Write My Essay Sample:  Movie Analysis
Posted by: Write My Essay on: October 4, 2018

 Sample by My Essay Writer

When we were kings: Characterization

In this 1974 documentary on a heavyweight boxing championship bout in Zaire between George Foreman and Muhammad Ali, Ali comes out as a humorous, bravado, tactful and intelligent character. It helps that Muhammad Ali comes out as the underdog and therefore, he has the sympathy of the viewer right from the beginning. [Click Essay Writer to order your essay]At one point, Ali claims “I’m handsome, I’m young, I’m strong, I’m fast and I can’t be beat” when talking to the press. It’s clear that a lot did not believe him in that press conference just like the odds were stacked against him 7-1. His opponent was stronger, younger and bigger. Ali pulled up an upset in the last rounds creating a myth that lasts forever in the mind of the viewer. The rest of the film depicting his private and public persona reinforces his already established personality of bravery and determination.

42: The Jackie Robinson Story: Setting

The story is set in a black vs. white social conflict setting. The story starts with Jackie Robinson a Black man in the baseball league. He is the first black person to break into the white dominated major league. It’s a very big challenge for both Robinson and Branch Rickey, who recruit Robinson to break the unspoken color line. Off and on the field, Robinson and his family endure some unrelenting hostility based on hostility. As the story progresses, he Rickie begins to find allies among the white. In the end, the viewer is able to realize that the focus of the movie is not so much about the baseball, but to see greatness in color in a struggle between races.

Hoosiers: Theme

This is a film about overcoming adversities. This film is based on a true story of an Indiana team from a small town that makes it to the finals in 1954. The movie is a chronicle of events and attempts by a coach with a tainted past and a basketball-loving drunk in leading their team to victory. The two struggle to insert discipline among a squad of local boys and ultimately turn them into unlikely title contenders. The coach, Norman goes through several challenges, including that of uninterested fathers, a teacher who won’t let the team’s best player go out for the team and some undisciplined athletes. [Need an essay writing service? Find help here.]    The struggles that the team goes through pull the team together and along the way, they pull surprises and ultimately achieve the impossible- a high school team victory that neither they, nor their doubters saw coming.

Field of Dreams: Plot

Ray Kinsella, an Iowa farmer hears a voice in his field, “if you built it, he will come.” Ray interprets the message as one instructing him to build a baseball field right on his corn farm. The ghosts of Joe Jackson as well as other men belonging to Chicago white sox, a group of players that were banned from baseball for throwing the 1919 World Series for exchange for gamblers money come in.  Joe was known to have taken money but it was never proved that he had thrown the game indeed. Ray works through puzzles to understand the full meaning of the voices. He is also under pressure from Anne’s brother who in looking out for his sister’s best interest is pushing Ray away from his plan that looks increasingly absurd.

Erratic Fire, Erratic Passion Poems: Point of View

The poem is written in the point of view of a player, possibly a black player in a basketball game. The narrator does not give his reason as to why it bothers him when playing against a white guy. He seems to have quite a prejudice against white guys because he outlines that he didn’t have a problem with black, yellow or red guys. [“Write my essay for me?” Get help here.]He simply had a problem against white guys. The narrator is an unreliable one because he does not give evidence as to why he dislikes and despises white guys during the game and trash-talks his opponents as soon as they enter the pitch. The closest he comes to giving evidence is when he claims that being guarded by a white guy is “disrespectful to his game” (Parker & Malla, 2015).


Parker, J., & Malla, P. (2015). Erratic Fire, Erratic Passion. New York: Routledge.

Essay Writing Service Sample:The Color Red
Posted by: Write My Essay on: October 3, 2018

Sample by My Essay Writer



Recruitment of Participants

The research subjects for this study were recruited from the collection of friends that the researcher had at FIU. The researcher contacted several potential research subjects and asked if they could meet in the campus library. Each participant was met individually by the investigator, verbally asked if they would consent to be part of a short study and presented with one of the printed test sheets. A total of three research subjects were used to obtain the necessary data.

Implementation of the Study

The participants were given the study materials with either red, green or black instructions. As per the instructions provided by the teacher, the research subjects were not informed beforehand regarding the importance of the coloring and were not aware that the other participants in the study were given test sheets that had a different color. A mobile phone timer was used by the researcher to limit the problem-solving time to three minutes, and a buzzer was used to signal the research subject per session that the total time was over for solving the anagrams. They were then instructed to fill out part two of the study results and were given five minutes to do so.

End of the Data Collection Period

Once the research subjects had finished with all the necessary data input, they were thanked by the researcher and given the study content spiel that was provided by the instructor. The data collection period took one day for the researcher to complete due to the differing schedules of the research participants and the fact that the researcher had to wait till their classes were over.

Results of the Study


The results of the study showed the following scores per participant based on the color of the instructions on their questionnaire: Red (6) correct answers, Green (13) correct answers, Black (12) correct answers. Overall, the study results showed that the participant using the red instructions had a lower level of performance when compared to the other research subjects.

Examining Participant Perceptions on the Test

a.) Perceived challenge on the anagram task

The results of the analysis showed that the average conclusion among the participants was to consider the test as being somewhat challenging: Green (5), Black (5), while the research subject with the red instructions found it extremely difficult Red (7).

b.) Perception on the Performance of Others on the Task

In this case, the results of the analysis showed a similar result to the first question where the Black (4) and Green (5) had a similar impression regarding how others would perceive the test. The same situation was seen in the case of the Red (9) participant with the results showing that they assumed that others would find the task equally as difficult as they found it.[Click Essay Writer to order your essay]

c.) Frustration of the Participants

Oddly enough, all the participants answered similarly for the third question wherein they all stated that the anagram task was somewhat frustrating (they all had an answer of six). The congruence between the different participants to arrive at the same answer could be indicative that while the anagrams were difficult, they were not perceived as having the same level of frustration as other tasks that they deal with while in FIU.

d.) Perspective on Performance

The mean on this answer was five since the participants who had the green and black questionnaires perceived their performance as being average considering the amount of blank spaces they left. In the case of the participant with the red questionnaire, they selected the score of “very poorly” given the number of questions they left unanswered.

e.) Accuracy of Color Coding Scheme

All the participants were able to correctly remember the color coding scheme that was used on their questionnaires. Considering the amount of time that has passed, it is not surprising that they would not forget this type of detail.

f.) Perspective on Color Coding Scheme Influencing Performance

A similar case of congruence occurred for this question wherein all the research participants answered with the number 5. They all stated that the color did not impact how they performed during the exercise. Based on this, it can be assumed that the participants are not aware of the potential correlation between color scheme and performance and merely attributed the use of red, green or black as the desire of the researcher to outline the instructions.


Examining Perception and Performance

The results of the study revealed that the color of the instructions did have an impact on how the study participants tackled the anagrams with the research subject receiving the instructions in red showing a much lower level of performance compared to the other individuals involved. The resulting data from the perspective of the students on the anagram questionnaire revealed that research subject Red perceived the task as being harder, more frustrating and thought that they did poorly on it. [“Write my essay for me?” Get help here.]

In comparison, research subjects Green and Black noted that while the anagram exercise was tough, it was not overly complicated and did not feel the same level of frustration with the task. What this outcome shows is that color can often influence perspective and could potentially cause performance drops based on how it would influence the behavior and attitudes people would have when approaching a challenge they must overcome.

In fact, the data from the performance clearly shows a considerable gap between subject Red and subjects Green and Black. The latter performed almost twice as well as the former and had similar results despite the two having much different color schemes on their instructions. However, the sheer difference between the two scores is something that needs further examination since attitude and perspective should not influence overall performance by this much. The next section will detail the assumptions of the researcher regarding the current large gap in performance.

Examining Contributing Factors

After going over what can be considered as “poor results” from the number of anagrams that the study participant provided with the red questionnaire was able to solve within the given timeframe, the researcher looked at the anagrams that were provided and noticed a discrepancy. In the answer key that was given to all members of the class, the anagram “THWTA” was listed as “WATCH”; however, the letter “c” was missing in all the provided documents.

This discrepancy could either be an error on the part of the professor or was an intentional aspect of the study since the instructions did state “you can do them in order, or you can skip around.” This implies that the missing letter could have been intentionally kept out to see which of the participants were more “mentally flexible” when it came to how they approached the given task. Analyzing the questionnaires revealed that the participants provided with the black and green instructions answered the questions randomly or, as the researcher believes, they filled out the blank spaces based on their observations regarding which anagrams were likely easier to complete and remembered what the instructions indicated.

The participant who was given the questionnaire with red instructions did not have the same random style as the other two research subjects. Each anagram was answered in descending order with only number three being skipped in the lineup. When comparing the performance outcomes from the different research participants involved, it can be assumed that the instructions in red were not as readily internalized as compared to those in green and black.           Considering the data that was presented earlier on in this study involving performance and how people perceived the color red, it can be assumed that while the research subject was reading the instructions on the paper, they did not internalize it given their perspective on the color. As a result, they failed to consider alternative strategies to answering the questions compared to the other participants in the study.

When combined with the current association in this study of red and poor performance, another potential piece of information that can be derived is that the use of red on written instructions can cause people to forget or not even internalize particular details. This can be due to what can only be described as a form of “mental aversion” to the color. [Need an essay writing service? Find help here.]

Another potential reason is that since red causes heightened physical performance, the research participant could have attempted to read the instructions as quickly as possible thereby causing them to miss a few details. This does tend to happen in some cases and assuming the association between red and increased avoidance behavior as stated in the introductory section of this section is accurate, this can explain why the instructions could have been missed due to the participant’s haste to avoid looking at the color red any longer.

Essay Writing Service Sample: Law Enforcement Agencies versus Constitutional Right
Posted by: Write My Essay on: October 2, 2018

Sample by My Essay Writer

Law Enforcement Agencies versus Constitutional Rights: Law Enforcement Interpretation of Encryption of Cell Phone Technology in Violation of the 4th And 5th Amendments

An assessment of the position of law enforcement agencies, the government, the society and the judiciary relating to the interpretation of the Fourth and Fifth Amendments reveals contentions in various situations. Cell phone encryption technology may emerge as an impediment and a violation to the fourth, while the interests of the investigators in compulsion of the provision of such information (or hacking of devices) carries varying translations of legal settings. These considerations, in comparison to the constitutional rights of an individual are essentially a position for the argument of the levels to which the constitution holds ground in legal and criminal prosecutions and investigations. This research process intends to engage these concepts in the development of an appreciation of concepts from criminology and legal studies. Within the development of concepts relating to the position of law enforcement, the discussion develops analytical standpoints for research purposes and attempts to test hypothetical stances within other scholarly discussions on similar and related topics. In addition, possible violation of the fourth and fifth Amendments is defined in the capacity of the individual and the state in response of each other in reaction to handling and prosecution of persons in possession of such encrypted information and devices.

Project Description

The significance of law enforcement agencies within the protection of national security and the interests of the nation plays on a level of importance on its capacity to survey, engage in surveillance and reconnoiter of threats on telecommunication. On the other hand, the entry of constitutional rights towards privacy and preservation of information security is arguably an important social utility. In this regard, this project concerns itself with the assessment of the interaction between these two functions within social space and political concepts on security versus constitutional rights. Through the consultation of the 4th and 5th Amendments, a research process possesses the evidence on which analysis of these interactions becomes either justifiable or excessive.

In the assessment of criminology, both as a function of social space and a threat to security, this analytical process aims at creation of an understanding of the legality of each of the positions of security agencies and private persons in the preservation of their respective interests.   This research question relates to the criminology and legal studies disciplines, demanding information from the theme of comparing of security and morality within a legal environment. Practices chosen by security agencies in surveillance and the attempts by parties under surveillance restrict the extent of the research project in achieving a balanced assessment of the legal aspects of the argument, while in comparison to the criminology of practices in encryption of data exchanged on mobile devices (Joh, 2013). The confines of practices allowable on legal basis in the practice of using virtual networks, tor services and end-to-end encryption define the criminology of publishable offences in similar attempts to privatize communication.  [“Write my essay for me?” Get help here.]

On the other hand, attempts to access such communications through eavesdropping attempts, unauthorized entry and listening on real-time basis can be criminalized in certain situations by the legal provisions available. Such interactions between the two disciplines not only form the basis of discussion for the research process- they also offer directives on research questions and hypothetical stands. In the overall sense, the main question is based on the possibility that the current law enforcement and the interpretation of encryption of telecommunication technology violates the 4th and 5th Amendments. The topics of concern within the identified disciplines involve the inferences of the 4th Amendment right to unreasonable search and seizure followed by the 5th Amendment right against self-incrimination. In addition, there is a consideration of society’s interest in safety versus nature of the crimes committed in encryption.

Background Literature Review

Context for the assessment of the hypothetical expectations relate to published content on various practices in the telecommunication and security sector- with relations to legal provisions and confines. Such theoretical understandings then relate to their application in an actual setting within socio-political influences, threats to security and interests in privacy of citizens. Bernstein (2016) expresses the need for the creation of protocols to understand the significance of telecommunications as a limited private interaction in the face of national surveillance on a large scale. In similar context, an assessment of the interference between the right to privacy and the position of the Fourth Amendment against unreasonable search and seizure. Wagner & Finkelman (2014) attempt to argue the necessity of contravening of some of these laws in the face of security threats such as terrorism or criminal activities (trafficking, murder and significant federal offenses). However, the qualification of the seriousness of an offense and the process of justification of such attempts varies- and is subject to different interpretation. Such variations in the entire approach to understanding the limitation of offenses and their constitutional provisions limits the concepts within criminology theories within the possibility of abuse of legal approach to encryption. On the other hand, it is arguable that the position of private persons should be protected by the constitution regardless of the level of threat that security agencies suspect without proof (Bernstein, 2016). Each of these considerations play significantly towards the theoretical understanding of legal arguments towards the position to be adopted by the interpretation of the constitution.

Implications of the 4th Amendment Right to Unreasonable Search and Seizure

In the setting where a defendant possesses encrypted devices within a setting of suspicious or evidenced criminal activity, their rights are still preserved by the constitution. Such rights, therefore, should include those within the fourth Amendment towards unreasonable search and seizure. Chang (2015) attempts to weigh the tension between privacy and law enforcement by considering the information revolution- which has introduced dynamic limitations to accessing and privatizing communication. In his discussion, the possibility of national security becoming a tool and an excuse for breaking of constitutional provisions emerges- and initiates the argument on the pressure on each position towards the law enforcement agencies. Intelligence (either before, during or after an event significant to national security) is an essential tool for the functioning of security- which is not guaranteed within the Fourth Amendment (Chang, 2015). For the position of the agencies to be defined, there must be distinct evidence for violation of other constitutional provisions by a suspect- the lack of which initiates the limitation against search and seizure.

When a defendant has encrypted cell phone technology, the ‘hacking’ process can be justified or denied by a number of factors surrounding the situation. the legal concepts that the constitutional rights act in dynamic allowance of each other applies, and in each case, the implementation of interpretative ideologies are used to argue the position of the Fourth Amendment in response to the level or reasonableness that is required to institute search and seizure (Lofgren, 2014). The provision of a judicially sanctioned warrant is a common basis for the usage of probable cause to instigate the access of information from an individual’s cell phone. However, the usage of encryption limits the significance of such warrants, since they only permit access and observation (Ohm, 2012). For the agencies to facilitate their investigative processes, means that are more aggressive are necessary- especially with the increasing possibility of criminal activities using advanced encryption to ensure privacy.

Justification of interruptive or destructive interception of communication-, which not only contravenes the limits of the fourth amendment- it, also reduces the efficiency of communication on a significant scale. A comparison of the legal aspects within the applicability of this amendment within telecommunication reveals concepts similar to the argument by Murphy (2013), within which the discussion of arrest, seizure of evidence and searching for additional federal offenses at a crime scene is justifiable. Lofgren (2014) similarly proposes the consideration of the telecommunication interface (a phone call or an internet-messaging platform) as a potential, existing or live crime scene within which probable cause can be the basis for such interruptive search, seizure and arrest as within physical settings. It is possible for a security agency to either engage a digital-eavesdropping warrant to facilitate the observation of criminal activity in surveillance regardless of its consequence on privacy wherever probable cause is obvious (Joh, 2013). Reasonable doubt, however, cannot form the basis for the usage of such warrants, and the interpretation of the situation by a judicial officer forms the basis of approval or rejection of search and seizure within cell-phone definition of terms.

The bill of rights defines the rights of a suspect in similar capacity as other persons- and does not differentiate the position of an agency. This amendment states that people possess the right to be secure, protected by the law against unreasonable searches and seizures, – and does not offer additional situations for interpretations of scenarios excluding this right outside of oaths of warrant. In this respect, Myers (2015) attempts to compare the level of legality and criminality of the practices of private persons in enforcing their personal security against such searches within a digital environment- and on the qualification on the amendments concept, such persons act within their right (but only within the confines of the amendment). However, such interests in extreme security interests not only motivate the instigation of criminal activity because of self-incrimination, motivation and method of commenting offenses within an undetected environment (Myers, 2015). All of these arguments are on a theoretical environment, but still capture the possibility of an advanced discussion on a practical level- where the usage of excessive encryption efforts indicates to security agencies the possibility of criminal activity.

In the overall sense, attempts by private persons to use encryption to ensure privacy and security of communication is within their rights, but delimits their position in response to search and seizure intents by investigative agencies. According to Setty (2015), it is possible to establish functional surveillance environments within which criminology theories and legal requirements can be observed within the interests of societal concerns and security. Such environments, however, only work within ideal settings and the adherence to laws and social constraints are only possible within controlled environments. In this regard, the Bill of Rights in itself provides limits within which provisions such as the fourth amendment can be enjoyed without infringement on other rights. Wilson (2015) offers similar sentiments on constitutional limitations on the limitations of the practice of legal provisions of the constitution. Rights have to be observed on equal observation, and the constitution- on legal platforms cannot contradict itself in interpretation by the security and enforcement agencies. [Click Essay Writer to order your essay]

Implications of the 5th Amendment Right against Self-Incrimination

The provisions of the Fifth Amendment facilitate the interests of self-preservation in legal processes through protecting the individual from compulsion towards becoming a witness against one’s self. On the digital setting, the presence of encryption for devices that makes it impossible for government to use seized information- investigative teams and prosecutors find it necessary to include subpoenas for the provision of information on mobile devices using such encryption. According to arguments by Ohm (2012), the provision of this amendment not only makes it unlawful to forcefully request for self-incriminating evidence, it also limits the position of a court in the prosecution of an individual. However, in the interest of state and security, Taylor (2015) presents opposing arguments in the context that the individual has to facilitate the search and seizure of material, both digital and physical following the Fourth Amendment based on an investigative effort with reasonable cause. In this regard, efforts in law enforcement in this nature can be argued either as justified or unlawful depending on the significance of an investigative process.

Gathering of information within investigations of crimes (before or after they are committed) necessitates the engagements of aspects that may be considered unethical or excessive. However, on the legal front, the definition of requirements and rights against self-incrimination are only subject to interpretative explanation- within which the digital concepts interact on a dynamic and developing scene. Sales (2014) attempts to argue against the presence of subpoenas within legal proceeding that may criminalize an individual through provision of self-incriminating evidence. In addition, one may consider this argument as being oriented towards a rationalization of legal defense for criminals with evidence that has been seized but is unusable due to its encryption. In similar context, Myers (2015) carries concepts towards the interest of criminology, and within the position of a prosecution towards accessing information protected through encryption. The right of access by law enforcement towards such encrypted information is only necessary attributable to reasonable cause- permitting their entry, observation and collection of evidence according to the fourth amendment. However, there exists the understanding that the position of such agencies still subscribes to privacy rights and these are not reversible by forcing an individual to incriminate himself.

Encrypted cell phone technology not only poses limitations to the extraction of information from digital storage, it also facilitates the development and storage of criminal content. Curtis, Gizzi and Kittleson (2014) argue that the implications of communication from such phones arises from the responses initially offered to subpoenas. The production of requested information is mandatory, and its usage on a testimonial level factors in other rights within the legal process of prosecution. This argument carries the possibility that implied communications (outside encryption) forms basis of testimonial requirements without contravening the Fifth Amendment. It also carries the ideologies that the criminal position of an individual compelled to produce information are adjustable by the law enforcement (through deals for immunity) for the facilitation of evidence in such difficult environments (Sales, 2014). Therefore, it is arguable that the position of a law enforcer is within the observation of the law and the protection of persons under prosecution (or as witnesses) to obtain information without infringing on rights. Such tactics result in the obtaining of evidence within legal and criminal capacities of the provisions of the amendment.

It is possible to compare the position of the legal context of digital content with the translations of the Supreme Court in the handling of the Fourth and Fifth Amendments in physical evidence. With the example of the provision of a key to a safe versus the provision of a combination for such a safe, Sales (2014) attempts to weigh the position of a witness on a testimonial setting. The provision of the physical key is not classifiable as testimonial evidence while the provision of a combination for a safe can- and in this way any physical evidence is obligatory and can be demanded through the Fourth Amendment- but any digital information that is self-incriminating is within the protection of the Fifth. The rationale for legal position on communication through encrypted phones, therefore, should be classified (and defined) by a legal position,- but within the entry of non-testimonial evidence (Curtis et al., 2014). As such, the argument transforms into the dichotomy of provision of the knowledge an individual facing prosecution and as defined by the Supreme Court’s values towards this amendment.

Society’s Interest in Safety Superseding Constitutional Rights

The position of societal interests in response to government interest on a legal basis commonly calls upon the constitutional guidelines to achieve a balance between the observations of either. From the Fifth Amendment’s core value, a discussion of the benefits from privacy and security are the common assessment points for the privileges enjoyed by the individual and those for the state agencies. Wilson (2015) presents the point of debate as being the level to which a court can compel the individual to break privacy interests in observance of legal necessitates and subpoenas. As a defendant, the individual exists within the society as a functional member and less as a criminal offender until proven so. Therefore, the provision of documents, conversations and material (both incriminating and non-implicating) is an invasion of privacy within the societal perception. However, the interest of the society towards security facilitates the presence of investigative protocols relating to reasonable cause-, which is subject to translation by legal and criminal theoretical perceptions. In this setting, the position of the society must arrive at an understanding of the level of state-individual balance.

Since there are legal provisions for subpoenas and warrants, the investigative interests of the state can become functional without the consideration of the points under discussion. Cole (2016), however, presents the practical situation of a jurisprudential lodestar that is the basis of recognition of the resolution of conflict on privacy and constitutional protection. The treatment of an individual as a witness in necessitates the provision of all available evidence towards acquittal of a suspect- and such evidence may involve data on encrypted mobile devices. In as much as constitutional protection covers the suspect, the societal interests may not- and in such scenarios, the criminology context of investigations necessitates a secondary discussion of the Fifth Amendment doctrine. Custodial interrogation of suspects of criminal cases (such as terror suspects) is a possible scenario- where the privileges of individuals compare to their legal position. As such, the presence of complementary evidence requiring information from encrypted devices is not self-incriminating until the content emerges. However, if a suspect invokes their right against self-incrimination- the evidence is immaterial (regardless of whether it contains incriminating content or not).

Arguments that public safety may at times outweigh the need for observation of the privilege from an amendment does not appeal to a legal setting, since it goes against the position of individual liberty. Wilson (2015) argues that the process of obtaining evidence and prosecuting criminals lies within the ability of a security agency to incorporate legal and principle-based provisions at its disposal. Societal principles towards the individual form the basis for social pressure and popular opinion relate towards the difficult of legal delimitation restricts the position of the government towards the observation of both its interests and societal interest. The pursuit of justice, as sponsored by the government’s agencies is within the obtaining of evidence- and with the prevalence of information in encrypted devices in modern day-; societal perceptions are constantly changing (Murphy, 2013). This concept relates to the integration of the fourth and fifth amendments- within the challenging of immunity of an individual against the exposure of information in their devices. In the overall assessment, it would be difficult to compare which amendment suits the pursuit of just dealings between the state and the individual- but the interpretative presence of a Supreme Court functions in the pursuit of a balance.  [Need an essay writing service? Find help here.]

The Competing Interests of Security and Constitutional Rights

The nature of the crime is a significant contributor towards popular opinion and social perspectives, – which are significant influences on government operations on a political scene. However, according to Knight (2016) it is possible for the legal institution and function to separate from the law enforcement approach chosen by agencies in certain situations. The concept of criminology versus legal frameworks comes into play with the development of the competing interests between constitutional and security interests. These competing interests can become the basis of attempting to understand the levels at which competing interests can reach as impacts on the legal process and societal perceptions towards the constitution (Cole, 2016). In this respect, crimes with national security implications may vary on the perceptions towards the interpretation of laws and the presence of variations in social perceptions.

Competing interests of security and constitutional rights are either in the context that the social pressure or governmental influence possesses a bearing on legal proceedings. The ideal setting, consistent with concepts by Torres?Spelliscy (2016), involves the conduction of investigation through the application of the ideals of a government agency within the constitutional provision s such as the 4th amendment and the inclusion of a consistent reporting of the criminal and legal position adopted by the organization in each process. In this regard, it becomes possible to create security and constitutional protocols within the existing legal framework. However, this ideal setting is flawed by the prioritization of either interest in the capacity of either the fast tracking of investigations or societal pressure due to the usage of state agencies to request for data from devices considered private in previous interpretations to the technology.

The entry of encryption software and modifications to smart handheld devices has modified the process to incorporate a competition between interests. Sales (2014) researches the position of societal perceptions regarding potential security threats, with the possible balance between threats from significant security challenges (terror, drug trafficking) and interests in security. Mass surveillance, as a contributor to social interests in security matters may be a common aspect of argued conflict, but within its level of necessity in the fight against national security threats, it is possible to moderate the social perspectives towards such measures. It also becomes possible for research teams to engage and evaluate evidence outside its constitutional capacity- within which legal interests may be overlooked due to external influences of law enforcement processes.

In the overall understanding, therefore, the constitutionality of some practices within the social setting is subject to influence by popular opinion or political positions of persons executing these processes. As such, it becomes imperative that judicial processes form a basis on the comparison of true constitutional interpretations and extra judicial investigations. Such protocols may be unjustifiable- but are more integrated into the culture of persons carrying out the legal and constitutional burden for addressing of all these aspects and still achieve a balance on either field of interest in such situations.

Methods of Analysis

            The initial statement of the problem captured interest in exploration of the aspects surrounding constitutional and legal provisions in the fourth and fifth amendments in the capacity of the legal and criminal systems. In this regard, the establishment of theoretical concepts will involve the assessment of previous content on the subject within the research context- with the contribution of research by persons in the criminal and justice systems. As the initial attempt towards the appreciation of the concepts involved, it will rely on secondary sources of research data and contexts in analysis of social and government practices in practices involving these amendments. The comparison of various cases (their handling and the social environment experienced) will facilitate the development of connections between theoretical concepts adopted in the hypothetical projections. In addition, such comparisons not only advance the understanding of the contexts in which the constitutional provisions towards rights apply. The continued revision of the interpretations developed in each context will facilitate the understanding of the interests of the government versus those of the society. In the position of the individual, similar context, secondary research will still facilitate the understanding of either concept.

Following the development of the practical contests of each scenario, it becomes necessary to carry out critical analysis of the hypotheses passing this stage. As a contributor to the overall analysis of concepts, – this evaluation of initial hypothesis will intend to eliminate untrue assumptions and develop functional concepts for application on a theoretical scene similar to the previously analyzed cases. The evaluation, therefore, will involve a comparison and contrast of standpoints from literature appraisals and a compilation towards the relation of information bits from such literature for either qualitative assessments from previous research and adjustments to meet the requirements of this research topic. In this respect, the impression of accuracy and entirety of the research process will be created from the elimination of bias through a secondary analysis of ready data. Following this presentation of research concepts after a refinement, it will become possible for the researcher to revisit the research question and use the developed standpoints to address each of the concepts questioned- either in the constitutional or legal processes of criminal prosecution.

In as much as these methods of analysis are subject to change, the data collection approach adopted limits the possibility of bias, error or inaccuracies. In addition, the basis of qualitative data reduces the possibility of occurrence of such limitations to the research process. Consultation with the faculty mentor will facilitate the development of the research process, and the moderation of the focus of the research and data collection as a general effort. Within each phase of data collection and analysis, it is possible for the advancement of the initially intended research projects.


The 2015 San Bernardino shooting presents evidential arguments towards the position of law enforcement agencies in response to encryption of data on mobile devices. The necessity of accessing cell phones for evidence or critical information during an investigation became apparent during this investigation by the FBI. The context of the investigation not only captured the interest of an investigative authority to compel an individual to reveal encrypted information, it also captured the position of corporate and societal players in similar (Torres?Spelliscy, 2016). In as much as the entire experience involved the avoidance of the usage of Apple’s corporate position, it involved the argument of the position of each contributor into the situation- and with the eventual efforts into accessing the information on the phone. Since the eventuality was the bureau hacking into the phone (without external help), it circumvented the contribution of the individual which would have contravened the fifth amendment on self-incrimination, and was still in the right of the bureau in searching and seizing. In addition, comparably similar cases will be integrated in the research process as the basis for practical integration of theoretical position of either the researcher or the theoretical assessments by previous research stance. [“Write my essay for me?” Get help here.]

The research process intends to integrate the potential of additional cases emerging with the advancement of encryption technology and digital protection of privacy. In comparison to the initial standpoint of the fourth amendment towards entry, search and seizure as based on a residence or a physical setting, the need to define digital jurisprudence plays into the research topic and the questions to integrate the research process. In the evaluation of legal studies as a basis, the most significant evidence is from the previous legal occurrences of the recent past involving digital information access and encryption of such information within the legal system. An assessment of the approaches and decisions adopted in the consideration of digital devices outside telephony will offer suitable basis for the consideration of the potential of increase of cases oriented towards mobile phone encryption and cases concerning security at various national interest levels (Curtis et al., 2014).  Such position from the government and the legal setting provide qualitative data towards evidential analysis of their perceptions in relation to the project question.

Investigations involving law enforcement with concerns in the process of accessing and retrieval of data as a form of evidence necessitate the research assessment based on records of similar nature within the system. Curtis et al. (2014) integrated a theoretical approach into discussion of the usage of cell phones as tracking devices, and such approach seems suited to this research process for the comparison of concepts from scholars. In addition, the usage of the cases indicated (San Bernardino) and the investigative efforts of the FBI over the last five years, it will be possible for the usage of records as a basis for the specification of evidence and the extended discussion of research processes.

June 27, 2014


In the overall consideration of the concepts from craniology and legal studies presents a thought-provoking discussion on the comparison of the interests of national security versus privacy. An assessment of literature on the constitutional and societal reveals varying positions of legal and criminal analysts who base their analysis on social and legal cases from previous discussions of the same. In summary of the content, it is possible for the legal system to position the interests of investigative agencies as in the case of San Bernardino in 2015 that integrated struggles between departments. The interaction between the FBI and Apple in the provision of data from the individual under investigation reveals additionally arguable concepts for analysis in the legal and criminal prosecution fronts. The project’s position, on a hypothetical basis, can either relate to agreeing to existing interpretations through research processes or the creation of newer legal perceptions and criminology understandings towards digital encryption of devices.

In the understanding of the current position, this proposal assumed the standpoint of theoretical truths within a practical environment-, which may require additional consideration for authentication and substantiation. Therefore, it is possible to conclude that as a research interest, the concepts and contexts within the positions of the constitution, the legal system and society are at a gridlock that requires analysis to fully appreciate and modify. Apart from discussion of the interests of either the government or the society (and the individual), it is imperative that the contribution of constitutional interpretations play a significant role in understanding of all aspects under analysis throughout.


Bernstein, H. (2016). The need for Fourth Amendment protection from government use of cell site simulators. Santa Clara Law Review, 56(1), 177-206.

Chang, C. (2015). New technology, new information privacy: Social-value-oriented information privacy theory. National Taiwan University Law Review, 10(1), 127-175.

Cole, D. (2016). Countering transnational terrorism: Global policing, global threats and human rights. The SAGE Handbook of Global Policing, 429-442.

Curtis, R. C., Gizzi, M. C., & Kittleson, M. J. (2014). Using technology the founders never dreamed of: Cell phones as tracking devices and the Fourth Amendment. University of Denver Criminal Law Review, 4, 61-101.

Joh, E. E. (2013). Privacy protests: Surveillance evasion and Fourth Amendment suspicion. Arizona Law Review, 5(4), 997.

Knight, R. (2016). National security or consumer privacy? A question even Siri could not answer. The University of Cincinnati Intellectual Property and Computer Law Journal, 1(1).

Lofgren, Z. (2014). Do modern Americans have Fourth Amendment protection? Santa Clara Law Review, 54(4), 901-929.

Murphy, E. E. (2013). The politics of privacy in the criminal justice system: Information disclosure, the Fourth Amendment, and statutory law enforcement exemptions. Michigan Law Review, 111(4), 485-546.

Myers, E. S. (2015). Containing cell phones? Restoring the balance between privacy and government interests in fourth amendment cell phone searches and seizures. Suffolk University Law Review, 48, 203-227.

Ohm, P. (2012). The Fourth Amendment in a world without privacy. Mississippi Law Journal, 81(5), 1309-1356.

Sales, R. M. (2014). The “biometric revolution”: An erosion of the Fifth Amendment privilege to be free from self-incrimination. University of Miami Law Review, 69(1), 193-240.

Taylor, C. A. (2015). The fiction of privacy under the Fourth Amendment: Examining warrantless cell phone searches in the context of Riley v. California. Northern Kentucky Law Review, 42(2), 395-417.

Torres?Spelliscy, C. (2016). A locked iPhone; unlocked corporate constitutional rights. University of Pennsylvania Law Review, 164, 287-292.

Wagner, A. R., & Finkelman, P. (2015). Security, privacy, and technology development: The impact on national security. Texas A&M Law Review, 2(4), 597-633.

Wilson, S. (2015). Compelling passwords from third parties: Why the Fourth and Fifth Amendments do not adequately protect individuals when third parties are forced to hand over passwords. Berkeley Technology Law Journal, 30(1), 1-38.








Research proposal presentation and submission Initiation of research

Initial hypothesis formulation

Research process design Execution of data collection, compilation and analysis Analysis of content, discussion and comparison to hypothesis Revising/redrafting Conclusion and presentation of results
Start date              
Duration 1 week 1 ½ weeks 2 weeks 30 days 1 week 1 week 2 weeks
Comments Time required for revision and reconsideration of the proposal concepts Establishment of hypothetical standpoint Establishment of data and resource collection protocols Collection of relevant information Discussion and consideration of research content Correction and revision of presented content Finishing up and presentation of the realizations of the research



Essay Writing Sample: How Patient Dumping Has Affected the Healthcare Industry
Posted by: Write My Essay on: October 1, 2018


Sample by My Essay Writer


Patient dumping is a statutorily imposed liability that primarily occurs when a health facility with the capacity of providing the required medical care transfers a patient to another center or even turns the patient away because of lack of financial abilities to pay for the services offered. It has been provided by law, that when healthcare facility is found to have willfully failed to comply with the provided legislation prohibiting patient dumping, it should be be faced with various monetary penalties as well as suspension of their Medicare license (Zuabi, et al., 2016).  Regardless of this provision, it is evident that there are many health facilities that do not primarily consider this legislation and most of the time consider patients who have been insured or have money to pay for the medical services over those who are incapable of paying the medical bills; demonstrating how the industry has been largely commercialized. These, alongside other patient-dumping factors, have negatively implicated the healthcare industry.

Many private hospitals tend to give emphasis on cash more than anything else; including the lives of its clients. It is important to note that provision of emergency care to all patients who are presented to the emergency department is a prerequisite longstanding commitment by the physician in the sector regardless of the patient’s ability to pay. This is considered as the safety net of the nation’s health care system as health care services provided to patients who are uninsured or underinsured is basically considered charity care, uncompensated care or better still bad debt. Charity care as defined by Bitterman, (2002), is care delivered for free or at a subsidized fee owing to the financial status and capabilities on the part of the patient.  Many organizations have however been categorical in their policy formulations and provision that primarily bar any charitable services by stating that no payment or reduced payment is allowed for clients visiting the facility but nothing is done to these institutions.[Click Essay Writer to order your essay]

As construed by Abel (2011), there are many practitioners and activists in the health sector who are out-rightly against the dumping of patients and with cooperation from other healthcare stakeholders, endeavored to set policies straight and get the bill passed into law that prevented dumping of patients in emergency situations. The legislatures had enough reasons as to why the bill had to be endorsed as there were many cases of patients dying on the hospital bench after being neglected without minding the matchless value attached to life; women have been seen losing their babies while being transferred during active labor just because of neglect and misplaced priorities among health care facilities. Transferring patients in critical conditions to other hospitals for the mare same financial reasons has been a norm in many facilities without considering the patient’s’ chances of survival in the course of transfer and readmission. ICU cases are again put on the road to seek other alternatives putting the patient in a stressful condition. The director of Parkland Memorial Health in Dallas admits of the fact that they have on previous occasions received patients from other facilities without being informed in due course concerning a transfer case. In some cases the transferring hospital did not have clear records of the patient being transferred yet they were in the Intensive Care Unit. This marks the epitome of moral degradation and misplaced priorities in our health sector and society at large. The private, capitalistic hospitals have taken a leading role in such heinous, dehumanizing acts with the main goal of maximizing profits (Santry, et al., 2015). Pained by the recent dramatic rise in medical expenses, it has become a norm for most private facilities to want to capitalize on their services to cater for the many expenses.

Consequently, in response to the financial crisis in the economy, health facilities have focused on aspects of cost containment strategies for health supply to execute a diverse payment system including capitation payment system. This is done in an effort to maintain certain profit margins as well as stabilize growth in medical expenses. Given the high financial pressure emanating from BNHI, many health facilities have been forced to incline more towards financial gains and business orientation that in most instances compromises the quality and accuracy of the medical services rendered (Kane, 2003). It is paramount to note that, health sector is a very sensitive department that needs sober minds as well as high level of professionalism and expertise in order to achieve the mandated responsibilities. If sanity, prudence and discretion are not fully restored in the sector coupled with stringent rules and guidelines, then incidences of patient dumping are bound to increase exponentially in the near future as priorities change. The trend in the medical field has since changed and is being driven by cost saving strategies in the course of delivering medical services- in a sole effort to remain competitive and relevant in the industry. [Need an essay writing service? Find help here.]

Another factor that has equally contributed to the recent trends in the health sector is the constant reductions in reimbursements as well as inadequate medical support and funding from the government. This has resulted into increased numbers of patient transfers from private hospitals for the reason that the government has not been proactive in supporting the sector. Information from the Public Citizen’s Health Research Group showed that approximately 250,000 cases of patient transfer are as a result of economic and financial reasons as opposed to lack of expertise or specialized treatments (Cetta, et al., 2015). This is a clear reflection of the healthcare condition in the country and the need for the federal government to consider funding for medical care and setting the standards for operating private healthcare facilities. Additionally, health care centers should be governed by their own stringent rules that are distinct from other businesses in the general domain given that they are dealing with human life. Business aspects such as competition and profit maximization should not be the driving factors in a health institution and hence the government and concerned stakeholders need to curb the malpractices and compromised services experienced in some rogue health facilities that are largely focused on profit maximization rather than quality healthcare services (Cetta, et al., 2015).

Patient dumping has not only become a widespread menace across the private healthcare sector in the state but it has also impacted on the financial situation of the receiving hospitals most of them being public facilities. This has equally led to overcrowding of the recipient facilities in which case the practitioners become overwhelmed owing to a high doctor to patient ratio; hence affecting quality and timely service delivery. The facilities in the healthcare center also become limited and patients end up being exposed to incidences of clinical counter-infections and poor healthcare outcomes as a result (Santry, et al., 2015). In this light, it is evident that patient damping has had a huge dent to the healthcare fraternity with regards to provision of quality medical services in a timely fashion and a lot needs to be done in a collaborative effort to fix this.

Despite the evident increase in incidences of patient dumping, little is being done to help address the matter in a succinct and logical manner. The industry has been flooded with cartels some of which involve influential personalities in the health ministry and the government of the day hence the incidences proceed on unchecked. A lot is being said by the administrators and legislators yet very little is being done on the ground to fully address the issue and restore sanity in the sector. This speaks a lot about the will spirit to bring transformation and ensure the interests of ailing patients’ are catered for regardless of their financial capabilities. A committee should be constituted within the health department to help in probing into the matter so as to get to the root of all this and ensure patient dumping does not continue to haunt the health sector.  The country has largely invested in training and hiring qualified health practitioners to attend to patients but the system is not providing conducive environment for professional practice consequently with the culture of prioritizing on money many good practitioners are slowly turned into business oriented people hence lowering their ability to concentrate on quality and precision (Stern, 2010).

In as much as there is an outcry to the government and all concerned stakeholders to ensure that patient dumping is contained, citizens should not be reluctant in seeking medical cover and insurance with the hope of getting free philanthropic services. It is important that they consider being under cover so as to safeguard their health wellbeing and that of their families. The state of health care industry is very unstable and many policies are formulated but very few implemented hence the need to seek medical cover in the best interest of the individual. [“Write my essay for me?” Get help here.]

This research hence affirms to the fact that patient dumping is indeed an issue of national concern as it is widespread across the various states in healthcare industry of America. A closer look provides a perspective of an international problem affecting not only America but other countries across the phase of the world that has significantly jeopardized patient health and impaired financial abilities of the recipient health facilities (Abel, 2011).  It is hence true that patient dumping that happens in our immediate environment has severely incapacitated the operations of many public hospitals with limited resources and facilities. The recommendation fostered forth is the applicable statutes be formulated and implemented to avoid cases of unnecessary patient transfers on basis of financial capabilities. Of particular interest is on patient requiring emergency services, their transfer should only be on grounds of unavailability of appropriate medical care, otherwise, the facility will be required to attend to them before following up on payments. If that provision is overlooked by any health facility, its license will be suspended and the practitioner in charge penalized or their certificate to practice be revoked for violating the rule they declared to abide in their course of professional practice (Santry, et al., 2015).

In conclusion, it is imperative to note that the patient dumping has literally change the nature of healthcare industry and the situation seems to get from bad to worse over the years. The increased lapses and compromise in the health sector is so evident and the trend continues to intensify as loopholes in the system widens. Several decades ago, practitioners were very dedicated to this service which was considered as a calling to be of help to humanity and touch lives with the God-given knowledge and expertise. Things have since changed and focus has been primarily laid on ways to maximize profits and stiff competition among private institution. Every practitioner wants to gain more than the other at the expense of the ailing patient. In this light, there is need to change and have a compete overhaul of the system so as to reflect the values and morals it upholds.  The findings from this research serve as a wakeup call to policymakers to identify the reasons as to the perceived prevalence of patient dumping and implement policies as well as put structures in place to seal all loopholes in the sector and spur positive health outcomes through reduces patient dumping and increased accountability and professionalism in the industry.


Abel, E. (2011). Patient Dumping in New York City, 1877-1917. American Journal Of Public Health101(5), 789-795.

Bernard, A.M., Hayward RA, Rosevear, J. and Chun H. (1996). Comparing the hospitalizations of transfer and non-transfer patients in an academic medical center. Acad Med 71, 262-6.

Bitterman, R. (2002). Explaining the EMTALA Paradox. Annals of Emergency Medicine, 40(5)470-475.

Cetta, M. G., Asplin, B. R. and Fields, W. (2015). Emergency Medicine and the debate over the uninsured: a report from the Task Force on Health Care and the Uninsured. Annals of Emergency Medicine, 36:243-246.

Irvin, A. B., et al. (2003). Financial Impact on Emergency Physicians for Nonreimbursed Care for the Uninsured. Annals of Emergency Medicine, 42(4) 571-576.

Kane C. (2003). The Impact of EMTALA on Physician Practices. AMA PCPS Report from 2001. Feb. 2003.

Tsai A. (2010). Declining Payments for Emergency Department Care, 1996-1998.Annals of Emergency Medicine, 41(3)299-308.

Santry, H. P., Collins, C. E., Wiseman, J. T., Psoinos, C. M., Flahive, J. M., & Kiefe, C. I. (2014). Rates of Insurance for Injured Patients Before and After Health Care Reform in Massachusetts: A Possible Case of Double Jeopardy. American Journal Of Public Health104(6), 1066-1072.

Stern, R. S. (2010). Epstein AM. Institutional responses to prospective payment based on diagnosis-related groups. Implications for cost, quality, and access, 312, 621-7

Stenobrook R. (2009). Hospital “dumping” of poor: lawmakers seek a cure. Los Angeles Times April 7, 2009. 11.

Sibbison, J. B. (2015). USA: right to live, or right to die? Lancet, 337, 102-3.

Zuabi, N., Weiss, L. D., & Langdorf, M. I. (2016). Emergency Medical Treatment and Labor Act (EMTALA) 2002-15: Review of Office of Inspector General Patient Dumping Settlements. Western Journal of Emergency Medicine: Integrating Emergency Care With Population Health17(3), 245-251.

Posted by: Write My Essay on: September 30, 2018

Write My Essay Sample: Culture

Sample by My Essay Writer


Cultures Represented in My Community

Our community is a mix of people from different ethnicities and religious backgrounds; it is a stereotypical melting pot which is not that unusual since we live in the city and, as a result, are exposed to a more diverse array of people from different walks of life. Our home is located in an area that has a large Latin American population, a majority of which are Roman Catholics. Aside from this, there are some African American and Asian families, as well as a few Caucasian ones as well. There are a few specialty stores that specifically target people with Asian ethnicities but, aside from this, there is nothing unusual about the area.


Reviewing a Culture

For this cultural study on male circumcision, I chose to examine the Filipino culture. Interestingly enough, the correlation between male circumcision and religion is not as entrenched among Filipinos as compared to other cultures (ex: Jews). For example, the concept of circumcision among Jewish males is based on religious traditions that connotate the act with cleanliness, acknowledgment of who they are as a person and supposed protection against disease. In the case of Filipinos, circumcision is not considered a religious rite of passage; rather, it is more of a societal one (Lee, 2006). [Need an essay writing service? Find help here.]

Circumcision is typically done later on in child’s life and is regarded as a way in which a boy progresses towards becoming a man. Individuals who opt not to get the procedure done are socially disparaged as lacking courage or “manliness.” Based on this example, it can be seen that circumcision is not always due to the need to conform with religious tradition; rather, it can also manifest as an established social practice (Lee, 2006).

Further analysis of this issue shows that circumcision among Filipinos did initially start as a religious tradition brought in by Spanish missionaries but eventually became less and less of a religious requirement. In fact, the Roman Catholic Church in the Philippines does not even require its members to undergo circumcision and does not actively advocate for its implementation. Despite this, the practice has become such an entrenched aspect of Filipino society, both in the Philippines and abroad, that its origin based on religious practices has largely been forgotten. [Click Essay Writer to order your essay]


Response # 1

That is a fascinating perspective on the practice of circumcision, and I would not have thought about it in that way. Admittedly, I am somewhat unfamiliar with that particular culture, so my limited knowledge does work against me here. I do have a question, though, do you think that the practice should continue for this particular culture?

I understand that it used to be thought of as a way to supposedly prevent diseases but various studies have revealed that circumcision is widely unnecessary at the present if disease prevention is what people are after (Svoboda, Adler, & Van Howe, 2016). Maybe some form of constructive debate should take place regarding the continuance of a practice that is mostly useless right now.


Response # 2

I have to admit that you did point out a fascinating perspective on that culture’s views on male circumcision. I wonder though where the idea originally started and how it evolved over the years (Melby, 2002). Yes, it was initially considered as a means of “being clean” but how did people back then think that being uncircumcised equated into being dirty?

I doubt they attempted some type of nationwide survey of individuals that had been and had not been circumcised and determined that circumcision made a people healthy. While religious proclamations can go a long way towards justifying the act, it still does not make much sense from my perspective.


Reference List

Lee, R. B. (2006). Filipino experience of ritual male circumcision: Knowledge and insights for    anti?circumcision advocacy. Culture, Health & Sexuality, 8(3), 225-234.


Melby, T. (2002). Pain and (possibly) a loss of pleasure. Contemporary Sexuality, 36(10), 1.

Svoboda, J. S., Adler, P. W., & Van Howe, R. S. (2016). Circumcision Is Unethical and   Unlawful. Journal Of Law, Medicine & Ethics, 44(2), 263-282.

Essay Writing Sample: Tentative Reference List
Posted by: Write My Essay on: September 26, 2018

Sample by My Essay Writer


Alcaraz, C. & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66.

Alcaraz and Zeadally (2015) present ideologies on the interests of infrastructure in cyberspace as a supporting facility of daily activities in a nation. Concepts, therefore, involve the control and facilitation of other infrastructure, both along the lines of security and vulnerability within this space. Based on such assessments, the concepts attempt to recommend solutions, protocols to facilitate self-healing, and protection of these infrastructures in the contemporary sense. CI’s, according to the theoretical framework, function within the national importance of national functions of security, public health, and economy, and in this way, their interaction with cyberspace in protective interests of the nation (Alcaraz & Zeadally, 2015). Also, the discussion of the defense industry captures the relationships between each protective facet in the economy (Alcaraz & Zeadally, 2015).

Through the interactions of cyber, geographic, physical, or logical interdependency relationships, the presence of a security function in each of the infrastructures compares to the presence of information systems. Inasmuch as the proximity of either relationship may not adequately define the threat of vulnerability or a threat, the systems can either be assessed regarding faults or external offensives within these proximities (Alcaraz & Zeadally, 2015). The theoretical presentation of vector based analysis of systemic weaknesses in RTUs, SCADA systems, and general ICTs present the authors with the opportunity to consider the technological limitations in critical infrastructure, which offer architectural complexities.[“Write my essay for me?” Get help here.]

Givens, A. D., & Busch, N. E. (2013). Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. International Journal of Critical Infrastructure Protection, 6(1), 39-50.

Givens and Busch (2013) attempt to compare the protection of the critical infrastructure in public and private institutions towards the provision of solutions to security challenges. With interests in the efforts in cross-sector communication and protection as a function of partnership, these authors establish the process of ensuring homeland security in the protection intention presented by the vulnerabilities in the systems (Givens & Busch, 2013). In their attempt to bolster these partnerships, Givens and Busch (2013) consider the position of threats ranging from terrorism to criminal attacks to failures in either of the nationally significant infrastructure. Also, the position of the government in relation to that of private players in the field matches the discussion of challenges towards efficiency and effectiveness of security as a function of infrastructural design (Givens & Busch, 2013). Similarly, it is possible to the research question for the discussion to borrow from this reference concerning the process of the positioning of CI’s in secure and functional environments, and in this way, minimize threats on both internal and external settings.

Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43-60.

Infrastructure systems can be considered to being interdependent on various levels in their performance which not only increases the possibility of risk of failure on a connected basis but also preconditions the systems towards maintenance and emergency risk. Ouyang (2014) reviews content on the field’s position regarding such interdependence and evaluates the fundamental design and operational principles of the systems. The discussions facilitate a rationale for comparing the criteria of the resilience of both infrastructure and supporting systems in the field. Regarding the changes in contemporary systems design in different areas, it is possible for one to use such concepts to understand the position of such design processes as functions of security performance based on interdependencies of various types. [Need an essay writing service? Find help here.]

Ouyang (2014) compares the position of the interdependence of facilities in the entire infrastructural system to full systems in other fields, and further analyzes the ability of such systems to communicate and function. Such discussions add to the position of understanding the reliability of infrastructure, materials, inputs, and outputs towards centralized processes and systems. The analysis of the topic, therefore, aims at using the information from the necessary functionality of one system to facilitate another within secure and practical national environments of consumption of such system-based services.

Murray, A. T., & Grubesic, T. H. (2012). Critical infrastructure protection: The vulnerability conundrum. Telematics and Informatics, 29(1), 56-65.

The discussion of the possibility of vulnerabilities in communication-based communications is a significant argumentative point in the assessment of the consumptive perspective. Through a basis of elicitation processes, it becomes possible for Murray and Grubesic (2012) to compare reference points within a functional system of the entire world of critical infrastructure. The vulnerabilities of cyberspace in a local setting can be considered as a position for the entire national and international system of interactive infrastructure, and according to Murray and Grubesic (2012), critical infrastructure protection is a utility of integrated facilities within various sectors of operation. The necessity of appreciating the conundrum under discussion in the completion of the intended analysis of security conditions of CIS’s links directly to the current state of such infrastructure. Through the use of existing protocols in the safeguarding of these critical systems, one can analyze the potential within other environments hosting related infrastructure or similarly vulnerable systems. The approach to protection, as suggested within by Murray and Grubesic (2012) is only in the physical sense of provision of service, with the disregard to other possible resources for consideration on a virtual space (such as cyberspace). However, their concepts prove necessary in the formulation of better approaches to creating secure infrastructure systems and offering additional cover of vulnerabilities through the integration of interdependent secure networks and utility support systems.

May, P. J., & Koski, C. (2013). Addressing public risks: Extreme events and critical infrastructures. Review of Policy Research, 30(2), 139-159.

The possibility of using non-coercive means for connecting national critical infrastructure forms the basis for the discussion by May and Koski (2013), whereby their research raises the need for a balance between roles by the government and the private sector. The protective actions where the sustenance of the infrastructural systems is achievable relates to the communities pursuing the solutions for the reduction of risks.[Click Essay Writer to order your essay]The ability of the governmental organizations to interact with these communities, therefore, offers the capability of their research process to focus on the partnerships and balancing of purpose achievable in partnerships. These research concepts relate to the topic of the project through the provision of standpoints assumed within the consideration of security, the interrelation between organs and general interdependence of systems wherever participants do not achieve balance (May & Koski, 2013).


Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66.

Givens, A. D., & Busch, N. E. (2013). Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. International Journal of Critical Infrastructure Protection, 6(1), 39-50.

May, P. J., & Koski, C. (2013). Addressing public risks: Extreme events and critical infrastructures. Review of Policy Research, 30(2), 139-159.

Murray, A. T., & Grubesic, T. H. (2012). Critical infrastructure protection: The vulnerability conundrum. Telematics and Informatics, 29(1), 56-65.

Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43-60.

Tentative Bibliography

Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53-66.

Baroud, H., Barker, K., Ramirez-Marquez, J. E., & Rocco, C. M. (2014). Inherent costs and interdependent impacts of infrastructure network resilience. Risk Analysis, 35(4), 642-662.

Givens, A. D., & Busch, N. E. (2013). Realizing the promise of public-private partnerships in U.S. critical infrastructure protection. International Journal of Critical Infrastructure Protection, 6(1), 39-50.

Hall, J. W., Henriques, J. J., Hickford, A. J., Nicholls, R. J., Baruah, P., Birkin, M., … Watson, J. W. (2014). Assessing the long-term performance of cross-sectoral strategies for national infrastructure. Journal of Infrastructure Systems, 20(3), 04014014.

Jaatun, M. G. (2015). Security in Critical Information Infrastructures (Ph.D. thesis). University of Stavanger, Norway.

May, P. J., & Koski, C. (2013). Addressing public risks: Extreme events and critical infrastructures. Review of Policy Research, 30(2), 139-159.

Murray, A. T., & Grubesic, T. H. (2012). Critical infrastructure protection: The vulnerability conundrum. Telematics and Informatics, 29(1), 56-65.

Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43-60.

Wang, S., Hong, L., & Chen, X. (2012). Vulnerability analysis of interdependent infrastructure systems: A methodological framework. Physica A: Statistical Mechanics and Its Applications, 391(11), 3323-3335


Essay Writing Service Sample: The Google Book Project
Posted by: Write My Essay on: September 25, 2018

Sample by My Essay Writer

The Google Books project began in 2004. At its inception, it was known as Google Book Search and Google Print. The Google Book project entailed the scanning of books and magazines and the storage of these books in the Google database. From the database, users would be able to access the books whenever they felt the need. The books stored in the databases were to be provided by the authors and publishers. This framework was made possible through the establishment of the Google Books Partner Program. The Google Books project further contained the Google Library program. Under this program, Google would collaborate with affiliate libraries to allow access to their databases to ease access to books for the user.

Scanning would be conducted on only public domain learning materials. This was to protect the interests of the private authors. In addition, Google would only print three snippets of a book that has repeatedly been searched. This move was meant to curtail free access to the book. Alternatively, Google print is a segment of the Google Books project that addresses the partnership with magazine publishers to digitize their article and book contents. The Google Books Library feature scans books that are found in the library partners’ databases and relays them to the digital inventory for access by the final users. The participating universities include the Michigan University, Oxford University, Stanford, Harvard and New York Public University (Band, 2006). Under this framework, Google will strive to ensure that it does not scan a similar book in the different libraries as this would be a breach of the limited view policy which is engaged by Google Books. The Google Books project extends several benefits to the online user. Essentially, the project comprises a myriad advantage in the age of globalization.[Click Essay Writer to order your essay]

Aims of the Google Books Project

I fully support the Google Books initiative. I support its aims since they are inclined towards the reinforcement of the reading culture. At the same time, digitalization of the books is in line with the pervasive globalization goals. To begin with, the Google Books initiative was intended to democratize knowledge. Essentially, it intended to ease the access with which individuals in different geographical regions and varied circumstances could access books and magazines. In an era where information is of utmost importance, the Google Book initiative is responsive to the demand for information. The next advantage that the initiative has on the readership is that it extends the reader the ability to determine the relevance of the books to their knowledge demands (Liptak, 2016). It was further intended to enhance the sales of books through the easy access that the clients would have to the books. Essentially, when clients were introduced to complementary topics, they would be able to purchase more books which would economically benefit the authors. Through the initiative, an increased number of authors would be able to reach a wide audience. The platform acts as a marketing platform for authors who may not be able to reach the target audience due to prevailing market hindrances. Google Books project further aimed at availing books which were out of print. The Google Book Project has a range of books which date back to 1500 AD (Band, 2006).  [Need an essay writing service? Find help here.]

Since its creation, Google Books has been the victim of several litigation cases. The Authors Guild and the American Publishers sued the Google corporation in September 2005. The authors demanded compensation and injunctive relief against the Google Books project (Selyuhk, 2015). On the other hand, the publishers demanded an injunctive relief against the corporation. The lawsuits prevailed that Google Books project would give Google too much power. It is indeed true that Google was not seeking prior authorization before scanning and storing the texts in their databases. However, this assertion lacked merit as it was largely known that Google was only extending pieces of the text to the users and not the entire documents. On the litigation case, the court prevailed that Google Books was operating within the Fair use regulatory framework (Selyuhk, 2015).  This framework allows for the employ of creative works of art for transformative purposes. Likewise, the borrower of the creative material should not benefit financially from the use of the material. Google Books Project was not intended to benefit the Google corporation financially. Furthermore, there was no linkage to the loss of revenue by the authors to the Google Books projects. Essentially, Google’s actions had not impeded the profits being made by the individual authors given that it only displayed the minimus. The minimus is sanctioned by the Fair Use Agreement.

Google Book’s intermediate copying also came under scrutiny from a range of stakeholders. Intermediate copying entails the transformation of paper materials into machine-readable objects. Nonetheless, the Fair use agreement counters this assertion. Google uses its scan option to develop a search index which eases the information storage and retrieval process (Liptak, 2016). These scans are further limited and only show snippets and not the entire document. Essentially, Google Books prevailed that it was aligning itself to the regulatory frameworks that promoted the intermediate copying if it was intended to a socially and responsive non-infringing end use

            The Google Books projects have also been accused of engaging written materials without the specific and prior authorization of the owner of the written work. Google Books does not solicit the permissions of the authors before scanning their works and availing them to the final user. Nonetheless, against the assertions of the Author’s Guild, Google Books developed the opt-in and opt-out framework. In this framework, authors and publishers who are uncomfortable with Google’s initiatives are allowed the opportunity to opt out of the system (Band, 2006). Alternatively, Google was also accused of having the potential to reconvert the scanned texts and employ them to further themselves economically. Under these assertions, remunerated insistence was a culmination of the allusion to Google’s financial backing. The capitalization of the market would impede the profits garnered by the publisher and instead benefit Google. This is because Google has the financial prowess to pay for their indexing. In selling advertisements during the availing of the books, Google will be able to earn from the initiative. This constituted a breach of the copyright law. Nonetheless, Google has repeatedly indicated that it is the intent of furthering knowledge and not the financial benefits. Essentially, if the permission of the authors were sought before the indexing, only a few number of authors would agree to the venture. This would impede Google Book’s transformative priorities (Band, 2006). [“Write my essay for me?” Get help here.]

            In conclusion, the Google Books project is an initiative that intended to digitalize knowledge. It is an extension of the 21st-century technological advancement and globalization. Despite the current opposition by groups such as Author’s Guild to the initiative, the project has brought several benefits to the general user. Furthermore, it is a legal framework which does not overlook the regulatory frameworks in place such as the Fair Use Agreement.



Band, J. (2006). The Google Library Project: Both Sides of the Story. MI: M Publishing.

Liptak, A. (2016, April 18). The challenge to the Google Books is Declined by the Supreme Court.

Selyuhk, A. (2015, October 16). Google’s Book-Scanning Project Is Legal, U.S. Appeals Court Says.

Write My Essay Sample: Leadership Concerns
Posted by: Write My Essay on: September 24, 2018

Sample by My Essay Writer

In his book Generation to Generation, Friedman (2011) discusses emotional forces of the most prominent families that are participating in the church. The distinct families are the relationship between the congregation itself, the one with the leader and the group, and the leader’s personal family. Friedman (2011) asserts that the functionality of a head does not lie entirely on knowledge of technique or pathology but majorly on how the leaders function in their families.

The leadership crisis in the church was due to spiritual stagnation as discussed by Friedman (2011). The leadership crisis was based on strained relationships arising between the minister and some members of the congregation. Some of his workmates had gone to as low as backbiting, and this was causing much strain on his leadership (Friedman, 2011).

Through a healing session with the congressional leadership, Friedman (2011) tried to help them get out of the rut they had found themselves in. He helped them understand their obligations to the church. Friedman (2011) further listed their emotional baggage, as well as their feelings towards each other, thus defining their leadership ways. He made them understand the meaning of leadership through self-differentiation. Mr. Love discovered that it takes more than him to have a conflict of wills. In this new understanding, Love learned that self-differentiation did not concern itself with the other person’s reaction and the leaders also picked out that they should not be dependent on the functioning of the head since those who are dependent are in control (Friedman, 2011). [“Write my essay for me?” Get help here.]

While the major focus of Generation to Generation is the leadership and family, there are enough lessons to carry home when it comes to leadership through self-definition. Through having mature and fulfilled relationships, humans become less critical and more productive. Being more self-aware allows an individual a chance to care for others without suffocating them. Being less overbearing to the congregation gives them more control, which in turn reduces conflict of wills. [Need an essay writing service? Find help here.]

Conclusively, leadership crisis could be solved by being self-differentiated, learning congregational families, and knowing when to transition from one congregational family to the other.


Reply 1

The leadership crisis affected the church in a great way. As you stated in your discussion, strained relationships between Mr. Love, the congregation leader, and some of the congregational members caused the leadership conflict (Friedman, 2011). Bearing in mind that the emotional processes in a church are similar to those operating in a family, a church cannot be expected to function properly when some of its members are in conflict. Strained relations between the leader (congregation minister) and members of the congregation are particularly worse as witnessed in this context. Congregational ministers and other members of the clergy should view their congregation as a family. They should approach the conflicts in the congregation the same way they approach conflicts within their families. The systemic family therapy model is one of the essential tools that the clergy can use in dealing with congregational disputes (Cox, 2006). It is this therapeutic approach that Friedman (2011) used to help the church clergy. Most importantly, he tried to emphasize on self-differentiation based leadership. [Click Essay Writer to order your essay]

Reply 2

The conflict seen in the church depicts what happens in many churches. Leadership wrangles between the clergy or the clergy and the congregation are common. The dispute in the church in context was as a result of poor leadership from the minister, Mr. love. Love failed to be a differentiated leader and succumbed to the emotional turmoil caused by what was happening around him (Friedman, 2011). His ability to think straight as a leader was compromised. A self-differentiated leader is the one who can resist anxiety and other emotional forces in the organization they lead. Mr. Love failed in differentiated leadership. Apart from failing to prevent conflicts from occurring in the church, Love also failed to solve them. The systemic family therapy model adopted by Friedman (2011) in resolving the dispute can be adopted by both the congregation and any family setting (Cox, 2006). The model views conflicts as related and not independent. The causative factors for conflicts should be addressed together and not in isolation. When they are treated in isolation, there is a high likelihood of issues not being resolved. Other issues are likely to arise in the future.


Cox, D. W. (essay, 2006). The Edwin Friedman model of family systems thinking: Lessons for organizational leaders. Arkansas State University.

Friedman, E. (2011). Generation to Generation: Family Process in Church and Synagogue (pp. 242-249). New York, NY: Guilford Publications.

Essay Writing Sample: An Analysis of Common Threads
Posted by: Write My Essay on: September 24, 2018

Sample by My Essay Writer

In her book Common Threads: Weaving Community Through Collaborative Eco-Art, Sharon Kallis shares her experiences incorporating overlooked and often unwanted resources at hand as a means to develop community art programs. Kallis references the experimentation and utilization of invasive species for crafting projects as well use of previously undesirable areas to create community spaces. She makes a case that such activities contribute to ecological sustainability, a wider array of interconnection between diverse members of the community and a heightened awareness among the participants of the products they consume. However, in the outline for her specific way of doing things, there are some notable gaps. The question left to be answered is how truly effective are these programs and where are their flaws?

Kallis argues that community eco-art programs educate and promote more sustainable practices. Rather than seeking to completely eradicate invasive plant species by whatever means possible, Kallis believes it would behoove interested members of the community to use them as materials for works of art and crafts. She relates how a particularly invasive species of ivy was experimented upon and utilized over the course of several months. The ivy was ultimately used as basket weaving material and replaced plastic and coconut fibers as the primary substance used for preventing erosion. Kallis states that this served as community connection and that the so-called “weird factor” drew in volunteers. Such projects are pivotal to the notion of Means of Production (MOP) gardening. One of the goals of MOP gardening is to provide members of the community with the resources and knowledge to make consumable items for themselves. Kallis argues that this more sustainable way of creating goods since it cuts down on resources used for transport and offers a higher quality product. Particularly impressive is the preported durability of the linen woven from flax. “…a cotton T-shirt often only lasts for 2-5 years while traditionally processed linen can last for 40-60 years” (Kallis 34). The picture of ecological sustainability Kallis paints is a compelling one, however very little hard data is given about how effective the experimental final products are. She states that the crocheted Ivy was a success, but she never states how much ground it covered or how much of it held. The strength and quality of the baskets and other items made out of ivy.[“Write my essay for me?” Get help here.]

Community is a much emphasized aspect in  Common Threads. “For me, quilting bees or old fashioned barn raising events have always appealed; they offer a shared purpose, a common goal and ultimately an excuse to meet neighbors and socialize” (84). There are descriptions of community events and drop-in classes. Isolation is referenced as a problem in social health: “we live in little bubbles; not having to see the world from anothers perspective” (72). Kallis states that the programs allow people from diverse backgrounds, cultures and experiences to interact with those whom they wouldn’t normally interact. However, some skepticism must be applied to this assertion. Early in Common Threads, Kallis elaborates on the labor intensive process involved in harvesting and preparing the materials found in the community spaces. She states that this long process allows people to consider the effort that goes into the things that they consume. On top of that, usage of the material is conditional. “MOP asks  someone wanting to use material grown on-site to volunteer in some capacity” (30). Although pragmatic, this system coupled with the time invested in crafting handmade goods makes it difficult for those who lack the time and resources to participate in programs. When one expends energy trying to make ends meet, it is difficult to find the time and wherewithal to spend a significant amount of time volunteering and crafting. Also, whether anyone in any given group intends to or not, there is an aura of exclusion with any well established group. An interested member will take a look at the people in the group and try to determine based on first impressions if the group consists of members who are like them or not. If they determine they are not among their own, they are less likely to join the group. Ellis makes it clear that she does everything she can to encourage people to get involved: she makes event signs, she creates a comfortable atmosphere for meetings and workshops. However, in order to expand and diversify the group, the new member has to make the leap and approach the group. This supposition could lead one to believe that there is a limit to how diverse the meetings and classes can truly be.[Need an essay writing service? Find help here.]

Ultimately, Common Threads: Weaving Community Through Collaborative Eco-Art provides a compelling portrait of sustainability and opportunity for diverse social opportunities. Sharon Kallis show passion and commitment to the community art projects she describes. However, some hard data would be useful to determine if the programs are living up to their potential. A potentially interesting option would be to incorporate some decidedly non-artistic individuals into the mix of leadership roles.[Click Essay Writer to order your essay]


Works Cited

Kallis, Sharon.  Common Threads: Weaving Community Through Collaborative Eco-Art. New Society Publishers. 2014.

Essay Writing Service Sample:Hospital Report Card Comparison
Posted by: Write My Essay on: September 19, 2018

Sample by My Essay Writer

Coney Island Hospital

Patient recommendation ratings: generally, the patients surveyed in the report felt that they experienced an inferior level of care. As a result, only 58% of the patients would recommend Coney Island Hospital to other patients. In terms of the likelihood of patients to recommend family and friends, only 58% would definitely recommend while 9% of them would not recommend and a further 33% would probably recommend. This is a serious under-performance in the national average in terms of patient recommendation rating considering that the hospital only managed a rating of 2 out of 5 (Health Grove, 2016).

Staff responsiveness rating: the hospital still under-performed in regards to staff responsiveness in based on the rate of staff responsiveness after the pressing of the call button and help getting to the bathroom or using a bedpan. Only 61% always received help while 24% usually received it and 15% didn’t receive help at all. The rating of 2 out of 5 summarized their dissatisfaction.

In terms of pain management ratings, the hospital still under-performed with a rating of 2 out of 5. In terms of the quietness around the patient’s room, the hospital received a rating of 1 out of 5. 21% of those interviewed said that the rooms were never quiet. The hospital only attained a favorable rating in regards to 3 out of 5 in terms of cleanliness in the patient room and the bathrooms. Given the dismal ratings that the hospital was rated according to this report card, I would not visit Coney Island Hospital for elective surgery. Considering the pain involved, I would want a speedy response from the staff and a quieter environment that the hospital cannot provide. [“Write my essay for me?” Get help here.]

Methodist Hospital

Just like in the case above, the patients surveyed felt that they almost experienced superior health care. 67% would recommend other patients to visit the hospital. In terms of patient recommended rating the hospital performed fairly with 67% of patients saying that they would recommend others to visit the hospital. Another 27% would probably recommend and a 6% wouldn’t. [Need an essay writing service? Find help here.]

In terms of staff responsiveness, the hospital’s performance was very poor, only 1 out of 5 in terms of: the time taken after pressing the bell for the staff to show up as well as assistance in using the bedpan. In terms of pain management rating, the hospital scored 2 out of 5 which is an under-performance on the national level. In particular, 62% claimed that their pain was always controlled, 27% claimed that their pain was usually controlled and 11% claimed that their pain was never controlled (Health Grove, 2016).

Moreover, in terms of quietness, only 48% observed that the area around their rooms was always quiet while a 31% claimed that it was usually quiet and a 21% claimed that it was almost never quiet. The overall rating on quietness was 1 out of 5. The Hospital was even found to be less clean when gauged against the national hospital average. I would want to visit the hospital for an elective surgery because I would want to be attended quicker by staff and the hospital can provide that in comparison to the other two. The hospital’s ability to manage pain is also fair in comparison to the other two.


Kingsbrook Community Hospital

In general, Kingsbrook Community Hospital received a good rating of 88% and is the third highest ranked hospital in the city of Brooklyn. However, in terms of the national survey, it fell short of receiving an outstanding rating. Only 61% of the patients said they would recommend a friend or a family member to visit the hospital while a 30% of them were not sure and 9% claimed they would not recommend. It also performed poorly in terms of staff response and patient pain management ratings.[Click Essay Writer to order your essay]

The hospital was also less quiet and less clean. I would not visit the hospital for an elective surgery because I feel that the rate of pain management by the hospital is poor. Only 58% of the visitors claimed that their pain was effectively managed. 15% of the patients responded that their pain was never controlled (Health Grove, 2016). Even the staff communication, especially on discharge information was very dismal.


Health Grove. (2016). Coney Island Hospital. Retrieved October 5, 2016,

Health Grove. (2016). Kingsbrook Jewish Medical Center. Retrieved October 5, 2016, from

Health Grove. (n.d.). New York Methodist Hospital. Retrieved October 5, 2016, from

Page 5 of 10« First...34567...10...Last »