Thursday, October 31, 2019

Reaction paper 5 Essay Example | Topics and Well Written Essays - 250 words

Reaction paper 5 - Essay Example Therefore, an alternative currency will help in restoring the confidence based on the dramatic rise in the price of gold. Additionally, the essence of gold is that no one can make more of it than what already is in the ground (Alan, Javier & Robin, 2010). As a result, this will help curb inflation. Another advantage of gold as a currency is in helping policymakers using it as a measure of investor’s concern about the fate of other currencies. Moreover, there has been increased investment in gold by new investors than before, and this has made it easier to buy and sell bullion (Alan, Javier & Robin, 2010). In addition, the gold as a currency has shown that it is not easy to be debased. On the other hand, there are arguments against the use of gold as a currency. The argument is that alternative currency will still have its own problems. For example, the Eurozone has fractured bond market while there is also no free trade on China’s renminbi (Alan, Javier & Robin, 2010). The other argument is that gold currency is prone to deflation based on its continuous rise in price. Consequently, such a high rise does not help in predicting a rise in the price of other

Tuesday, October 29, 2019

Reintroduce death penalty Essay Example for Free

Reintroduce death penalty Essay Death penalty is a legal process through which, as a punishment a person is sentenced to death for a criminal offense by the state. Criminal offenses punishable through death penalty are referred to as capital offenses or capital crimes. The death penalty proponents, pro-capital punishment argues that it is an important aspect for deterring crimes, preserving law and order, and is less expensive compared to life imprisonment. They also claim that it is in the honor of the victim to award the death penalty. This is because it ensures the offenders of the heinous offenses do not get another chance to commit such crime again. In addition, the death penalty consoles the victims grieving families. Those opposed to death penalty, abolitionists argue that there is no deterrent effect on crimes, and government wrongly uses it as power to take life. They claim that it is the death penalty is a means to bring about social injustices through targeting people who cannot afford good attorneys, and people of color disproportionately. They argue that life imprisonment is less expensive and more severe than the death penalty. With all these arguments, we are left to decide on what course to take, assess the pros and cons of capital punishment and decide to support or oppose it. Questions relating to who deserves the death penalty and who does not have been raised by both the advocates of death penalty and those opposed to the death penalty (Zimring 91-93). Should death penalty be introduced? This is the argument of this paper. Capital punishment, in many countries, cultures and societies, throughout the human history has been applied in the justice system; the question that arises is that is it morally acceptable? Is it justified? Both the advocates for death penalty and the opponents of death penalty have valid arguments to back up their reasons. Those for the death penalty argue that the act of capital punishment is a deterrent to crime. However, those against argue that the death penalty is only a life imprisonment and not a deterrent to crime. It is however evident that the deterrence from the perspec tive of capital punishment is about the murderer’s mind involving the existing psychological processes (Haag 70-71). Not everybody deserves the death penalty. However, some people earn capital punishment. A person who breaks into a grocery store and steals bread definitely does not deserve the death penalty. In addition, people who commit murder for self-defense or during moment of  passion. Such people according to me do not deserve death. On the other hand, a serial killer after the lives of innocent people for fun and personal gains deserves capital punishment. I support the proponents of capital punishment. This stance is informed by a number of facts and reasons. Death penalty is a deterrent to crime. Even though the death penalty is irreversible, convicted persons are often given numerous chances to prove their innocence. Capital punishment assures societal safety through elimination of criminals. A life for a life is a sensible and credible assertion. Deterrence is punishing someone to create fear among people for punishment. Capital punishment is a punishment creates fear, especially in the minds of sane persons. Haag (2003) in his article On Deterrence and Death Penalty, people refrain from dangerous and harmful acts because of inchoate, vague, habitual, and most importantly preconscious fear (Haag 72). Everyone fears death, and most criminals would have a second thought if they were aware their own lives would be on the line. There are not so many justifications and evidence of death penalty to effectively deter crime than the usual long term imprisonment. The countries or states with the capital punishment has no lower rates of crime or rates of murder than those countries and states without those laws. On the other hand, the states or countries that campaign against capital punishment have not shown any significant deviation in the rates of murder or crime. The indicates that capital punishment has no defined deterrent impact. Claims that the executions dissuade particular number of murders have been discredited thoroughly by the researches of social sciences. In fact people do commit murder widely in the heat of passion basically under drug or alcohol influence, or because of mental illness, without thinking about the implications of the act. Those murderers who make plans of their murder crimes expect and intend to escape punishment by avoiding getting caught (Haag 70-73). On the other hand, some social research has found that execution has a significant deterrence to incidents of murder. In addition, the implementation of the capital punishment is related to the increased murder incidences, while those against the death penalty argue that the capital punishment is used unfairly against the African Americans, every extra execution prevents murder of 1.5 African Americans. In moratoria, death row, and commuted sentences removals tend to increase murder  incidences. Americans have emerged to support the capital punishment for reasons such as; the existence of minimal justification that suggest unfair treatment of the minorities, and that the death penalty results into a reduction or deterrent to crimes and saves life. Those for capital punishment believe that the death penalty ultimately deter murderers from killing more innocent people. No concrete evidence justifies this assertion. Therefore the supporters suggest that the capital punishment is a basic reminder to the general public that there is no reward for crimes. It gives people a notion that if you engage in killing innocent people then you are forced to pay a quite high price (Zimring 95-96). Abolitionists, opponents of the death penalty argue that there is no need to take the life of a criminal to deter life, and that imprisonment in itself is a deterrent to criminal activities. Zimring (2004) asserts that deterring crime is only possible by frightening the would-be criminals by arrest, conviction, and punishment. However, imprisonment may not be enough for some criminals to stop committing more crimes. A number of criminals such as serial killers believe that they would never be caught and brought to justice. For these kinds of criminals, the death penalty should be warranted to teach others a lesson and instill fear in them. The advocates of anti the death penalty argue that capital punishment is irreversible, and may lead to making irreversible mistakes. I accept this fact because once someone is awarded the death penalty; there is no reverse even if they only failed to prove their innocence (Haag 77-78 ). However, the probability of making a mistake with the death pe nalty is very minimal, extremely low. Capital punishment is very extreme. Therefore, the judicial system exercises it with a lot of care and caution. Because of the various guaranteed rights protection of people facing capital punishment, guilt must be determined by convincing and clear evidence that leaves no room for alternative justification of facts. The right to appeal is also protected for the convicts, and other privileges that ensure only rightly accused persons are awarded the death penalty. According to Haag, whenever life is at stake, trials are often more likely to be fair, and the death penalty is less often inflicted unjustly than others. Therefore, the abolitionists’ argument of making irreversible mistakes is unjustified. People have argued that the death penalty theory is correct since people are deterred from doing crimes by what they fear most,  that people fear death more than any other punishment, that the death penalty is a deterrent to crimes that any other punishment possible, and that the capital punishment is humane enoug h and the law supports it. They also argue that because those sentenced to death normally do much to have the day postponed, it proves that people fear death and therefore will avoid it (Zimring 97). Others have also said that the televised executions are more effective as people exercise more reaction to what they see than that which they imagine. It is hence hard to threaten murderers with something basically invisible, but in their minds, the death penalty is a major deterrent option. These are justifications that the death penalty is effective. The U.S establishment of the death penalty was due to capital crimes and murder. State or congress legislature may recommend the death penalty for capital crimes. According to the Supreme Court ruling, the death penalty does not violate the Eighth Amendments ban per se on unusual and cruel punishment. However, the Eighth Amendment shapes certain aspects of procedures regarding where a jury may prescribe the death penalty and the way it must be conducted. Analyses of Eighth Amendment demand courts to consider the evolution of decency standards. This is important in ascertaining that a particular punishment constitutes an unusual or cruel punishment. It is required that when considering evolving decency standards, objective factors that show a change in standards of the community must be observed and independent evaluations made concerning the reliability and/or essence of the statute in question. Although the death penalty is being considered effective in deterring capital crimes, the Supreme Court ruling discredited capital punishment for juvenile offenders. Majority opinion indicated that juveniles are irresponsible and immature. They have incomplete character development and are greatly vulnerable to negative influences. The Supreme Court deduced that adolescent offenders assume reduced accountability for their crimes. However, social science researchers point out that people do commit murder widely in the heat of passion. The reas on for this may be influence from drug or alcohol, mental illness. This renders little or no thought to the consequences of the act. Those murderers who make plans of their murder crimes expect and intend to escape punishment by avoiding getting caught. Therefore, the death penalty may be appropriate in such cases (Zimring 98-101). In conclusion, I support the arguments given  by the proponents of the death penalty, the pro-capital punishment. I think death penalty should be reintroduced. I take this stance because I believe the death penalty serves a definite purpose of deterring crime and bringing criminals to justice, as well as honoring the victims. For capital punishment to rightly serve this purpose, it must be made efficient and more effective. The system of justice has gone through a drastic transformation to ensure only rightly accused persons are brought to justice. I believe the death penalty ensures societal safety, brings criminals to book, brings justice to the victims, and deter crimes and reduce the number of criminals. From these illustrations, I believe capital punishment should not be abolished. Capital punishment is necessary to maintain public safety and keep justice shining in the society. It also cuts down the number of convicts on death row. The death penalty relieves families and friends who lose their loved ones in the merciless hands of criminals. It also solves the problem of overcrowding through a humane action. From this account, the death penalty aids in resolving a number of societal criminal issues. Therefore, I take the stance of the pro-capital punishment: I support the reintroduction of death penalty. Works Cited Haag, Ernest Van Den. On Deterrence and Death Penalty, Reserved reading for Philosophy, 2(3) 2003; 44-78. Zimring, F. E. The Contradictions of American Capital Punishment, New York: Oxford University Press. 2004. Print.

Sunday, October 27, 2019

Proactive Network Defence Techniques in Security Attacks

Proactive Network Defence Techniques in Security Attacks 1. Introduction Network Security in the twenty-first century is one of the critical aspects for the effective management and protection of the enterprise data alongside its sustained operations (Stallings, 2007[1]). This is naturally because of the fact that the threat for network security has increased from passive attacks to active breach of the security through exploiting the vulnerabilities of the network and its set-up as argued by McClure et al, 2007[2]. This makes it clear that apart from the traditional security measures in and organization, it is essential to launch a pro-active approach to identify and prevent attacks on the network. In this report a critical review on the application of proactive network defence techniques to help identify and prevent security attacks to enable network defence is presented to the reader. 2. What is Proactive Network Defence? The proactive network defence strategy as opposed to the traditional network security differs mainly in its application within a given network. This is because of the fact that the proactive network defence strategy is predominantly involved in the process of analysing incoming communication and data transfer within the organization’s network to identify patterns for virus attack or security breach outside the purview of the virus definitions that are normally handled by anti-virus software used. This makes it clear that the application of the pro-active network defence strategy in an organization mainly focused on identifying and preventing new virus patterns, Trojan programs, etc., as opposed to handling the existing virus definitions (Todd and Johnson, 2001[3]). Todd and Johnson (2001) further argues that the network attacks by hackers and other unauthorised users is mainly through exploiting the vulnerabilities in the existing set-up of a network and the programs used for communication etc., This makes it clear that the use of the proactive network defence strategy is a key requirement to assess the communication infrastructure and the protocols used on a regular basis to identify potential vulnerabilities through constant analysis in order to help prevent malicious attacks exploiting such vulnerabilities (McClure et al, 2007). Some of the key proactive network defence strategies are discussed with examples in the subsequent sections of this report. The application of proactive network defence can be accomplished through implementing a set of applications that are targeted to perform network data analysis and performance analysis on the network as well as the computers connected to the network. This strategy will help feed the network security definitions with potential threats to the network thus enabling the organization to update the network security policies by an organization. Another critical factor associated with the network security and proactive defence approach is the increasing need for sustainability over disaster recovery for uninterrupted operations of the core business processes. This makes it clear that the implementation of proactive network defence strategies through continuously monitoring the network traffic will help achieve the desired level of network defence against external attacks. The level of threats faced by a network varies with the extent to which its vulnerabilities are visible to the hackers and the nature of the information being handled. 3. Event Correlation This is deemed to be one of the key elements of proactive network defence as the events leading to the security attack like a Denial of Service (DoS) Attack when analysed online can help prevent the attack rather than repair the damage post-recovery of the attack (Hariri et al, 2005[4]). This process is mainly the ability to use the proactive network defence system to analyse the network data and the events handled by an application as part of the network communication in order to identify patterns of unusual nature that can affect the network defence as argued by Todd and Johnson (2001). One of the key areas where event correlation online is necessary would be the ICMP attacks and the DoS attacks mentioned above. In these cases the major vulnerability of the network is the ability of the attacker to exploit the basic nature of the protocol architecture and logical conditions that lead to the handshake and subsequent communication between the parties involved. The spoofing and flooding attacks that exploit the network layer protocol communication vulnerabilities associated with the handshake process. The sequence of events that lead to the successful attack are mainly associated with the network switch or the hub failing to recognise the malicious user in the handshake process resulting in the transfer of data to the unauthorised user. The events correlation at the network level on the hub will help analyse the series of events in the handshake process raised by the unauthorised user just by identifying the level of communication ports dedicated to the channel for communication thus helping prevent such an attack at the network level. Apart from the case of spoofing and flooding at the network layer protocol attacks, the process of event correlation is one of the critical components of proactive network defence owing to the fact that the communication vulnerabilities is evident at all the communication layers of the TCP/IP model as well as the applications using them for communication as argued by Conway (2004) (2004)[5]. This is naturally because of the fact that the event correlation is one of the major elements that help identify new Trojan programs that have infiltrated the firewall. Once the events are recorded, a correlation either linear or non-linear would help identify potential threats to the network by identifying Vulnerabilities in the network The programs that have exploited such vulnerabilities The events leading to the threat Upon identifying the above, a network administrator can successfully prevent the attack by updating the security policies and virus definitions of the network’s anti-virus program. Another example for the case above will be the Pine e-mail program in UNIX and Linux Machines that generated temporary file a user was editing an e-mail message (Howard and Whittaker, 2005[6]). The event correlation process can help identify the sequence of events associated with the access of the temporary files by unauthorised users. The above example also justifies that the communication level security vulnerability is not the only issue but also the actual software application that is utilising the communication protocol (Conway, 2004). 4. Real-time Analysis and Event logging The process of real-time analysis is deemed to be one of the key aspects of proactive network defence. This is necessary because both the software application vulnerability and the network vulnerability. The real-time analysis as argued by Hariri et al (2005) is mainly performed as a listener service that is dedicated to capture the events as they occur whilst analysing them against the logged events from either a database-based application or the event logs that are generated by the operating system. This is the process that can help control the network attacks as the comparison with the historic events is one of the key aspects associated with identifying planned attacks on a network as argued by Hariri et al (2005). The use of the real-time analysis of the events along with using the existing set of events is indeed a memory rich and processor demanding process. Hence the implementation of this procedure across a wide network would require effective configuration of the available resources in order to optimize the network performance for running the enterprise applications. The implementation of the real-time analysis strategy as part of the proactive network defence is deemed to be an advanced level of security implementation purely due to the fact that the resources consumed and the nature of the requirement to prevent the slightest attack on the network. This makes it clear that the real-time analysis with correlation to the archive events in either the event logs or database is not an option for small and medium enterprises whilst the real-time analysis in itself is a powerful tool that can help fend the network attacks effectively in a proactive manner. One of the major areas where the real-time analysis is applicable is the case of spyware (Luo, 2006[7]). The case of spyware is predominantly dependant on the ability to mask the events and listen into the target computer/network without the knowledge of the user. The use of the real-time analysis of the events will help identify patterns that can be assessed in order to identify potential spyware that are running in the computer. The use of real-time analysis as part of the proactive network defence will also help identify critical issues associated with the network performance as the primary aim of attackers is the de-stabilise the network. The use of the real-time analysis to review the network performance will help prevent the infiltration of hackers through the use of listeners programs on the transport layer and network layer protocols either through opening an additional communication port or through flooding the communication ports with malicious handshake requests. Attacks like Tiny Fragment Attack which is targeted on the TCP protocol through exploiting the filtering rules of the protocol algorithm can be identified effectively using the real-time analysis. The use of appropriate conditions on identifying the filtering rules’ manipulation in the real-time analysis will help achieve the desired level of network defence whilst preventing the exploitation of the TCP protocol rules. Spyware related attacks that threaten the corporate environment heavily as argued by Lou (2006) can be identified and prevented effectively using the proactive network defence strategies. The real-time analysis strategy of proactive network defence will help accomplish the desired level of network defence whilst continuously analysing the data transferred across the network. 5. Access Control and Network Immunity The use of the access control and network immunity in a network defence strategy is one of the major areas where the network security can be maintained whilst preventing the unauthorised access to the network/network resources as argued by Hariri et al (2005). The proactive network defence strategy in an organization though event correlation and real-time analysis can be achieved effectively through enabling a robust access control policy across the network as argued by Conway (2004). This owing to the fact that the code hacking targeted on the TLS and SET protocols of the TCP/IOP protocol stack can be identified through analysis through the effective use of the access control policies as argued by Conway (2004). This is plausible by integrating the real-time analysis with the access control policies of the network thus providing the ability to handle exceptions and violations to the network access for a given user registered with the network. It is further critical to appreciate the fact that the major vulnerability within a network is the access control which when not implemented effectively will provide room for the registered users to exploit their network access rights. Role-Based Access control that is deemed to be a logical and proactive measure to prevent the malicious access to the information whilst enabling robust access control policy is one of the strategies that can help achieve proactive network defence. The combined use of the real-time analysis and the Role-Based Access Control methodology will help accomplish proactive network defence against external as well as internal attacks on the network. Application penetration as argued by Howard and Whittaker (2005) is one of the major areas where the network immunity strategy can help achieve proactive network defence against malicious attacks on the network. As the inherent weaknesses of the application when identified by the hacker to use for his/her benefit will result in the network being attacked from the core through the application, it is necessary to implement strategies like the aforementioned in order to enable reliable network security. This process is also evident in the case of throughput-based attacks on the communication protocols like the Blind-Throughput reduction attack which can be used by the attacker to reduce the amount of data transferred on purpose when using ICMP protocols. The use of the network immunity through real-time analysis and the use of access control strategies will help draft a better appreciation of the issue faced by the network and the cause for the performance reduction. This when identifie d can be integrated to the existing security policies of the network in order to prevent abuse of the vulnerabilities within the network. The case of through reduction attacks also accompany the threat of forcing the server computer to re-send the same message multiple times with reduction in the packet size owing to the inability of the destination to receive the packet. This strategy popularly known as the performance degradation attack by the hackers can have serious impact on the server performance due to the lack of the server to cater for more number of users can be identified through the use of proactive network defence strategies like real-time analysis and network immunity to ensure that the performance of the network as well as the computers connected to the network are not affected. The use of event correlation and real-time analysis strategies will help identify the critical issues associated with the communication port related attacks on server computers like the TCP port 80 attacks can be identified and prevented effectively. As the port 80 is one of the key communication ports for TCP protocol in external communication, the exploitation of this vulnerability will affect the overall performance of the server computer being attacked thus resulting in performance degradation. The use of the proactive monitoring methods for network defence can help overcome these issues by identifying patterns through running correlation (linear or non-linear) to prevent new attacks targeted on such communication ports. The HTTP protocol which is a critical element in the Web-based applications for electronic commerce is another key application layer protocol that is targeted by hackers on specific communication ports of the computers involved in the communication. 6. Applied Proactive Network Defence and Protocol Attacks’ countermeasures The countermeasures for protocol attacks specific to the vulnerability in each network communication protocols used for communication over the Internet are mainly reactive in nature. This is because of the fact that the countermeasures Port Randomization for Blind Connection Reset Attack etc., were set in place following an attack but not prevented through assessing the network communication architecture beforehand. In case of the use of the proactive network defence strategy, the key advantage is to use specific software algorithms to assess the existing network and perform a vulnerability check in order to identify the key areas where there will be potential external attacks. This approach will help prevent new attacks through enabling new virus definitions that handle exceptions raised through these attacks. The applied proactive network defence strategy is deemed to be a continuously evolving strategy that can help identify and handle vulnerabilities in the network as well as the applications used in the network. This makes it clear that the effective use of the applied proactive network defence strategies will help realize the desired network security at an on-going basis as opposed to the traditional countermeasures approach which is mainly reactive in nature. 7. Conclusion From the discussion presented above it is clear that the proactive network defence when applied across a given enterprise network will help achieve a dynamic network security management. However, the key element that must be appreciated is the fact that the network security must be enabled for the existing security threats using the security definitions and policies defined by the organization alongside the commercial software used for the network security. The continuous update of the virus definitions alongside the firewall configuration and security updates from the security software vendor is critical for the network security. The major advantage of the use of the proactive network defence strategy is the ability to identify patterns that may have been missed by the definitions from the security software vendor. The configuration of proactive network defence system to the security requirements specific to the organization’s network will help implement a layer of security o ver the otherwise reactive network security strategy. It is also critical to appreciate that the proactive network defence in an organization will help address not only the security related aspects of the network but provide a comprehensive support strategy by analysing the performance of the network and the server/nodes comprising the network. The applied proactive network defence strategy is thus a layer of security that can help effectively use the security software and network resources in an integrated fashion. Footnotes [1] Stallings, W. (2007), Cryptography and Network Security: 4th Edition, Prentice Hall [2] McClure, S.; Kurtz, G.; and Scambray, J. (2005), Hacking Exposed – 5th Edition, McGraw-Hill [3] Todd, C. and Johnson, N. L. (2001), Hack Proofing Windows 2000 Server Security, Syngress Publishing [4] Hariri, S.; Guangzhi Qu; Modukuri, R.; Huoping Chen and Yousif, M.; (2005), Quality-of-protection (QoP)-an online monitoring and self-protection mechanism, Selected Areas in Communications, IEEE Journal on Volume 23, Issue 10 [5] Conway, R. (2004), Code Hacking : A Developers Guide to Network Security, Charles River Media [6] Howard, M. and Whittaker, J. A. (2005), Application Penetration Testing, IEEE COMPUTER SOCIETY, 1540-7993/05/$20.00 [7] Luo, X. (2006), A Holistic Approach for Managing Spyware, E D P A C S, VOL. XXXIII, NO. 11

Friday, October 25, 2019

Essay examples --

Steven Spielberg’s film â€Å"Amistad† and Howard Jones’ book â€Å"Mutiny on the Amistad† both tell the story of a group of slaves who were able to take over a ship called the Amistad just off the coast of Cuba in attempts to sail home to west Africa. After being tricked by the two remaining crewmembers into sailing up the east coast of America, the slaves are captured and thrown into a life changing legal battle, one of the most famous trials in history. Eventually, the group of slaves were granted their freedom and allowed to return to their homes. Both Spielberg and Jones focused on the events leading up to the trial, the outcome of the trial, as well as its significance, however Jones told the story with more depth, details, and accuracy. However even with this being said, there are still things that can be learned through viewing this film. When viewing the film, students will learn and get a feel for a general outline of the events that took place. The film does not go into much detail about any of the characters or main events, however does focus on the trials and their eventual verdicts. Also, in typical Spielberg fashion, the cinematography of the movie helps to provide very detailed visuals of the horrifying nature of slavery, evident in the conditions we see on the two ships, the Amistad and the Tecora. Though what went on aboard the ships in the film may or may not have actually happened, it if safe to say actual events probably were not that far off. At the most, this film may provide some background information on the events that took place during this time, and which may lead to further interest in the viewer. As previously stated, both the film and the book deal with the events of the Amistad and the fate of the slaves ... ... speeches, testimonies, etc. to put together an in depth look at the Amistad, along with many more sources which can be found at the end of the book (pg. 222-259). When it comes to teaching history in university, the fact that the book used many more reputable resources and remained true to the story makes it more suited and superior to the movie. The book is a more reliable source and a more accurate representation of all events that occurred, written from each angle. As stated earlier, Steven Spielberg put together very well made movie and includes many of the main events that occurred at the time, however due its inaccuracy and lack of detail regarding all events, it should not be used in teaching. It may be used to gauge interest and lead to further readings, however it should not be used over the book to teach the significance of this historical event.

Thursday, October 24, 2019

One Wish

Ever since I played in my first soccer game when I was five, I knew I wanted to play professional soccer. I loved the feeling of running past defenders and scoring a goal. If I had one wish, it would be to play on the USWNT because I would get to travel to new places, be on Nike commercials and go to the Olympics. To begin with, I have always wanted to travel to new places such as Europe. Imagine, seeing the Alps mountains, and getting to play where futbol originated. Another reason is that I would become a better player; I would learn to be more adaptable to climate change and less sleep.In addition, I would be on Nike commercials! For example, Cristiano Ronaldo is one of my favorite players, and he has a butt load of Nike gear! So, if I became a professional soccer player I could get Nike gear and I could meet Cristiano Ronaldo! This leads up to being on T. V. which is one of my top reasons for wanting to be a professional soccer player. People around the whole globe would soon lea rn my name. Additionally, I would have the chance to be on the Olympic roster! Imagine, standing on the podium, a bouquet of flowers in your arms, sweat dripping down your face, being awarded a gold medal.Just feeling the weight of the gold medal around your neck, the sense of accomplishment you feel, the roar fans screaming your name. That’s the feeling I want. While I’m playing, knowing I was playing against the best teams in the world. In conclusion, if I had opportunity to have anything I wanted, it would be to play professional soccer because of the Nike commercials, visiting new places, and going to the Olympics. I love playing soccer, and that’s why I wished to be on the USWNT. If you had the chance to wish for anything, what would it be?

Tuesday, October 22, 2019

Hospitality Operation Management Essay

Executive Summary This report is based on the findings from Tripadvisor that aimed to examine theissues of in Bella Vista Hotel and Resort Langkawi and provided therecommendations for improving housekeeping management in the futureexpansion. The findings in this report are according to the comments fromguests who had been staying in Bella Vista Hotel and Resort previously and makethe judgments on those serious issues in this particular hotel. The studyconfirmed the existing of inappropriate hotel housekeeping operation andmanagement would strongly influence the image of hotel and lead this hoteltowards low revenue. This report discusses on four issues of Bella Vista Hoteland Resort which are room hygiene and cleanliness concerns, inappropriatemaintenance, bathroom and amenities as well as inconsistent manpowermanagement and other service. Because of the massive growth of travelers around the world, the guests‟ perception to the hotel rooms have been shifted differently compared the past. Hotel guests are looking forward a comfortableroom and proper hotel management when they are staying in particular hotel toincrease the satisfaction of guests. It is shown that the comments from hotelguests are effective means of evaluating the issues of Bella Vista Hotel andResort and the application of recommendations are highlighted. Introduction to assignment objectives Hospitality environment has always played a key role in the tourism and hotelculture. Lodging or Accommodation with service is the center of any hotel in theworld, but recently, it has been facing many problems. Society nowadays shiftsthe concerns from traditional style with high-class service and room amenities tothe flexibly modern way of saving money or budget oriented style due to thechanges of preferences, economic crisis and other external factors. Guestsbecome smarter and pickier when they choose the hotel to stay. The hotelsattempting to succeed have to forecast what the new trend is. And they alsoshould consider of combining two elements of luxury and budget in one coreproduct   room (Power, 2005).Malaysia is early named as one of the most popular tourist destinationsworldwide. With its significant hot spots, especially in island areas, tourists areincreasingly coming to Malaysia and enjoying their trip with affordable price.Langkawi islands (Malaysia) and its hotels serve a thousand of tourists annually,which means to sustain the quality and quantity, the hotels in this isolated islandput as much effort as possible. With the combination of the custom ers‟  expectation factors such as low rate and high quality in service, the frequency of guests‟ returns inclines tremendously in Langkawi. However, in an isolated area with many issues can be happened, and to solve the problems, it could beanalyzed critically and particularly.