological Type. Retrieved October 6, 2008 from capt.org/mbti-assessment/type-descriptions.htm nbsp;

Thursday, November 21, 2019

Good Faith Evidence Rule in reversal of a high profile rape cases in Research Paper

Good Faith Evidence Rule in reversal of a high profile rape cases in 2010 in state of virginia - Research Paper Example There was a young woman, who was dressed in black attire and had long blond hair; she stood on the railroad bridge extending her thumb gesturing for a ride. The unfortunate fact was that this was the last moment the father and daughter saw Morgan Dana Harrington alive. (Siegel, 2011) It is now one year since the remains of the Virginia education tech student (who was 20 years of age upon her death) was discovered. With no suspects identified, the police have made enquiries to the public hoping that there might individuals who may assist with the investigation. The questions still remain unanswered as to how Morgan’s body was discovered in a cow pasture 10 miles from where she was last seen, and whether there is a stalker still roaming the streets of Charlottesville and Albemarle county. While retracing the steps of Morgan, the Virginia State Police Special Agent Dino Cappuzzo disclosed the story of the daughter and father, who allowed the police to determine the time that Morgan was possibly abducted. The father stated that, on his way back from dropping his daughter at the dormitory, he stopped at the convenience store on Ivy Road, which was at 9.30 pm based on time on his receipt. On his return to the bridge after 7-11 minutes, Morgan was gone. Two other witnesses confirmed that they had seen a blond woman hitchhiking in the same area. Cappuzzo stated that the witnesses’ stories had been completely vetted by the police. However, none was considered suspects. The descriptions provided by the witnesses were new information released to public on the 25th of January 2011, which was a day prior to the anniversary of the discovery of the body. It was the first piece of information that was obtained by the police department since last summer, when police confirmed the DNA obtained from the Harrington case is related or linked to a rape case that took place in 2005, in Fairfax. The victim in that case survived