Impacts of Cyber Inecurity

Impacts of Cyber Inecurity

Name

Institution

Year

Introduction

Cyber security is one of the major concerns in this fast-growing field of technology. Most people blindly use the technology mainly in communication and social media without taking any precautions to secure their personal information and data. The increased cases of hacking on individuals, companies, and governments is worrying and demands urgent actions to address the issue. More so is the rising cases of theft of personal data from customers and patients where it is then sold on online black markets for billions of dollars. The danger lies in the uncensored exposure of innocent individual’s personal data that is later used to threaten and steal from them on the online platforms. Over the years, the sensitization and public outcry over hacking and insecurity on the online platforms has raised the alarm that is helping combat the problem. However, a huge problem lies within the uncontrolled cases of hacking where millions of cyber insecurity issue are reported. The solution lies in the close collaboration between the governments and tech experts who can help crack down on the perpetrators of these evil acts. Just in 2019 alone, there were more than 2.5 million cases of attempted and successful hacks that mainly targeted customers in the online business and even air travel.

Just the past 8 months, the FBI reported that the Federal Reserve of the U.S. was a victim of almost 2500 attempted hacks. These figures show that the hackers and only criminals have no limits and will do anything to get even to the most secure systems (Kshetri, 2017). Moreover, the government has been called upon to come up with the right systems that will help safeguard the online data of its people that if exposed to the criminals can even pose a national security problem. There is thus a personal and national concern when it comes to issues of cyber security. Another outlook into the issue is the co-relations between the underlying factors that touch on tech security and the usage over its widely spreading reaches (Ekstedt et al., 2015). The internet has become a common tool that is facilitating the sharing of data between individuals, companies, and governments. Through the same avenue, online criminals and inventing ways to bypass this and acquire key personal and financial information from the people. Studies have shown that 2.7 billion dollars are stolen through cyber related hackings from customers and even governments (Kharchenko et al., 2019). These mischievous activities happen with little detection from the cyber security experts who are meant to crack down and stop these acts.

Effect of cyber insecurity on business and customer security

Cyber security has been highlighted as one of the core issues modern business have to address. Almost all businesses today operate within or under a set of full tech systems that involves communication, payments, and customer services (Soomro et al., 2016). This exposes them to the cyber security issues of this age and thus a major setback to their security and stability. One of the underlying factors in this business is the inclusive value and that posed by these cyber security problems on businesses studies shows that at least 45% of modern business receive cyber security threats or hacking attempts every year. The figures have been rising thus showing the agility and increased attempts by the online criminals to penetrate the business files (Ji et al., 2016). A case in point was like the 2015 Yahoo hacking that raised global attention over the security of customer data. Cyber insecurity is harmful to businesses and has an overall effect of cutting down customer loyalty. Cyber security is targeted to become a multi-billion-dollar industry as the risks of hacking continue to rise (Rashid et al., 2018). The exposure of online data from customers who seek online services is offering an outlet for criminals to conduct their activities.

In some extreme cases, cyber insecurity has led to loss of cash where some businesses accounts are hacked and money transferred in mysterious ways. One of the main threats that businesses face is theft of customer data (Hubbard & Seiersen, 2016). Most e-commerce firms across the w rod now have to spend millions of dollars in cyber security to safeguard their customer data as well as finances (Kharchenko et al., 2019). The issue adds to the burden of doing business thus increasing the pressure on the existing value and dynamics of doing business. The threat not only exists among the ecommerce firms but almost all businesses as they are now exposed to the modern technology. The theft of this vital information not only threatens the companies but the customer safety as already seen in the health records scandals around the world. The cyber criminals know that the key to inducing harm to a company is to steal customer data where they threaten to sell the personal information. To online buyers. These risky ad dangerous moves by online criminals are responsible for the rising cases of customer loyalty decline where some cases lead to lawsuits (Shapsough et al., 2015). The end game to these hackings is the increased fear by customers to trade online and the huge financial burden the business has to bear in protecting their customers and data.

Impact of cyber insecurity on government operation

Cyber insecurity has been a major issue at the governmental level with many countries reporting attempted hackings. Online criminals seek to terrorize and steal critical government information and data through its websites and this even poses national security threat (Van Schaik et al., 2017). The U.S. Federal government reports an average of 2500 hackings annually that often come from its rivals like China and Russia. The online criminals have mastered the new way to target the government by using the lower agencies and ministries that are more vulnerable and easier to hit (Tisdale, 2015). The impact of cyber insecurity is very sensitive when it is done to the government as it poses both economic and national security risk that can endanger the stability of a country. One of the key targets for online hackers is the political establishments and state of a country that are the pillars of the country’s stability (Srinivas et al., 2019). For example, the 2016 Russian hacking on the Democratic party in the U.S. shows how the situation can be dangerous when it goes unnoticed.

The impact of the cyber security at a national level is the possibility of conflict between countries that can even lead to war. China is accused of conducting ample hacks on the U.S. treasury that was almost promoting diplomatic chaos between the two giants back in 2014 (Kharchenko et al., 2019). These mischievous online business by government hackers who mainly work secretly for the government can be dangerous and harm relations between countries. Cybercrime has been noted by the UN as a major hindrance to diplomatic relations mainly between the democratic and communist countries. Iran which has been a major concern for many countries has been accused of hiring and protecting its hackers who often target the U.S. these relations that have been derailed by the increased tense atmosphere on the online platforms has stained the links between countries (Soomro et al., 2016).

Cyber security at governmental level also targets the military sector that is a prime source of a country’s security data. Hackers target this prime sector as it can provide the enemy an edge on the weapon development and defense tactics used by its enemy (Hubbard & Seiersen, 2016). The increased cases of hacks on the military departments of other countries has become a major concern for NATO and the UN as some of the global society bodies. The U.S. has even accused China od hacking into its weaponry departments and stealing vital and sensitive data that it uses to gain an edge over its enemy. For example, the U.S. accused China if hacking into its drone development system thus causing a major setback to the underlying and existing diplomatic ties (Shapsough et al., 2015). These acts have even led to some countries calling back their envoys and closing consulates as a retaliatory measure. The effect of cyber security at governmental level can thus be far reaching ad dangerous when not handled in a mature manner. Many governments report cases of hacking in their financial reserves that threatens their security and economic viability (Rashid et al., 2018). Moreover, there is a concern over what and how the measures can be directed to harnessed the right technology to help curb cases of hacking and cyber security.

Impact of cyber insecurity on personal privacy

Cyber security at a personal level has never been more concerning than now at a time when the rate of technology use is rising. There is a major concern over what many people expose on the internet and the safety that comes with this platform (Van Schaik et al., 2017). One of the key aspects of internet security relates to the theft of personal sensitive data that relates to the individual’s life. For example, hackers target the frequent intern users mainly on the social media. Hidden cameras in hotel rooms and spying done on the home-based cameras shows the increasing sensitivity of the mater. cyber security at a personal level has to do with the increasing cases of diverse internet use that shows that technology can be costly to people (Hubbard & Seiersen, 2016). The online hackers who often target social media users have identified a prime field where people pay less attention to their safety. One of the main ways technology is affecting personal security relates to the loss of vital details that can threaten one’s physical security.

Cyber security also shows that many people often lose their credit card details when they shop online or pay for ai tickets. Airports have also been hacked where vital personal data of that belong to travelers is lost and sold by hackers on the dark web (Kharchenko et al., 2019). One of the key shortages of the key concerns over the cyber security is the way personal data can be protected from online criminals who use to it to threaten and extort money. For example, online hacks on personal data is often sold to criminals who use it to carry out financial hacks on the customers. Still, the value of key aspects of online insecurity goes beyond personal information that often touches on what the individuals would use as security in various applications (Soomro et al., 2016). The special media accounts have remained the prime target used by the hackers who capitalize on the reckless intent users. Today, more than 25 million social media accounts are hacked every year that target the young people who pay less attention to their online security. One of the main ways the online hacking threatens the security of individual is like in tracing the location of the individual. Online hackers also target social media accounts for companies and businesses where they steal customer data. Still, these activities are conducted under the radar that often makes it hard for the security personnel to identify the source of the threat (Van Schaik et al., 2017). The common personal information stolen from individuals include the credit card data, photos, personal videos, or even financial records.

Cyber security evaluated the relationship between cyber security and personal safety where key aspects of online safety was addressed. One of the main ways the online security is a major issue as noted in the study is that most people have zero knowledge on their online safety (Hubbard & Seiersen, 2016). The scholar also identified that the value of an inclusive value that is attached to online safety has become a major concern for most people. Most of the online users have increasingly become sensitive to the information they share with their peers. The study also found that cyber security will increasingly become a sensitive issue that is tied to the technology use. Over the years, the need for a robust and strong cyber security system has shown that the world is far from attaining the right security. One of the main ways cyber security is being addressed is by bringing together viable avenues that can help address the right security issues that exist on the online platforms. Theft of online data by hackers is already posing a challenge to businesses that are having to invest millions of dollars to secure customer data (Hubbard & Seiersen, 2016). The study sums up that there is need to have a combined effort that can address rising threats of cyber security to ensure online safety.

Cyber security analyzed the reasons for the rising threats to cyber security mainly at busines and personal level. One of the main ways companies and individual are putting measures to protect their information is by hiring the right experts or programs that can help safeguard their privacy (Shapsough et al., 2015). The major issue here lies in the possibility of a diverse and strong security systems that can help eliminate the problem of data security. Most people who face online security threats have testified that they originate from a single source and this makes it easy to track. However, online hackers have mastered the loopholes that exist in technology use and thus capitalize on these weaknesses to harm or threaten the individuals (Van Schaik et al., 2017). The study concludes that the viability of the online security measures in a bid to upgrade cyber security has to match or be ahead of the various technological gains.

The statement implies that the safety on the online platforms needs to be evaluated regularly to ensure that any loopholes identified is addressed with the right technology. The approach will not only safeguard customer data nut also increase the leverage on the use and safety of the internet and other technologies. Moreover, the increased threats that lie within the online technology like in use of computers and smartphones needs to be addressed by creating the right barriers (Hubbard & Seiersen, 2016). The key to ensuring strong cyber security is to always stay ahead of the online criminals by identifying the key loopholes that they may sue in trying to sabotage and ruin the online business.

Conclusion

Theft of customer data mainly for online companies has come at a huge financial and loyalty cost for the firms. Victims of the cyber insecurity issues continue to rise and this puts more risk to online business. Governments are also facing acute challenges when securing the financial and military data from hackers. The problem shows how deep the issue of cyber security has gone and thus urgent solutions are needed to keep the world secure ad safeguard the integrity of the fast-developing technology. Over the years, efforts and huge amounts of money has been poured to the upgrading of cyber security systems mainly in the governmental platforms that have remained a key target by hackers. For this reason, some progress is being made that is helping bring the issue to some control and thus enabling the problem to put under control. One of the major problems realized in the past two years is the by passing of even the most secure cyber security systems that is raising concern of how best the online platforms can be secured. Studies have showed that most people are now aware of the threat that exists relating to cyber security and thus are taking some precaution to safeguard themselves from this problem. Even with the huge efforts being made, the online hackers are upping their game by coming up with high tech software and programs that spy and bypass the secure systems and this points to a very worrying issue of the preparedness of the tech companies.

References

Ekstedt, M., Johnson, P., Lagerström, R., Gorton, D., Nydrén, J., & Shahzad, K. (2015, September). Securi cad by foreseeti: A cad tool for enterprise cyber security management. In 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (pp. 152-155). IEEE.

Hubbard, D. W., & Seiersen, R. (2016). How to measure anything in cybersecurity risk. Hoboken: Wiley.

Ji, X., Yu, H., Fan, G., & Fu, W. (2016, May). Attack-defense trees based cyber security analysis for CPSs. In 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 693-698). IEEE.

Kharchenko, V., Dotsenko, S., Illiashenko, O., & Kamenskyi, S. (2019, June). Integrated Cyber Safety & Security Management System: Industry 4.0 Issue. In 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT) (pp. 197-201). IEEE.

Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038.

Rashid, A., Danezis, G., Chivers, H., Lupu, E., Martin, A., Lewis, M., & Peersman, C. (2018). Scoping the cyber security body of knowledge. IEEE Security & Privacy, 16(3), 96-102.

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F., & Al Ali, A. R. (2015, October). Smart grid cyber security: Challenges and solutions. In 2015 International conference on smart grid and clean energy technologies (ICSGCE) (pp. 170-175). IEEE.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.

Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178-188.

Tisdale, S. M. (2015). Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective. Issues in Information Systems, 16(3).

Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547-559.

3D printing technology

3D printing technology

The emergence and continued advances of the 3D technology have been closely associated with having both positive and negative effects and impacts at the social and environmental levels of our contemporary. On the positive hand, the advent of 3D printing technologies remains to be praised for promoting and sustaining a culture of innovation in the designing and production of products in the society. As an emphasis, according to the available literature, the 3D printing has resulted to innovative materials and new patterns of objects whose competitive value can only be exploited using 3D.

Advances and the increased acceptance of 3D printing are expected to continue changing the manufacturing industry as we know it today. Overall, with promising continued advancement of 3D printing technology in the future, and the competitive advantage such promises in terms of cost, efficiency, and reliability, the near future and beyond of 3D printing technology is bright.

In terms of cost, the cost 3D printing is in essence expected to continue enjoying rapid declines over the new five years. The claim is based on the truth that the technology has witnessed decreases in cost over the past few decades, a trend expected to progress and increase in future as the technology continues to appreciate rapid advancements and favorable conditions for exploiting the competitive value that come with economics of scale in its market. In addition, the future of 3D printing technology is quite promising in terms of efficiency and accessibility since possible trends of declines in the costs will translate to increased ability to access and use this technology by many in the society.

It is likely that regulatory bodies will move in to pass strict laws to the entry of the industry. For instance, there is a continued trend in focusing the FDM and poly jet technologies in the 3D printing of bio-compatible materials as a competitive platform for enabling the speedy prototyping of medical and dental products. Medical security cannot be placed in the hands of individual and the private sector for this matter. We can, therefore, hypothesize that the industry is definitely going to grow steadily in a series of few years but will begin to retard with the emergence of new rules following the pursuit to act ethically. Mostly governments and states will seek to make public all 3D printers.

Recommendations for future research

It is evident that the research on 3D printing has a long way to go. In the future, there should be a platform for researchers to pool all their research findings in order to improve the existing 3D printing machine. The ability of this machine is associated with the coming up with shapes that cannot be obtained in any other way. Simply put, this machine enhances creativity of the highest order. The world is going through a threat of waste management and the use of this technology will mean frequent recycling of waste materials and hence reducing pollution (Wang & Chen, 2014; Lipson & Kurman, 2013). These machines can be made to use the available materials only. For instance, where the customer has plastics, metals, glass, wood, food and even living cells a machine suitable to using such material can be made. This means a wide applicability of 3D printing technology in the near future and beyond.

Reference

Free, D. 2012. University of Nevada-Reno Library offers 3-D printing. College & Research Libraries News 73(8): 455.

3Ex Response Outline

Student’s Name

Course

Instructor

Date

3Ex Response Outline

Thesis: I disagree with the point that Google has made people lack concentration and contemplation because Google does not only provide the most accurate results, but it is also free and has exceptional filtering options.

Body Paragraph One: First, I disagree because Google has been known over the years since the emergence of the internet to provide reliable and efficient results.

Example One: Google enhances user engagement by removing spinning content, spamming text, and information enhanced via unnatural link schemes (Kurmar and Bervell 3)

Explanation One: A person can find answers to your questions using Google to find a term or sentence. Its values include which publications and postings are the most pertinent for a search keyword by taking into account user activity.

Body Paragraph Two: Secondly, I disagree because Google is free to access. There is no charge required to access information that is available on Google.

Example Two: A person only needs a gadget such as a computer, laptop, tablet, or smartphone and access to an internet connection. Being free gives students and scholars much information (Surdasana et al. 3).

Explanation Two: Students do not have to buy physical books, which are more costly. Academics and students can use Google Books, which now has a more user-friendly interface, to explore books, examine writer bios, and navigate among publications.

Body Paragraph Three: Lastly, I disagree because Google has spectacular filter tools which help focus on particular items that a user wants to find.

Example Three: In Google, other manual techniques are referred to as operators, which enable you to obtain more precise results (Haim et al. 334).

Explanation Three: The filtering options enable users to find information in a specific language, from a specific time or date, and in a particular format, depending on which is relevant.

Work Cited

Haim, Mario, Andreas Graefe, and Hans-Bernd Brosius. “Burst of the filter bubble? Effects of personalization on the diversity of Google News.” Digital journalism 6.3 (2018): 330-343. https://www.tandfonline.com/doi/abs/10.1080/21670811.2017.1338145?journalCode=rdij2Kumar, Jeya Amantha, and Brandford Bervell. “Google Classroom for mobile learning in higher education: Modelling the initial perceptions of students.” Education and Information Technologies 24.2 (2019): 1793-1817. https://www.researchgate.net/profile/Brandford Bervell/publication/330298788Sudarsana, I. Ketut, et al. “The use of Google classroom in the learning process.” Journal of Physics: Conference Series. Vol. 1175. No. 1. IOP Publishing, 2019. https://iopscience.iop.org/article/10.1088/1742-6596/1175/1/012165/pdf

Importance of paid-in capital separated from earned capital

Equity Paper

Contents

TOC o “1-3” h z u HYPERLINK l “_Toc377198043” Introduction PAGEREF _Toc377198043 h 1

HYPERLINK l “_Toc377198044” Importance of paid-in capital separated from earned capital PAGEREF _Toc377198044 h 1

HYPERLINK l “_Toc377198045” Paid-in capital or earned capital PAGEREF _Toc377198045 h 2

HYPERLINK l “_Toc377198046” Basic earnings per share or Diluted earnings per share PAGEREF _Toc377198046 h 3

HYPERLINK l “_Toc377198047” Conclusion PAGEREF _Toc377198047 h 4

IntroductionStockholders’ Equity has two sources of capital which include paid-in capital and earned capital. Paid-in capital must be kept alienated from earned capital to avoid misinterpretation of the sources which facilitate a clear distinction from operational capital acquired from profit making operation. Most of the investors are majorly concerned with the earned capital compared to the paid in capital. The reason behind this preference is the facts that earned capital represent the earning potential of a firm. Another major aspect is the dilution earning which is more detailed unlike the basic earnings per share earnings.

Importance of paid-in capital separated from earned capitalPaid-in capital is the capital that is raised from the sale of capital stock in the stock markets in form of shares while on the other hand, earned capital is the funds that a company or firm is able to acquire in form of profit accrued by the sale of services and goods. Both capitals are very significant to the growth and expansion of the firm’s operations. However, investors find it necessary to separate the two capitals because of several reasons.

Kimmel, et al (2010, P.577) observe that one reason for separating the two source of capital are very distinct funding source and that paid-in capital signifies the funds to be used in the enhancement of the earned capital. On the other hand, earned capital symbolises the funds accrued from the profitability of the operation of the firm and combining the two sources would lead to confusion. That is, the paid in capital accelerates and boost the earned capital. The intension of combining the two source of capital will lead to a misinterpretation and misrepresentation of the overall earning of the firm. Not only that, but can also cause complexity in calculations in regards to profits margins. The two sources of capital must be separated so that the shareholders and investors information can be clearly distinguished from one another.

The two capitals must be distinguishable in such a way that it provides a form of protection to companies offering capital in excess thus protect creditors and investors in case of liquidation. This is because the two values of capital depict the strength of the firm financially. Investors must be aware of the manipulation of earning which will be rendered difficult if the two capitals are combined making it very difficult to convince them on the method used to compute the earning.

Paid-in capital or earned capitalMajority of the investors in most case are concerned with the firm’s earned capital other than the paid-in capital. The reason behind this is that earned capital is a representation of the potential earnings that a firm can generate through it day to day operations. Therefore investors would like to venture into a business that yield dividend as per their expectation. While on the other hand, paid-in capital is the capital raised from the subscription of the shareholders through the sale of capital shares thus represent the capital that is invested by the shareholders and does not in any way represent the profitability of the firm. Despite the importance of the two forms of capital, paid-in capital is more significant that earned capital. Paid–in capital represents the amount the investors have raised above the par values of the firm’s stock. The par value is very important in calculating the stability of the firms in terms of financial status (Kimmel, et al, 2010, P.577).

As per the investor’s opinions, firms could rather earn money via operations other than selling capital stock. This is because the firm reporting their financial status using earned capital reveals their financial value to the stakeholders while on the other hand the firm that report using their paid-in capital in excess of the already earned capital does not necessarily imply that the firm is experiencing good investment opportunities. Brigham and Houston (2009, p.197) noted that earnings capital is also generally well thought-out as single and the most significant variable that is used in determining the share price in the market. Other issue that make an investor preference is that it is used in the computation of price to earnings valuation ration.

Basic earnings per share or Diluted earnings per shareThe diluted earnings per share is very important to all the venturing investors because of its detailed nature bearing a lot of information regarding the firms operation. This gives full details to the investors regarding the firm’s financial status for several duration of time unlike the basic earnings per share which is less detailed and lack vital and relevant information that allow an investor to make decisions. The diluted earnings as per each share reveals to the investors all the dilutive shares that are outstanding in a given financial period. As for the investor, it is important to inspect the diluted earnings per share because of it ideal computational techniques which shows the general and basic earning of the firm per share or dividends. Another reason for preference of diluted earnings per share is because of the fact that basic EPS does not take into account the potential dilutive impacts of the companies’ securities. Lacks of dilutive securities scare away potential investor due to lack of protection from the securities which can easily be converted into stock. The suitability of the diluted earnings per share is the calculation that is associates with it which is simple in the calculation of per share capital and dividends raised.

The reason why most investor opt for diluted earnings per share is because of it inclusion of the issues of security analysis. This therefore dictates that most investors do analyse the company presentation in terms of prospective investments. That is, majority of investors would opt to evaluate companies as a potential ventures by the use of the diluted earnings per share scheme (Stickney, et al, 2009, p.27).

ConclusionIt is wise to keep the earned capital alienated from the paid-in capital so as to avoid major issues that may lead to misinterpretation of the source in the final account balancing and also avoid the confusion that result from the unknown source of capital. Majorly, investors prefer to use earned capital instead of paid in capital because of its inclusions of security component. On the other hand dilution of earnings per share is embraced by the investors because of its detailed nature.

References

Brigham, E.F., & Houston, J.F. (2009). Fundamentals of Financial Management. Chicago:Cengage Learning. p.191-201.

Kimmel, P.D., Donald, Jerry, E.K., & Weygandt, J.(2010). Financial Accounting: Tools for Business Decision Making. New York, NY:John Wiley and Sons. p.570-597.

Stickney, C.P., Weil, R.L., Schipper, K., & Francis, J. (2009). Financial accounting: an introduction to concepts, methods, and uses. Chicago:Cengage Learning. P.25-31.

Importance of Unions and collective bargaining in the current economic condition

Employment Relationships

Name:

Professor

Institution

Course:

Date:

Importance of Unions and collective bargaining in the current economic condition

Collective bargaining refers to a tool or mechanism in industrial relations, which is used for the purpose of negotiation. It is a vital aspect in any employment relationship, in an organization. Unions have a role to play in collective bargaining as well as in negotiating. The latter represents the collective interest of all its members at the work place. Often, there is a public interest in matters concerning negotiations, as this is related to labor laws. Governments have a role to play in collective bargaining as they are responsible for workers in their country. According to the International Labor Organization, collective bargaining refers to voluntary negotiation, which exists in organizations, and it involves employers and their employees. They must all be aware that there are certain conditions and terms, which exist during this process. Furthermore, both parties should strive towards reaching an agreement (Susseles & Magid, 2005).

According to the unitary view, the employee and the employer must have an interesting identity. In case, there are any conflicts it is due to mischief or misunderstanding by the parties involved. Most times those in managerial positions over look this view as they believe that the employees share the same goals as them (Hogler, 2005). This means that it is associated with the approach that focuses on traditional human relations. Before, this approach was viewed as being unrealistic as well as old fashioned. This view has currently been done away with as it does not bring desirable advantages to organizations. Most managers used to deal with the employees directly and did not want any union members to be present during negotiations.

A system, which is political, should exist among various pressure groups, and this is according to an outlook, which is pluralistic. Some of these pressure groups include; political parties, unions, religious groups and business associations. Concessions can be made by the government in order to arrive at a compromise through effective dialogue. Pluralism advocates for there to be an intermediary during the process of negotiation. Democracy is achieved when the various groups are involved in collective bargaining (McDonald, 2000). It ensures that checks and balances exist, and this is extremely desirable. This means that, in organizations, which are pluralist, stability is brought about by collective bargaining. The latter is viewed as a tool, which is fundamental, in the process of negotiation. Moreover, unions and collective bargaining enhance freedom among employees. They will work well knowing that, in case of any work related problems, they will be represented.

Settlement is easily achieved through consensus and dialogue when collective bargaining is used during employee relations. This is far off better than using the approach of confrontation and conflict, which has a negative impact. Organizations, which do not use collective bargaining often, leave solutions to be determined by third parties. In collective bargaining, it is the party members who make decisions regarding their problems. In such economic times, making appropriate decisions and in a timely manner is needed. When all the parties are happy, work will resume, and this will be advantageous to the organization (Palokangas, 2000).

Collective bargaining leads to dialogue and in turn, brings about institutionalized settlement. Various methods of collective bargaining ensure that a decision will be made easily. It helps in forecasting whether there is a chance that an agreement will be achieved. In turn, disagreements will exist in the organization, and this will lead to more problems. When employers and employees are involved in collective bargaining, it enhances participation (Tyler, 2005). The union members and the employees all decide on what should be done about the situation at hand. Furthermore, it is a method of ensuring that power and rule making is shared. Before, matters concerning making rules were a function of those in top management. The latter were the only ones responsible for factors such as modernization, redundancy, transfer promotions and discipline. However, in some countries, like Malaysia and Singapore, some work functions are not accepted by law. They include; layoffs, promotions, transfers, retrenchments and promotions, among others.

Through the use of collective bargaining, disputes are settled through the actions of trade unions. In turn, industrial peace is easily achieved as the agreements guarantee it. In this modern time when there are many economic problems, this is extremely desirable. When peace prevails, workers focus their attention on working and this increases productivity. On the other hand, when workers are not at peace they will not focus on their jobs. The result is that the organization may lose out on profits, which it would be making (Armstrong & Goodman, 2009). Labor relations in many organizations are striving because of the social partnerships, which have been brought about by collective bargaining. This means that there will be mutually beneficial relationships between organized labor institutions and employer institutions. In turn, in case any disputes arise the employees and employees will be prepared. Collective bargaining leads to the maintenance of process of negotiation, which is non-confrontational.

The relationship, which exists between the parties benefits through by- products obtained from collective bargaining. Trust is created and enhanced due to the dealings that are considered being bona fide and successful. Furthermore, union members, employees and employers have a relationship, which is mutual. This means that it will lead to solving problems, rather than attacking the various party members. Union membership is stabilized through consequent bargains and collective bargaining. It will ensure that employees and employers do not keep on changing their union loyalties. When employees keep on changing their union membership, it affects the organization as it is expensive. Disputes, which exist between various unions, might lead to rivalry. Thus, union loyalty is a vital aspect of the process of collective bargaining (Wajcman, 2000).

Collective bargaining usually takes place at three levels, and these are enterprise, industry and national levels (Forth & Millward, 2000). No country in the world where it places exclusively on one level. In the United States, most collective bargains procedures take place at the enterprise level. It occurs in all other areas except for industries such as construction, trucking, steel and coal. According to research, it has been found out that performance of employees is enhanced when there is bargaining at the industry level. Employees believe that they have security, which is in the form of trade unions to offer them support. It is a common site in the media to hear that workers are striking, and they are not worried about losing their jobs.

The European Union is fully aware about the role, which unions and collective bargains play in this economic crisis. This means that its member countries will have to come up with standardized policies, which focus on collective bargaining. The European Monetary Union seeks to ensure that unions benefit from adjustments of exchange rates. As a member of the European Union, it will be easy to benefit from issues that affect organizations that are unionized. Furthermore, organizations will now be competitive and know how to balance off inequalities (Glassner & Watt, 2010). Moreover, there is a need for organizations to adjust the wages of their employees in order to meet the expectations of the European Union. Organizations were worried that the money regime, which exists, would make want to stop working. Fortunately, Europeans organizations have come up with effective instruments, which are known as wage formulas. In the public sector, many of the employees have had their salaries drastically reduced. Organizations in, which employees are in unions, are the ones which have not been affected as much by this crisis. They have actively negotiated with their employees. It has even reached a point whereby, some employees are given counter offers, so as not to go and work in the United States. It must be known that, in the future, such unions will be the ones, which will run matters concerning employee relationships.

In conclusion, the pluralist approach should be used by employers who are in managerial positions, in various organizations. It has been found out in various studies that employment relationships are strengthened through the process of collective bargaining. Most employees are now fully aware of their rights, and that is why they have joined various unions. The economy crisis affecting the world has made negotiations, and collective bargaining become hard to deal with. Fortunately, organizations have found ways to be constructive and gain from collective bargaining and becoming unionized.

References

Glassner, Vera. & Watt, Andrew. (2010). The Current Crisis reveals both : the importance and the limitations of the transnational coordination of collective bargaining policies. Social Europe Journal. 15, 45-78.

Forth, J. & Millward, N. (2000) High involvement management, unions and pay, mimeo,

National Institute of Social and Economic Research

Palokangas, T. (2000) Labour Unions, Public Policy and Economic Growth, Cambridge:

Cambridge University Press

Wajcman, J. (2000) Feminism Facing Industrial Relations in Britain’, British Journal of IndustrialRelations, 38, 2, 183-202.

Ackers, P. (2002) .Reframing employment relations: the case for neo-pluralism, Industrial

Relations Journal, 33, 1, 2–19.

Armstrong, P. & Goodman, J. (2009). Managerial and supervisory custom and

practice, Industrial Relations Journal, 10, 3, 12–24.

McDonald, Kathlene. (2000). Same goals, but another way of getting there.

Social Policy, 30, 4, 23.

Susseles, Elliot. & Magid, Marcia. (2005). “Pay for Performance in the Public Sector.” Benefits & Compensation Digest. 42, 1, 32-35.

Hogler, R. (2005). “The Changing Role of Unions: New Forms of Representation.” Choice, 42, 7, 1273

Tyler, Kathryn. (2005). Good-Faith Bargaining.” HR Focus, 50, 1, 8-53.

Freeman, Richard. (2005). What Do Unions Do? Journal of Labor Research, 26, 4,641-668.

Collective Bargaining Outlook: Expect a Hard Line on Benefits. HR Focus. 82, 4, 9.

0b_0b_0b_networking_for_a_charity

Networking for a Charity

Student Name

Institution Affiliation

Peer-to-peer networks

The networking set up has improved with the latest versions of windows. Specifically, connecting the computers correctly prompts windows to set up the appropriate settings automatically. Windows 7 enables a user to ‘save’ a wireless connection for automatic connection when the computer comes close to the network. For that to happen, first, each computer has to have a network interface card (NIC), for example USB network adapter, internal network adapter, a network PC card, and a mother-board based network chip. An external router is also needed. The user must activate DHCP (Dynamic Host Control protocol) on the router. The DHCP automatically assigns different/unique IP addresses to the computers connected to the network. The network cable should run from the NIC to the router ports. In case of a high-speed modem, the user can run a network cable from the WAN port in the router and into the modem’s network port. This process ensures that all the six computers can share internet connection. In addition, all commuters must have unique names and use the same workgroup name.

Internet, files, and devices sharing in a network

Sharing of devices such as printers in many workplaces brings convenience and cost efficiency. Sharing printers in a network involves connecting it to the host computer. The host computer then ‘shares’ the printer to all the network computers by allowing them to print over a LAN or internet connection. The main limitation of sharing printers using a host computer is that it must be on if any computer is to use the printer. If the user wants to print using a different computer on the same network, then they must have a network setup and a printer installed on the host computer. In addition to printers, networks can also share files such as documents, photos, and music among others. Joining a home group is the easiest way that one can use to share pictures, videos, music, documents, and printers as well. When joining a home group, a user has to instruct windows on which libraries and folders to share. A user can protect the home group settings using a password, which is changeable at any time. The ‘share with’ menu is the simplest way to share things, but a public folder offers another option.

Network security

Not many people have addressed the security issues with P2P networks. The problem comes with the requirement to provide anonymity for the users of P2P networks and the increasing need of providing data integrity, confidentiality, accountability, authentication, non-repudiation, and robust access control. Other problems affecting P2P networks include pseudospoofing attacks whereby malicious parties claim multiple identities, thus causing fundamental security threats. For example, the e-bay system reputation, which is a P2P system constantly, finds itself under pseudospoofing attacks (Damiani, 2002). The security of P2P networks becomes worse with the lack of centralized authority to vouch for security parameters or identities. However, features of the TCG specifications can be used to improve the network security. Specifically, using TGC protocols for DAA (Direct Anonymous Attestation) enforces the use of a stable platform-dependent pseudonyms and consequently reducing pseudospoofing in P2P networks.

Users can use runs of DAA protocols to build entity authentication at the level of pseudonyms and safely link it to secure channels using known end points. Many security services in networks rely on the user to establish stable identities (Rivest, 2005).

Hardware recommendations

A network enables computers to share resources between/among them. The computers to use in a network have to meet certain standards that are compatible to the operating system in use. There are many hardware components needed to create a network involve. A keyboard and a mouse are essential as they perform routine operations in a computer. There are wired and wireless versions of keyboards and mice. A monitor displays what the user is doing on the keyboard and mouse. A VGA cable connects the computer with the monitor. Printers are also important for the printing needs of the users in the networks.

Many printers are wireless although wired ones are also available at a lower price. Networks cables (comes in different colors such as yellow, red, and blue) connect many computers together. All these hardware devices are available at general stores, computer stores, or web stores over the internet. Computers are connected together using the serial ports. However, connecting many computers together needs one to use a central ‘object’ that connects all computers and other devices. This ‘object’ then distributes or manages the network traffic. Most users use a hub, router, or the switch as the ‘object’ at the center of a network.

The network also requires one to have network cards, which can be internal, external, or wireless. The network cards (NIC) connects a computer to the exterior. Most computers from big companies come with tested and ready network cards. The last party involved in a network is an ISP (Internet Service provider). This company connects the network and the internet. These involve local telephone companies and local TV cable companies. In addition, a firewall is needed to protect the network from potential intruders. Types of firewalls include software and hardware firewalls.

References

Damiani, E. (2002). A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In V. Atluri, editor, Proceeding s of the 9th ACM Conference on Computer and Communications Security, pages 207-216. ACM Press

Rivest. R. (2006). SDSI: A Simple Distributed Security Infrastructure, Revised. Presented at CRYPTO’96 Rumpssession.

1d_1d_1d_fourthfifth_and_sixth_ammendments

Fourth, Fifth and Sixth Amendments

Student’s Name

Professor

Course

Date

The Fourth, Fifth, and Sixth Amendment of the U.S. Constitution provide protection to US citizens during the various stages involved in the judicial processes. The fourth amendment was incorporated in the US constitution to change the way the police and other law enforcement agencies carry out searches (Becker, 2013). This was done in order to ensure the rights of a defendant are not violated during the process of carrying out searches .The fourth amendment prevents the carrying out of searches without search warrant. It gives the citizens of the United States of America the right to privacy by preventing the carrying out of searches and seizure by government officials or agencies without proper cause (Becker, 2013). Therefore this amendment prevents the government officials from carrying out searches on houses or properties without a warrant.

The Fifth Amendment on the other hand give the citizens the right to fair and speedy trial before any of their rights can be taken away from them by the US court. It also prevents the government from trying a defendant twice for the same crime (Becker, 2013). Furthermore it ensure that the citizens cannot be forced to testify against themselves in a court of law. This therefore protects the rights of the US citizens. Furthermore, it allows the government to take the properties of US citizen (Siegel, 2010).However, when this happens, the defendant is supposed to be compensated by the government according to the market value of the property that has be taken by the government. This further protects the fundamental right of the defendant.

The sixth amendment of the US constitution is also very important as it gives the defendant the right to be tried by an impartial jury (Becker, 2013). This ensures that justice prevails in the US courts. Moreover, it also gives the defendant the right to have an attorney in a court case. In cases where a defendant may not manage to pay for an attorney the government intervenes and appoints an attorney for him.

The sixth amendment offers the greatest protection to the defendant since it ensures that the defendant is given an impartial trial. This ensures that the defendant is not denied justice in the US court.

Reference

Becker, R. (2013).Criminal Investigation. Burlington: Jones and Barlet Publishers

Siegel, L. (2010).Introduction to Criminal Justice. Canada: Nelson Education Ltd

1 Demirci, Kadir, Mehmet Akgönül, and Abdullah Akpinar.

Demirci, Kadir, Mehmet Akgönül, and Abdullah Akpinar. "Relationship of smartphone use severity with sleep quality, depression, and anxiety in university students." Journal of behavioral addictions 4.2 (2015): 85-92.

Goldwasser, Amy. “What’s the Matter with Kids Today?” Salon, Salon.com, 14 Mar. 2008, https://www.salon.com/2008/03/14/kids_and_internet/.

Gámez-Guadix, Manuel, et al. "Longitudinal and reciprocal relations of cyberbullying with depression, substance use, and problematic internet use among adolescents." Journal of Adolescent Health 53.4 (2013): 446-452.

Livingstone, Sonia, and David R. Brake. "On the rapid rise of social networking sites: New findings and policy implications." Children & society 24.1 (2010): 75-83.

Khamis, Susie, Lawrence Ang, and Raymond Welling. "Self-branding,‘micro-celebrity’and the rise of Social Media Influencers." Celebrity studies 8.2 (2017): 191-208.

Kowalski, Robin M., et al. Cyberbullying: Bullying in the digital age. John Wiley & Sons, 2012

Newman, Nic. "The rise of social media and its impact on mainstream journalism." (2009).

Sharon, Tzlil, and Nicholas A. John. "Unpacking (the) secret: Anonymous social media and the impossibility of networked anonymity." new media & society 20.11 (2018): 4177-4194.

Turkle, Sherry. "Talk to Each Other, Not Your Phone." The New York Times (2015). 30 May 2018. <https://www.nytimes.com/2015/10/01/opinion/talk-to-each-other-not-your-phone.html>.

Twenge, Jean M., et al. "Increases in depressive symptoms, suicide-related outcomes, and suicide rates among US adolescents after 2010 and links to increased new media screen time." Clinical Psychological Science 6.1 (2018): 3-17.

Valkenburg, Patti M., Jochen Peter, and Alexander P. Schouten. "Friend networking sites and their relationship to adolescents’ well-being and social self-esteem." Cyberpsychology & Behavior 9.5 (2006): 584-590.

1st Ammendment of USA constitution

First Amendment

Student’s Name

Affiliation

Course

Date

Introduction

According to the first amendment of the constitution of United States of America, “Congress shall make no law respecting an establishment of religion, prohibiting free exercise or abridging freedom of speech; press the right of people to assemble and to petition the Government to readdress grievances”. It clearly stipulates that an individual right to practice religion is a fundamental right and should not be prohibited. According to the United States Constitution the freedom of speech, right peaceable assembly and freedom of press should not be infringed by religion view point.

During the years that have past there are various cases which the first amendment have been violated or put to test from various states. This cases deal with the infringement of rights and freedoms of individuals. The rights in the first amendment have been valuable to the free society, although they have been limited at some point. This is because when a person or entity takes advantage of this rights and the person is presenting a clear and present danger to the public, they should be limited when they endanger the public. Such a case as:

Stanley vs. Georgia (1969): The accused Stanley and arrested after, authority with warrants searched the home and found with films that were projected or deemed obscene. He was indicted, tried and convicted for obsession of obscene matter and was in violation of Georgia laws. The Supreme Court contended that statutes validity on obscenity is unconstitutional as an allegation was claimed on private possession of obscene matter and no evidence was found to indicate sale or expose or circulate content. Subsequently the first amendment prohibits making private possession of obscene material a crime. The Constitution protects the right to receive information regardless of social worth and free from government intrusions. Another case was one that defined the government’s obligations to respect, maintain and uphold legal rights of citizens in event of arrest.

Brandenburg vs. Ohio (1969): Clarence Brandenburg 1st amendments rights had been violated due to the fact that he had been punished for non criminal expression after his arrest. Clarence was a leader of the Ku Klux Klan he was recorded by a Cincinnati news station where his speech had racial slurs and which urged violence against African Americans and Jews. The state must preserve and protect an individual’s human rights and liberties (Olson, 2008). The Supreme Court ruled in favor of Brandenburg as the Ohio statute undermined the first amendment freedom of speech and expression. The Human rights which include respectful, fair and ethical treatment without violence and harm was the sentiments of the Ku Klux Rally were no immediate danger to the state. The Supreme Court distinguished between implied violence and violent acts. In the case below the violation of the first amendment right to access of criminal trials which were previously free to press and the public.

Globe Newspaper Company vs. Superior court (1982): The Massachusetts trial court provided for exclusion of press and public from courtroom case that involved a victim under the age of 18 and a defendant charged with rape of three minors. The Newspaper Company challenged the exclusion in the supreme judicial court it held that the fact that the exclusion order expired with completion of the trial at which the defendant was acquitted does not render the controversy moot within the meaning of Art. III. It held that by offering such protection it will serve to ensure individual citizens can participate in contributing to republican system of self government.

Massachusetts statute as construed by Massachusetts Supreme Judicial Court violated the first amendment that embraces the right to access criminal trials which ensures that the constitutionally protected discussion of government affairs is an informed one. The court noted that although it was in the interest of protection closure it would be advisable to let the victim testify as the names were already in the press (Wagman, 1991). The constitutional right of press and public to gain access on the trial would not be restricted only and only if it is to protect the states interest. The role in the judicial process is significant as such trials have historically been open to press and public. It was noted that it was for protection of the minor victim’s sex crimes from further trauma and embarrassment so as to encourage such victims to come forward.

Conclusion

The First Amendment is a part of the Bill of Rights in and the amendment which disables an entity or individual from practicing or enforcing a religious viewpoint which infringes on the freedom of speech, right peaceable assemble, freedom of press, a right of access to criminal trials and prohibits governmental evaluation of grievances. Without the First Amendment, religious minorities could be persecuted, the government might well establish a national religion, protesters could be silenced, the press could not criticize government, and citizens could not mobilize for social change.

The Supreme Court interpreted the first amendment as a profound national commitment on public issues that should be uninhibited, robust and wide-open. Freedom of speech was important in the history of America as women and the oppressed minorities could express there needs. This also assisted women to use the right to assemble and petition and gather more women as per the right of association

Reference

Wagman, R. J. (1991). The first amendment book (pp. 12-78) the University of Michigan: World Almanac Books

Olson, D. A. (2008) Cases on the first amendment (pp. 500-750) Vandeplas Publishing

Hybridity in the novel Ceremony

(Name)

(Instructors’ name)

(Course)

(Date)

Ceremony

By Leslie Marmon Silko

The novel, Ceremony, tells the story of a young man, a former fighter in the World War two, who returns home and seek to find healing from the emotional and physical wounds attained at war. Tayo, the main character in the book, takes a journey back home with the aim of achieving all of this, but when he finally gets home, he is confronted with past experiences with family and friends. At first, Tayo seeks for healing at the veteran hospital, but when he realizes that the hospital is not providing him with what he wants, he opts to leave the hospital and go back to his grandparents home. He believes that being back home with his grandparents will assist him deal with is issues but he realizes that this is not the case when he sinks into depression and drug abuse. In response to this, his grandmother seeks the help of a medicine man to perform a ceremonial ritual to help him heal. He engages in a number of ceremonies until he attains the healing he requires.

This paper examines the theme of hybridity in the novel ceremony by Leslie Marmon Silko. More specifically, the paper examines the different ways in which the theme of hybridity has been brought out in the novel, while drawing attention to the blending of poetry and prose, storytelling, mixed heritage, hazel eyes, and healing at the Veterans hospital and ceremony.

Theme of Hybridity

Hybridity is defined as a mixture of two or more phenomena that are considered different and separate from each other. Put simply, it is the process whereby two things become separated from their inherent practices, and recombine to form new practices. The theme of hybridity has widely been used in literature to signify a transformation from the old into the new, through amalgamation. The new hybrid forms that develop through this combination are an indication of the profound changes that take place as a consequence of hybridization. These changes can either be positive or negative depending on the nature of the change that has taken place. This, therefore, implies that hybridity changes how things used to be, as well as, how they are viewed by the society. In the novel, Ceremony, hybridity has been revealed in a number of ways. Readers are exposed to hybridity from the beginning of the book all the way to the end. Specifically, the theme of hybridity in the novel is brought out in various ways including storytelling, blending of poetry and prose, mixed heritage, hazel eyes, and healing at the Veterans hospital and ceremony.

Hybridity in Storytelling

In the novel, Ceremony, storytelling is not only a theme on its own; it is also used to bring out the theme of hybridity. Evidently, the novel is centered on the main character Tayo, and his return home from World War II. However, in the development of the novel’s plot, the author interweaves the stories of other individuals, such as Tayo’s friends and his community at large. Tayo’s story is unique and individually appealing, but the development of the novel into what it is could not have been possible if the author did not integrate the stories of others. In addition to this, Tayo, who is the main character in the book, seeks to find healing from his experiences, something he can only achieve together with his friends. Accordingly, the combination of the different stories in the book, leads to the creation of the novel, which is the hybrid in this particular case. Each character in the book has an individual story regarding his or her experiences, and the combination of these stories demonstrates the greatest form of hybridity in the novel.

Blending of poetry and prose

The second and most evident form of hybridity in the novel is brought out through the combination of poetry and prose in the novel. In essence, the author uses these two techniques of storytelling as a way of exposing to the readers the two main cultures that are central in the story, including the native Americans and the communities from the West. Both the two techniques are significant to one culture with the poetry style signifying the storytelling patterns in native America, whereas the prose signifies storytelling in the West. Through a combination of these two techniques, the author affirms the combination of cultures as the main content of the novel. In the story, the two cultures are in a constant clash with each other, though in the end, they come together to form a culture that is a combination of both but distinctively different from their cultural roots and background. The use of prose and poetry throughout the novel provides a clear illustration of this and it illustrates both the differences in the two cultures, as well as, provide the necessary combination to bring out the theme of hybridity. Though the combination of these techniques may, at the beginning, sound different and clash with each other, they complement each other in such a way that helps the readers understand the underlying meaning of the theme of hybridity in the novel.

Mixed heritage

The theme of hybridity in the novel is also brought out in the fact that Tayo, the main character of the novel, is of mixed heritage. As a character, Tayo embodies both the native American and Wetsren cultures as part of his identity, something that he struggles with throughout his lifetime. As the author tells Tayo’s story, the readers can see how this character has struggled with this combination, as he does not possess a clear identity as to the person he is. He is often portrayed as confused and in need of clarification, which illustrates one of the negative effects of hybridity. Tayo feels out of place at most times and he is not sure of whether to identify himself as a native American or a member of the Western community. Tayo’s mixed heritage brings out the theme of hybridity in the sense that it illustrates both the negative and positive effects of hybridity. At the outset, readers are exposed to the complications of being of a ‘combined’ culture being to the formation of a hybrid that has not been well defined. However, towards the end of the book, the readers are introduced to a new Tayo who has learnt to appreciate his combined cultural background. This, in turn, illustrates the positive aspect of hybridity owing to the formation of a new and different form.

Hazel eyes

In addition to being of mixed heritage, Tayo also has hazel eyes, which is a combination of the colors brown and green. Tayo’s hazel eyes indicate that he himself is a hybrid, as he is the offspring of parents who are Native American and Western. Additionally, his hazel eyes are an indication of the ways in which the world is changing as a result of hybridity. In a way, the society, as well as, Tayo is confused about the changes that are brought on by hybridity, but later on, they all learn to accept these changes as a way of positive development.

Healing at the Veterans hospital and Ceremony

Upon a closer examination of the plot and story of the novel ceremony, it is evident that the most of the characters in the book are in search of healing. This is especially applicable to Tayo, the main character in the book, as he wishes to heal from both the physical and emotional wounds attained from his experience in World War II. Tayo looks to find healing from numerous places, but there are only two places where he successfully manages to achieve this including the veterans hospital and the ceremony. These two places are filled with a various individuals from different cultural backgrounds, and they all come together are attain the healing they require as a combined force. In the veterans hospital, individuals from diverse cultural background come together and receive treatment as a group, with minimal discrimination because of their cultural background. The ceremonies are a representation of the different cultural traditions in the novel, and it is the only place where these two cultures meet and appreciate their authenticity as a group. Away from the ceremonies, the two groups have no considerations for each other and they discriminate against one another. However, in the ceremonies, they combine into one forget their differences, and carry out their ceremonies as a group. This, in turn, builds on the theme of hybridity in the novel.