Monday, December 30, 2019
Oku no Hosomichi and Tosa Nikki Compare and Contrast
Comparing Oku no Hosomichi and Tosa Nikki within reason is very difficult because of the many factors that must be taken into account. The authors were from different time periods, the writing style is different, the subject is different, and many other things all contribute to its difficulty. While there are many differences there are perhaps an equal number of similarities between the two works, which offers a converse view of the relationship between them. In regards to the authors of Oku no Hosomichi and Tosa Nikki, Matsuo BashÃ
and Ki no Tsurayuki respectively, there are several points of interest when comparing them. One of the main points is that the authors lived in completely different times, which shows in their style ofâ⬠¦show more contentâ⬠¦Oku no Hosomichi is arguably an evolved form of Tosa Nikki as it is reminiscent of the Tosa Nikki in many ways. Also in regards to religion, it is a very distinguishable point that there was a great deal of religion in Ok u no Hosomichi which was not present in Tosa Nikki. There are many easily discernable religious themes like impermanence, karma, and even Chinese concepts like yin and yang. This is a key point in looking at the Oku no Hosomichi because of the fact that Matsuo BashÃ
frequently referenced many famous religious poets like SaigyÃ
. In terms of rhetoric there is an emphasis on the poetry in both works. Much of the poetry in the Tosa Nikki reflects grief and tragedy which complements the overall theme of the work. Alternately, the Oku no Hosomichi has poetry that focuses on nature and distinguishes itself in its more blatant and somewhat vulgar advances. The poetry of the Tosa Nikki was also placed towards the occasion as an accompaniment and while the poetry of Oku no Hosomichi was also in accompaniment to the situation, BashÃ
many times also included the back story to the poem in detail. It is also important to note that the Tosa Nikki was written in a combination of pros e and the more traditional waka, while the Oku no Hosomichi was written in both prose and haiku. Also the writing of the Tosa Nikki was in Chinese characters mainly because the
Sunday, December 22, 2019
Essay about The Iliad of Homer - 1055 Words
The Iliad is the quintessential epic. It is full with gods, goddesses, heroes, war, honor, glory, and the like. However, for just short while near the very conclusion Homer avoids all of those epic qualities. The banquet scene in Book XXIV is the most touching, the most ââ¬Å"humanâ⬠scene in the entire poem . In the midst of the dreadful gulf of war and anger there occurs an intimate moment between two men who ironically have much in common below the surface. Priam, old and fragile, makes his way to the camp of the enemyââ¬â¢s greatest warrior late at night. He bears what little treasures have not been exhausted by the ten-year conflict and plans to plead for the rightful return of his sonââ¬â¢s body. This is his final heroic endeavor. And perhaps,â⬠¦show more contentâ⬠¦He calls upon his attendants to remove Priamââ¬â¢s gifts from the wagon and prepare Hektorââ¬â¢s body so that his mournful father may carry him home. But extraordinarily when the body has been washed and wrapped it is Achilles himself that embraces Hektor up and places him in the wagon. At the same time he is embracing his own inevitable fate. Upon returning Achilles invites Priam to join him for supper and reminds him that, mournful as they may be, they must remember to eat. Neither has eaten in days but now it is as if a great weight has been lifted from each manââ¬â¢s heart and a strange healing power has surfaced. Finally relieved, they are able to satisfy one of their basic human needs. Again, Achilles assumes the role of the elder of the two and shares with the old king a story to support his decision to have supper. Again, though he has accepted his death it seems as though Achilles is buying himself a little more time. ââ¬Å"But when they had put aside their desire for eating and drinking,â⬠Priam gazes at Achilles in wonder. In him he sees godlike qualities and he is reminded of his own heroic son. This is again a bizarre occurrence taking into consideration that Achilles has the killed so many of his children. Perhaps Priam accepts those deaths as an element of the war and doesnââ¬â¢t see Achilles exclusively as a killer. If this is so than Priamââ¬â¢s kind heart and ability toShow MoreRelatedThe Iliad By Homer1654 Words à |à 7 Pages The Iliad is a collection of poems by Homer describing the 10-year siege on Troy by Greeks in what is now famously referred to as the Trojan War. Several Greek and Trojan characters are worth a special mention in these Homeric poems because of the roles they played in the battles before the war was won, how they conducted themselves to help eventually win the war for their side. This paper specifically investigates the writings in the Homeric poems to look are important in the overall text. TheRead MoreThe Iliad By Homer892 Words à |à 4 Pages The Iliad by Homer depicts the great struggle by Agamemnon and the Greeks to take the mighty city state of Troy and return Helen to her rightful husband, Menelaus. While many ponder if the war actually happened, or why the gods always seemed to be more human than humans themselves, few ask the key but often overlooked question; why is Agamemnon the leader of the Greeks in the first place? What happened that put him in charge of the Greek forces? Why does there seem to be an underlying resentmentRead MoreThe Iliad, by Homer980 Words à |à 4 Pages The Iliad written by Homer in the days of Ancient Greece has become one of the most epic poems of all time. It is a poem that has been debated for centuries. Within the tale of Achilles and the wrath of war lies a magnificent object that is shortly mentioned in Book 18. The brief section in Book XVIII, lines 505-660, described the shield that Achilles would carry into battle. How ever, it also tells us something about the nature of Achilles and his heroic image full of rage and anger. In orderRead MoreThe Iliad By Homer2007 Words à |à 9 PagesThe Iliad is a collection of poems written by Homer describing the 10-year siege of the city of Troy by Greeks in what is now famously known as the Trojan War. Several characters stand out in the series of poems because of the roles they played in the war, how they behaved and the acts they took to help eventually win the war for the Greeks (then known as Akhaians). This paper specifically investigates the writings in Books two, four, thirteen, sixteen and seventeen and why the events in these booksRead MoreThe Iliad, by Homer855 Words à |à 4 PagesIn Homers epic Iliad, the poet emphasizes the control of the gods in the war he describes. He creates literary devices around these well-known deities to illustrate their role in the action, conveying to his audience that this war was not just a petty conflict between two men over a woman, but a turbulent, fiery altercation amongst the gods. To an audience which had likely lost their fathers, brothers, or husbands to the Trojan War, it would be a welcome relief to hear that the whole affair wasRead MoreThe Iliad by Homer1383 Words à |à 6 Pageswas, in fact, useful. Aristotle agreed with Plato that literature induces undesirable emotions, but he stated that it only does so in an attempt to purge us of these harmful sentiments, a process which he termed ââ¬Å"catharsisâ⬠. The events in Homerââ¬â¢s Iliad, while used by both Plato and Aristotle to defend their theories about literature, lend themselves to the defense of Aristotleââ¬â¢s ideas more so than Platoââ¬â¢s. Specifically, the juxtaposition of Achilleusââ¬â¢s intense lamentation with the portrayal of Hephaistosââ¬â¢sRead MoreThe Iliad By Homer2191 Words à |à 9 PagesThe Iliad By Homer was created in the late 5th-early 6th century A.D. This Epic was a best seller, but the publishing date and publisher is unknown, due to the story being so old. The Iliad is around 576 pages long. Some facts that have to do with the Iliad that are not well knows include the name Homer resembling the greek word for ââ¬Å"hostage.â⬠Also, taking place after the events of the Iliad, Aeneas supposedly survives the war and goes on to become the founder of roman culture. Going on to a differentRead MoreIliad by Homer1216 Words à |à 5 Pagesin Homerââ¬â¢s Iliad, to be a hero is to be ââ¬Å"publicly recognized for ones valour on the battlefieldâ⬠and to have a prize with it (Sale). In other words, a hero is someone who fights for his own fame and glory. However, the modern perception of a hero is quite different. A hero is someone who do not endeavor to become a hero, but someone who act in admirable ways, often for the better of everyone else. The modern concept of heroism is what defines a true hero. Achilles is a hero in the Iliad, because ofRead MoreThe Iliad Of The Homer s Iliad Essay1475 Words à |à 6 PagesThe Iliad ranks as one of the most important and most influential works in terms of world literatures since its establishment. Between the underlying standard to which the Iliad offers us as audience members, along with the plethora of writers that have followed in the footsteps to which Homerââ¬â¢s Iliad paved, the impact that the Iliad has played is remarkable in itself. While the Iliad can be credited for much of present day literature we study today, Hollywood can be created for the plethora ofRead More The Iliad of Homer Essay711 Words à |à 3 Pages When analyzing the Greek work the Iliad, Homer procures an idealistic hero with an internal conflict, which questions the values of his society and the Greek Heroic Code. The Greek Heroic Code includes respect, honor, and requirements to procure an exorbitant image. To be considered a Greek hero you must meet the perquisites and fulfill all of the aspects of the code. Achilleus was deemed a hero, he was the strongest and swiftest of the Achieans. Achilleus lived up to all of these aspects until
Friday, December 13, 2019
Locke on the Social Contract Theory Free Essays
Social Contract Theory is a philosophy, which states that political and moral obligations of a person are rendered to him, upon an agreement between the ruler and the society. This agreement governs both the ruler and the ruled society to act in accordance with one another. John Locke, along with Thomas Hobbes and Jean Jacques Rousseau, is one of the best known proponents of this theory, which emerged as one of the most influential political theories in the history of the Modern West. We will write a custom essay sample on Locke on the Social Contract Theory or any similar topic only for you Order Now Social Contract Theory was an answer to reject the Divine Right Theory, which was used by kings and queens as their basis for their right to rule. Lockeââ¬â¢s most important and influential writings are in his book, Two Treatises on Government. The first treatise in his writing is geared towards the rejection of Divine Right theory; and the second treatise states Lockeââ¬â¢s own views on the justification for the civil government, which he entitled An Essay Concerning the True Original Extent and End of Civil Government. John Lockeââ¬â¢s Social Contract Theory held a positive view about human nature. He argued that humans have a gift of reason, and manââ¬â¢s natural condition is a state of perfect and complete liberty wherein, humans live their lives at its best without interference from other people. People are assumed to be in equal footing with one another and are bound by the Law of Nature. This Law of Nature however is according to Lockeââ¬â¢s view is the basis of all morality, and thus must not extend to harm other peopleââ¬â¢s rights with regards to their life, health, liberty or possessions (Locke 2003). Further more, as his concept of State of Nature lacks civil power amongst men and an appeal to the Law of Nature allowing people to defend themselves. Because of this lack of authority, a war is likely to break out, thus prompting the reason to abandon the State of Nature and recognize a contract that shall in turn form a government. This, as a result to manââ¬â¢s having the ability to think rationally, humans submit themselves to a higher authority for the protection of their rights. However, in Lockeââ¬â¢s Social Contract Theory, a rational individual will only agree to a government, with minimal and limited control, and a government that is controlled by the citizens. Because for Locke, the government can be easily lured to become restrictive, corrupt and abusive of powers, thus prompting the individuals to always retain some power over the government for the sake of freedom and equality. This issue concerning freedom has always been central to Lockeââ¬â¢s market government. Government must always employ the right blend of freedom and restrictions with it. For the people, their property and lives are their rational interests; and their concept to form a government is geared towards the protection of these interests. Therefore, the people, although putting the security of their rights in the government, are still fearful of the governmentââ¬â¢s potential power (The Social Contract). Thus, according to Locke, should the government cease to become responsive to its citizens, the government should be overthrown. They still hold the right to revolt against their ruler if they realize that their ruler is no longer able to cater to their needs and has been abusive and oppressive to the rights of man. Locke also supported the idea of laissez-faire, wherein there will be limited government intervention for the market to be able to generate a prosperous civil society based on individualââ¬â¢s rational competition. Lockeââ¬â¢s version of the theory has played a great role in the development of the Western politics, particularly in America. His social contract plus laissez faire, has also became the basis for market institutions. Lockeââ¬â¢s theory has been influential to the current criminal justice system, with property playing an essential role in the societyââ¬â¢s government and contract that establishes it. With the State of Nature being itself chaotic when no one is bound to control the state of liberty for men, hence bringing about the State of War, and eventually creating the need to establish a contract between the ruler and the ruled society to enable people to rightfully defend their life and liberty. Thus, the need to protect their properties has prompted the people to abandon the State of Nature and form the social contract between the civil society and the government. Given the great influence that John Locke has posed through his political theories, his philosophies have continued to live until the present time, especially in American politics. The criminal justice system and world politics in general have exhibited strong influential heritage from Lockeââ¬â¢s philosophies; in particular pertaining to the way the government must handle its affairs, so as to please the civil society who placed them in power. The Democratic form of government and criminal system, wherein the civil society is always left with a choice to whom must be put into power is an example of a social contract. And in turn, the overthrow or government leaders who did not much perform for the benefit of the people is an illustration of Lockeââ¬â¢s theory. Reference Locke, John. (2003) Two Treatises of Government and A Letter Concerning Toleration. Yale University Press. The Social Contract. Retrieved October 25, 2007 from http://www.sagepub.com/upm-data/2769_Swri01.pdf à How to cite Locke on the Social Contract Theory, Essay examples
Thursday, December 5, 2019
California SB 1386 Essay Example For Students
California SB 1386 Essay On July 1, 2003, California enacted an electronic data privacy law to protect residents from one of its fastest growing crimes: identity theft. SB 1386 (Civil Code 1798.29) requires businesses to notify California residents if a security breach results in disclosure of personal electronic data. All businesses are subject to this law regardless of size, location, or operations. Business owners should be aware of the problems associated with identity theft, the steps required to comply with SB 1386, and the preventative measures available. Identity theft is a significant problem to both citizens and financial institutions. The FTC estimates that over 27.3 million Americans have been the victims of identity theft in the past five years. The U.S. financial impact is staggering; in 2002 alone, losses were estimated at $48 billion to financial institutions and $5 billion to victims. The FTC reviewed trends from 214,905 cases reported in 2003, and California accounted for the highest number of incidents (39,452). In 20% of all cases, the source of the information breach involved disclosure of personal data over the internet or other electronic sources. In 55% of all cases, the identity theft resulted in credit card, bank, or loan fraud. Federal and state laws address this growing problem. The FTC provides some protection by aggressively enforcing existing federal laws. Under the unfair and deceptive trade practices law, a website operator must adhere to the companys own privacy policy or face prosecution for failing to exercise a reasonable standard of care. Reasonable care includes addressing potential system vulnerabilities such as viruses and encrypting personal information so that it cannot be viewed. The FTC recently ordered several large corporations to implement stronger privacy controls after breaches exposed personal information. In January of 2001, Eli Lilly settled with the FTC after accidentally releasing the e-mail addresses of nearly 700 consumers who were using the companys anti-depressant Prozac. Seven months later, Microsoft was targeted by the FTC for misrepresenting the security of its Passport Wallet web service. More recently, in April of 2004, Tower Records faced allegations for allowing and failing to correct a breach that disclosed consumer information including names, billing and shipping addresses, email addresses, phone numbers, and purchase histories. Under the separate settlement agreements, the three companies were barred from misrepresenting website security and required to implement rigorous programs to prevent future incidents. Californias SB 1386 takes the FTCs efforts one step further by requiring companies to notify California residents when a security lapse has resulted in disclosure of personal information so that immediate action may be taken to mitigate damages. In 2002, the California state employee payroll database was breached. Confidential information about 265,000 employees was available to hackers including names, addresses, bank account numbers, and social security numbers. The data center didnt notify anyone for several weeks, leaving the employees vulnerable to identity theft longer than necessary. In response, SB 1386 was enacted as a means to ensure that Californians receive prompt notification so they may take immediate steps to protect their personal information. SB 1386 applies to any business that stores unencrypted personal information of an employee or customer that resides in California. According to the law, personal information means an individuals name in combination with any one or more of the following elements:1.Social security number2.Drivers License number of California Identification Card number3.Account number, Credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individuals financial account. Any unauthorized access of a computer and its data constitutes a breach. Notification must be provided even if confidential personal information was not stolen due to the difficulties of proving that all data remained secure. Any breach discovered on or after July 1, 2003 falls within the scope of SB 1386, and the law requires notification in the most expedient manner and without unreasonable delay. Legal notification can be conducted by direct mail, e-mail, posting on the companys public website, or notification to major statewide media. Compliance with SB 1386 and litigation could be costly. To date, there have been no lawsuits, however Wells Fargo recently spent millions of dollars to comply with the new law. .uc819e565fc56871cc8ce3517adb0965b , .uc819e565fc56871cc8ce3517adb0965b .postImageUrl , .uc819e565fc56871cc8ce3517adb0965b .centered-text-area { min-height: 80px; position: relative; } .uc819e565fc56871cc8ce3517adb0965b , .uc819e565fc56871cc8ce3517adb0965b:hover , .uc819e565fc56871cc8ce3517adb0965b:visited , .uc819e565fc56871cc8ce3517adb0965b:active { border:0!important; } .uc819e565fc56871cc8ce3517adb0965b .clearfix:after { content: ""; display: table; clear: both; } .uc819e565fc56871cc8ce3517adb0965b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uc819e565fc56871cc8ce3517adb0965b:active , .uc819e565fc56871cc8ce3517adb0965b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uc819e565fc56871cc8ce3517adb0965b .centered-text-area { width: 100%; position: relative ; } .uc819e565fc56871cc8ce3517adb0965b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uc819e565fc56871cc8ce3517adb0965b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uc819e565fc56871cc8ce3517adb0965b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uc819e565fc56871cc8ce3517adb0965b:hover .ctaButton { background-color: #34495E!important; } .uc819e565fc56871cc8ce3517adb0965b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uc819e565fc56871cc8ce3517adb0965b .uc819e565fc56871cc8ce3517adb0965b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uc819e565fc56871cc8ce3517adb0965b:after { content: ""; display: block; clear: both; } READ: Major Tasks Of Quantity Surveyor Construction EssayIn 2003, Wells Fargo hired a consulting firm to perform some work and turned over a database that contained names and social security numbers of 200,000 consumers that had secured loans from Wells Fargo. A petty thief stole the laptop containing the database from the consultants office. When the theft was discovered, Wells Fargo took steps to comply with SB 1386 and sent letters to all 200,000 customers, not just those residing in California. A follow up call was placed to each customer to ensure that the correspondence had been received. Account numbers were changed, and customers were encouraged to contact credit reporti ng agencies and monitor their credit. Wells Fargo also offered to purchase Privacy Guard service for each customer. Privacy Guard service costs approximately $75 per person and provides notification of activity on credit reports. Even though the laptop was recovered and it was determined that the information had not been used, compliance with SB 1386 was costly due to the number of individuals affected. Businesses can implement preventative measures to help reduce the costs and loss of good will that can result from such a breach of security. Companies that electronically store personal information should have a formal written security policy that addresses data security. An effective plan addresses the size of the organization, the existing computing infrastructure, the types of activities conducted over the internet, and the amount the company is willing to spend on security features to mitigate problems. Security features include firewalls, secure socket layer encryption (encryption at the starting and end points), and intrusion detection systems. The plan should outline notification procedures and allow for the investigation and documentation of all breaches. Implementation of a formal written security policy will ensure compliance with SB 1386. Identity theft is a growing concern due to the enormous financial consequences. SB 1386 outlines a companys responsibilities for securing private information. Businesses have a moral and legal obligation to provide a high level of security and disclose breaches so action can be taken. Adherence to SB 1386 will reduce the damages of identity theft and protect companies from litigation and loss of good will. ReferencesFTC Press Releases and Reports:Identity Theft Victim Complaint Data, Figures and Trends in California, January 1 December 31, 2003. http://www.consumer.gov/idtheft/IDT_CY03/California%20CY2003.pdfJanuary 18, 2002, Eli Lilly Settles FTC Charges Concerning Security Breach. http://www.ftc.gov/opa/2002/01/elililly.htmAugust 8, 2002, Microsoft Settles FTC Charges Alleging False Security and Privacy Promises. http://www.ftc.gov/opa/2002/08/microsoft.htmApril 21, 2004, Tower Records Settles FTC Charges. http://www.ftc.gov/opa/2004/04/towerrecords.htmArticles:Cheryl A. Falvey, Disclosure of Security Breaches Required by New California Privacy Legislation. http://library.lp.findlaw.com/articles/file/00008/009186/title/Subject/topic/Antitrust%20and%20Trade%20Regulation_Unfair%20Trade%20Practices/filename/antitrustandtraderegulation_2_237Whole Security, Facts on Identity Theft. http://www.wholesecurity.com/threat/identity_theft.htmlAuxillium West, California SB 1386 Personal Information: Privacy. http://www.auxillium.com/californiaSB1386.shtmlStrongAuth, Inc., Californias SB 1386 Frequently Asked Questions. http://www.strongauth.com/regulations/sb1386/sb1386FAQ.htmlLegislation:California SB 1386http://info.sen.ca.gov/pub/01-02/bill/sen/sb_1351-1400/sb_1386_bill_20020926_chaptered.html
Subscribe to:
Posts (Atom)