Wednesday, July 31, 2019
Human Profile
Chapter 5 Human Factors in Aviation Security Contents Page INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background on Human Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA AND HUMAN FACTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA Policy and Plans for Human Factors and Aviation Security . . . . . . . . . . . . . . . . . . 80 FAA Requirements for Aviation Security: Human-Factors Implications . . . . . . . . . . . . . 82 Other Issues for Human Factors and Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Box Box Page 5-A. UAL Hi-Tech Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter 5 Human Factors in Aviation Security factors in these cases can greatly improve the utilization of technology for airline security. Dramatic accidents caused by human errors in the nuclear power, chemical, and transportation industries have increased public attention to human performance issues during the past decade. Additional training requirements, revised operating procedures, warning devices, and expanded government oversight are typical recommendations following accident investigations.However, these stopgap measures address only the surface of problems that are rooted in the complex interactions of people and equipment within the larger system and the institutional and organizational structures and procedures that drive the planning, design, and management of these systems. Following the ground collision of two jetliners in Detroit in December 1990, Dr. John Lauber, a member of the National Tr ansportation Board, said that ââ¬Å"basically the [aviation] system, the way weââ¬â¢re operating it, almost demands nearly error-free [human] performance. Similar concerns can be echoed for the aviation security systemââ¬âa number of successful airline terrorist events have been traced to a human failure. 2 ââ¬Å"The challenge is to design a system. . which is tolerant of those errors when they do occur and which detects and traps them before we have [a catastrophe]. â⬠3 Multilayered defenses are employed at many commercial airports and airline terminals, and security managers and government authorities are turning to new technologies to buttress these systems. Heretofore, Federal requirements and industry use of security technologies have usually been with specific functions in mind.As long as the technical goals could be met effectively, the equipment was considered satisfactory and human performance problems related to the technology were resolved through revised tr aining and procedures. Technology use in counterterrorism will likely increase dramatically over the next decade, but if early and INTRODUCTION Human resources are critical to aviation security. Security personnelââ¬âpassenger and baggage screeners, guards and law enforcement officers, and airport and airline employees in general-are important elements of a system that prevents and deters hostile acts against air carriers.Technology can enhance, but cannot replace, the capabilities of these people and the many services they provide. Moreover, management practices based on behavioral research findings can further improve human performance. This chapter considers the function of screeners in weapons and explosives detection, and the role of guards, officers, and other aviation employees in discovering (and deterring) suspicious individuals or situations. Within the past 20 years, technology has greatly increased the capability and productivity of these security people.Metal detect ors and x-ray devices are faster, more accurate, and more socially acceptable tools for screening passengers and baggage than manual searches. Remote television and other monitoring devices, computer-controlled access to restricted areas, and communication and data systems allow comprehensive surveillance and threat assessment. While these technologies raise the capabilities of a security system to new levels, their ultimate success and actual performance depend on the people who design, operate, and maintain them.Many security assignments require repetitive tasks and close monitoring for rare eventsââ¬â functions that humans perform poorly. Selecting well-suited individuals, training them properly, designing their work environment and rotation schedule to elicit the best possible performance, and providing motivating incentives are fundamental requirements for successful operations, regardless of the type of technology in place. These functions involve human performance; applic ation of human p. A17. IJohn Lauber quoted by John H. Cushmau Jr. , ââ¬Å"Test for Aviation: Coping with Human Shortcomings,â⬠The New York Times, Dec. 0, 1990, ~ne example was the destruction of a Korean Air Lines flight over the Andaman Sea by a bomb planted by North Korean agents. The device, in a carry-on bag, was ahnost detected at a security checkpoint in Baghdad at an earlier stop. When a security guard wished to remove the batteries from a radio, one terrorist turned the radio on, proving it operated, and then raised a hue and cry, yelling and complaining. Instead of using this as a reason to stop the two suspect individuals and to examine their belongings minutely, the security forces decided to avoid trouble by allowing them to proceed. Lau~r, op. cit. , footnote 1. ââ¬â79ââ¬â 80 q Technology Against Terrorism: Structuring Security methodic attention is not given to human performance issues, we may expect that system efficiency and effectiveness will be substa ntially impaired. Background on Human Error The human role in a security system is complex; thus the nature of human errors, from mental to physical, varies widely. Mental or cognitive errors can include improper judgment or decisionmaking, while physical errors may stem from motor skill deficiencies or faulty equipment design.A combination of physical and mental processes may influence other kinds of errors, such as those involving communication, perception, or alertness. Human factors, a discipline combining behavioral sciences and engineering, focuses on improving the performance of complex systems of people and machines. Designing and operating a system so that it does not induce human error (in fact, designing it so that human error may be minimized) is one critical component of human factors and limiting the impact of a human error once it occurs is another aspect.Many types of human error are systematic, following certain predictable patterns; once these patterns are identifi ed, countermeasures can be developed. For example, poor location of switches or dials can induce manual or perceptual errors. For those types of human error that do not follow predictable patterns, mitigation techniques are difficult to develop. Some examples of mitigation techniques include automatic monitoring and warning devices. These subsystems, when properly designed and implemented, can be invaluable tools for negating human error.Employee selectionââ¬âallowing into the system only those people least likely to make mistakesââ¬â and continued quality control maintained through training and monitoring are basic steps for minimizing human errors. Potential errors can be forestalled by the use of standard procedures and checklists for routine and emergency tasks, planning work shifts and assignments so as not to induce inattention and 4EM1 L. hlC. , fatigue, and properly designing the work environment. ââ¬Å"If human factors engineering is done properly at the conceptual and design stage, the cost is high, but paid only once.If tranin g must compensate for poor design, the price is paid every day. â⬠4 According to one expert, there does not appear to be a strong need for new basic research in human factors related spectifically to security-behavioral science findings in general and experience with human performance problems in other industries are probably sufficient to enhance current security operations. 5 For example, such knowledge is being used to upgrade security screener selection by airlines, and to improve training standards.However, the mechanisms to identify early on and to address effectively the human performance issues stemming from new security technologies, such as explosives detection systems, are not yet in place in industry or the Federal Government. Shifting boring and repetitive tasks that people perform poorly to machines is an approach that can reduce errors. However, automated devices (or any new technology) may create new sources of human error. 6 Excessive false alarms unnecessarily distract operators and may lead to the device being ignored or disabled.During unusual or emergency circumstances, the lack of flexibility in many automated systems can be a serious limitation and the human backup may not be mentally or physically prepared (or possibly even capable) to take over. Consequently, a full system approach is required for reducing total human errors. FAA AND HUMAN FACTORS FAA Policy and Plans for Human Factors and Aviation Security In a report released in July 1988, OTA concluded that FAA attention to the spectrum of human performance problems in commercial aviation fell far short of the level warranted, since human error is the leading cause of aviation accidents. Later that same year, Congress passed the Aviation Safety Nagel wiener, $~cw~it Automationââ¬â¢ Hu~n ~ac~or~ in Aviation, Eu1 L. wiener and David c. (eds. ) (Sm Diego, CA: Academic PESS, 1988) p. 454. SH. c~fion FoUShee, c~ef scien~lc and Tec~~ Advi,qor for Human FaCto~, FAA p~so~ wmmunimtio~ 1991. 6see wiener, op. cit. , f~~ote 4, Ch. 13 for a discussion of new and subtle types of human error that have resulted from the introduction of automation into aircraft cockpits. W. S. Congress, OffIce of Technology Assessment Safe Skies for Tomorrow: Aviation Safefy in a Competitive Environnzent, Oââ¬â¢E4-SET-381 (Washington, DC: U.S. Government Printing Offke, July 1988). Chapter 5-Hurnun Factors in Aviation Security q 81 Research Act, which directed the FAA to expand its research efforts on human performance in aviation and authorized funds specifically for that purpose. 8 The FAA responded by creating the position of Chief Scientific and Technical Advisor for Human Factors, responsible for coordinating for the FAA various human-factors research efforts within the FAA NASA, and the DOD and for opening lines of communication within the FAA and industry.Communication among Federal agencies is critical, since decisions made by the aviation industry and the operational and regulatory sections of the FAA often drive the need for new human-factors research and could benefit from an understanding of humanfactors research findings and products. The FAA has made progress in addressing the earlier criticism of its human-factors programs and understanding in aircraft and air traffic control (ATC) equipment and operations.However, the key shortcomings in FAA human-factors efforts that OTA cited in its 1988 study-insufficient agency expertise, uncoordinated research efforts, and regulations and certification standards that do not reflect human-factors principles-still exist within FAA civil aviation security programs. During the course of its study, OTA examined closely many of the technology development programs and regulatory efforts underway in the security sections of FAA and found a general lack of awareness and understanding of the human-factors issues involved with possible new security te chnologies.An exception to this situation, however, and a hopeful indicator of a new trend, has been the hiring of a human-factors expert at the FAA Technical Center to oversee human-factors research as it relates to airline security. However, at present, it appears that the FAA is ill-prepared to identify and address possible human-factors concerns with the increasingly complex and diverse security technologies now under development. The dearth of trained humanfactors specialists in areas of the FAA responsible for civil aviation security is a serious deficiency.Until recently, the Aviation Security R&D Service of the Technical Center would have merited similar concerns, but this shortcoming is being redressed, at least in part. Some of the expertise that the FAA is developing on human factors for other uses could also be applied to security issues. One potential vehicle for bringing human-factors knowledge into aviation security efforts is the National Plan for Aviation Human Fact ors (HF Plan), the first major product of the heightened FAA attention to human performance issues following the enactment of the Aviation Safety Research Act.The HF Plan identifies significant human performance issues and lays out a 10-year blueprint for establishing and coordinating research programs and conveying the results across Federal agencies and industry. The HF Planââ¬â¢s development depended strongly on advisory committees composed of a cross-section of research, operational, and regulatory representatives from government and industry and approximately 50 of the nationââ¬â¢s leading human-factors researchers. The good news for aviation security is that the Plan appears to provide a strong foundation for multi- and cross-disciplinary efforts and understanding in human factors and has begun to institutionalize and focus consideration of human-factors issues in FAA decisionmaking. The bad news is that nowhere in the Plan is security mentionedââ¬âthe Plan addresses the following five aviation environments only: aircraft flight deck, air traffic control, aircraft maintenance, airway facilities maintenance, and flight deck/ATC integration.This should not be construed as criticism of the general thrust of the HF Planââ¬âthe human-factors categories considered have historically been more critical to aviation safety and are considerably more complex than human performance issues in security-and it is beyond the scope of this study to analyze in detail the specifics of the HF Plan. However, some objectives and products of the HF Plan maybe directly transferable to aviation security, provided that lines of communication are established and security experts are included in committee structures.The Plan has eight objectives, all of which can apply to aviation security, but the following two are especially pertinent, given the present attention to technologies for countering terrorism: . to encourage the development of principles of ââ¬Ëhuman-ce nteredââ¬â¢ automation and the design of SAviation Stieu Research [emailà protected] I%blic bW 100-591. %J. S. Department of Transportation Fedeml Aviation Administratio~ ââ¬Å"The National Plan For Aviation Human Factors,â⬠vol. I, draf~ November 1990. 82 q Technology Against Terrorism: Structuring Security dvanced technology that will capitalize on the relative strengths of humans and machines; . to develop human factors-oriented validation and certification standards for aviation system hardware and personnel that will enhance both safety and efficiency . 10 The HF Plan is designed to be reexamined and revised periodically and aviation security could be added explicitly as a focus area if need and resources warrant. Crucial to the development and future success of the HF pian is the Human Factors Coordinating Committee (HFCC), formed by the FAA administra11 tor in September 1989.HFCC has representatives from each major division of FAA and serves as ââ¬Ëââ¬Ëan adv isory body for senior management of FAA in all matters involving human performance and [is] intended to assure that human factors issues are represented in all FAA activities. ââ¬â¢ ââ¬â¢12 Until very recently, the Assistant Administrator for Civil Aviation Security was not represented on this committee. However, this omission has since been recti13 critical-flight safety is at risk only when security performance fails at the same time that a threat occurs.Moreover, FAA staff and the agency ââ¬Å"cul- tureâ⬠are predominantly interested in aviation technology and operations and protecting facilities and countering terrorism are not an inherent part of aviation, l4 However, the increasing Complexity of screening technologies and the continuing (possibly increasing) terrorist threat make the performance of aviation security systems more critical to flight safety. fied. Aviation terrorist events in the 1980s made apparent the shortcomings of the minimum Federal security req uirements.The FAA and the airlines both focused attention on screener selection and training, detection and screening technologies, and airline management of security programs and systems. The FAA has increased requirements and oversight of security personnel (selection, training, and management) and equipment (weapons and explosives detectors), but has not yet addressed how security personnel and equipment perform as components of a system. Screener Selection and Training For years, the people who screened airline passengers and baggage for domestic flights generally received little training, low wages, and few benefits.Consequently, alarmin g numbers of domestic 15 FAA Requirements for Aviation Security: Human-Factors Implications Aviation security personnel and equipment have received (and have not needed) the same level of regulatory and certification attention that the FAA places on flightcrew, air-traffic controllers, and ground support personnel and their respective aviation equipment. The FAA has focused its regulatory efforts on elements of the aviation system essential to flight safety. For example, the performance of pilots and aircraft systems are continuously critical for maintaining safety-a failure could cause an accident.On the other hand, the performance of the security system (other than as a deterrent) is rarely not screeners failed unannounced FAA tests (22 percent failure rate in 1988). 16 Since there has not been a severe domestic terrorist threat against aviation in the United States, these shortcomings have not resulted in life or property losses. 17 In light of public pressure following the Lockerbie disaster and costly fines stermming from FAA inspections, the Air Transport Association (ATA) developed an extensive set of screener selection, training, and compensation standards.ATA pro- 1%id. , p. 3. lllbid. , p. 28. l%id. , p. 28. lsundm tie FAA ~rga~tio~ s~c~e fi plaW in 1988 [emailà protected] 1990, tie Office of Aviation Security wu represented @ the Executive Director for Regulatory Standards and Compliance, to whom it reported. 14fiowl~ge of aviation tw~olow ~d Operatiom i5 impo~t to fic~t ad @ofi s~ty. For e~ple, spec~ characteristics of aviatio~ Such as large volumes of people and luggage that must be screened quickly, drive the security system design and functions.IsHowever, ~~es ~ustom~y ~ve ~gher s~n~ds for security personuel working h ktWtEitiOlld OpelZitiOllS. 16Lpe Osmus, office of Aviation Security, FW, personal COllMIluIlktitiOIL Feb. 22, 1991. [emailà protected] on tie deffitio~ he des~ction of a PSA ftight in 1987, caused by a disgruntled ex-emPIOYW Who Shot tie flying Crew in [emailà protected] @@t aircraft be considered a terroris4 as well as criminal, act. In this case, theex-employee had an identifkation card with which he gained access to the so screener training was not an issue. Chapter 5-Human Factors in Aviation Security 83 posed that airlines (or their security contractors) 18 co nsider education and health criteria, the ability to speak English, and aptitude test results before hiring screeners, and that they offer competitive wages, benefits, and incentives and follow a comprehensive training curriculum. In March 1990, the ATA asked the FAA to adopt its proposal as requirements for all airlines. Based on this cooperative industry effort, the FAA has required some of these suggested upgrades in training measures for screeners. (Most U. S. irlines have adopted at least some of the ATA recommendations; the failure rate on random checks has since dropped significantly. )19 The FAA decided not to include selection and wage standards because such a change would require public comment (i. e. , through the Federal Register), thereby calling attention to perceived or actual security weaknesses. rewards to those who detect test weapons and explosives (and even higher rewards to those who find the real thing); and increasing wages to at least the ââ¬Å"local prevail ing rate. For comparison, in Israel, screeners are paid at a level considered a ââ¬Å"goodâ⬠salary, far higher than minimum wage. In Switzerland, they are paid at the rate of about $lOper hour. In the United States, rates are often near minimum wage. Management Practices and Human Performance The FAA mandates certain positions in an airlineââ¬â¢s organizational structure, such as a security director for the airline and security coordinators at each airport, but airline management practices and philosophy usually fall outside the scope of FAA 20 regulatory authority.In Safe Skies for Tomorrow, OTA found that the effect of airline operating or management practices on airline safety, and changes in those practices, were rarely addressed in FAA safety analyses. 21 The FAA's Human Factors plan cites the influence of management ââ¬Å"cultureâ⬠on human performance as one area where basic research is needed. 22 If the organizational ââ¬Å"climateâ⬠(i. e. , working co nditions, wages, management, organizational culture, etc. ) does not allow an individual to perform at his or her peak, it may not matter how well he or she is trained or how well designed the technology is. 3 The ATA proposal for upgrading screener standards suggests giving screeners employee benefits common in many industries (vacation, holiday, medical) that contractors often donââ¬â¢t receive); offering to contractors the advantages of airline employment (e. g. , low-cost travel) and career opportunities to top performers; providing monetary The United Airlinesââ¬â¢ approach to improving screener performance on all flights from selected airports delineates one set of management techniques (box 5-A). Another approach has been undertaken by American Airlines, lthough only for its international flights. 24 American treats its international screeners as part of the American team. They are hired as full-fledged airline employees, not employees of a contracted security agency, a nd enjoy the same salary levels and benefits that ticketing agents do. The educational level of entrants appears relatively high, with a few individuals having advanced degrees. There appears also to be a real opportunity for advancement within American Airlines, and not just in the security division.Before starting work, the entrants are brought to Dallas (from across the world; many screeners are hired from the countries in which they will be working) for 2 weeks of training at Americanââ¬â¢s headquarters. The training includes emphasis on the screening questions as well as on what to look for on the x-ray screens. The screeners ask the standard questions as to who packed the baggage and whether anyone could have placed contraband in it. But they also ask general questions regarding destination and travel plans, somewhat akin to the lines of questioning performed by El Al.Indeed, American has used Israeli security consultants in designing their security system. The screeners lo ok for a number of specific characteristics, which remain proprietary to the company. If too many of the characteristics match a passenger, the individualââ¬â¢s baggage will receive much closer inspection. Screeners are ro- 18Most scree~g for domestic flights in the United States is conducted by security Contractors, nOtairhe employC%S. l~we Osmus, op. cit. , footnote 16. ~u. s. Conwss, OffIce of Technology Assessment, op. it. ,fOOtiOte 7. 211bid. , p. 88. 22U. S. Department of Transportatio~ Federal Aviation Administration op. Cit. , fOOtnOte 9, p. 15. ââ¬ËIbid. 24s0~~: Site visit t. D* [emailà protected]% December 1$)90, and Homer [emailà protected] Chief of Sedty, American Airlines, perSOIlal COmm~CatiO~ December 1990. 84 q Technology Against Terrorism: Structuring Security tated between looking at x-ray screens and interviewing passengers. Periodically, security systems are tested by contractors, who choose an American employee to play a terrorist.A specific scenario i s given to this impostor, and the reaction of the security personnel is noted. If they do not perform their functions, they may be subject to severe discipline, including termination. The result of the overall approach, using incentives and threat of discipline for negligence, appears to be a well-motivated and alert force. Box 5-Aââ¬âUAL Hi-Tech Screening United Airlines is focusing on management practices in its program, called Hi-Tech Screening, to improve the quality of pre-departure screening and the public perception of this highly visible function.Begun in 1987 at Chicago Oââ¬â¢Hare and San Francisco Airports, the program incorporated many of the selection and incentive steps later recommended in the ATA proposal, and also attempted to integrate technology and people by reconfiguring the screening environment to make it more pleasant for screeners and passengers as well as to improve operations. Although wages are still low, successful workers have the opportunity to j oin the UAL organization, instead of working as contract security personnel.Improvements include direct communication links to supervisors for oversight and advice to screeners, layout designed to minimize passenger delays, and multiple cues to passengers that security measures are being taken in a professional reamer (security supervisor in an elevated booth, passengers see themselves on video monitors as they go through metal detectors, signs describing procedures are clear and concise). United believes that the program has been successful to date in increasing public awareness and employee morale and competence.At Chicago, the employee attrition rate dropped by half and weapon detections and FAA test scores increased significantly (79 percent detection rate on FAA weapons tests prior to Hi-Tech and 92 percent subsequently). United has also installed Hi-Tech Screening systems in Denver, LOS Angeles, Seattle, and Washington Dunes, with plans for additional implementation in the fut ure. SOURCE: Site visit to Oââ¬â¢Hare, April 1990, and Richard Davis, Operational Security, United Airlines, Jan. 3,1991.Security Equipment Currently, the FAA requires airlines to employ relatively few types of security equipmentââ¬â primarily x-ray devices and metal detectors. The FAA established minimum performance standards for detecting weapons and explosives, and since these technologies are radiation-based, the FAA also requires that they meet Federal health and safety standards . 25 There are no standards governing operator interaction with the equipment, such as the layout of controls and display symbology options. At the time the FAA established x-ray and metal detector requirements (early 1970s), it had little expertise in human factors.Moreover, these technologies were relatively simple compared with aircraft cockpit and ATC consoles that the FAA had to certify without objective human-factors criteria, making humanfactors standards for security a relatively low pri ority. However, many behavioral experts argue that properly developed human-factors standards could improve system performance for aviation security as well as safety. In recent years, the FAA has issued regulations for security technologies-computer-controlled access at airports and explosive detection systemsââ¬âthat are considerably more complex and have wider system implications than x rays and metal detectors.As has is evidenced in the explosive detection system (EDS) regulations published in September 1989 26 and the subsequent performance of TNA, the only device to date that could meet the FAA standards. Beyond setting detection criteria, which are critical to the security system performance, the FAA also included requirements for throughput of the device (which is primarily an economics issueââ¬âsee ch. 4) and a requirement for 100-percent automated detection decisionmaking. Several lines of reasoning could lead to a design goal of total automation, including lower o perating costs over the long run een commonly the case whenever new technology is used to solve a problem, attention is focused on the positive aspects of the technologyââ¬âhow effective it isââ¬âwithout giving full consideration to possible new human-factors problems caused by the technology. The lack of attention to man/ machine human-factors and system operating issues ~F~r ~xmple, ~. ray ~y~tms ~~~ P-Y for cW. on baggage must meet tie s~n~ds set by the Food and Drug Administration. x54 Federal Register 36938 (Sept. 5, 1989). Chapter 5-Human Factors in Aviation Security q 85 nd possibly removing human error from the operating loop. However, it maybe useful, and sometimes vital, to keep the human in the operating/decisionmaking loop, especially if he or she must respond during emergency or unusual conditions. As has been shown so far in TNA tests, the false alarm rate is well above earlier goals and human intervention is required quite often. While automation, in the conte xt of an EDS, is a useful tool, and total automation may be an understandable goal, requiring 100 percent automated functions in an EDS is not justified at this time.The E D S regulations provide an example of where input from a group such as the FAAââ¬â¢s Human Factors Coordinating Committee could help flag potentially troublesome human-factors aspects of security regulations. Airline passenger profiling, in most cases, must be fast (and consequently cursory) enough so as not to impose excessive delays. In other security contexts, such as screening for the ââ¬Å"insider threatâ⬠profile within an organization where time is not so critical, much more detailed background data and questioning is possible.A different, although overlapping, form of profiling is used by law enforcement and investigatory agencies. Given pertinent data and evidence from a crime scene or threat, experts compile a profile of likely social, psychological, and physical characteristics of the criminal. However, much of the work and methodology could be transferred from one of the broad profiling regimes to the other. FAA Requirements for Profiling-Under Federal regulations, U. S. airlines must apply a relatively simple form of passenger profiling for international flights (e. g. questions regarding electronic devices), although airlines are not prohibited by FAA/DOT from conducting any form of profiling at any time. Whether or not a passenger is selected for closer scrutiny, such as a manual baggage search, depends on where his passport was issued (a factor that varies based on threat intelligence) and on responses to a series of questions aimed at identifying potential terrorist ââ¬Å"dupes. â⬠Additionally, airlines must conduct random baggage inspections on a small percentage of otherwise unselected passengers for each flight.These requirements do not apply to domestic flights or to foreign airlines, which results in an obvious gap in protection for Americans. The fact P assenger Profiling In-depth questioning of all airline passengers and detailed examin ation of each of their personal belongings and baggage is impossible in a modern transportation system. Since most of the millions of passengers that fly on U. S. airlines each year pose no security risk, targeting security resources on the small number of passengers who exhibit some elements of the threat ââ¬Å"profileâ⬠is one way to increase security without clogging transportation flows. rofiling can be a valuable component of a transportation security system, providing an independent complement to hardware-based (and often more expensive) explosives and weapons detection technologies. Successful profiling depends on a large support system including comprehensive intelligence networks and threat analyses, information system technology to process large databases, behavioral research and analysis, and trained and motivated screening personnel.There are two general approaches to operational profiling. One compares passenger demographic and other background data (age, sex, nationality, travel itinerary, etc. ) to historic or recent intelligencederived ââ¬Å"threat profiles. â⬠The other is based on the examinerââ¬â¢s psychological assessment of the passenger, taking into account nervousness, hostility, or other suspicious characteristics. Most profiling systems currently use elements of both approaches to varying degrees. that foreign airlines that compete with U.S. airlines on international routes do not have to satisfy these requirements imposes an economic penalty on domestic carriers and weakens their ability to compete successfully with foreign carriers, which, in addition, are usually statesubsidized. Domestic airlines complain, with justification, that a ââ¬Å"level playing fieldâ⬠should be established to avoid this unfair disadvantage. An option would be to compensate U. S. airlines for the additional costs, either from Federal subsidies or from the Airport Trust Fund. 7 Alternatively, foreign carriers could be required to apply similar security measures on flights landing in the United States to those demanded of U. S. carriers. The United States has forced better security practices in foreign 2% l$)7(j, Congress estiblishedaprecedent for compensating U. S. air carriers forsecuritymeasures incurred in international operatiombyautioritig nearly $10 million for fiscal years 1976-78 (Public Law 94-353, sec. 24). In 1982, Congress extended the authorized limit to $15 million (Public Law 97-248, sec. 24(d). Nearly this much was actually disbursed to four U. S. carriers. 84 q Technology Against Terrorism: Structuring Security revocation of landing rights of carriers from those countries in the absence of improvements. airports by threatening coordinating security management decisions and for providing a conduit for a detailed database. 30 The FAA is considering making CPSP mandatory, but a number of carriers oppose it, citing se curity officer vigilance problems caused by distraction by computer keyboard and display.Knowledgeable FAA and airline personnel claim that airline opposition stems mainly from the increased oversight capabilities that such a system would give the FAA CPSP would provide a detailed record of all airline profiling actions (and errors or failures) that could be used for civil penalty proceedings. Presently, the FAA oversees airline profiling procedures through random or scheduled field visits. The FAA counters that if a would-be malefactor sneaks through, CPSP also can provide documented proof that the airline followed FAA-required procedures, shifting some liability for a profiling failure to the FAA. 1 Additionally, there is substantial U. S. airlines operating on European routes have been permitted to substitute their own profiling programs for FAA requirements. 28 Most U. S. airlines and many foreign carriers conduct more extensive profile screening than minimum FAA requirements at foreign airports and some U. S. international gateways. Some airlines train their international employees in profiling techniques while others hire contractors to handle security for their international flights.Proprietary profiling procedures used by these airlines are modeled generally on the Israeli El Al method of profiling which is more comprehensive (and intrusive) than FAA requirements and reportedly includes psychological, social, and political factors. Complaints by certain groups, such as Arab-Americans, claiming harassment, stem from carrier-initiated profiling, not Federal requirements. 29 During the past 5 years, the FAA has developed and tested a computer-based profiling tool aimed at potential terrorist hijackers and saboteurs.The Comprehensive Passenger Screening Profile (CPSP) is both a checklist and decision aid for field officers and a data collection system to support profiling enhancements. It encompasses the current FAA required profiling procedures plus addit ional factors based on a data profile of terrorists, using historical and intelligence sources. The decision process for selecting a passenger for further examination is automated through a series of mathematically weighted yes/no questions (some of which do not require passenger interviews), that the security officer responds to via a keyboard.CPSP is designed for easy modication if intelligence or data analysis indicates a need. In early 1990, the FAA offered CPSP as an option for airlines to meet profiling requirements. Continental Airlines and United Airlines have tested versions of CPSP at a few locations, and have been generally pleased with its performance, especially as a tool for centrally ~ho [emailà protected] FAA htelligence, personal communication Oct. 1*, 1990%llid. analytic value to the large data set that would come from CPSP.As discovered during TNA testing, little is known about the baseline average passenger and baggage; therefore, general background data, regar dless of how well CPSP works operationally, would be valuable for security planning. No names of passengers are (or legally can be) included in such a data set maintained by the Federal Government. 32 However, as private entities, airlines can and do maintain such lists. Other Issues for Human Factors and Profiling Research and Development Due to security and proprietary concerns, profiling systems in place today are shrouded in secrecy.The technical aspects of their development and quantitative measures of their performance are difficult to obtain, although the widespread use at airports across the world attest to airline confidence in profiling Given industry acceptance of profiling technology, the unregulated environment in which profiling systems were developed, and the potential enhanced capabilities and future needs, there is a ~JO~Be~~l~q Director, Comorate s~~~, COntinenM fi~es, ~rson~ commtication, od. 15, 1990 and Glen W- Director, @XtitiOI. Ud Security, United Airlines, p ersonal communication, Oct. 6, 1990. 31c)P. cit. , footnote 27. qzfiid. Chapter 5-Human Factors in Aviation Security q 87 role for a concerted Federal (DOT) effort in profiling R. The primary research fields of interest are in the behavioral sciences and in large database collection and analysis. A useful but neglected approach would be to investigate the role of cultural differences in establishing profiles. Since patterns of behavior considered anomalous in one culture are normal in others, understanding cultural effects better could lead to more effective and, possibly, less discriminatory use of profiles. 3 Relevant behavioral research with applications for profiling is being conducted by a number of Federal agencies, although they generally do not coordinate these research efforts. There is a need to coordinate research and experience in developing terrorist profiles among concerned agencies. Also, some work is going on to establish databases of past incidents and known terrori sts in order to help develop profiles. The FAA conducts a modest profiling research effort that produced the CPSP and is analyzing profiling field tests.However, this effort is housed in the in aviation security. It has worked with in-house experts, with other agencies, and with behavioral scientists under contract. There should be steps taken to guarantee that this institutional knowledge is not lost, due to needed secrecy or personnel turnover. There should also be an effort to bring together knowledge on profiling from the Intelligence Community, from the Federal Bureau of Investigation, from the Immigration and Naturalization Service, and from the FAA, so that all agencies may profitably pool their knowledge.One way of helping assure such interagency communication would be the institution of annual interagency conferences on the topic (see ch. 3). Profiling techniques and related technologies are being added to current security R plans at the FAA Technical Center. The operationa l aspects of using automated profiling systems, such as data entry and human/computer interaction, are similar to those of many other technologies, and could benefit from further research and development. intelligence section under the Assistant Administrator for Civil Aviation Security with no direct link to FAAââ¬â¢s R division.Historically, the FAA pioneered the use of profiles in aviation in the late 1960s and early 1970s during the upsurge of hijackings to Cuba. A team of experts under the leadership of the FAA Office of Aviation Medicine was involved in the development of the initial profiles. Limited use of profiles was made during the early 1970s and again in 1980, when immigrants from the Mariel Boatlift began hijacking aircraft to Cuba. [Profiles were employed on a limited basis to help stem the wave of hijackings to Cuba by some ââ¬Å"Marielitosâ⬠. In the 1970s, the FAA also developed a profile for domestic use to identify persons who might be carrying explosives or incendiary devices in checked baggage. This ââ¬Å"checked bagâ⬠profile included several objective elements and was intended for use by airline personnel at ticket counters. This profile was never applied rigorously, although some of its elements were automated by at least one U. S. air carrier. Thus, the FAA has had substantial experience with developing and implementing profiles for useA near-term research need is how best to combine profiling systems with the new security technologies now in the pipeline. In fact, arguments have been made that the TNA device can only function effectively when combined with profilebased selection of baggage to inspect, since false alarm rates are high. This is, in fact, being done at the Gatwick tests. Presently, the profiling process results in binary decisionsââ¬âlet the passenger pass into the normal security process (more than 95 percent of passengers) or conduct a manual search of the passenger and his baggage. One possibility w ould e to expand and refine the decision outcome from profiling to provide multiple screening paths for passengers depending on the level of threat and the availability of advanced detection equipment (see ch. 4). A longer term research option is to investigate new technologies to enhance profiling. Rapid access in the field to Federal, international, and, possibly, private databases (i. e. , hotel, credit card) could greatly enhance capabilities. Remote sensing of respiration and heart rates and other biological parameters, combined with large population databases, automated facial-recognition systems, andSsCustom offici& in the Northern ~ Islands, a U. S. -flag territory, incorporate cultural characteristics in looking for anomalies for profding. ââ¬Å"a 88 q Technology Against Terrorism: Structuring Security biometric passports, all offer new possibilities for on-the-spot psychological and physiological assessments. From past experience, cultural factors particular to the countr y where the event is taking place frequently influence decisionmaking by local authorities. Some observers report that U. S. fficials who were involved would, on occasion, have benefited by a more detailed knowledge of the dynamics of local social systems. For example, in some cases, although crisis management officials were supposed to be in charge of handling an incident, local cultural or political factors have resulted in the crisis being directed instead by senior office holders, who are untrained for the purpose and unable to provide the rapid decisionmaking that is often required. Some research into systematizing knowledge of relevant aspects of different social systems would be useful.In this area, as in profiling, the construction of appropriate databases would be of use to U. S. officials who may be called on to participate in resolving a crisis. At present, there appears to be little coordination among agencies in understanding behavioral aspects of incident management. T his lack provides another argument for strengthening interagency coordination in counterterrorism (see ch. 3). Civil Liberties Security systems in general, and profiling methods in particular, trade certain freedoms (e. g. privacy) for safety. profiling methods, based on specific individual characteristics, may be derived from historical experience (e. g. , the large number of Cuban refugees who hijacked aircraft to Cuba in the early 1970s or the examples of hijacking engaged in by members of various Middle Eastern terrorist groups). These characteristics sometimes include physical and cultural features, since these traits are the easiest indicators to verify. Often such subjects belong to readily distinguishable minority groups.Therefore, people who possess the characteristics in question but who have no ill intentions (obviously, the great majority) could be subjected to scrutiny that could be considered to encroach on individual freedoms. This study describes measures to meet com pelling public safety interests. It is, however, beyond the scope of this study to discuss the many legal and societal civil liberties issues involved (e. g. , how much intrusiveness on privacy is countenanced by a compelling interest of the state? ).It is certain that the technical ability to investigate and record personal histories and characteristics and the demand for the use of such ability will greatly expand, thereby increasing the potential for crossing the fine line protecting constitutionally guaranteed individual liberties. Legislative attention will have to address the tradeoff between public safety and welfare and civil liberties. Policy Options The following policy options address human factors and aviation security. 1. Enhance FAA attention to human factors in security: 34 qExplicitly address aviation security in agencywide human-factors planning. The FAA has taken measures to move in this direction. Bolster human-factors expertise under the Assistant Administrator f or Civil Aviation Security and the Aviation Security Research and Development Service at the FAA Technical Center by adding professionals to their respective staffs, especially in light of plans to increase staff levels of both sections significantly during the next few years. One such professional has already been added. Incident Management Human factors also play a role in managing incidents abroad.When U. S. citizens are held hostage in a foreign country, the United States often plays a role in resolving the incident. Some foreign security officials are trained in the United States under assistance programs. But the United States also may participate actively, as it did in responding to a number of airline hijackings in the 1980s. q ~~e follo~ r=omenhtiom included in earlier drafts of this repofi has already been implemented by tie FAA q Add a designee of the Assistant Administrator for Civil Aviation Security to the FAAââ¬â¢s Human Factors Coordinating Committee.Chapter 5-Hum an Factors in Aviation Security q 89 2. Consider conducting R on combining passenger profiling techniques with other security technologies. 3. Give consideration to methods for ââ¬Å"leveling the playing fieldâ⬠when imposing requirements on U. S. carriers but not on competing foreign ones. 4. Give consideration to civil liberties issues 5. stemming from Federal aviation security requirements. Coordinate behavioral research into profiling and incident management being conducted in the Federal Government. Arrange periodic interagency conferences on related topics.
Tuesday, July 30, 2019
Essay
Alarm Bell about Internet Addiction Having been widely used since the sass, the Internet has become an integral part because of its popularization and incorporation into virtually every aspect of modern human life. The Internet allows us to access various information and global communication in a very convenient and effective way. Unfortunately, the excessive misuse of it can alter the development of human being society, especially the young generation.Therefore, I believe that it is necessary to raise the alarm bell about the Internet addiction among the teenagers due to its negative effects as well as consequences in three aspects: interpersonal (physical and mental), occupational (at school and at work), and social (relationship with family as well as community). Just like other types of addictions such as drug addiction or alcohol addiction, Internet addiction leads to many serious health hazards to both teenagers' physical and psychological fields.Since Internet addicts spend mo st of their time sitting, staring and focusing before the monitor screens, their bodies lack of active exercise while their brain are stimulated in high pressure. Hence, their vision and immune systems are easily weakened, increasing their vulnerability to assorted diseases. The lack of exercise due to excessive use of computer by maintaining a sitting posture may also risk suffering from carpal tunnel syndrome, back pain, and eyestrain.The Internet addiction also increases the danger of sleeping disorders (insomnia, apneas, nightmares) among teenagers (Western and Leukocyte 5). Many psychological and medical experts have agreed that the sleep is the essential function to human beings which helps to repair brain cells and promote formation of new neurons in the brain, so it is extremely important for the adolescents to grow up and develop. As a result, it is very harmful if adolescents skip sleeping because of heir addiction to the Internet.Moreover, many Internet addicts are so foc used on their ââ¬Å"own worldâ⬠that they forget to eat or drink; this may lead to malnutrition or even death. In the documentary ââ¬Å"Digital Nationâ⬠, it shows the ââ¬Å"PC bangsâ⬠in South Korea where adolescents are glued to the screens, expressionless. Some even play for more than 50 hours at a time without food or water. In fact, there have been a few deaths as a result of this (Digital Nation). Not only the physical side, but teenagers also have to face some psychological problems due to their Internet addiction.In the essay ââ¬Å"Internet Addiction or Excessive Internet useâ⬠, Waistband and Leukocyte have reviewed many cross-sectional studies to prove that there are high risk of mental disorder among Internet addicts such as ââ¬Å"affective disorder, anxiety disorders (including generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorderâ⬠(3). It is also found that there is a positive relationship betwe en Internet addiction and depression, as well as aggressive behaviors.Since the teenagers can be easily attracted and addicted with the harmful content in the Internet for a long time such as adult ex websites, online gaming, online chat systems and Bulletin Board System, the exposure to malicious and uncensored content online has perverted teenagers and has caused them to be more aggressive and violent. In the other words, they can be influenced and are likely to have aggressive behaviors. The above physical and psychological harmfulness caused by Internet addiction can bring teens many problems in their occupations.Since they spend too much time and efforts on their Internet usage rather than other activities, the Internet addicts usually face a lot of problems with their studies and work. All of we know that for 24 hours per day, people should divide into three equal sections: work/study, recreation, and sleep. Each section should last for eight hours. However, for Internet addic ts, they arrange their schedule differently by spending most of the time for being on- line instead of studying, working or sleeping.Without enough time for study/ work and lack of sleep as mentioned above, the Internet addicts have a shortage in the decision making function and a strategy learning/working lag. Students cannot concentrate and focus on their study if their minds are thinking of the Faceable newsfeed or the online games all the time. Academic problems caused by Internet addiction include decline in study habits, significant drop in grades, missing classes, increased risk of being placed on academic probation, and poor integration in extracurricular activities.For instance, Chunk Young II, a fifteen-year-old boy from Korea, dropped from the top half of his class to the bottom after being addicted to the computer games (Digital Nation). Similarly, employees with access to the Internet spend numerous hours of their working day engaged in non-work related Internet use. It can be said that Internet addiction can lead to poor academic reference in school and impaired functioning at work. Besides the negative effects mentioned above, the more dangerous consequence is the social relationships of the Internet addictive teenagers.According to Nine and Revering study in 2000, it is showed that there are about a quarter Of Internet addicts spends little time with their friends and families and 1/1 0 of them does not pay attention to the outside world (CTD. In Says 2). From this statistic, it can be understood that the adolescents may use the Internet for too long periods, isolating themselves from other forms of social contact, and focus almost entirely on the Internet rather than broader reality of life. Constant Internet use detracts time that could be spent with meaningful and productive social relationships.Hours wasted away typing useless messages, surfing the meaningless website, or playing nonsense games are injurious to personal relationships with t he one who really matter like family and friends. The social isolation, as a result of Internet addiction, that takes the teenagers away from the social activities and weakens the discourse relationship, might cause the feeling of incapability and social despair in teenagers. In the documentary Digital Nation, the mother Of Chunk Young II -? the fifteen year- old Korean boy whom we mentioned above- says ââ¬Å"[my son] that inability to communicate with me, his own mother, makes me so sad. Unfortunately, her situation is not an exception. There are more and more cases which have been reported linking with the abnormal behaviors of Internet addictive teenagers to the people surrounding them. In the past, when people had problems in their lives, they used to confide to their family members or close friends for asking advice. However, the situation is changed now; the managers nowadays stick to the Internet by logging in their PC or smart devices, keeping chatting with strangers or fin ding the solutions by Google- inning.The invention of social networks like Faceable or Twitter was supposed to increase and tie the relationship between people. However, the result is contrast. The more people depend on those networks, the more they become lonely. There is a quote in the essay ââ¬Å"Is Faceable making us lonely? â⬠which Stephen Marcher claims that, â⬠Faceable is interfering with our real friendships, distancing us from each other, making us lonelier; and that social outworking might be spreading the very isolation it seemed designed to conquerâ⬠(2).By using the example of the death of a former Play Boy playmate as well as many statistics and experts' opinions, Marcher believes that the overuse or dependence on this type of social network is responsible for the increasing of loneliness of modern people. Marcher also states a noticeable article written by researchers at Carnegie Mellon showing that an increase in Internet misuse is compatible with t he increase of loneliness. This contradiction between chance to connect and lack of human contact is called ââ¬Å"Internet paradoxâ⬠(Marcher 5). Becoming addicted to the Internet, the teenagers lose their human interaction.Moreover, they accept the unreal contacts which replace the real one. In the other words, by participating deeply in an artificial community, the Internet addicts teenagers lack real world face- to- face human interaction because talking through the computer network is greatly different from face- to- face contact. It's just like that if someone play the football video game really well, that does not mean he can play football in the real life. Since Internet addicts usually eliminate themselves from the social environment, their social relations have turned UT to be negative.Therefore, they cannot get many benefits from the social support. Like an endless cycle, the Internet addicts will spend more time on the Internet and expect more from the Internet for help. The example, which Marcher displays in the beginning of his essay, that Yvette Vickers had died for a very long time but no one discovered. Her computer was on when she died as it was the only connection she made with the outside world. She made contacts with distant fans through fan conventions and Internet sites instead of keeping in touch with her friends or family (Marcher 1).That can be portrayed as tragicomedy, and this type of tragicomedy has been shown more and more popular nowadays. On the whole, by the time connecting people, the Internet itself also makes the people isolate and decrease social skills to be more dependent on it. No one can deny that the Internet has played an important role that cannot be replaced in our modern lives. Therefore, many Internet supporters emphasize the advantages of the Internet usages such as convenient, popular and helpful rather than focus on the side-effects of the Internet in case of excessive use.They also may say hat the dangers listed are overstated and pessimistic about the situation of the Internet users. Those supporters argue that since there is no universal definition of Internet addiction, they believe that the quantities as well as quality of the Internet that they have used are suitable and appropriate; as a result they are not Internet addictive and are not affected by the consequences. In fact, since the Internet has attached closely to peep?s daily life, they can hardly realize how they depend on it.For example, they keep checking emails every five minutes and say that is just because of keeping in touch with their jobs. They spend several hours chatting with friends on instant messages on Faceable instead of hanging out and talking with them face-to-face. The first thing they do every morning is checking Faceable newsfeed instead of doing morning exercises. According to Marcher, ââ¬Å"among 18-to-34-year-odds, nearly half check Faceable minutes after waking up, and 28 percent do so before get ting put of bedâ⬠(9).Although the statistic is simple, it shows the reality that how people depend on the social network as well as the Internet, even though they do not realize it. Moreover, people think that they can handle their behaviors and not be easily influenced actively by the Internet because it is just a tool supporting human life. Their argument may be right and reasonable, but only if it's applied on disciplined people. However, to the teenagers or adolescents, they are immature and too young to developing the self-control against the temptation of the Internet.It can be said that the adolescent period is the most important developing stage of human life spans. Therefore problematic computer usage that is time consuming and spoils functioning in important life domains is very dangerous to teenagers as well as the whole society. For many reasons above, I strongly live that it is necessary for us to raise the warning alarm on the Internet excessive use or Internet a ddiction among the teenagers. Today, the popularity of Internet usage is likely to increase Internet addiction, especially to teenagers.The online games and social networks such as Faceable, Twitter make individuals interact and increase their activities on the Internet more and more. This situation makes individuals, especially adolescents, spend more time on the Internet. As a result, technological advancement is likely to increase Internet addiction day by day. Therefore, not only Internet addicts but also all the Internet users must be informed about the dangers of Internet addiction and preventive programs must be developed. Ignoring this problem and not developing solutions mean standing by bigger troubles that will rise in the future. Essay This is especially important to politicians and leaders because if they keep trying to be the good guy and making empty promises then they will eventually ruin themselves. Several of Machiavellian ideas can also be applied to modern leaders and political figures today. Believing that a prince needs to rule restriction and limitation to protect people in order to survive. Therefore, being cruel and being feared are necessary actions a ruler must take to keep safety and order to his country.One of the feared leader in today's society is Kim Gong Un who is the supreme deader of North Korea and has been directly responsible for a number of strategic policy which his subordinates approve. Kim Gong Un is a powerful supreme commander who as the decider balances his institution and show people that as the dictator, people needs to bear in their mind that loyalty and devotion is necessary in order for him to protect his country and traitors is not going to be tolerated.And by showing that tra itors will be punish, Kim Gong Un executed his powerful uncle Gang Song-take who held accountable for being traitor that wanted to get the power Kim Gong LLC has. According to Goldman, Russell. ââ¬Å"Kim Gong-nun's Bloody Path to Power. â⬠BBC News. Web. ââ¬Å"Purging and killing suspected rivals or officers with wavering loyalty has been a trait of the family dynasty along with unusual means of execution, which have included death by close range mortarsâ⬠Because Kim Gong UN is feared, people has too much devotion for him.And because of that, protecting his country has become secure. Kim Gong UN construct stronger army that can handle any modern time warfare with complete offensive and defensive capabilities. And promises people that no one will get hungry again. Another feared and powerful leader in our today's society is President Xi Jigging from China. President Xi articulated a simple but powerful vision to revive and restore the Chinese nation. After just two years in office, President Xi has advanced himself as a transformation leader, adopting an agenda that proposes to reform.President Xi has a mission to kill graft and corruption in his country, the campaign touch almost every corner of the government. According to Kiang Steven. CNN News. Web. The 61 -year-old leader, considered China's most powerful in decades, reiterated his ââ¬Å"zero-toleranceâ⬠stance, vowing to keep ââ¬Å"waving high the sword against corruptionâ⬠and ââ¬Å"fastening the cage of regulations. â⬠He took down former domestic security Czar Yanking, likely soon to become the most senior Chinese official ever to face corruption charges; General Xx Cachou, once the military's second-in- command; and Ling Joshua, a top aide to ex-President Huh Contain.For the sake of stability of china's nation, President Xi wanted to prove the people in china hat he will not tolerate deception and betrayal to their own county whether they are high ranking officials or lo w ranking officials. Lastly, President Vladimir Putting of Russia has a remarkable grip on power in today's society. He became prime minister in 1999. That lasted until 2000, when he switched to president, which lasted until 2008. Then he became prime minister again until 2012. He then went back to being the president of Russia, an office he's held since May 2012. According to Kamikazes, Cork. Endearingly. Web. No one would call Vladimir Putting a good guy,â⬠Forbes staffer Caroline Howard wrote. In 2014 he strong-armed his way into possession of Crimea and waged an ugly proxy war in neighboring Ukraine, during which an almost certainly Russian-supplied surface-to-air missile downed a civilian jetliner. â⬠President Putting is the kind of man who does what he wants and sin ââ¬Ët backing down from his ambitions no matter what everyone say. Because Putting is aiming Ukraine to instigate maximum damage since he wants to reconstitute Russia, President Putting sent tanks and artillery into eastern Ukraine and he knows that the west won't interfere. Essay God in our lives. There is no point to have money if we do not have God. For example, ââ¬Å"Great wealth without the peace Of God has little benefitâ⬠(1 6; 28:6). Also, ââ¬ËWealth gained through corruption will eventually be judgedâ⬠(22: 16, 22-23; 28:8, 20). There are so many proverbs on wealth and poverty, but the general idea is that working hard leads to wealth, and laziness and corruption leads to poverty. These are general principles that can be followed but are not always perfect in design.The book of Hebrews also speaks of sides and folly, especially chapter 9. For example, in Proverbs 9, two women are compared: one is wisdom and one is folly. The one named Wisdom built her home around seven pillars and prepared a feast for everyone who wanted to attend. She even cried out loudly so that everyone could hear her invitation. On the other hand, the woman of folly cried out even louder. She is without knowledge but still cries out to those ââ¬Å"who are straight on their way' (Provo. 9:15).Her main target is believers who are following God and she will keep crying louder and louder. This applies to the world today because it is easier to give in to the woman of folly, because she is screaming so loudly. Just as the book of Proverbs compares diligence and laziness, it also compares wisdom to folly. It is almost as if they are on opposite sides of a scale and one will always weigh more in our lives. Hinds and Yates explain that the book of Proverbs ââ¬Å"continually presents a sharp contrast between the life of wisdom and the life of follyâ⬠(p. 263).Wisdom and folly is ââ¬Å"often a contrast between righteousness and sidedness,â⬠and the contrast is not for a person with ââ¬Å"street smarts,â⬠but a person with a close relationship with God (p. 263). This means that it does not matter how many education degrees a person has, if they are not close with God, and fearing God, they cannot possibly be wise. This would apply to a wealthy business owner who seems to have it all, but does not have God so he is a fool. Smartness from the world's perspective is not wisdom in God's eyes. Bibliography Hinds, Deed and Gary Yates. Essence Of the Old Testament: A Survey. Nashville: publishing, 2012. Essay The Journal's mandate is to publish rigorous and methodological examinations of past, current, and advanced concepts, methods and results in physics research. Physics Essays dedicates itself to the publication of stimulating exploratory, and original papers in a variety of physics disciplines, such as spectroscopy, quantum mechanics, particle physics, electromagnetic theory, astrophysics, space physics, mathematical methods in hicks, plasma physics, philosophical aspects of physics, chemical physics, and relativity.Accelerated Online Publication Articles are available online well in advance of production of the printed version of the Journal. These accelerated online articles will be complete and final, with identical content to the versions subsequently published in the printed Journal. The articles posted in an accelerated fashion online will contain final bibliographic citation information and are fully excitable from the moment they appear online. Essay Essay Name: ââ¬â Class: Kohort15 Group 1 Individual assignment Essay: Myself & My hobby Iââ¬â¢ am -, age 19 years old and was born on 05 June 1993 at the General Hospital Tawau, Sabah. I am from Tawau, Sabah. I live in village of Tanjung Batu Keramat, Tawau. I was the third child of five siblings. I started school at St Patrick's Primary School Tawau from Primary 1 to Primary 6. Then I enrolled into Kuhara High School, Tawau up to Form 5. In school, I used to only educational performance.Now I went to the University Selangor Diploma in Pre-School Program. My ambition is want to be a flight attendant but my sustenance is to be a pre-school teacher god willing I would become a good educator and useful for future generations. My hobby is photography. Photography is a way of to express myself. This hobby also removes all my monotony and dullness of life. It gives me leisure, pleasure and mental refreshment. When I went to relax my mind, my camera becomes my solace and friend. My hobby w as become part and parcel of my life.It keeps my mind and body occupied during my free time. My hobby also keeps my mind all the time refreshed and tension time. It adds colour and zest to my life. I started growing interest in photography since 2010 when my first sister purchase dslr camera and now I my own camera dslr a gift from my grandfather. I donââ¬â¢t think I will ever give up my hobby of taking beautiful snaps of anything. I am also eager to learn more about photography to become excellent in it. I like photography very much. Essay God in our lives. There is no point to have money if we do not have God. For example, ââ¬Å"Great wealth without the peace Of God has little benefitâ⬠(1 6; 28:6). Also, ââ¬ËWealth gained through corruption will eventually be judgedâ⬠(22: 16, 22-23; 28:8, 20). There are so many proverbs on wealth and poverty, but the general idea is that working hard leads to wealth, and laziness and corruption leads to poverty. These are general principles that can be followed but are not always perfect in design.The book of Hebrews also speaks of sides and folly, especially chapter 9. For example, in Proverbs 9, two women are compared: one is wisdom and one is folly. The one named Wisdom built her home around seven pillars and prepared a feast for everyone who wanted to attend. She even cried out loudly so that everyone could hear her invitation. On the other hand, the woman of folly cried out even louder. She is without knowledge but still cries out to those ââ¬Å"who are straight on their way' (Provo. 9:15).Her main target is believers who are following God and she will keep crying louder and louder. This applies to the world today because it is easier to give in to the woman of folly, because she is screaming so loudly. Just as the book of Proverbs compares diligence and laziness, it also compares wisdom to folly. It is almost as if they are on opposite sides of a scale and one will always weigh more in our lives. Hinds and Yates explain that the book of Proverbs ââ¬Å"continually presents a sharp contrast between the life of wisdom and the life of follyâ⬠(p. 263).Wisdom and folly is ââ¬Å"often a contrast between righteousness and sidedness,â⬠and the contrast is not for a person with ââ¬Å"street smarts,â⬠but a person with a close relationship with God (p. 263). This means that it does not matter how many education degrees a person has, if they are not close with God, and fearing God, they cannot possibly be wise. This would apply to a wealthy business owner who seems to have it all, but does not have God so he is a fool. Smartness from the world's perspective is not wisdom in God's eyes. Bibliography Hinds, Deed and Gary Yates. Essence Of the Old Testament: A Survey. Nashville: publishing, 2012. Essay This is especially important to politicians and leaders because if they keep trying to be the good guy and making empty promises then they will eventually ruin themselves. Several of Machiavellian ideas can also be applied to modern leaders and political figures today. Believing that a prince needs to rule restriction and limitation to protect people in order to survive. Therefore, being cruel and being feared are necessary actions a ruler must take to keep safety and order to his country.One of the feared leader in today's society is Kim Gong Un who is the supreme deader of North Korea and has been directly responsible for a number of strategic policy which his subordinates approve. Kim Gong Un is a powerful supreme commander who as the decider balances his institution and show people that as the dictator, people needs to bear in their mind that loyalty and devotion is necessary in order for him to protect his country and traitors is not going to be tolerated.And by showing that tra itors will be punish, Kim Gong Un executed his powerful uncle Gang Song-take who held accountable for being traitor that wanted to get the power Kim Gong LLC has. According to Goldman, Russell. ââ¬Å"Kim Gong-nun's Bloody Path to Power. â⬠BBC News. Web. ââ¬Å"Purging and killing suspected rivals or officers with wavering loyalty has been a trait of the family dynasty along with unusual means of execution, which have included death by close range mortarsâ⬠Because Kim Gong UN is feared, people has too much devotion for him.And because of that, protecting his country has become secure. Kim Gong UN construct stronger army that can handle any modern time warfare with complete offensive and defensive capabilities. And promises people that no one will get hungry again. Another feared and powerful leader in our today's society is President Xi Jigging from China. President Xi articulated a simple but powerful vision to revive and restore the Chinese nation. After just two years in office, President Xi has advanced himself as a transformation leader, adopting an agenda that proposes to reform.President Xi has a mission to kill graft and corruption in his country, the campaign touch almost every corner of the government. According to Kiang Steven. CNN News. Web. The 61 -year-old leader, considered China's most powerful in decades, reiterated his ââ¬Å"zero-toleranceâ⬠stance, vowing to keep ââ¬Å"waving high the sword against corruptionâ⬠and ââ¬Å"fastening the cage of regulations. â⬠He took down former domestic security Czar Yanking, likely soon to become the most senior Chinese official ever to face corruption charges; General Xx Cachou, once the military's second-in- command; and Ling Joshua, a top aide to ex-President Huh Contain.For the sake of stability of china's nation, President Xi wanted to prove the people in china hat he will not tolerate deception and betrayal to their own county whether they are high ranking officials or lo w ranking officials. Lastly, President Vladimir Putting of Russia has a remarkable grip on power in today's society. He became prime minister in 1999. That lasted until 2000, when he switched to president, which lasted until 2008. Then he became prime minister again until 2012. He then went back to being the president of Russia, an office he's held since May 2012. According to Kamikazes, Cork. Endearingly. Web. No one would call Vladimir Putting a good guy,â⬠Forbes staffer Caroline Howard wrote. In 2014 he strong-armed his way into possession of Crimea and waged an ugly proxy war in neighboring Ukraine, during which an almost certainly Russian-supplied surface-to-air missile downed a civilian jetliner. â⬠President Putting is the kind of man who does what he wants and sin ââ¬Ët backing down from his ambitions no matter what everyone say. Because Putting is aiming Ukraine to instigate maximum damage since he wants to reconstitute Russia, President Putting sent tanks and artillery into eastern Ukraine and he knows that the west won't interfere. Essay The Journal's mandate is to publish rigorous and methodological examinations of past, current, and advanced concepts, methods and results in physics research. Physics Essays dedicates itself to the publication of stimulating exploratory, and original papers in a variety of physics disciplines, such as spectroscopy, quantum mechanics, particle physics, electromagnetic theory, astrophysics, space physics, mathematical methods in hicks, plasma physics, philosophical aspects of physics, chemical physics, and relativity.Accelerated Online Publication Articles are available online well in advance of production of the printed version of the Journal. These accelerated online articles will be complete and final, with identical content to the versions subsequently published in the printed Journal. The articles posted in an accelerated fashion online will contain final bibliographic citation information and are fully excitable from the moment they appear online. Essay Alarm Bell about Internet Addiction Having been widely used since the sass, the Internet has become an integral part because of its popularization and incorporation into virtually every aspect of modern human life. The Internet allows us to access various information and global communication in a very convenient and effective way. Unfortunately, the excessive misuse of it can alter the development of human being society, especially the young generation.Therefore, I believe that it is necessary to raise the alarm bell about the Internet addiction among the teenagers due to its negative effects as well as consequences in three aspects: interpersonal (physical and mental), occupational (at school and at work), and social (relationship with family as well as community). Just like other types of addictions such as drug addiction or alcohol addiction, Internet addiction leads to many serious health hazards to both teenagers' physical and psychological fields.Since Internet addicts spend mo st of their time sitting, staring and focusing before the monitor screens, their bodies lack of active exercise while their brain are stimulated in high pressure. Hence, their vision and immune systems are easily weakened, increasing their vulnerability to assorted diseases. The lack of exercise due to excessive use of computer by maintaining a sitting posture may also risk suffering from carpal tunnel syndrome, back pain, and eyestrain.The Internet addiction also increases the danger of sleeping disorders (insomnia, apneas, nightmares) among teenagers (Western and Leukocyte 5). Many psychological and medical experts have agreed that the sleep is the essential function to human beings which helps to repair brain cells and promote formation of new neurons in the brain, so it is extremely important for the adolescents to grow up and develop. As a result, it is very harmful if adolescents skip sleeping because of heir addiction to the Internet.Moreover, many Internet addicts are so foc used on their ââ¬Å"own worldâ⬠that they forget to eat or drink; this may lead to malnutrition or even death. In the documentary ââ¬Å"Digital Nationâ⬠, it shows the ââ¬Å"PC bangsâ⬠in South Korea where adolescents are glued to the screens, expressionless. Some even play for more than 50 hours at a time without food or water. In fact, there have been a few deaths as a result of this (Digital Nation). Not only the physical side, but teenagers also have to face some psychological problems due to their Internet addiction.In the essay ââ¬Å"Internet Addiction or Excessive Internet useâ⬠, Waistband and Leukocyte have reviewed many cross-sectional studies to prove that there are high risk of mental disorder among Internet addicts such as ââ¬Å"affective disorder, anxiety disorders (including generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorderâ⬠(3). It is also found that there is a positive relationship betwe en Internet addiction and depression, as well as aggressive behaviors.Since the teenagers can be easily attracted and addicted with the harmful content in the Internet for a long time such as adult ex websites, online gaming, online chat systems and Bulletin Board System, the exposure to malicious and uncensored content online has perverted teenagers and has caused them to be more aggressive and violent. In the other words, they can be influenced and are likely to have aggressive behaviors. The above physical and psychological harmfulness caused by Internet addiction can bring teens many problems in their occupations.Since they spend too much time and efforts on their Internet usage rather than other activities, the Internet addicts usually face a lot of problems with their studies and work. All of we know that for 24 hours per day, people should divide into three equal sections: work/study, recreation, and sleep. Each section should last for eight hours. However, for Internet addic ts, they arrange their schedule differently by spending most of the time for being on- line instead of studying, working or sleeping.Without enough time for study/ work and lack of sleep as mentioned above, the Internet addicts have a shortage in the decision making function and a strategy learning/working lag. Students cannot concentrate and focus on their study if their minds are thinking of the Faceable newsfeed or the online games all the time. Academic problems caused by Internet addiction include decline in study habits, significant drop in grades, missing classes, increased risk of being placed on academic probation, and poor integration in extracurricular activities.For instance, Chunk Young II, a fifteen-year-old boy from Korea, dropped from the top half of his class to the bottom after being addicted to the computer games (Digital Nation). Similarly, employees with access to the Internet spend numerous hours of their working day engaged in non-work related Internet use. It can be said that Internet addiction can lead to poor academic reference in school and impaired functioning at work. Besides the negative effects mentioned above, the more dangerous consequence is the social relationships of the Internet addictive teenagers.According to Nine and Revering study in 2000, it is showed that there are about a quarter Of Internet addicts spends little time with their friends and families and 1/1 0 of them does not pay attention to the outside world (CTD. In Says 2). From this statistic, it can be understood that the adolescents may use the Internet for too long periods, isolating themselves from other forms of social contact, and focus almost entirely on the Internet rather than broader reality of life. Constant Internet use detracts time that could be spent with meaningful and productive social relationships.Hours wasted away typing useless messages, surfing the meaningless website, or playing nonsense games are injurious to personal relationships with t he one who really matter like family and friends. The social isolation, as a result of Internet addiction, that takes the teenagers away from the social activities and weakens the discourse relationship, might cause the feeling of incapability and social despair in teenagers. In the documentary Digital Nation, the mother Of Chunk Young II -? the fifteen year- old Korean boy whom we mentioned above- says ââ¬Å"[my son] that inability to communicate with me, his own mother, makes me so sad. Unfortunately, her situation is not an exception. There are more and more cases which have been reported linking with the abnormal behaviors of Internet addictive teenagers to the people surrounding them. In the past, when people had problems in their lives, they used to confide to their family members or close friends for asking advice. However, the situation is changed now; the managers nowadays stick to the Internet by logging in their PC or smart devices, keeping chatting with strangers or fin ding the solutions by Google- inning.The invention of social networks like Faceable or Twitter was supposed to increase and tie the relationship between people. However, the result is contrast. The more people depend on those networks, the more they become lonely. There is a quote in the essay ââ¬Å"Is Faceable making us lonely? â⬠which Stephen Marcher claims that, â⬠Faceable is interfering with our real friendships, distancing us from each other, making us lonelier; and that social outworking might be spreading the very isolation it seemed designed to conquerâ⬠(2).By using the example of the death of a former Play Boy playmate as well as many statistics and experts' opinions, Marcher believes that the overuse or dependence on this type of social network is responsible for the increasing of loneliness of modern people. Marcher also states a noticeable article written by researchers at Carnegie Mellon showing that an increase in Internet misuse is compatible with t he increase of loneliness. This contradiction between chance to connect and lack of human contact is called ââ¬Å"Internet paradoxâ⬠(Marcher 5). Becoming addicted to the Internet, the teenagers lose their human interaction.Moreover, they accept the unreal contacts which replace the real one. In the other words, by participating deeply in an artificial community, the Internet addicts teenagers lack real world face- to- face human interaction because talking through the computer network is greatly different from face- to- face contact. It's just like that if someone play the football video game really well, that does not mean he can play football in the real life. Since Internet addicts usually eliminate themselves from the social environment, their social relations have turned UT to be negative.Therefore, they cannot get many benefits from the social support. Like an endless cycle, the Internet addicts will spend more time on the Internet and expect more from the Internet for help. The example, which Marcher displays in the beginning of his essay, that Yvette Vickers had died for a very long time but no one discovered. Her computer was on when she died as it was the only connection she made with the outside world. She made contacts with distant fans through fan conventions and Internet sites instead of keeping in touch with her friends or family (Marcher 1).That can be portrayed as tragicomedy, and this type of tragicomedy has been shown more and more popular nowadays. On the whole, by the time connecting people, the Internet itself also makes the people isolate and decrease social skills to be more dependent on it. No one can deny that the Internet has played an important role that cannot be replaced in our modern lives. Therefore, many Internet supporters emphasize the advantages of the Internet usages such as convenient, popular and helpful rather than focus on the side-effects of the Internet in case of excessive use.They also may say hat the dangers listed are overstated and pessimistic about the situation of the Internet users. Those supporters argue that since there is no universal definition of Internet addiction, they believe that the quantities as well as quality of the Internet that they have used are suitable and appropriate; as a result they are not Internet addictive and are not affected by the consequences. In fact, since the Internet has attached closely to peep?s daily life, they can hardly realize how they depend on it.For example, they keep checking emails every five minutes and say that is just because of keeping in touch with their jobs. They spend several hours chatting with friends on instant messages on Faceable instead of hanging out and talking with them face-to-face. The first thing they do every morning is checking Faceable newsfeed instead of doing morning exercises. According to Marcher, ââ¬Å"among 18-to-34-year-odds, nearly half check Faceable minutes after waking up, and 28 percent do so before get ting put of bedâ⬠(9).Although the statistic is simple, it shows the reality that how people depend on the social network as well as the Internet, even though they do not realize it. Moreover, people think that they can handle their behaviors and not be easily influenced actively by the Internet because it is just a tool supporting human life. Their argument may be right and reasonable, but only if it's applied on disciplined people. However, to the teenagers or adolescents, they are immature and too young to developing the self-control against the temptation of the Internet.It can be said that the adolescent period is the most important developing stage of human life spans. Therefore problematic computer usage that is time consuming and spoils functioning in important life domains is very dangerous to teenagers as well as the whole society. For many reasons above, I strongly live that it is necessary for us to raise the warning alarm on the Internet excessive use or Internet a ddiction among the teenagers. Today, the popularity of Internet usage is likely to increase Internet addiction, especially to teenagers.The online games and social networks such as Faceable, Twitter make individuals interact and increase their activities on the Internet more and more. This situation makes individuals, especially adolescents, spend more time on the Internet. As a result, technological advancement is likely to increase Internet addiction day by day. Therefore, not only Internet addicts but also all the Internet users must be informed about the dangers of Internet addiction and preventive programs must be developed. Ignoring this problem and not developing solutions mean standing by bigger troubles that will rise in the future. Essay God in our lives. There is no point to have money if we do not have God. For example, ââ¬Å"Great wealth without the peace Of God has little benefitâ⬠(1 6; 28:6). Also, ââ¬ËWealth gained through corruption will eventually be judgedâ⬠(22: 16, 22-23; 28:8, 20). There are so many proverbs on wealth and poverty, but the general idea is that working hard leads to wealth, and laziness and corruption leads to poverty. These are general principles that can be followed but are not always perfect in design.The book of Hebrews also speaks of sides and folly, especially chapter 9. For example, in Proverbs 9, two women are compared: one is wisdom and one is folly. The one named Wisdom built her home around seven pillars and prepared a feast for everyone who wanted to attend. She even cried out loudly so that everyone could hear her invitation. On the other hand, the woman of folly cried out even louder. She is without knowledge but still cries out to those ââ¬Å"who are straight on their way' (Provo. 9:15).Her main target is believers who are following God and she will keep crying louder and louder. This applies to the world today because it is easier to give in to the woman of folly, because she is screaming so loudly. Just as the book of Proverbs compares diligence and laziness, it also compares wisdom to folly. It is almost as if they are on opposite sides of a scale and one will always weigh more in our lives. Hinds and Yates explain that the book of Proverbs ââ¬Å"continually presents a sharp contrast between the life of wisdom and the life of follyâ⬠(p. 263).Wisdom and folly is ââ¬Å"often a contrast between righteousness and sidedness,â⬠and the contrast is not for a person with ââ¬Å"street smarts,â⬠but a person with a close relationship with God (p. 263). This means that it does not matter how many education degrees a person has, if they are not close with God, and fearing God, they cannot possibly be wise. This would apply to a wealthy business owner who seems to have it all, but does not have God so he is a fool. Smartness from the world's perspective is not wisdom in God's eyes. Bibliography Hinds, Deed and Gary Yates. Essence Of the Old Testament: A Survey. Nashville: publishing, 2012. Essay Alarm Bell about Internet Addiction Having been widely used since the sass, the Internet has become an integral part because of its popularization and incorporation into virtually every aspect of modern human life. The Internet allows us to access various information and global communication in a very convenient and effective way. Unfortunately, the excessive misuse of it can alter the development of human being society, especially the young generation.Therefore, I believe that it is necessary to raise the alarm bell about the Internet addiction among the teenagers due to its negative effects as well as consequences in three aspects: interpersonal (physical and mental), occupational (at school and at work), and social (relationship with family as well as community). Just like other types of addictions such as drug addiction or alcohol addiction, Internet addiction leads to many serious health hazards to both teenagers' physical and psychological fields.Since Internet addicts spend mo st of their time sitting, staring and focusing before the monitor screens, their bodies lack of active exercise while their brain are stimulated in high pressure. Hence, their vision and immune systems are easily weakened, increasing their vulnerability to assorted diseases. The lack of exercise due to excessive use of computer by maintaining a sitting posture may also risk suffering from carpal tunnel syndrome, back pain, and eyestrain.The Internet addiction also increases the danger of sleeping disorders (insomnia, apneas, nightmares) among teenagers (Western and Leukocyte 5). Many psychological and medical experts have agreed that the sleep is the essential function to human beings which helps to repair brain cells and promote formation of new neurons in the brain, so it is extremely important for the adolescents to grow up and develop. As a result, it is very harmful if adolescents skip sleeping because of heir addiction to the Internet.Moreover, many Internet addicts are so foc used on their ââ¬Å"own worldâ⬠that they forget to eat or drink; this may lead to malnutrition or even death. In the documentary ââ¬Å"Digital Nationâ⬠, it shows the ââ¬Å"PC bangsâ⬠in South Korea where adolescents are glued to the screens, expressionless. Some even play for more than 50 hours at a time without food or water. In fact, there have been a few deaths as a result of this (Digital Nation). Not only the physical side, but teenagers also have to face some psychological problems due to their Internet addiction.In the essay ââ¬Å"Internet Addiction or Excessive Internet useâ⬠, Waistband and Leukocyte have reviewed many cross-sectional studies to prove that there are high risk of mental disorder among Internet addicts such as ââ¬Å"affective disorder, anxiety disorders (including generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorderâ⬠(3). It is also found that there is a positive relationship betwe en Internet addiction and depression, as well as aggressive behaviors.Since the teenagers can be easily attracted and addicted with the harmful content in the Internet for a long time such as adult ex websites, online gaming, online chat systems and Bulletin Board System, the exposure to malicious and uncensored content online has perverted teenagers and has caused them to be more aggressive and violent. In the other words, they can be influenced and are likely to have aggressive behaviors. The above physical and psychological harmfulness caused by Internet addiction can bring teens many problems in their occupations.Since they spend too much time and efforts on their Internet usage rather than other activities, the Internet addicts usually face a lot of problems with their studies and work. All of we know that for 24 hours per day, people should divide into three equal sections: work/study, recreation, and sleep. Each section should last for eight hours. However, for Internet addic ts, they arrange their schedule differently by spending most of the time for being on- line instead of studying, working or sleeping.Without enough time for study/ work and lack of sleep as mentioned above, the Internet addicts have a shortage in the decision making function and a strategy learning/working lag. Students cannot concentrate and focus on their study if their minds are thinking of the Faceable newsfeed or the online games all the time. Academic problems caused by Internet addiction include decline in study habits, significant drop in grades, missing classes, increased risk of being placed on academic probation, and poor integration in extracurricular activities.For instance, Chunk Young II, a fifteen-year-old boy from Korea, dropped from the top half of his class to the bottom after being addicted to the computer games (Digital Nation). Similarly, employees with access to the Internet spend numerous hours of their working day engaged in non-work related Internet use. It can be said that Internet addiction can lead to poor academic reference in school and impaired functioning at work. Besides the negative effects mentioned above, the more dangerous consequence is the social relationships of the Internet addictive teenagers.According to Nine and Revering study in 2000, it is showed that there are about a quarter Of Internet addicts spends little time with their friends and families and 1/1 0 of them does not pay attention to the outside world (CTD. In Says 2). From this statistic, it can be understood that the adolescents may use the Internet for too long periods, isolating themselves from other forms of social contact, and focus almost entirely on the Internet rather than broader reality of life. Constant Internet use detracts time that could be spent with meaningful and productive social relationships.Hours wasted away typing useless messages, surfing the meaningless website, or playing nonsense games are injurious to personal relationships with t he one who really matter like family and friends. The social isolation, as a result of Internet addiction, that takes the teenagers away from the social activities and weakens the discourse relationship, might cause the feeling of incapability and social despair in teenagers. In the documentary Digital Nation, the mother Of Chunk Young II -? the fifteen year- old Korean boy whom we mentioned above- says ââ¬Å"[my son] that inability to communicate with me, his own mother, makes me so sad. Unfortunately, her situation is not an exception. There are more and more cases which have been reported linking with the abnormal behaviors of Internet addictive teenagers to the people surrounding them. In the past, when people had problems in their lives, they used to confide to their family members or close friends for asking advice. However, the situation is changed now; the managers nowadays stick to the Internet by logging in their PC or smart devices, keeping chatting with strangers or fin ding the solutions by Google- inning.The invention of social networks like Faceable or Twitter was supposed to increase and tie the relationship between people. However, the result is contrast. The more people depend on those networks, the more they become lonely. There is a quote in the essay ââ¬Å"Is Faceable making us lonely? â⬠which Stephen Marcher claims that, â⬠Faceable is interfering with our real friendships, distancing us from each other, making us lonelier; and that social outworking might be spreading the very isolation it seemed designed to conquerâ⬠(2).By using the example of the death of a former Play Boy playmate as well as many statistics and experts' opinions, Marcher believes that the overuse or dependence on this type of social network is responsible for the increasing of loneliness of modern people. Marcher also states a noticeable article written by researchers at Carnegie Mellon showing that an increase in Internet misuse is compatible with t he increase of loneliness. This contradiction between chance to connect and lack of human contact is called ââ¬Å"Internet paradoxâ⬠(Marcher 5). Becoming addicted to the Internet, the teenagers lose their human interaction.Moreover, they accept the unreal contacts which replace the real one. In the other words, by participating deeply in an artificial community, the Internet addicts teenagers lack real world face- to- face human interaction because talking through the computer network is greatly different from face- to- face contact. It's just like that if someone play the football video game really well, that does not mean he can play football in the real life. Since Internet addicts usually eliminate themselves from the social environment, their social relations have turned UT to be negative.Therefore, they cannot get many benefits from the social support. Like an endless cycle, the Internet addicts will spend more time on the Internet and expect more from the Internet for help. The example, which Marcher displays in the beginning of his essay, that Yvette Vickers had died for a very long time but no one discovered. Her computer was on when she died as it was the only connection she made with the outside world. She made contacts with distant fans through fan conventions and Internet sites instead of keeping in touch with her friends or family (Marcher 1).That can be portrayed as tragicomedy, and this type of tragicomedy has been shown more and more popular nowadays. On the whole, by the time connecting people, the Internet itself also makes the people isolate and decrease social skills to be more dependent on it. No one can deny that the Internet has played an important role that cannot be replaced in our modern lives. Therefore, many Internet supporters emphasize the advantages of the Internet usages such as convenient, popular and helpful rather than focus on the side-effects of the Internet in case of excessive use.They also may say hat the dangers listed are overstated and pessimistic about the situation of the Internet users. Those supporters argue that since there is no universal definition of Internet addiction, they believe that the quantities as well as quality of the Internet that they have used are suitable and appropriate; as a result they are not Internet addictive and are not affected by the consequences. In fact, since the Internet has attached closely to peep?s daily life, they can hardly realize how they depend on it.For example, they keep checking emails every five minutes and say that is just because of keeping in touch with their jobs. They spend several hours chatting with friends on instant messages on Faceable instead of hanging out and talking with them face-to-face. The first thing they do every morning is checking Faceable newsfeed instead of doing morning exercises. According to Marcher, ââ¬Å"among 18-to-34-year-odds, nearly half check Faceable minutes after waking up, and 28 percent do so before get ting put of bedâ⬠(9).Although the statistic is simple, it shows the reality that how people depend on the social network as well as the Internet, even though they do not realize it. Moreover, people think that they can handle their behaviors and not be easily influenced actively by the Internet because it is just a tool supporting human life. Their argument may be right and reasonable, but only if it's applied on disciplined people. However, to the teenagers or adolescents, they are immature and too young to developing the self-control against the temptation of the Internet.It can be said that the adolescent period is the most important developing stage of human life spans. Therefore problematic computer usage that is time consuming and spoils functioning in important life domains is very dangerous to teenagers as well as the whole society. For many reasons above, I strongly live that it is necessary for us to raise the warning alarm on the Internet excessive use or Internet a ddiction among the teenagers. Today, the popularity of Internet usage is likely to increase Internet addiction, especially to teenagers.The online games and social networks such as Faceable, Twitter make individuals interact and increase their activities on the Internet more and more. This situation makes individuals, especially adolescents, spend more time on the Internet. As a result, technological advancement is likely to increase Internet addiction day by day. Therefore, not only Internet addicts but also all the Internet users must be informed about the dangers of Internet addiction and preventive programs must be developed. Ignoring this problem and not developing solutions mean standing by bigger troubles that will rise in the future. Essay This is especially important to politicians and leaders because if they keep trying to be the good guy and making empty promises then they will eventually ruin themselves. Several of Machiavellian ideas can also be applied to modern leaders and political figures today. Believing that a prince needs to rule restriction and limitation to protect people in order to survive. Therefore, being cruel and being feared are necessary actions a ruler must take to keep safety and order to his country.One of the feared leader in today's society is Kim Gong Un who is the supreme deader of North Korea and has been directly responsible for a number of strategic policy which his subordinates approve. Kim Gong Un is a powerful supreme commander who as the decider balances his institution and show people that as the dictator, people needs to bear in their mind that loyalty and devotion is necessary in order for him to protect his country and traitors is not going to be tolerated.And by showing that tra itors will be punish, Kim Gong Un executed his powerful uncle Gang Song-take who held accountable for being traitor that wanted to get the power Kim Gong LLC has. According to Goldman, Russell. ââ¬Å"Kim Gong-nun's Bloody Path to Power. â⬠BBC News. Web. ââ¬Å"Purging and killing suspected rivals or officers with wavering loyalty has been a trait of the family dynasty along with unusual means of execution, which have included death by close range mortarsâ⬠Because Kim Gong UN is feared, people has too much devotion for him.And because of that, protecting his country has become secure. Kim Gong UN construct stronger army that can handle any modern time warfare with complete offensive and defensive capabilities. And promises people that no one will get hungry again. Another feared and powerful leader in our today's society is President Xi Jigging from China. President Xi articulated a simple but powerful vision to revive and restore the Chinese nation. After just two years in office, President Xi has advanced himself as a transformation leader, adopting an agenda that proposes to reform.President Xi has a mission to kill graft and corruption in his country, the campaign touch almost every corner of the government. According to Kiang Steven. CNN News. Web. The 61 -year-old leader, considered China's most powerful in decades, reiterated his ââ¬Å"zero-toleranceâ⬠stance, vowing to keep ââ¬Å"waving high the sword against corruptionâ⬠and ââ¬Å"fastening the cage of regulations. â⬠He took down former domestic security Czar Yanking, likely soon to become the most senior Chinese official ever to face corruption charges; General Xx Cachou, once the military's second-in- command; and Ling Joshua, a top aide to ex-President Huh Contain.For the sake of stability of china's nation, President Xi wanted to prove the people in china hat he will not tolerate deception and betrayal to their own county whether they are high ranking officials or lo w ranking officials. Lastly, President Vladimir Putting of Russia has a remarkable grip on power in today's society. He became prime minister in 1999. That lasted until 2000, when he switched to president, which lasted until 2008. Then he became prime minister again until 2012. He then went back to being the president of Russia, an office he's held since May 2012. According to Kamikazes, Cork. Endearingly. Web. No one would call Vladimir Putting a good guy,â⬠Forbes staffer Caroline Howard wrote. In 2014 he strong-armed his way into possession of Crimea and waged an ugly proxy war in neighboring Ukraine, during which an almost certainly Russian-supplied surface-to-air missile downed a civilian jetliner. â⬠President Putting is the kind of man who does what he wants and sin ââ¬Ët backing down from his ambitions no matter what everyone say. Because Putting is aiming Ukraine to instigate maximum damage since he wants to reconstitute Russia, President Putting sent tanks and artillery into eastern Ukraine and he knows that the west won't interfere. Essay
Subscribe to:
Posts (Atom)