http://dio.sagepub.com/
Diogenes
http://dio.sagepub.com/content/53/1/11
The online version of this article can be found at:
DOI: 10.1177/0392192106062432
2006 53: 11Diogenes
Lyman Tower Sargent
In Defense of Utopia
Published by:
http://www.sagepublications.com
On behalf of:
International Council for Philosophy and Humanistic Studies
can be found at:DiogenesAdditional services and information for
http://dio.sagepub.com/cgi/alertsEmail Alerts:
http://dio.sagepub.com/subscriptionsSubscriptions:
http://www.sagepub.com/journalsReprints.navReprints:
http://www.sagepub.com/journalsPermissions.navPermissions:
http://dio.sagepub.com/content/53/1/11.refs.htmlCitations:
at UNIV OF NEVADA LAS VEGAS LIB on September 15, 2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
http://dio.sagepub.com/content/53/1/11
http://www.sagepublications.com
http://www.unesco.org/cipsh/
http://dio.sagepub.com/cgi/alerts
http://dio.sagepub.com/subscriptions
http://www.sagepub.com/journalsReprints.nav
http://www.sagepub.com/journalsPermissions.nav
http://dio.sagepub.com/content/53/1/11.refs.html
http://dio.sagepub.com/
In Defense of Utopia
Lyman Tower Sargent
In a number of recent and forthcoming articles and papers, I have argued that while
utopia can be dangerous, utopian visions are absolutely essential, that we must
choose utopia.1 Today, I want to try to give you the essence of that argument while
also relating it to some new issues. Let me summarize my argument:
1. Hope/desire for a better life in this life is a central aspect of the human experi-
ence.
2. That hope/desire has often been distorted by ideology and religion.
3. That hope/desire has often been captured to serve the economic and political
ends of the powerful.
4. When that hope/desire is distorted or captured, it can become dangerous.
5. That danger usually comes about because the hope/desire is warped so that the
better life is only for a select few or in-group, thus creating an out-group, an
other, who can be neglected, harmed, even killed to achieve the end. Such
groups have included members of other religions, indigenous peoples, other
ethnic groups, ideologies, and so forth. The boundaries of the other have often
been changed to include some formerly in the in-group.
6. Even so, that hope/desire for a better life is the only effective means of over-
coming such distortion/capture.
Let me give a particularly relevant example, a pattern observable in the Americas:
colonies produce utopias for the colonists and dystopias for the colonized. The
colonized are now effectively using the vision of their own eutopia against the
dystopia they were thrust into. Canada and New Zealand have responded most
positively, but the entire indigenous rights movement is based on utopian visions.
This last point applies to other social movements like the women’s movement,
where many feminist utopias have helped shape the movement. With the excep ...
This document discusses dystopian fiction and its development over time. Some key points:
1. Dystopian fiction emerged in the early 20th century in response to totalitarian regimes and world wars. Authors like Orwell and Burgess used dystopias to critique present tendencies and warn of potential dark futures if unchecked.
2. Dystopias depict gloomy, oppressive futures where individuals have little freedom or choice. Societies are often controlled through psychological manipulation and lack of individualism.
3. The genre absorbed modernist techniques and responded to rapid social and technological changes of the time. It questioned political structures and assumptions from the post-Enlightenment era.
4. Dystopian fiction provides
This question asks for the identification of a term used in debates about cultural identity and immigration in Europe. Specifically:
- The agricultural term used to describe the dominant plant variety was borrowed by a sociologist to describe certain cultural values Europe needed.
- It has since been used as a counter to multiculturalism and appropriated by the far right, causing controversy whenever debates emerge about national identity.
- The term refers to Leitkultur, meaning dominant or leading culture.
This document provides an overview of utopian and dystopian fiction. It defines utopia as an imagined perfect society and dystopia as an imagined place where people are unhappy and usually not free. It describes characteristics of each genre, such as utopias featuring equality and education while dystopias are typically oppressive societies with restricted freedom. Examples of famous works of both utopian and dystopian fiction are also outlined.
Broken promises. From the Enlightenment to the modern Epistememon.rodriguez
This document summarizes and critiques Jürgen Habermas's model of the public sphere as presented in his 1962 work "Strukturwandel der Öffentlichkeit". It argues that while Habermas's model provides a useful framework, it idealizes history and does not fully capture changes over time. New perspectives are needed to understand alternative discourses and how digital media may be enabling a new "epistemic rupture" or revolution in structures of knowledge and power.
Anarchist Tendencies in Modern English Literature (BA thesis).pdfKatie Naple
This document provides an introduction to and overview of anarchist tendencies in modern English literature. It discusses how anarchism calls for socialism in the political and economic realms while emphasizing individual freedom and rejecting state power. Key authors and works discussed that exhibit anarchist tendencies include William Morris' News from Nowhere, which depicts a libertarian socialist society, and George Orwell's Homage to Catalonia, which praised the egalitarian society created by anarchists during the Spanish Civil War in Catalonia. The document argues that anarchism has been overlooked in Britain's academic and Marxist circles due to the lack of social and political rewards for intellectuals who supported it.
Write My Essay Online For Cheap - Essay DescribingMiles Priar
The document describes the steps to get essay writing help from the website HelpWriting.net, which includes creating an account, completing an order form with instructions and deadline, reviewing writer bids and choosing one to complete the assignment, receiving the paper and authorizing payment upon approval of the work. Customers can request revisions until satisfied and are ensured original content or a full refund.
Jean-Francois Lyotard was a French philosopher best known for his articulation and analysis of postmodernism. In his 1979 work The Postmodern Condition: A Report on Knowledge, he introduced the concept of "metanarratives" or "grand narratives" - all-encompassing theories that claim to explain historical events and give meaning based on universal truths. Lyotard was critical of these narratives, arguing that postmodernism involves skepticism of universalizing theories. He believed knowledge had become a commodity communicated through local narratives rather than grand narratives, which postmodernism sees as inadequate.
The chapter discusses basic microeconomic principles for firms, including total cost functions that represent the relationship between costs and output. It also defines average cost functions and how they vary with output, as well as marginal cost and economies of scale. The concepts laid out in this chapter provide a foundation for understanding firm strategy and decision-making.
This document discusses dystopian fiction and its development over time. Some key points:
1. Dystopian fiction emerged in the early 20th century in response to totalitarian regimes and world wars. Authors like Orwell and Burgess used dystopias to critique present tendencies and warn of potential dark futures if unchecked.
2. Dystopias depict gloomy, oppressive futures where individuals have little freedom or choice. Societies are often controlled through psychological manipulation and lack of individualism.
3. The genre absorbed modernist techniques and responded to rapid social and technological changes of the time. It questioned political structures and assumptions from the post-Enlightenment era.
4. Dystopian fiction provides
This question asks for the identification of a term used in debates about cultural identity and immigration in Europe. Specifically:
- The agricultural term used to describe the dominant plant variety was borrowed by a sociologist to describe certain cultural values Europe needed.
- It has since been used as a counter to multiculturalism and appropriated by the far right, causing controversy whenever debates emerge about national identity.
- The term refers to Leitkultur, meaning dominant or leading culture.
This document provides an overview of utopian and dystopian fiction. It defines utopia as an imagined perfect society and dystopia as an imagined place where people are unhappy and usually not free. It describes characteristics of each genre, such as utopias featuring equality and education while dystopias are typically oppressive societies with restricted freedom. Examples of famous works of both utopian and dystopian fiction are also outlined.
Broken promises. From the Enlightenment to the modern Epistememon.rodriguez
This document summarizes and critiques Jürgen Habermas's model of the public sphere as presented in his 1962 work "Strukturwandel der Öffentlichkeit". It argues that while Habermas's model provides a useful framework, it idealizes history and does not fully capture changes over time. New perspectives are needed to understand alternative discourses and how digital media may be enabling a new "epistemic rupture" or revolution in structures of knowledge and power.
Anarchist Tendencies in Modern English Literature (BA thesis).pdfKatie Naple
This document provides an introduction to and overview of anarchist tendencies in modern English literature. It discusses how anarchism calls for socialism in the political and economic realms while emphasizing individual freedom and rejecting state power. Key authors and works discussed that exhibit anarchist tendencies include William Morris' News from Nowhere, which depicts a libertarian socialist society, and George Orwell's Homage to Catalonia, which praised the egalitarian society created by anarchists during the Spanish Civil War in Catalonia. The document argues that anarchism has been overlooked in Britain's academic and Marxist circles due to the lack of social and political rewards for intellectuals who supported it.
Write My Essay Online For Cheap - Essay DescribingMiles Priar
The document describes the steps to get essay writing help from the website HelpWriting.net, which includes creating an account, completing an order form with instructions and deadline, reviewing writer bids and choosing one to complete the assignment, receiving the paper and authorizing payment upon approval of the work. Customers can request revisions until satisfied and are ensured original content or a full refund.
Jean-Francois Lyotard was a French philosopher best known for his articulation and analysis of postmodernism. In his 1979 work The Postmodern Condition: A Report on Knowledge, he introduced the concept of "metanarratives" or "grand narratives" - all-encompassing theories that claim to explain historical events and give meaning based on universal truths. Lyotard was critical of these narratives, arguing that postmodernism involves skepticism of universalizing theories. He believed knowledge had become a commodity communicated through local narratives rather than grand narratives, which postmodernism sees as inadequate.
The chapter discusses basic microeconomic principles for firms, including total cost functions that represent the relationship between costs and output. It also defines average cost functions and how they vary with output, as well as marginal cost and economies of scale. The concepts laid out in this chapter provide a foundation for understanding firm strategy and decision-making.
Part 1.....InstructionsSelect one of the age groups disc.docxMARRY7
Part 1.....
Instructions
Select one of the age groups discussed in this unit (adolescent, adult, or elderly). Create a community health strategy for dealing with intentional and unintentional injuries (motor vehicle accidents, suicide, or violence).Your response should include information on the morbidity and mortality rates and the key factors associated with the injuries.Your APA-Style essay must be at least two pages in length (not counting the title and reference pages). All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Part 2....... Need To Be 1 Paragraph Long
According to the Centers for Medicare Services (CMS), the Affordable Care Act (ACA) was designed to give U.S. citizens improved flexibility and control, allowing them to make more informed decisions about their own health plans and healthcare providers.
Now that the ACA has been in place for several years, do you feel that in fact happened? Discuss the strengths and weaknesses of the ACA today.
.
Part 1 – Add to Website PlanList at least three .docxMARRY7
Part 1 – Add to Website Plan
List
at least three interactive features that could be added to your
site and what purpose each would serve for your site and its visitors.
The form created in Part Two of this assignment can be included as
one of the interactive features.
Part 2 – Refine and finalize your website
Refine
and finalize your website by doing the following:
•
Add a simple web form—such as an order form, a subscription
to a newsletter, or a request for contact.
•
Use division or a table to structure the form elements.
•
Apply JavaScript
®
to validate the form.
•
Finalize a navigation system.
•
Use metadata to increase accessibility and search engine
optimization.
15
WEB/240 Version 1
8
•
Test for functionality and usability.
As in the prior assignment, use only Adobe
®
Dreamweaver
®
or
another HTML editor to refine the homepage developed in Week
Three.
Check
your HTML code using the Markup Validation Service on the
W3C
®
website, (www.w3.org) prior to submitting your web page(s).
A link to this site may be found in the Materials tab on your student
website.
Submit
all website files in a compressed folder.
.
Part 1 True or False Questions. (10 questions at 1 point each).docxMARRY7
Part 1: True or False Questions.
(10 questions at 1 point each)
T
F
A hash algorithm uses a one-way cryptographic function, whereas both secret-key and public-key systems use two-way (i.e., reversible) cryptographic functions.
Answer: _____
T
F
The strongest 3DES (Triple DES) requires the use of three independent keys.
Answer: _____
T
F
When it comes to the ethics of a particular situation, there is only one right answer.
Answer: _____
T
F
Packet filters protect networks by blocking packets based on the packets’ contents.
Answer: _____
T
F
The biggest advantage of
public-key
cryptography over
secret-key
cryptography is in the area of key management/key distribution.
Answer: _____
T
F
In terms of privacy laws, companies have no advantage over the government in terms of the types of data that a company can collect.
Answer: _____
T
F
Intrusion Detection Systems (IDS) provide no protection from internal threats.
Answer: _____
T
F
A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.
Answer: _____
T
F
AES uses the Rijndael algorithm.
Answer: _____
T
F
A one-time pad is a safe house used only once by an undercover agent.
Answer: _____
Part 2: Multiple Choice Questions. Print
all
the correct answers in the blank following the question; in some cases a fully correct answer may require more than one lettered choice to be selected. (
Each question is worth 2 points.
There is no guarantee of partial credit for partially correct answers.)
If person A uses AES to transmit an encrypted message to person B, which key or keys will A have to use:
a.
A’s private key
b.
A’s public key
c.
B’s private key
d.
B’s public key
e.
None of the keys listed above
Answer(s): ____
From the perspective of
entropy
:
Plaintext will have a higher entropy than the ciphertext
The unequal frequency of characters in human languages tends to reduce the entropy of plaintext messages in that language
Encrypted messages appear to be noise-like
Plaintext requires more transmission bandwidth than ciphertext
None of the above
Answer(s): _____
Protection of a software program that uses a unique, novel algorithm could be legally protected by:
a.
A patent
b.
A copyright
c.
A patent and copyright
d.
Ethical standards
e.
All of the above
Answer(s): _____
Security
threats
include which of the following:
a.
Unlocked doors
b.
Disgruntled employees
c.
Hurricanes
d.
Un-patched software programs
e.
All of the above
Answer(s): _____
Denial of service attacks include:
a.
DNS poisoning
b.
Smurf attack
c.
Ping of death
d.
SYN flood
e.
All of the above
Answer(s): _____
Part 3: Short Answer Questions.
(10 questions at 5 points each)
Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message.
Answer:
Briefly describe the purpose of firewalls and how .
Part 11. Why is it so important in system engineering to become .docxMARRY7
Part 1
1. Why is it so important in system engineering to become familiar with some of the analytical methods?
2. Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
3. How does CAM and CAS relate to system engineering? Describe some possible impacts.
4. How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
5. What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
6. What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 2
Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 3
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1 Using the internet, search for commercial IDPS systems. What.docxMARRY7
Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.
Part 2: What are some of the legal and ethical issues surrounding the use of intrusion detection systems logs and other technology tools as evidence in criminal and legal matters?
Part 3: Write a 2 - 3 page APA style paper summarizing the background, description, and purpose of NIST Special Publication 800-94,
Guide to Intrusion Detection and Prevention Systems
. The last section of your paper should be titled "Author Reflection" and should reflect your critique of the publication examined. You are not expected to read the entire guide, you should be mainly concerned with section two of the report, titled "Intrusion Detection and Prevention Principles" and section three of the report, titled "IDPS Technologies."
Part 4:
Why is it so important in system engineering to become familiar with some of the analytical methods?
Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
How does CAM and CAS relate to system engineering? Describe some possible impacts.
How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 5: Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 6:
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxMARRY7
Part 1- Create an outline of the assignment below then
Part 2-1000 word assignment
Your fast-food franchise has been cleared for business in all 4 countries (United Arab Emirates, Israel, Mexico, and China). You now have to start construction on your restaurants. The financing is coming from the United Arab Emirates, the materials are coming from Mexico and China, the engineering and technology are coming from Israel , and the labor will be hired locally within these countries by your management team from the United States. You invite all of the players to the headquarters in the United States for a big meeting to explain the project and get to know one another. The people seem to be staying with their own groups and not mingling.
What is the cultural phenomenon at play here (what is it called/ term)?
How do you explain the lack of intercultural communication and interaction?
What do you know about these cultures—specifically their economic, political, educational, and social systems—that could help you in getting them together?
What are some of the contrasting cultural values of these countries?
You are concerned about some of the language barriers as you start the meeting, particularly the fact that the United States is a low-context country, and some of the countries present are high-context countries. Furthermore, you only speak English, and you do not have an interpreter present.
How will this affect the presentation?
What are some of the issues you should be concerned about regarding verbal and nonverbal language for this group?
What strategy would you use to begin to have everyone develop a relationship with each other that will help ease future negotiations, development, and implementation?
.
Part 1 Review QuestionsWhat is the difference between criminal la.docxMARRY7
Part 1: Review Questions
What is the difference between criminal law and civil law?
What is privacy, in the context of information security?
What is intellectual property? Is it offered the same protection in every country of the world? What laws currently protect it in the U.S. and Europe?
What are the three general categories of unethical and illegal behavior?
Part 2: Module Practice
What does CISSP stand for? Using the Internet, find out what continuing education is required in order for the holder of a CISSP to remain current and in good standing.
.
Part 1 Review QuestionsWhat is the difference between authenticat.docxMARRY7
The document contains two parts. Part 1 lists review questions about authentication vs authorization, network security relationships, network vs host intrusion detection systems, and VPNs. Part 2 instructs the reader to create a spreadsheet that encrypts values using a transposition cipher, then further encrypts the results using a substitution cipher.
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxMARRY7
Part 1: SQL/Database work
Scenario
Development of a relational database system for a food producing company
FoodRU is a Leicester-based food producing company. The company wants to keep details regarding both past and present employees and their assignment to shifts over time. At present, there are three defined shift patterns; the morning shift starts at 6am and finishes at 2pm, the day shift starts at 9am and finishes at 5pm, and the evening shift starts at 4pm and finishes at 12am (midnight). However, management have already indicated that they may need to add further shift patterns in the future (e.g., by adding a night shift to the existing ones so that the company can meet a high user demand for their foods). They therefore require shift details to be stored within a separate Shift table, with attributes that allow the storage of a shift name with its associated start and finish times (use the 24 hour clock for these times).
Past and present employee details are to be kept in the same Employee table, and the details to be kept are the employee’s unique 6 digit reference number, the first name, surname and any other names (if there are any) of the employee, the employee’s gender, contact address and contact telephone, the date on which the employee started his/her employment at the company and the date on which the employee finished his/her employment at the company (should s/he be a past employee). Details regarding staff assignments to shifts include the date that an employee was allocated to work a particular shift, and the date that s/he was taken off the shift (if not still assigned to it). Employees can be assigned to different shifts over time and even to the same shift over different time periods, although they cannot be assigned to more than one shift at any one time. A new employee may not yet be assigned to a shift.
Tasks:
1. Provide the table specifications for the THREE tables that are required by FoodRU to store employee, shift and assignment details. That is, for each of the three tables, you should provide, in a suitable presentation format, the name of the table and a specification of each its attributes to include:
• Attribute name
• Attribute brief description as to its meaning
• a description of the attribute’s data type/integrity (e.g., date field, character field of length 20, number field <= 10, etc. – you can use the Oracle data types within these descriptions if you want to)
• An indication as to whether the attribute is a primary key attribute and/or foreign key attribute
• An indication as to whether the attribute can or cannot take null values
Make sure your design specifies the appropriate links between the three tables. Remember to write down any additional integrity you need to enforce either at a specific table level or across two or more tables, if this is required. Also, remember to write down any justifications for the data types/integrity or for any other design features that.
Part 1 Review QuestionsWhat functions constitute a complete infor.docxMARRY7
Part 1: Review Questions
What functions constitute a complete information security program?
What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
Where can an organization place the information security unit? Where should (and shouldn’t) it be placed?
Into what four areas should the information security functions be divided?
Part 2: Module Practice
Design three security posters on various aspects of information security using a graphics presentation program and clip art. Describe the methods you used to develop your design.
.
Part 1A persons lifestyle has a significant influence on the p.docxMARRY7
Part 1:
A person's lifestyle has a significant influence on the person's health and development as he or she moves into middle age (and old age). Stability and change are also common factors in an adult's life.
Describe how middle adulthood provides stability in a person's life. Explain some of the factors that would lead to stability in a person's life as he or she moves through middle age.
Describe some of the more common lifestyle issues that have a negative impact on a person's continued development. Explain how a person may be able to reverse some of the lifestyle influences.
On the basis of your readings, describe what is meant by a midlife crisis. Explain why a midlife crisis may or may not be critical.
Part 2:
Erikson, Gould, Helson, and Levinson provide different perspectives on middle age in adulthood.
Describe each of these theories as it relates to middle adulthood.
On the basis of your readings, compare and contrast these theories. Which one gives a better explanation of middle adulthood?
Justify your answers with appropriate reasoning and research from your text and course readings. Comment on the postings of at least two peers, and provide an analysis of each peer’s postings while also suggesting specific additions or clarifications for improving the discussion question response.
.
Part 1 Review QuestionsWhat is the definition of information secu.docxMARRY7
Part 1: Review Questions
What is the definition of information security? What essential protections must be in place to protect information systems from danger?
Define the InfoSec processes of identification, authentication, authorization, and accountability.
Define project management. Why is project management of particular interest in the field of information security?
What are the five basic outcomes that should be achieved through information security governance?
What is a threat in the context of information security? How many categories of threats exist as presented in this chapter?
Part 2: Module Practice
Find an article that talks about relative risk either from inside the organization or form external sources. Once you locate and read it, compose a 1-2 page paper that summarizes your findings and critique the article. Use a word processor to complete your assignment and submit it as a .docx or .doc document.
.
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxMARRY7
Part 1: Review Questions
What is a security model?
What are the essential processes of access control?
Identify at least two different approaches used to categorize access control methodologies. List the types of controls found in each.
What is COBIT? Who is its sponsor? What does it accomplish?
What is the standard of due care? How does it relate to due diligence?
What is baselining? How does it differ from benchmarking?
Part 2: Module Practice
Make a list of at least ten information security metrics that could be collected for a small internet commerce company with 10 employees. For this senario, the company uses an outside vendor for packaging and distribution. Whom should the metrics be reported?
.
Part 1 Listed below are several key Supreme Court decisions that .docxMARRY7
Part 1:
Listed below are several key Supreme Court decisions that resulted in a clarification of inmate rights.
Choose any one
of the cases listed below. Summarize the facts of the case, the issue that needed to be resolved, the court’s decision, and the reasoning behind the decision.
Helling v. McKinney
(1993)
Washington v. Harper
(1990)
Hudson v. Palmer
(1984)
Bell v. Wolfish
(1979)
Bounds v. Smith
(1977)
Estelle v. Gamble
(1976)
Wolff v. McDonnell
(1974)
.
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxMARRY7
Part 1: Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
Document the potential security vulnerabilities and a security design for your e-commerce company.
Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
Use sources to support your writing.
Choose sources that are credible, relevant, and appropriate.
Cite each source listed on your source page at least one time within your assignment.
Part 2: Updated Gantt Chart
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.
.
part 1 I attended an international conference on Biotechnology and .docxMARRY7
part 1: I attended an international conference on Biotechnology and one of the sessions I went to was on the subject of bio-engineering a "death gene" that could be introduced into the mosquito population and destroy every mosquito on earth. The discussion that ensued was about the ethics of such a thing. I want you to tell how you feel about introducing such a gene. Look up something about this. Your reference does not have to be about this particular gene, but can be about anything that relates to the discussion. Remember to cite your reference, and write at least 150 words
part 2:
Respond to another student
respond to this
I think that with regulation of the mosquito communities would be a good thing. Mosquitos carry many dangerous diseases and if we can lower the population we can slow the rate of transmission of these diseases. This could save many many lives around the world. I would be hesitant though to release the genetically engineered mosquitos into the environment. In the article I read they releases sterile male mosquitos into the environment. This I feel is a safer way to regulate because we are not altering any genes we are just regulating a naturally occurring issue in nature. Sterile males cannot pass on the genes and also male mosquitos are not the ones who would be likely to pass on the diseases. The article stated that only females bite and therefore males would not be capable of spreading the diseases. With sterile males being released there will be less mosquitos due to lack of repopulation. This will still allow organisms relying on mosquitos for food to still be able to survive with less risk to humans. They are an invasive species so it would help to eliminate the spread of mosquitos to different areas. This will keep the spread of disease throughout areas. I do not think it is right to alter the genes for human use though. It is not how nature had intended. If the gene pops up naturally in the population then it should not be taken out but we should not introduce it due to humans "playing God" with genetics. "Mosquitoes Engineered To Kill Their Own Kind." NPR. NPR, n.d. Web. 22 July 2014. .
.
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxMARRY7
Part 1:
Chapter 7 Summary plus end of chapter discussion of Alfred Marshall, should be 100-250 words
Part 2: The discussion on the first 7 pages is a satire on the economists (known as the neoclassical economists).
List 4 passages that can be considered satire.
(You need not write the entire passage.
Simply show clearly where the passage begins and ends.)
.
Parent Involvement Plan This week you will create a Parent Involve.docxMARRY7
Parent Involvement Plan
This week you will create a Parent Involvement Plan in response to the following scenario:
Imagine you are working with infant, toddler and preschool aged children in a child care center. The majority of the children has special needs and receives early intervention or are on an IEP. Many of the children’s parents work two jobs and have a difficult time participating in the center's activities. Whenever the center plans an event, the parental involvement is lower than desired. The center has tried to increase parental involvement through such methods as calling to remind parents and sending home notices, but is not having any luck.
Your assignment is to create a Parental Involvement Plan to encourage better participation from parents. Follow these steps to develop your plan:
Step 1:
Identify the issue, discuss your beliefs about the situation, and formulate conclusions and offer suggestions to the director of the child care center.
Step 2:
Create a Parent Involvement Plan that your director can copy and paste into the employee and parent handbook. Your plan should include:
The importance of early intervention and individual educational plans
Ways to assist students and their families
The importance of parent involvement
Please use the template provided and your rubric as your guide to completing this assignment.
.
Parenting Practices Over GenerationsGeneration 1 Years children.docxMARRY7
Parenting Practices Over Generations
Generation 1: Years children were raised (19XX-XXXX)
Generation 2: Years
Generation 3: Years
Parenting Practice 1: Education
Parenting Practice 2:
Parenting Practice 3:
Parenting Practice 4:
.
ParamsThe interface must be pleasing to look at (a basic form wit.docxMARRY7
Params:
The interface must be pleasing to look at (a basic form with the four fields listed below, a playlist queue (checked listbox) and media player will suffice).
There must be a separate file that will contain information about each soundtrack in your system. That information will be:
Title;
Artist;
Note area;
Type; and
Anything else that you wish to include on each record.
There must be a way to add data to this file.
There must be a way to delete data from this file.
There must be at least one report using data from the file.
There must be a queue to allow you to play selected music tracks in sequence (like two in a row) without manual intervention.
There must be a way to show the data in at least two different sequences (by title, by artist, etc.).
There must be documentation explaining how your Jukebox works (how you add songs, play songs, etc.).
Currently there is a Text file that contains the information about the wav files to be played, several wav files that the text file references. I have also made an access database from the text file.
.
Part 1.....InstructionsSelect one of the age groups disc.docxMARRY7
Part 1.....
Instructions
Select one of the age groups discussed in this unit (adolescent, adult, or elderly). Create a community health strategy for dealing with intentional and unintentional injuries (motor vehicle accidents, suicide, or violence).Your response should include information on the morbidity and mortality rates and the key factors associated with the injuries.Your APA-Style essay must be at least two pages in length (not counting the title and reference pages). All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Part 2....... Need To Be 1 Paragraph Long
According to the Centers for Medicare Services (CMS), the Affordable Care Act (ACA) was designed to give U.S. citizens improved flexibility and control, allowing them to make more informed decisions about their own health plans and healthcare providers.
Now that the ACA has been in place for several years, do you feel that in fact happened? Discuss the strengths and weaknesses of the ACA today.
.
Part 1 – Add to Website PlanList at least three .docxMARRY7
Part 1 – Add to Website Plan
List
at least three interactive features that could be added to your
site and what purpose each would serve for your site and its visitors.
The form created in Part Two of this assignment can be included as
one of the interactive features.
Part 2 – Refine and finalize your website
Refine
and finalize your website by doing the following:
•
Add a simple web form—such as an order form, a subscription
to a newsletter, or a request for contact.
•
Use division or a table to structure the form elements.
•
Apply JavaScript
®
to validate the form.
•
Finalize a navigation system.
•
Use metadata to increase accessibility and search engine
optimization.
15
WEB/240 Version 1
8
•
Test for functionality and usability.
As in the prior assignment, use only Adobe
®
Dreamweaver
®
or
another HTML editor to refine the homepage developed in Week
Three.
Check
your HTML code using the Markup Validation Service on the
W3C
®
website, (www.w3.org) prior to submitting your web page(s).
A link to this site may be found in the Materials tab on your student
website.
Submit
all website files in a compressed folder.
.
Part 1 True or False Questions. (10 questions at 1 point each).docxMARRY7
Part 1: True or False Questions.
(10 questions at 1 point each)
T
F
A hash algorithm uses a one-way cryptographic function, whereas both secret-key and public-key systems use two-way (i.e., reversible) cryptographic functions.
Answer: _____
T
F
The strongest 3DES (Triple DES) requires the use of three independent keys.
Answer: _____
T
F
When it comes to the ethics of a particular situation, there is only one right answer.
Answer: _____
T
F
Packet filters protect networks by blocking packets based on the packets’ contents.
Answer: _____
T
F
The biggest advantage of
public-key
cryptography over
secret-key
cryptography is in the area of key management/key distribution.
Answer: _____
T
F
In terms of privacy laws, companies have no advantage over the government in terms of the types of data that a company can collect.
Answer: _____
T
F
Intrusion Detection Systems (IDS) provide no protection from internal threats.
Answer: _____
T
F
A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.
Answer: _____
T
F
AES uses the Rijndael algorithm.
Answer: _____
T
F
A one-time pad is a safe house used only once by an undercover agent.
Answer: _____
Part 2: Multiple Choice Questions. Print
all
the correct answers in the blank following the question; in some cases a fully correct answer may require more than one lettered choice to be selected. (
Each question is worth 2 points.
There is no guarantee of partial credit for partially correct answers.)
If person A uses AES to transmit an encrypted message to person B, which key or keys will A have to use:
a.
A’s private key
b.
A’s public key
c.
B’s private key
d.
B’s public key
e.
None of the keys listed above
Answer(s): ____
From the perspective of
entropy
:
Plaintext will have a higher entropy than the ciphertext
The unequal frequency of characters in human languages tends to reduce the entropy of plaintext messages in that language
Encrypted messages appear to be noise-like
Plaintext requires more transmission bandwidth than ciphertext
None of the above
Answer(s): _____
Protection of a software program that uses a unique, novel algorithm could be legally protected by:
a.
A patent
b.
A copyright
c.
A patent and copyright
d.
Ethical standards
e.
All of the above
Answer(s): _____
Security
threats
include which of the following:
a.
Unlocked doors
b.
Disgruntled employees
c.
Hurricanes
d.
Un-patched software programs
e.
All of the above
Answer(s): _____
Denial of service attacks include:
a.
DNS poisoning
b.
Smurf attack
c.
Ping of death
d.
SYN flood
e.
All of the above
Answer(s): _____
Part 3: Short Answer Questions.
(10 questions at 5 points each)
Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message.
Answer:
Briefly describe the purpose of firewalls and how .
Part 11. Why is it so important in system engineering to become .docxMARRY7
Part 1
1. Why is it so important in system engineering to become familiar with some of the analytical methods?
2. Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
3. How does CAM and CAS relate to system engineering? Describe some possible impacts.
4. How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
5. What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
6. What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 2
Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 3
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1 Using the internet, search for commercial IDPS systems. What.docxMARRY7
Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.
Part 2: What are some of the legal and ethical issues surrounding the use of intrusion detection systems logs and other technology tools as evidence in criminal and legal matters?
Part 3: Write a 2 - 3 page APA style paper summarizing the background, description, and purpose of NIST Special Publication 800-94,
Guide to Intrusion Detection and Prevention Systems
. The last section of your paper should be titled "Author Reflection" and should reflect your critique of the publication examined. You are not expected to read the entire guide, you should be mainly concerned with section two of the report, titled "Intrusion Detection and Prevention Principles" and section three of the report, titled "IDPS Technologies."
Part 4:
Why is it so important in system engineering to become familiar with some of the analytical methods?
Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
How does CAM and CAS relate to system engineering? Describe some possible impacts.
How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 5: Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 6:
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxMARRY7
Part 1- Create an outline of the assignment below then
Part 2-1000 word assignment
Your fast-food franchise has been cleared for business in all 4 countries (United Arab Emirates, Israel, Mexico, and China). You now have to start construction on your restaurants. The financing is coming from the United Arab Emirates, the materials are coming from Mexico and China, the engineering and technology are coming from Israel , and the labor will be hired locally within these countries by your management team from the United States. You invite all of the players to the headquarters in the United States for a big meeting to explain the project and get to know one another. The people seem to be staying with their own groups and not mingling.
What is the cultural phenomenon at play here (what is it called/ term)?
How do you explain the lack of intercultural communication and interaction?
What do you know about these cultures—specifically their economic, political, educational, and social systems—that could help you in getting them together?
What are some of the contrasting cultural values of these countries?
You are concerned about some of the language barriers as you start the meeting, particularly the fact that the United States is a low-context country, and some of the countries present are high-context countries. Furthermore, you only speak English, and you do not have an interpreter present.
How will this affect the presentation?
What are some of the issues you should be concerned about regarding verbal and nonverbal language for this group?
What strategy would you use to begin to have everyone develop a relationship with each other that will help ease future negotiations, development, and implementation?
.
Part 1 Review QuestionsWhat is the difference between criminal la.docxMARRY7
Part 1: Review Questions
What is the difference between criminal law and civil law?
What is privacy, in the context of information security?
What is intellectual property? Is it offered the same protection in every country of the world? What laws currently protect it in the U.S. and Europe?
What are the three general categories of unethical and illegal behavior?
Part 2: Module Practice
What does CISSP stand for? Using the Internet, find out what continuing education is required in order for the holder of a CISSP to remain current and in good standing.
.
Part 1 Review QuestionsWhat is the difference between authenticat.docxMARRY7
The document contains two parts. Part 1 lists review questions about authentication vs authorization, network security relationships, network vs host intrusion detection systems, and VPNs. Part 2 instructs the reader to create a spreadsheet that encrypts values using a transposition cipher, then further encrypts the results using a substitution cipher.
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxMARRY7
Part 1: SQL/Database work
Scenario
Development of a relational database system for a food producing company
FoodRU is a Leicester-based food producing company. The company wants to keep details regarding both past and present employees and their assignment to shifts over time. At present, there are three defined shift patterns; the morning shift starts at 6am and finishes at 2pm, the day shift starts at 9am and finishes at 5pm, and the evening shift starts at 4pm and finishes at 12am (midnight). However, management have already indicated that they may need to add further shift patterns in the future (e.g., by adding a night shift to the existing ones so that the company can meet a high user demand for their foods). They therefore require shift details to be stored within a separate Shift table, with attributes that allow the storage of a shift name with its associated start and finish times (use the 24 hour clock for these times).
Past and present employee details are to be kept in the same Employee table, and the details to be kept are the employee’s unique 6 digit reference number, the first name, surname and any other names (if there are any) of the employee, the employee’s gender, contact address and contact telephone, the date on which the employee started his/her employment at the company and the date on which the employee finished his/her employment at the company (should s/he be a past employee). Details regarding staff assignments to shifts include the date that an employee was allocated to work a particular shift, and the date that s/he was taken off the shift (if not still assigned to it). Employees can be assigned to different shifts over time and even to the same shift over different time periods, although they cannot be assigned to more than one shift at any one time. A new employee may not yet be assigned to a shift.
Tasks:
1. Provide the table specifications for the THREE tables that are required by FoodRU to store employee, shift and assignment details. That is, for each of the three tables, you should provide, in a suitable presentation format, the name of the table and a specification of each its attributes to include:
• Attribute name
• Attribute brief description as to its meaning
• a description of the attribute’s data type/integrity (e.g., date field, character field of length 20, number field <= 10, etc. – you can use the Oracle data types within these descriptions if you want to)
• An indication as to whether the attribute is a primary key attribute and/or foreign key attribute
• An indication as to whether the attribute can or cannot take null values
Make sure your design specifies the appropriate links between the three tables. Remember to write down any additional integrity you need to enforce either at a specific table level or across two or more tables, if this is required. Also, remember to write down any justifications for the data types/integrity or for any other design features that.
Part 1 Review QuestionsWhat functions constitute a complete infor.docxMARRY7
Part 1: Review Questions
What functions constitute a complete information security program?
What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
Where can an organization place the information security unit? Where should (and shouldn’t) it be placed?
Into what four areas should the information security functions be divided?
Part 2: Module Practice
Design three security posters on various aspects of information security using a graphics presentation program and clip art. Describe the methods you used to develop your design.
.
Part 1A persons lifestyle has a significant influence on the p.docxMARRY7
Part 1:
A person's lifestyle has a significant influence on the person's health and development as he or she moves into middle age (and old age). Stability and change are also common factors in an adult's life.
Describe how middle adulthood provides stability in a person's life. Explain some of the factors that would lead to stability in a person's life as he or she moves through middle age.
Describe some of the more common lifestyle issues that have a negative impact on a person's continued development. Explain how a person may be able to reverse some of the lifestyle influences.
On the basis of your readings, describe what is meant by a midlife crisis. Explain why a midlife crisis may or may not be critical.
Part 2:
Erikson, Gould, Helson, and Levinson provide different perspectives on middle age in adulthood.
Describe each of these theories as it relates to middle adulthood.
On the basis of your readings, compare and contrast these theories. Which one gives a better explanation of middle adulthood?
Justify your answers with appropriate reasoning and research from your text and course readings. Comment on the postings of at least two peers, and provide an analysis of each peer’s postings while also suggesting specific additions or clarifications for improving the discussion question response.
.
Part 1 Review QuestionsWhat is the definition of information secu.docxMARRY7
Part 1: Review Questions
What is the definition of information security? What essential protections must be in place to protect information systems from danger?
Define the InfoSec processes of identification, authentication, authorization, and accountability.
Define project management. Why is project management of particular interest in the field of information security?
What are the five basic outcomes that should be achieved through information security governance?
What is a threat in the context of information security? How many categories of threats exist as presented in this chapter?
Part 2: Module Practice
Find an article that talks about relative risk either from inside the organization or form external sources. Once you locate and read it, compose a 1-2 page paper that summarizes your findings and critique the article. Use a word processor to complete your assignment and submit it as a .docx or .doc document.
.
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxMARRY7
Part 1: Review Questions
What is a security model?
What are the essential processes of access control?
Identify at least two different approaches used to categorize access control methodologies. List the types of controls found in each.
What is COBIT? Who is its sponsor? What does it accomplish?
What is the standard of due care? How does it relate to due diligence?
What is baselining? How does it differ from benchmarking?
Part 2: Module Practice
Make a list of at least ten information security metrics that could be collected for a small internet commerce company with 10 employees. For this senario, the company uses an outside vendor for packaging and distribution. Whom should the metrics be reported?
.
Part 1 Listed below are several key Supreme Court decisions that .docxMARRY7
Part 1:
Listed below are several key Supreme Court decisions that resulted in a clarification of inmate rights.
Choose any one
of the cases listed below. Summarize the facts of the case, the issue that needed to be resolved, the court’s decision, and the reasoning behind the decision.
Helling v. McKinney
(1993)
Washington v. Harper
(1990)
Hudson v. Palmer
(1984)
Bell v. Wolfish
(1979)
Bounds v. Smith
(1977)
Estelle v. Gamble
(1976)
Wolff v. McDonnell
(1974)
.
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxMARRY7
Part 1: Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
Document the potential security vulnerabilities and a security design for your e-commerce company.
Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
Use sources to support your writing.
Choose sources that are credible, relevant, and appropriate.
Cite each source listed on your source page at least one time within your assignment.
Part 2: Updated Gantt Chart
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.
.
part 1 I attended an international conference on Biotechnology and .docxMARRY7
part 1: I attended an international conference on Biotechnology and one of the sessions I went to was on the subject of bio-engineering a "death gene" that could be introduced into the mosquito population and destroy every mosquito on earth. The discussion that ensued was about the ethics of such a thing. I want you to tell how you feel about introducing such a gene. Look up something about this. Your reference does not have to be about this particular gene, but can be about anything that relates to the discussion. Remember to cite your reference, and write at least 150 words
part 2:
Respond to another student
respond to this
I think that with regulation of the mosquito communities would be a good thing. Mosquitos carry many dangerous diseases and if we can lower the population we can slow the rate of transmission of these diseases. This could save many many lives around the world. I would be hesitant though to release the genetically engineered mosquitos into the environment. In the article I read they releases sterile male mosquitos into the environment. This I feel is a safer way to regulate because we are not altering any genes we are just regulating a naturally occurring issue in nature. Sterile males cannot pass on the genes and also male mosquitos are not the ones who would be likely to pass on the diseases. The article stated that only females bite and therefore males would not be capable of spreading the diseases. With sterile males being released there will be less mosquitos due to lack of repopulation. This will still allow organisms relying on mosquitos for food to still be able to survive with less risk to humans. They are an invasive species so it would help to eliminate the spread of mosquitos to different areas. This will keep the spread of disease throughout areas. I do not think it is right to alter the genes for human use though. It is not how nature had intended. If the gene pops up naturally in the population then it should not be taken out but we should not introduce it due to humans "playing God" with genetics. "Mosquitoes Engineered To Kill Their Own Kind." NPR. NPR, n.d. Web. 22 July 2014. .
.
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxMARRY7
Part 1:
Chapter 7 Summary plus end of chapter discussion of Alfred Marshall, should be 100-250 words
Part 2: The discussion on the first 7 pages is a satire on the economists (known as the neoclassical economists).
List 4 passages that can be considered satire.
(You need not write the entire passage.
Simply show clearly where the passage begins and ends.)
.
Parent Involvement Plan This week you will create a Parent Involve.docxMARRY7
Parent Involvement Plan
This week you will create a Parent Involvement Plan in response to the following scenario:
Imagine you are working with infant, toddler and preschool aged children in a child care center. The majority of the children has special needs and receives early intervention or are on an IEP. Many of the children’s parents work two jobs and have a difficult time participating in the center's activities. Whenever the center plans an event, the parental involvement is lower than desired. The center has tried to increase parental involvement through such methods as calling to remind parents and sending home notices, but is not having any luck.
Your assignment is to create a Parental Involvement Plan to encourage better participation from parents. Follow these steps to develop your plan:
Step 1:
Identify the issue, discuss your beliefs about the situation, and formulate conclusions and offer suggestions to the director of the child care center.
Step 2:
Create a Parent Involvement Plan that your director can copy and paste into the employee and parent handbook. Your plan should include:
The importance of early intervention and individual educational plans
Ways to assist students and their families
The importance of parent involvement
Please use the template provided and your rubric as your guide to completing this assignment.
.
Parenting Practices Over GenerationsGeneration 1 Years children.docxMARRY7
Parenting Practices Over Generations
Generation 1: Years children were raised (19XX-XXXX)
Generation 2: Years
Generation 3: Years
Parenting Practice 1: Education
Parenting Practice 2:
Parenting Practice 3:
Parenting Practice 4:
.
ParamsThe interface must be pleasing to look at (a basic form wit.docxMARRY7
Params:
The interface must be pleasing to look at (a basic form with the four fields listed below, a playlist queue (checked listbox) and media player will suffice).
There must be a separate file that will contain information about each soundtrack in your system. That information will be:
Title;
Artist;
Note area;
Type; and
Anything else that you wish to include on each record.
There must be a way to add data to this file.
There must be a way to delete data from this file.
There must be at least one report using data from the file.
There must be a queue to allow you to play selected music tracks in sequence (like two in a row) without manual intervention.
There must be a way to show the data in at least two different sequences (by title, by artist, etc.).
There must be documentation explaining how your Jukebox works (how you add songs, play songs, etc.).
Currently there is a Text file that contains the information about the wav files to be played, several wav files that the text file references. I have also made an access database from the text file.
.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Brand Guideline of Bashundhara A4 Paper - 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
1. http://dio.sagepub.com/
Diogenes
http://dio.sagepub.com/content/53/1/11
The online version of this article can be found at:
DOI: 10.1177/0392192106062432
2006 53: 11Diogenes
Lyman Tower Sargent
In Defense of Utopia
Published by:
http://www.sagepublications.com
On behalf of:
International Council for Philosophy and Humanistic Studies
can be found at:DiogenesAdditional services and information
for
3. utopia can be dangerous, utopian visions are absolutely
essential, that we must
choose utopia.1 Today, I want to try to give you the essence of
that argument while
also relating it to some new issues. Let me summarize my
argument:
1. Hope/desire for a better life in this life is a central aspect of
the human experi-
ence.
2. That hope/desire has often been distorted by ideology and
religion.
3. That hope/desire has often been captured to serve the
economic and political
ends of the powerful.
4. When that hope/desire is distorted or captured, it can become
dangerous.
5. That danger usually comes about because the hope/desire is
warped so that the
better life is only for a select few or in-group, thus creating an
out-group, an
other, who can be neglected, harmed, even killed to achieve the
end. Such
groups have included members of other religions, indigenous
peoples, other
ethnic groups, ideologies, and so forth. The boundaries of the
other have often
been changed to include some formerly in the in-group.
6. Even so, that hope/desire for a better life is the only effective
means of over-
coming such distortion/capture.
5. 2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
being recognized through this meeting, Bartolomé de Las Casas
(1474–1566) and
Vasco de Quiroga (1470–1565). In 1537, Pope Paul III felt the
need to declare the
Indians human. Both the utopians Las Casas and Vasco de
Quiroga, limited as they
were by their time period and beliefs, wanted to create a world
in which the indige-
nous peoples, who were being defined as alien, non-human
others, were instead
treated as human beings worthy of respect. Another utopian,
Roger Williams (1603?–
83) in colonial North America, reported an Indian saying, ‘We
wearne no Clothes,
have many gods, And yet our sinnes are lesse: You are
Barbarians, Pagans wild, Your
Land’s the Wilderness’ (Williams, Key into the Language of
America [1643] qtd. in
George H. Williams, 1962: 103).
The Dutch sociologist F. L. Polak argued that if we lost the
vision of eutopia (he
called it ‘positive images of the future’), western civilization
would fail, and he con-
tended that we were already moving in that direction when he
was writing in the
1950s. The US architect and social critic R. Buckminster Fuller
entitled one of his
books Utopia or Oblivion: The Prospects for Humanity. That
was in 1969. I want to say
something similar (and I do not limit this to western
6. civilization); if we lose eutopia,
if we lose hope, we lose our humanity. But there are both
inclusive and exclusive
utopias, and the differences between the types provide one of
the main reasons for
utopia being both necessary and potentially dangerous.
In the 20th century and so far in the 21st century, it is all too
easy to make a case
against utopias. In the 20th century, we saw the utopias of
communism and fascism
turned into their own dystopias. With the fall of communism,
we saw the establish-
ment of a free-market utopia that for many people rapidly
became its own dystopia.
And in the 21st century, we seem to be reverting to exclusive
utopias that are for
most people inseparable from dystopia. George W. Bush is as
much a utopian as the
Taliban and other Islamic extremists, and they are both certain
that they are doing
their god’s work. Both of them know that they have the truth,
and with power and
the willingness to impose their truth, they create dystopia in the
name of utopia.
I have argued for many years that the only way to overcome
utopia become
dystopia is with a new eutopia, but we have seen the communist
utopia/dystopia
replaced with the free-market utopia/dystopia and should
recognize that something
more has to be said. One of the problems can be seen in the
relationship between
utopia and ideology, but not as used by Karl Mannheim.2
Ideology, as most com-
7. monly used today, refers, with variations on the basic themes,
to:
. . . a system of values and beliefs regarding the various
institutions and processes of
society that is accepted as fact or truth by a group of people. An
ideology provides the
believer with a picture of the world both as it is and as it should
be, and, in doing so, organ-
izes the tremendous complexity of the world into something
fairly simple and under-
standable. (Sargent, 2006: 3)
As such, every ideology contains a utopia, and the problem with
utopia arises when
it becomes a system of beliefs rather than what it is in almost
all cases, a critique
of the actual through imagining a better alternative. I think of
utopia as a carnival/
funfair mirror in reverse; we hold the distorted contemporary
society up to the
mirror and it shows us a better possibility.
Diogenes 209
12
Diogenes 209 1/12/06 11:32 AM Page 12
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
One thing that constantly irritates me in writing about utopias is
8. the use of the
words ‘perfect’ and ‘perfection’. In English the words mean
finished, completed,
without future change. Thomas More did not pretend that the
society in his Utopia
was perfect; Edward Bellamy’s eutopia Looking Backward is
changing, and did
change in that he wrote a sequel that had differences. H. G.
Wells says that the
eutopia in Men Like Gods is rapidly changing. The only utopias
that I can think of that
can be said to be perfect are some myths of an earthly paradise
and some of the
depictions of heaven that were popular in the late 19th century.
The overwhelming majority of utopias were not written as
depictions of unchang-
ing perfection. I think of them as like a photograph which
captures a moment in time
that has had a past and will have a future, and that future will
be different, although
less so than the past. Northrop Frye wrote that ‘most utopias
have built-in safe-
guards against radical alteration of the structure . . .’ (1967: 31)
and saw this as a
problem, but it strikes me as simply to be expected. If you have
finally gotten some-
thing to work, you want safeguards against ‘radical’ – and the
word radical is impor-
tant – changes in the structure, but that does not suggest that the
utopia should be
considered perfect. Change is possible, even expected, just not
radical change.
Think of the originating text, More’s Utopia (1516) and its
imposition of slavery for
9. leaving town without permission, or A Pleasant Dialogue
betweene a Lady called Listra,
and a Pilgrim (1579), probably by Thomas Nicholas, which has
a peculiarly vicious
system of punishment to enforce honesty; for example, a judge
found to have taken
a bribe has his leg sawn off with a wooden saw. J. C. Davis, in
discussing his defini-
tion of utopia, says ‘The utopian is more ‘realistic’ or tough-
minded in that he
accepts the basic problem as it is: limited satisfactions exposed
to unlimited wants’
(1981: 37) and later says, ‘The utopian mode is one which
accepts deficiencies in
men and nature and strives to contain and condition them
through organisational
controls and sanctions’ (370).3
The examples of the utopia become dystopia of communism and
fascism led
thinkers like Karl R. Popper in The Open Society and Its
Enemies (1945) and Jacob L.
Talmon in Utopianism and Politics (1957) to argue, as Talmon
put it:
Utopianism is based upon the assumption that reason alone –
not habit, or tradition, or
prejudice – can be the sole criterion in human affairs. But the
end of this assumption is that
reason, like mathematics, must command universal consent,
since it has sole and exclusive
truth. In fact, reason turns out to be the most fallible and
precarious of guides; because
there is nothing to prevent a variety of ‘reasons’ from cropping
up, each claiming sole and
exclusive validity, and between which there can be no
10. compromise, no arbiter except force.
(13)
And there is a case here. Too much reason, be it in the 16th or
the 20th century, can
produce dystopia. But so can too little reason. The dystopias
that are bedeviling us
in the 21st century are based on faith and tradition not reason.
If I simply replace
reason with faith and tradition in the statement by Talmon just
quoted, the result is
the same. It is not utopianism that is at fault, it is the insistence
that a particular
utopia is the only correct way of living that is the problem.
One of the dominant themes in the writings of Isaiah Berlin
serves, in a quotation
Sargent: In Defense of Utopia
13
Diogenes 209 1/12/06 11:32 AM Page 13
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
from Kant, as the epigraph of one of his books – ‘Out of timber
so crooked as that
from which man is made nothing entirely straight can be built’.
Berlin puts this
insight into a cultural and national context, saying:
11. Freedom . . . is . . . to be at home, not to be impinged upon by
what is not one’s own, by
alien obstacles to self-realisation whether on the part of
individuals or civilisations. The
idea of the earthly paradise, of a golden age for the whole of
mankind, of one life which all
men live in peace and brotherhood, the Utopian vision of
thinkers from Plato to H.G. Wells,
is not compatible with this. (Berlin, ‘Apotheosis’, 225).
Berlin relates this, in what was the title of one of his essays, to
‘The Decline of
Utopian Ideas in the West’.
As I was working on an earlier version of this essay I came
across a book by the
economist Albert O. Hirschman that had a title that seems to me
to sum up the
message of utopianism, A Bias for Hope. Certainly, utopias are
pervaded with that
bias. And, I argued in the first essay I published on utopias that
even dystopias have
a positive message in that they are most often explicitly
warnings of what will
happen if we don’t shape up. The dystopian is a Jeremiah telling
us of the conse-
quences of our actions but holding out the hope that we can
change (Sargent, 1966).
Are there utopians today? Yes, and for good and ill. As I
suggested earlier the
Islamic extremists and the neo-conservatives in the United
States are both hoping to
impose their visions of the good life on a mostly unwilling
world. But, fortunately,
there are also other utopians, ones who believe that these
12. utopias are in fact
dystopias, utopians who are in the model of Las Casas and
Vasco de Quiroga.
Oppositional utopianism is essential to keep alive the vision of
a world without
‘others’, without an oppressed. And we only need to look
around us to see these
utopians alive and well in our world. Some might not agree with
all my examples,
but I see utopianism in Liberation Theology, which has spread
from its roots in
South America into Black, Womanist and Mujerista in the
United States, all of which
keep alive a vision of a world without debilitating divisions
based on class, gender,
ethnicity and race. I see it in those Islamic theorists who argue
for an inclusive rather
than an exclusive Islam. I see it in the Zapatista movement in
Chiapas, which, with
other groups and movements throughout the world, specifically
keeps alive the
dream of a world in which indigenous peoples are not
suppressed and can live a life
they choose. I see it in the World Social Forum, which provides
an outlet for thou-
sands of individuals and groups to meet and develop
alternatives to the dominant
ideologies and the movements that would suppress rather than
free. I see it in the
continuing relevance of movements like feminism and
environmentalism that
remind us of ways we can change our own lives. I see it in the
thousands of inten-
tional communities still in existence or being founded where
people choose utopia
for their own lives now, and work with others to create their
13. vision. There are more
such communities in existence today than at any time other than
the height of the
communal movement in the so-called Sixties. And I see it in the
fact that authors still
write positive utopias to hold up a vision to us and dystopias to
tell us it is not too
late to change. And these authors are also writing more complex
works in which the
utopias are troubled and the dystopias hold out hope.
Diogenes 209
14
Diogenes 209 1/12/06 11:32 AM Page 14
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
Utopia become ideology can be dangerous. A utopia that insists
on conformity to
one model can also be used as a tool of repression and has been
all too often. Thus,
personally, I opt for what Albert Camus called ‘the relative
utopia’ and, much more
recently, John Rawls has called the ‘realistic utopia’ (4–6, 11–
12), but it is also my case
that this is the dominant model in utopias and communities.
Most utopias aim to
improve the human lot not by repression but by enhancement,
and as long as we do
not aim for perfection or eliminate the possibility of change,
14. such utopias can stand
up to the all-too-prevalent dystopias of the present. We need
utopias today, and
we need the people who choose to try to live their good life
today in experimental
communities, because they just may help us find the way
forward out of the morass
brought about by those ideologues willing to impose their
version of the good life on
all of us. We must never give up the search for eutopia.
Lyman Tower Sargent
Department of Political Science, University of Missouri-St
Louis
Notes
The definitions I use are:
Utopianism – social dreaming.
Utopia – a non-existent society described in considerable detail
and normally located in time and space.
In standard usage utopia is used both as defined here and as an
equivalent for eutopia (below).
Eutopia or positive utopia – a non-existent society described in
considerable detail and normally located
in time and space that the author intended a contemporaneous
reader to view as considerably better than
the society in which that reader lived.
Dystopia or negative utopia – a non-existent society described
in considerable detail and normally located
in time and space that the author intended a contemporaneous
reader to view as considerably worse than
the society in which that reader lived. The first use of this word
15. is usually ascribed to Negley and Patrick’s
‘Introduction’ to their anthology, but there were much earlier
uses. Deirdre Ni Chuanacháin has recently
noted a 1747 use by Henry Lewis Younge in his Utopia or
Apollo’s Golden Days (Dublin: Ptd. by George
Faulkner) spelled as ‘dustopia’ used as a clear negative contrast
to utopia. Before this discovery, the
earliest usage appeared to be in 1782. See Patricia Köster,
‘Dystopia: An Eighteenth Century Appearance’,
Notes & Queries 228 (n. s. 30, no. 1) (February 1983): 65–6,
where she says that the first use was in 1782 by
Noel Turner (1739–1826) as dys-topia [first three letters in
Greek] in ‘Letter VIII’ of his Candid Suggestions
in Eight Letters to Soame Jenkins, Esq. (London, 1782), 169–
72. John Stuart Mill used ‘dys-topian’ in the
House of Commons. Hansard (12 March 1868, page 1517,
column 1) reports him saying ‘I may be permit-
ted, as one who, in common with many of my betters, have been
subjected to the charge of being Utopian,
to congratulate the Government on having joined that goodly
company. It is, perhaps, too complimentary
to call them Utopians, they ought rather to be called dys-
topians, or cacotopians. What is commonly called
Utopian is something too good to be practicable, but what they
appear to favour is too bad to be practi-
cable.’ According to the OED, Cacotopia was first used by
Jeremy Bentham in his Plan of Parliamentary
Reform, in the Form of a Catechism (1818, Bowring edition of
his Works, 3: 493).
Utopian satire – a non-existent society described in
considerable detail and normally located in time
and space that the author intended a contemporaneous reader to
view as a criticism of that contemporary
society.
16. Anti-utopia – a non-existent society described in considerable
detail and normally located in time and
space that the author intended a contemporaneous reader to
view as a criticism of utopianism or of some
particular eutopia.
Critical utopia – a non-existent society described in
considerable detail and normally located in time and
Sargent: In Defense of Utopia
15
Diogenes 209 1/12/06 11:32 AM Page 15
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
space that the author intended a contemporaneous reader to
view as better than contemporary society
but with difficult problems that the described society may or
may not be able to solve and which takes a
critical view of the utopian genre.
Critical dystopia – a non-existent society described in
considerable detail and normally located in time
and space that the author intended a contemporaneous reader to
view as worse than contemporary
society but that normally includes at least one eutopian enclave
or holds out hope that the dystopia can
be overcome and replaced with a eutopia.
Intentional community – a group of five or more adults and
17. their children, if any, who come from more
than one nuclear family and who have chosen to live together to
enhance their shared values or for some
other mutually agreed-upon purpose (14–15). The term was first
used in 1948 with the founding of the
Fellowship of Intentional Communities (with the exception of
‘critical dystopia’, these definitions come
from Sargent 1994).
1. These include Sargent (2003); Sargent (2004a); Sargent
(2004b); ‘Choosing Utopia: Utopianism as an
Essential Element in Political Thought and Action’, a paper
given at the University of Limerick and
the National University of Ireland Galway in 2003; ‘The
Intersection of Utopianism and
Communitarianism’, a paper given at the Utopian Studies
Society of Europe, Porto, Portugal, in 2004.
This presentation is based most explicitly on this most recent
paper.
2. Unfortunately, when one mentions these terms in tandem, the
specter of Mannheim rises from the
grave. Most people aren’t even aware that the book generally
available under the title was not
written by Mannheim in the form it exists; it was put together
by the first editors/translators from a
book of that title and a miscellany of essays. And while the
book as most people have it contains
some valuable insights, Mannheim scholars generally rate it as
among his least valuable pieces. Also,
utopian scholars seem to enjoy ripping the concepts out of
context and applying them to places they
do not belong.
3. Davis’s approach raises a question not often addressed by
students of utopia, the role of law within the
18. utopia rather than as a means of bringing it about. Miguel Ángel
Ramiro Avilés has addressed this
question in his Utopía y derecho and in an exchange in Utopian
Studies with Shulamit Almog (2001,
2003).
References
Almog, Shulamit (2001) ‘Literary Legal Utopias – Alexander’s
Visit to Kasiah and Law at the End of Days’,
Utopian Studies 12(2): 164–73.
Almog, Shulamit and Amon Reichman (2003) ‘On Law and
Utopia: Rules vs. Principles. A Comment on
Ramiro Avilés’s Reply’, Utopian Studies 14(1): 143–8.
Berlin, Isaiah (1990a) ‘The Apotheosis of the Romantic Will:
The Revolt Against the Myth of an Ideal
World’, in his The Crooked Timber of Humanity: Chapters in
the History of Ideas, ed. Henry Hardy, pp. 207–
37. London: John Murray. Originally published in Italian in
Lettere italiane 27 (1975).
Berlin, Isaiah (1990b) Decline of Utopian Ideas in the West.
Tokyo: The Japan Foundation, 1978. Rpt. as ‘The
Decline of Utopian Ideas in the West’ in his The Crooked
Timber of Humanity: Chapters in the History of
Ideas: 20–48.
Camus, Albert (1972) Neither Victims nor Executioners, trans.
Dwight Macdonald. Chicago: World Without
War Publications. Originally published in Combat (1946) and
trans. in Politics (July–August 1947).
Davis, J[ames] C[olin](1981) Utopia and the Ideal Society: A
Study of English Utopian Writing 1516–1700.
19. Cambridge: Cambridge University Press.
Frye, Northrop (1967) ‘Varieties of Literary Utopias’, in
Utopias and Utopian Thought, ed. Frank E. Manuel.
Boston, MA: Beacon Press, 1967; London: Souvenir Press,
1973, pp. 25–49. Originally published in
Daedalus 94(2) (spring 1965): 323–47.
Fuller, R. Buckminster (1969) Utopia or Oblivion: The
Prospects for Humanity. New York: Bantam.
Hirschman, Albert O. (1971) A Bias for Hope: Essays on
Development and Latin America. New Haven, CT: Yale
University Press.
Diogenes 209
16
Diogenes 209 1/12/06 11:32 AM Page 16
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/
Polak, Fred[erick] L[odewijk] (1961) The Image of the Future:
Enlightening the Past, Orientating the Present,
Forecasting the Future, trans. Elise Boulding, 2 vols. Leyden:
A. W. Sythoff; New York: Oceana
Publications. Originally published as De Toekomst is verleden
tijd: Cultuur-futuristische verkenningen, 2
vols, Utrecht: W. de Haan, 1955. Reprinted as The Image of the
Future, trans. and abridged Elise
Boulding. San Francisco: Jossey-Bass, 1973.
20. Ramiro Avilés, Miguel Á[ngel] (2003) ‘On Law and Utopia: A
Reply to Shulamit Almog’, Utopian Studies
14(1): 132–42.
Ramiro Avilés, Miguel Á[ngel] (2002) Utopía y derecho: El
sistema jurídico en las sociedades ideales. Madrid:
Universidad Carlos III de Madrid, Instituto de Derechos
Humanos ‘Bartolomé de Las Casas’/Marcel
Pons Ediciones Jurídicas y Sociales.
Rawls, John (1999) The Law of Peoples. Cambridge, MA:
Harvard University Press.
Sargent, Lyman Tower (1966) ‘Existentialism and Utopianism:
A Reply to Frederick L. Polak’, The
Minnesota Review 6(1): 72–5.
Sargent, Lyman Tower (1994) ‘The Three Faces of Utopianism
Revisited’, Utopian Studies 5(1): 1–37.
Sargent, Lyman Tower (2003) ‘The Problem of the “Flawed
Utopia”: A Note on the Costs of Utopia’ in
Raffaella Baccolini and Tom Moylan (eds), Dark Horizons:
Science Fiction and the Dystopian Imagination,
pp. 225–31. London: Routledge.
Sargent, Lyman Tower (2004b) ‘Utopische Literatur und die
Schaffung nationaler und personaler
Identitäten’ [Utopianism and the Politics of Identity], in Jörn
Rüsen and Michael Fehr (eds), Die Unruhe
der Kultur: Potentiale des Utopischen. Weilerswist: Velbrueck
Publishers.
Sargent, Lyman Tower (2004a) ‘The Necessity of Utopian
Thinking: A Cross-National Perspective’, in Jörn
Rüsen, Michael Fehr and Thomas W. Rieger (eds), Thinking
21. Utopia: Steps Into Other Worlds, pp. 1–14.
New York: Berghahn Books.
Sargent, Lyman Tower (2006) Contemporary Political
Ideologies: A Comparative Analysis, 13th edn. Belmont,
CA: Wadsworth/Thomson Learning.
Talmon, Jacob (1957) Utopianism and Politics. London:
Conservative Political Centre.
Williams, George H[untston] (1962) Wilderness and Paradise in
Christian Thought: The Biblical Experience in
the History of Christianity & the Paradise Theme in the
Theological Idea of the University. New York: Harper
& Brothers.
Sargent: In Defense of Utopia
17
Diogenes 209 1/12/06 11:32 AM Page 17
at UNIV OF NEVADA LAS VEGAS LIB on September 15,
2011dio.sagepub.comDownloaded from
http://dio.sagepub.com/