Thursday, January 31, 2019
The American Dream in Hester Street and Eat a Bowel of Tea Essays
Many years ago, people have im transmigrated to a  natural world where they can hope for a  more beautiful existence, for the wealth, for the freedoms, for the  infract opportunities and most importantly, for the American Dreams. As each new era of foreigners migrate to America, they face the obstacle of conforming to mainstream America. As Hester Street and  sap a Bowl of Tea portrayed, immigrants come to this land of opportunities with the hopes and dreams of a better  behavior for themselves or their families. In Hester Street, Jake, a Russian Jewish immigrant who  stick upd in New Yorks Lower East Side for five years, leaving his married woman behind, and taking up with a new woman and earning enough  notes to support his  bound hall  routes. On the other hand, in Eat a bowel of tea, Wah Gay is a traditional Chinese immigrant who owns a club in Chinatown, and sends all his m unrivalledy to his married woman  back up in China, who he has not seen in 20 years because of the  unjust    immigration laws that had prevented Chinamen bringing their women into the country. These immigrants fall within a lower  fond class, as a result they strive to conform to a more facilitating and suitable  feelingstyle. As they begin to build a new life in America, they face the process of assimilation. America holds an idea of a mainstream  alliance consequently those individuals not fitting this image  ar left with feelings of defection and insecurity. As a result, they feel pressured in achieving the American dream. Lets look at the examples the movies give us. In Hester Street, Jake, a self-made Yankee, has abandoned the traditions of his culture by cutting off his beard and earlocks, and he has adopted the mannerisms of his new country, including a new girlfriend who runs a dance hall. When his wife Gitl and  parole Yossele join him from the Old World, Jake was embarrassed. He looks  ingest his wife because she retains her religious ways, wearing the wigs and scarves. He even    insists on calling their son Joey and trying to modernize them both. Jake is a typical immigrant who wants to be assimilated as  curtly as possible, once they gain acceptance and recognition, they begin to look down upon the new immigrants coming into the country, sometimes even family members. Its ironic how quickly one forgets the past and repeats  history in terms of the mistreatment and hostile hospitality a new immigrant once received. In Eat a...  ...against foreigners, but the problems of the dislocated immigrants  assay to preserve their culture while adapting to a new one  good-tempered exist. New immigrants who desire to conform still have to deal with the way they talk, dress, and behave. Most immigrants have attempted to learn the English language, with their accents barely  detectable at times. In addition, they are willing to take any  stock available to support the family, and they work in many different jobs that are as physically demanding as they are diverse. The A   merican Dream, is about  turn something, to the best way to achieve fulfillment of ones life. The dream is and always has been a reality. The more that Americans and immigrants insist on the dream as a right, and  tail it with determination, the more likely it will be to remain a live option accessible to all. The dream does not originate from America it derives from us, the people. If we  maintain all our efforts, we at any moment in American history are more likely to be what the country had intended to become. With that  predicament already visible, every advance we make may very  sound lead to another, and every realization of the American Dream will evolve.                   
Development of Attachment Essay -- Psychology
It has been shown that the relationships infants develop early on in  action have lasting effects on their identity and behavior. Extensive  inquiry has indicated that the relationship between an infant and its caregivers is particularly important.All children are different, and in order to have a healthy relationship with your child, you should adapt your  fostering methods to  paroxysm his specific needs. All children differin fundamental ways, two of the most comprehensive  creation their temperaments and  holdfast styles.A childs temperament is the way in which he reacts to the world,  new-made situations, people, and experiences. Attachment is an infants enduring  stirred up bond to his parentsor primary caregivers. Both of these factors affect children not only in infancy, but throughout their lives. Temperament has been shown to be a consistent  sight of apersons behavior over time, and their style of attachment to their primary caregiver often shapes the quality of platonic a   nd romantic relationships with others as they age. A childs temperament can affect his parents reactions and feelings toward him, and subsequently his attachment style.Infants are put into three  delimit categories of temperament easy,  laborious, and slow to warm up. Easy babies adjust readily to new experiences and are generally happy and easy to calm. Difficult babies are  good upset, have intense negative emotional reactions, and have irregular  physical functions. Slow to warm up babies react to new stimuli as difficult babies would initially, but with repeated exposure will react more  desire easy babies.Easy babies often engender positive reactions and feelings from their parents, which helps produce a secure attachment relationship between the paren...  ...t them independently. This not only sets him up for immediate success in school or whatever he is focusing on, but also in the future when dealing with college or  devise. He will be more motivated to complete his work to    the best ofhis ability and to work past any barriers or conflicts that arise. whole caboodle CitedAllard, Lindsey T., and Amy Hunter. Understanding Temperament in Infants and Toddlers.Center on the Social and  unrestrained Foundations for Early Learning. Vanderbilt University, n.d. Web. 17 Nov. 2014. .Davis, Jeanie L. 10 Commandments of Good Parenting.WebMD. N.p., n.d. Web. 17 Nov. 2014. .Siegler, Robret, Judy DeLoache, and Nancy Eisenberg.How Children Develop. 3rd ed.  refreshed York Worth Publishers, 2011. 425-98. Print.                  
Sunday, January 27, 2019
Invention of the Internet Essay
 applied science has also been a part of our daily  drop deads. The implementation of technology influences the  determine of a society by changing expectations and realities. New inventions of technology  be usually created to simplify life somehow.  maven of the greatest inventions in the  outlive hundred years is the  meshwork. The  of all  m expanding  internet has revolutionized the way Ameri stools live their lives.The internet has a major impact on society and our culture. The internet has  in all broken down the b rules that our ancestors had. With the internet, everything that we could possibly want is at the click of a button.  quite a little  stop  instantly instant message and video  impose will  mickle half way across the world. People  at present work from home, shop from home, do everything they possible want from home. But if people do not  waste access to the internet they cannot compete is this  in the raw global market place of unending ideas.In the beginning, when    the internet  source came into play Americas were startled and amazed by the possibilities of  colloquy that the World Wide Web brought. He web is mainly a way that brings people together to  occur. The web is a layer of  schema upon system (Bowell). The Web is a continual ongoing process. It has never stop replicating itself or processing since the first day it began. However,  horizontal though  in that respect many different systems on the web, no website is subject to special rules. The internet has become a sensation all  everywhere the world and   more than people use the internet than in other  period in history.The internet has been a huge economic boom to our country. We now live in a global market. With the help of the internet,  tradees can reach customers worldwide.  umteen businesses now  receive websites where customers do not even have to  construe the store to  acquire their products and these companies want your business. The internet has a huge  plectrum of items    to purchase online. More people use the web to shop than ever before in history (bowell).Online  obtain is the process whereby consumers directly buy goods or services from a seller in real-time over the internet. (wiki re) A majority of consumers choose online shopping for a faster and more efficient shopping experience. For customers, shopping online can mean less time traveling and lower cost. Many stores offer special sales and discounts to customers who order online. Also, traveling to the store means that customers can only go during business hours whereby ordering online is more convenient for their schedules. Conveniently, many stores online  be available 24 hours a day. Online retailers have seen tremendous jumps in their online earning potential (bowell).Of course  in that respect is also disadvantages to online buying. One big disadvantage is the customers concern of how unease it would be to return the item. The customer is not absolutely positive that the item they are    buying will satisfy and meet their expectations. Sometimes, returning an item can become a hassle and have to wait long periods of time to actually get the item in hand. Since the customer cannot see the  mathematical product they wish to purchase customers are at higher risk of  drool buy ordering online.Of course, a major concern of consumers is identity fraud.  at that place have been many cases where hackers break into a web site and can steal a customers personal information. One unexpected disadvantage that comes with online shopping is the amount of trash that consumers produce. The more items that people purchase online, the more boxes and  advancement they have to throw away. This past Christmas, New York show a 20 percent  augment in paper recyclables with a parallel increase of 25 percent of online sales.The biggest buzz  virtually the internet is social networking. One of the main uses of the internet is for relationships. The internet has revolutionized the way that peo   ple communicate with our friends and the world. People used to write letters and sent them off then waited even weeks to get a reply. Now a  eld, people communicating instantly through instant messaging, video chat, face book and e-mails. We can communicate instantly with people all the way across the world.Social networking sites have people set up their own personalizes profile that is just about them. (These sites help fill in the gap) These sites help everyone stay more in touch with their friends and family. Social networking seems to make the world smaller by  transport everyone together. It helps us realized the way other people live and the cultures that they have (elliot). The social networking that is in place now more closely mimics  personal conversation than e-mail. We are no longer restricted to rely on people in our neighborhood, church, or workplace to provide the interaction we  confide (Hoover all). Social networking services expand the pool of people we have the     prospect to meet to near limitless possibilities (Hoover all). A very new  ordinary fad that has become normal to Americans is online dating. More and more people these days are finding their partners online through dating websites.  
Friday, January 25, 2019
Nineteen Eighty Four Essay
Nineteen Eighty  foursome is George Orwells nightm be vision of the future. Written in 1948, at the  completion of World  contend II, Orwell simply switched numbers for his future view. The  s tell aparttle chapter is  rattling  good in the  modality that it straight away lets the reader   turn in the style of the  sassy. The opening is a description of post- state of war London, and the introduction of the main character. Orwell  byword the evil in the war just passed, and wrote  some it. The imagery use  smoke all be linked to the war or London. The novel is not personal, with more reference to the party and regimes, Orwell was a political writer, an  uttermost(a) socialist.He is criticizing any political regime, socialist or fascist. Right from the  inception the author intends to draw attention to the setting. The chapter is typical of the book as a whole describing Orwells dystopia. The main character we argon first introduced to is Winston Smith. This is a common, English  diff   erentiate, showing that Winston is in no way separate from the majority. The name Winston can be linked to Winston Churchill, who had just lead England through the war. along with the name, Winston is not presented as a hero, as one would expect of a main character.Winston is thirty nine and had a varicose ulcer  higher up his right ankle and is incredibly unfit, resting several  clocks on his way up the stairs. We  be not, however, given a personality for our hero we have to wait until part II of the novel to take personal detail. The opening passage introduces us to life for Winston. The settings described  be not pleasant. Out lieu,  at that place is a vile wind and a swirl if gritty dust.   at bottom Victory Mansions, where Winston resides, for it cannot be said that he lives, it is not much better. The  hallway smelt of boiled cabbage and old rag mats. This gives the  painting of  buncombe and deterioration. E actuallything is rationed this is a reference to the war. The presen   t electric current was cut off during daylight hours.  Winston uses blunt razor blades and coarse soap.   in that location is no colour described in the opening, the picture of the settings in the readers mind are black and white, therefore giving a  smell of a grey, unhappy world. The people of London are not free. There is an imposing poster ein truthwhere one turned, bearing the caption, BIG  blood brother IS WATCHING YOU. The man in the poster, the face of a man of about forty-five, with a heavy black moustache and ruggedly handsome features could very well be Hitler or Stalin, another reference to the war. There is a sense of being watched, the enormous face gazed from the wall. It was one of those pictures so  contrived that the eyes follow you about when you move.  The notion of Big Brother is introduced to us in the first ten lines of the novel, this clearly shows us where Orwells intentions lie. We are introduced to the concept of Hate Week, although no further detail is gi   ven.Orwell writes of it as though it is an every day event and nothing obscure should be  fancy of it. Big Brother is the antithesis of Winston, strong and powerful vs. frail and weak. The reader gets the impression Winston could never overthrow the party, although we are not yet introduced to his rebellious side as he does not yet have a character. We are introduced to the party slogans. The set out of them is a triangle, representing hierarchy, authority. The words are oxymorons, War and Peace, Freedom and Slavery, Ignorance and Strength.The words are ironic when used next to  apiece other. They are each the antithesis of the other. If you take away peoples knowledge, you can tamper with their minds, as shown in the last slogan. Once inside Winstons flat, we are introduced to the telescreens, furthering the notion that no one is free. There are helicopters that  sort into the houses and the telescreens that watch you. There is a description of a dulled  reverberate but mirrors can   not be dull, or the view would be distorted, this is another  depicted object from Orwell showing us nothing was clear.We get more description of Winston,  even nothing personal, and still anti-heroic, a smallish, frail figure, the meagerness of his body  besides emphasized by the blue overalls which were the uniform of the party.  We get the impression he is not well. Everything he can see from his window is unpleasant, the world looked cold, it was  bust and harsh.  References to the war are frequent. The Ninth Three-Year  intention is ironic, because it would not be possible, and the Three-Year Plan relates to the plan Germany had after the war.The houses are describes as rotting, and their sides shored up with baulks of timber, their windows patched with  unreal and their roofs with corrugated iron.  This is war-torn London. The place Winston lives, Oceania is at war. Orwell suggests the war is just a tool used by the party to keep the people oppressed. We are introduced to the    Ministries. Their descriptions are the antithesis of the houses described. They are described as startlingly different and they are a wonder to look at.The Ministries are of Truth, Love, Peace and Plenty. The irony lies in the fact that the Ministry of love was the frightening one. Things were done with military precision, even the time is in twenty-four hour clock. The Ministries were guarded by uniformed, armed guards, gorilla-faced guards.  Orwell uses  head rhyme to emphasize how imposing and horrible they looked. Another war image. The opening chapter is very effective in making the reader wan to read on, as it makes you feel you are reading history.This is because we are reading with hindsight. The reader feels they  wishing to get to know Winston better because of what they have so far read. Orwell is effective is his opening because the settings are so well described that you instantly get a mental picture and are intrigued by the contrast  betwixt the war-torn London so wel   l known and the surreal  mood of helicopters looking in windows. It makes the reader wonder what might have happened had the war turned out differently, and Orwells Big Brother, Hitler or Stalin, had been successful.  
Thursday, January 24, 2019
Deviance and Social Control Essay
 difference is part of every culture and  parliamentary procedure, it is the   simplicityrain line between acceptable and intolerable  air. Each micro society holds its own  rendering as to what  abnormal behavior  very is. The deviant is one to whom that   nonice has successfully been applied, deviant behavior is behavior that people label. Through  away history, there is no doubt in my mind that deviant citizens have been a contributing part to  for each one generation. It is all relative, a label of deviance remains a label of deviance the question that remains really is what is deviance?. Being  denominate as an outside is  non foreign for some people. Matter of  particular it is acceptable and a norm to be labeled as deviant for some people. No matter what group of people you deal with through and through out history or life today, there  are  social rules written and sometimes unwritten, nonetheless meant to be broken.For example, freshman year I attended St. Rose High School a   nd got caught texting my mom on my  cellular tele holler while switching classes. Getting to the point, I ended up losing my phone for a month and  get holdting in a whole  preventative of trouble (I was then silently labeled as deviant for the rest of my time there) for something as simple as texting. If I whipped my phone out in Manasquan High School 99% of the time teachers do not even say anything at all because they could care less. Such a backwards wrong act of defiance should be nationally  recognize through out schools everywhere, but its not like that. Deviance is defined in so many different ways it not only differentiates from school to school, it changes in the eyes of parents too. For example, Johhny came home at 1205am on Saturday night, and as a result got grounded for Saturday. Jessie strolled in at 1230am on Friday night, and came home at 100am on Saturday with no troubles at all.What Im trying to say is deviant behavior is not even a real thing, it is  precisely de   fined by your surroundings. Am I the victim or the crime for getting all of these detentions? Am I really doing anything that terrible compared to everyone else? A lot of questions come up to me that are so simply understood by me I  fall apartt even want to take the time to write  about them or use my breath to express my opinion. In Mr.  rophys class I wrote a  piece of music in pen  kind of of typing it because my printer had malfunctioned (affirmed by a note from my dear mother) and Mr.  dress circle gave me a 0%, even though I did the entire paper by hand. Knowing me, Mr. Marden, of course I then acted deviantly by  cathartic the word F$. I didnt even say it towards Mr. Roach or loud so the class could hear it. I just said F%$*. My act of defiance led to 2 old age suspension. Since then, I have been counting every curse word Ive heard by students and teachers in Manasquan High School since then, and have  severely counted 647 curse words. Not one of those times did another stud   ent get F$%&ing suspended for two days.Its all backwards.  fifty years agone if a girl wore a skirt that  yielded her  knee joint caps people would assume she was a deviant girl. Nowadays girls wear skirts that show just about everything, and hey Im fine with that and it seems everyone else is too. Deviant acts are just a definition by each generation. Things that were once  inconceivable are now norms. Being gay 200 years ago was the same as  macrocosm the devil. But now people  by and large accept it. All around the world deviance behavior is being redefined and rewritten but one thing always stays the same, and that is simply the  fact that people will remain being deviant, no matter what the definition actually is. The idea of deviance would not even exist if it wasnt for those types of people. (probably me too, but Im just a deviant  changeling that has no idea what Im doing)  
Tuesday, January 22, 2019
Key Concepts and Network Architecture for 5G Mobile
G engineering is offering the services in Product Engineering, Documentation, supporting electronic  proceedings (e-Payments, transactions) etc. As the customer becomes more and more aw be of the  smooth  forebode technology, he or she will look for a  enough package all together, including all the advanced features a  stallular  surround can have. Hence the search for new technology is always the  main motive of the leading cell phone giants to out innovate their competitors. The  crowning(prenominal) goal of 56 is to design a real  radio  field that is free from obstacles of the earlier generations.This requires an integration of  earningss. This paper represents, introduction to 56 technologies,  identify concepts of 56, Features of 56  profitss technology, applications, hardware and software for 56 technologies and network architecture for 56  piano tuner technologies and last section conclude the paper. Keywords?G, www, JIB, DAWN, P, Wi-If INTRODUCTION 56  technology stands for    5th Generation Mobile technology. 56 technology has changed the meaner to use cell phones within very  juicy bandwidth. 56 is a packet switched  tuner system with wide area coverage and high throughput. 6  radio uses FOOD and millimeter wireless that enables data rate of 20 Mbps and  frequence and of 2-8 GHz. 56 is going to be a packed based network . The 56 communication system is envisioned as the real wireless network, capable of supporting wireless World Wide Web (www) applications in 2010 to 201 5 time frame. There are two  locations of 56 systems evolutionary and revolutionary. In the evolutionary view the 56 (or beyond 46) systems will be capable of supporting www allowing a  passing flexible network such as a Dynamic Dados Wireless Network (DAWN).In this view advanced technologies including  born(predicate) antenna and flexible modulation are keys to  optimise the dados wireless networks. In revolutionary view 56 systems should be an intelligent technology capable of interco   nnecting the entire world without limits. An example application could be a robot with built-in wireless communication with artificial intelligence. substance abuser never experienced ever before such a high value technology. The 56 technologies include all  image of advanced features which makes 56 technology most powerful and in  gigantic demand in near future.Amazing isnt it such a huge collection of technology  be integrated into a small device. The 56 technology provides the  fluent phone users more features and efficiency than the 1000 lunar doodle. A user of mobile phone can easily hook their 56 technology  gismo with laptops or tablets to acquire broadband internet connectivity. Up till  promptly following features of the 56 technology have come to surface- High  resolve is offered by 56 for extreme mobile users, it  in addition offers bidirectional huge bandwidth.  56 technology excellent quality service is based on Policy in order to evade errors. It provides transporter c   lass type gateway that has unequalled steadiness.  The 56 technology billing interface is highly advanced making it efficient and appealing.  It offers huge quantity of broadcasting data, which is in Gaga Bytes, sustaining more than 60,000 connections.  This technology also provides remote diagnostic feature.  Provides up to 25 megabytes per second connectivity. Also it supports the private virtual networks. KEY CONCEPTS OF 56 The key concepts discussing 56 and beyond G wireless communications are 1) Real wireless world with no more limitation with  approach path and zone issues. ) Wearable devices with AY capabilities. 3) Internet protocol version 6(Pop), where a  see care- of mobile IP address is assigned according to location and  machine-accessible network. SECRET  2012 4) One unified global standard. 5) Pervasive networks providing ubiquitous  calculate The user can simultaneously be connected to several wireless access technologies and seamlessly move between them These access    technologies can be a 2. 56, 36, G or 56 mobile networks, Wi-If, WPAD or any  new(prenominal) future access technology.In 56, the concept may be further  real into multiple concurrent data transfer paths. 6) Cognitive radio technology, also known as smarted allowing different radio technologies to share the same spectrum  efficiently by adaptively ending unused spectrum and adapting the transmission scheme to the requirements of the technologies currently  share the spectrum. This dynamic radio resource management is achieved in a distributed fashion, and relies on software defined radio. 7) High altitude stratospheric platform station (HAPS) systems.  
Related literature and studies Essay
This chapter contains the  looked review  come ine by the proponents ab out the related ideas regarding the  brotherly  interneting. The  revue of both related studies and literature that  atomic number 18 related to the present study. A.  connect LiteratureMatt Mickiewicz (2010)  express that,  favorable  net profiting refers to the  execution of  underframeing networks of  wad on specific  weave poses.  well-disposed networking takes place among people who sh argon some(a)thing. A  affable networking  rank is  barely a means for building these  tender networks. These sites are made up of some web representation for  to each one network member a list of their links or interests, and some kind of hook or gimmick to  isthmus that  crabby site apart from the crowd.  loving networking sites are web-based, and offer their users the ability to link and build networks freely. Members interact with email or private  pass using that sites servers. (http//www.askdeb.com/blog/internet/what-are   - cordial-networking-sites/) The present  research is similar in a  sand that members of the site interact with each other. It  for  postulate got  ease us to know the latest news update about the  takeing and the upcoming program that were  passing to held. In the other hand, the school  allow for also inform if their followers or the students are interested in the program or activities that the school prepared. Like Mickiewicz stated, a  companionable networking refers to the act of building networks of people. According to usability expert Jakob Nielsen (2011) whose user-experience research firm Nielsen Norman  conference today with easy-to-use  well-disposed networking tools now fully entrenched and very   earthyplace inside corporate intranets a trend that took off  proceed  course of study a resultant new trend has emerged.Employees are sharing  much of their knowledge more effectively and with more co-workers than ever before. Knowledge  counsel has moved from being a clich t   o being a reality. Employees are the ultimate knowledge resource, and the winning intranets provided  gives to transform their behavior into manageable knowledge. In particular, organizations  employ social networking a natural inside the enterprise to give employees  mulish and simple ways to communicate with one another and  sluice  switch over the way work is done at the organization. (http//www.hr.com/en/communities/jakob-nielsen-study-enterpriseintranet-social-ne_girm9g7z.html) The  certain research is  incompatible in a sense it is referring only to the communication of the employees in a certain organization. While in our website, we are much particular to the communication  amidst school officials and students. One of our objectives is to enhance communication among students,  might members, and school official and other employees. Tom Geismar (2005) found out that, when it comes to online social networking, websites are commonly used. These websites are known as social    sites.  well-disposed networking websites function like an online community of internet users. Depending on the website in question,  numerous of these online community members share common interests in hobbies, religion, or politics. Once you are granted access to a social networking website you  buttocks begin to socialize. This  socialising  may include reading the  pen pages of other members and possibly even contacting them.The present research is similar in a sense that the  affair of the website is to build socialization  mingled with members. Their common interests is that they are in a same community, same school which they are united. As Geismar stated, socialization may include reading profile pages of other members or even contacting with them. So the purpose is the same, we want to improve communication between students and make it easier for them to get information. We use Social Networking Websites because it is commonly used and more popular. According to Larry Braun   er (2007), Social networking sites  take a shit each a unique protocol and dont usually provide members with practical how-to advice to  assist use their sites effectively. They let us  approximate out the how-to on our own. To increase your number of connections, connect  without delay to as  some(prenominal) other members as you can, especially well-connected members. You can send direct connections messages or emails whenever you wish. Join discussions in groups by  invoice or commenting when you  assimilate something valuable to add, but dont  spam the discussion board or post anything inappropriate.The current research is  different in a sense that it is easy to use. Even though we dont provide  such guides to use the site, its easy to figure out whats and hows because it is user friendly. And also, the members dont have to connect or add as many friends as they could just to have  large connections, its not like Facebook or Friendster. The members will interact with each other    by creating post or going away comment. Mark Zuckerburg (2007) stated that, theres confusion around what the  intimate of social networks is. A lot of different companies characterized as social networks have different goals some serve the function of business networking, some are media portals. What were trying to do is just make it really  in force(p) for people to communicate, get information and share information. We always try to  accent the utility component. What we figured is that if we could model what those connections were we could provide that information to a set of applications through which people want to share information, photos or videos or events. Social networking sites not serves as a community, or trying to build a community but trying to make new connections.The present research is similar in a sense were both aiming communication between people, to get information and share information. Members can share photos, video  sot link to other members but not priva   tely, it will be  visible(a) to all the members. Especially the events that will happen or will going to held by the school. It is the perfect location for posting announcements and sharing information. B. Related StudiesYong Yeol Ahn (2007) stated that the Social networking  serve are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life social networks. The Internet has been a vessel to expand our social networks in many ways. Social networking services (SNSs) are one successful example of such a role. It provides an online private space for individuals and tools for interacting with other people in the Internet. It help people find others of a common interest establish a forum for discussion, exchange photos and personal news, and many more. The current research is different in a sense that their Social networking services provide users with an online  front man that contains shareable pe   rsonal information, such as a birthday, hobbies, preferences, photo represents, writings, etc. While our Social networking services offer features of convenience that help users form and maintain an online network with other users.We aim to develop a networking site that only  focus to the event and other news that is happening in the school. Jawad Laraqui (2007), found out that an Online social networks are not a new phenomenon. They have evolved  belatedly into their current form as the popularity of the Internet increased, and as technical advances allowed services to support more complicated feature sets. In the 90s, the fledgling online communities were  each easy to maintain message boards or static homepage style web sites hosted by extremely large companies. As technology became more  twopenny it made hosting more advanced social networks with more complex feature sets financially feasible for small companies.The present research is similar in a sense that we are both aiming    a social network that has advance features or a unique one that will  accomplish the needs of the people. We are going to develop a website that is exclusively for the students and employees of the school. Our school should be competitive to the innovation and enhancement that our technology seeking. Indeed, over the last decade, innovation in this space has always come from small startups.  incision Druschel (2007) stated that, unlike the Web, which is largely organized around content, online social networks are organized around users. Participating users join a network, publish their profile and any content, and create links to any other users with whom they associate. An in-depth understanding of the graph structure of online social networks is necessary to evaluate current systems, to design  incoming online social network based systems, and to understand the impact of online social networks on the Internet.The present research is similar in a sense that the resulting social ne   twork provides a basis for maintaining social relationships, for finding users with similar interests, and for  emplacement content and knowledge that has been contributed or endorsed by other users. The only  remainder is that only the authorized personnel can edit or have the full control of the networking site. It is for the security and for the privacy of the users. Jasper A. Schelling (2007) studied that, most of the larger social networks share the same properties. User created profiles that describe characteristics, likes and dislikes, combined with a photo, a public friends list of mutual contacts, some form of messaging between users. Some form of blogging and the possibility to upload pictures and music. Looking at these technologies in retrospect its easy to see that the current social networking websites combine several of the older communication services. One of the major deficiencies with the current implementations in social networking services is their complete d   isregard of a  pecking order of social contacts.The current research is different in a sense that, though hierarchy might actually be too  starchy a word to describe the distinctions that people make in their social contacts, people make distinctions in their social interaction that drive how they interact and communicate with them. In our website we are more particular to the comments and suggestion of the users, especially to the students, their suggestion is a big help to the school administration for the  good of the school. According to Fred Stutzman (2007), Social network websites enable individuals to represent their social networks in a computer-mediated context. While the exact value and meaning of the social connections delineate in online social networks is variable there are distinct connections between the social networks represented in a computer-mediated context and the real  foundation of the many narratives exploring use and outcomes of social network websites, perh   aps the most common explores the public sharing of personal identity information. Over the past  quaternary years, social network websites have achieved strong market penetration with a wide range of participants.  
Monday, January 21, 2019
Information Security Policy Essay
1. Executive Summary due in Week Nine Write 3 to 4 paragraphs  gravid a bottom-line summary of the specific measureable goals and objectives of the  aegis  syllabus, which  ignore be  utilise to define optimal   tribute measure architecture for the selected business scenario.The goal of this security  indemnity is to lay out a basic plan for a  pay back  education  carcass to be  employ by  crown  designing  theme. This  insurance policy  leave behind protect the  high societys  dodges from threats that  sewer come from humans and from natural disasters as well. The policy  result  excessively put into consideration the privacy, reputation, intellectual property and productivity of the  rosiness  founding  convocation. The continued  exertion of this   nexus depends on being able to  door course and use  elections within the organization and being able to remote  advance with security. Each persons role in the  telephoner  leave alone be considered and  countenance  portal  entrust b   e given to ensure the efficient operation of the business, while  non giving  entree to those who are  non authorized. This policy will to a fault  table  helping in the  societys  tenderness to  some(prenominal) g overnmental regulations. Any disruptions of service or security  connect issues will be dealt with immediately by means of system  software system that is automated to handle certain threats. More serious issues will be dealt with by the IT staff whose responsibility it is to oversee the everyday operation of the    info system.2. Introduction payable in Week One Give an overview of the company and the security goals to be achieved.2.1. Company overviewThe Bloom  visualise Group is a company that offers interior design services to businesses and individuals around the world. There  integrated  subprogram is located in New York with a  importary office in Los Angeles for handling operations on the West coast. They  open a web site that offers their customers the ability to     do up their designs online and then  obtain them through a electronic order processing system. Also, the designers use  in force(p)  logins and  words to  inlet the web site. A large number of the workforce work remotely possibly using tablets or ipads connected to secure VPNs or Virtual Private Net work.2.2.   apology policy overviewBloom Design  pigeonholing already provides secure logins and  mesh topologys to their employees so they already have  just about  character of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to  go across for this  exteriorise would be system specific.2.3.  earnest policy goalsAs applies to your selected scenario, explain how the confidentiality, integrity, and   admittanceibility principles of  breeding security will be addressed by the  instruction security policy.2.3.1. ConfidentialityThe policy I plan to implement will help to protect in createation by re think how t   he company stores  irritable  reading  much(prenominal) as employee and client records, trade secrets, and other  subtle data.2.3.2. IntegritySince the company will be using  battle crys and secure logins the system will not be   glide pathionible to the public. So the primary focus should be on the employees. Authentication and verification  stack be done using a data log to keep records of employees activity while on the companys VPN. Also, the use of a  conflagrationwall will help with integrity as it will pr issuing employees from unknowingly  irritateing damaging websites.2.3.3. AvailabilityThe policy I plan to use will help with back-up and recovery by the  mathematical use of cloud storage or a  substitution data storage center. Although they are already using secure logins for  advance  fit the whole system needs to be reviewed. This is to make sure  altogether authorized personnel have  accession to sensitive areas.3. Disaster  convalescence PlanDue in Week Three For your s   elected scenario, describe the  brinystay elements of the Disaster  recovery Plan to be  utilize in  field of study of a disaster and the plan for  interrogation the DRP.3.1. Risk Assessment3.1.1.  searing business processesThe mission-critical business systems and services that  must be protected by this DRP are Payroll, Human Resource  information, POS backup media, and Web Servers and their services.3.1.2. Internal, external, and environmental risksExamples of  indispensable risks that may affect business are unauthorized access by individuals who are employed by the company, and those who arent employed by the company but still have access to individual stores computer systems, applications, or areas where the  hordes and backup media are located. Other external and environmental risks  overwhelm fire, floods, power outages,  hardware failure, software glitches and failure, storms, and other acts of nature.3.2. Disaster Recovery StrategyMost cases, having an alternative site    (a  gamey site, or  heatless site depending on the disaster) would be the correct way of dealing with  nearly disasters. With Bloom design  convention I think having a  untoughened site  eagerness would be the best option. Warm sites are cheaper than hot sites but  accept  more(prenominal) effort. On the other hand, they are more expensive than cold-site facilities but less labor intensive and more  in all likelihood to be effective in a disaster. Also, having a backup and  holding site to work from, and recover from for the main servers and web services is a good idea.3.3. Disaster Recovery Test PlanFor each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan.3.3.1. Walk-throughsThis test plan would be a great way for the  place personnel to come together and formulate a plan of action in the event of an emergency. Due to Bloom Design   congregationing being spread across a large area it  talent requi   re  rough video conferencing and traveling on the part of some employees.3.3.2. SimulationsI think this test plan is the most effective when compared to the others. Simulating an  unfeigned emergency is a great way for people to get used to operating in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster.3.3.3. ChecklistsThis  dormant case of testing would be a good system to implement on a weekly or monthly basis depending on the needs of the company. This will help in detecting problems before they  acquire a major issue.3.3.4. Parallel testingSince Bloom Design group is updating their security parameters and do not have an equal  image of system already implemented parallel testing would not be appropriate for this security policy.3.3.5. Full interruptionI think this is  some other very effective way to test the system in the event of an emergency. However, to minimize inconveniences to th   e customers it would have to be done during off hours.4.  material Security PolicyDue in Week Five  compendium the Physical Security Policy. Merkow and Breithaupt (2006) state, an often overlooked connection between physical systems (computer hardware) and  tenacious systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the  biddings needed for each category as relates to your selected scenario. These controls may include the  pursuitPhysical controls (such(prenominal) as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) Environmental or life-   safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)4.1. Security of the construction facilities4.1.1. Physical entry controlsAt the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction with an access control system that limits entrance/exit to the offices through one main entrance. There will be an employee entrance as well  as well as to be accessed by an electronic badge.4.1.2. Security offices, rooms and facilitiesFor the security offices I would implement biometric s fecal matterners due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will utilize electronic badges with a photo and  abduce of the employee.4.1.3. Isolated delivery and loading areasFor these areas I would implement electronic key card access with the use of a CCT   V system recording to a DVR. With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being made and  stooge  break he  distant environment before opening the door.4.2. Security of the information systems4.2.1. Workplace protectionFor this part of the security policy I would utilize pre-employment screening and  obligatory vacation time. This prevents people from hiding illegal activities while performing their duties. Also, I would setup  rightd entity controls so operators and system administrators have  picky access to computing resources.4.2.2. Unused ports and cablingFor unused ports I would use a  human of security equipment that can be plugged into the unused port and can only be removed by someone with a special key. This will help prevent unauthorized access into the  lucre. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above    mentioned equipment isnt  getable then the port should be removed.4.2.3.  profits/server equipmentBeing that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room that contains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to  abide the equipment to operate at peak efficiency.4.2.4. Equipment maintenanceSince a lot of the equipment is spread across a large region I would utilize remote communication connections to troubleshoot issues. If the maintenance need is more  concentrated than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment.4.2.5. Security of laptops/roaming equipmentFor laptops and roaming equipment I would install all devices with a GPS  reporter and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room wit   h access being tightly controlled.5.  nettle Control PolicyDue in Week Seven Outline the Access Control Policy. Describe how access control methodologies work to secure information systems5.1. AuthenticationAuthentication credentials permit the system to  asseverate ones identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a  naive password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personalsomething that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the  ordinarily used systems.With two or three factors to authenticate, an information  possessor can gain confidence that use   rs who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric  examine uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common approach to managing IDs and passwords is to  make up a password or PIN vault. These programs use secure methods to topically store IDs and passwords that are protected by a master password that unlocks the vault when its needed.5.2. Access control  schema5.2.1. Discretionary access controlThe discretionary access control system will be used for Bloom Design Group because this is the favored approach in the  incorporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is t   o give people the least amount of access to a system that is needed to perform the job theyre doing. The need-to-know dictates the privilege (authority) to perform a transaction or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations.5.2.2. Mandatory access controlIn a system that uses mandatory access control (MAC also called nondiscretionary access control), the system decides who gains access to information based on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best choice for this scenario. MAC is better suited for  military machine or governmental systems.5.2.3. Role-based access controlRole-based access control (RBAC) groups users with a common access need. You    can assign a role for a group of users who perform the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to easily assign access to certain groups such as designers, office personnel, customer service associates and so forth.5.3. Remote accessRemote Access Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be applied at a single administered  mesh topology point. Having a central service also means that its easier to track usage for billing and for keeping  profits statistics. A virtual  toffee-nosed  mesh topology (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or h   er ISP and initiates a connection to the protected network (often using a RADIUS server), creating a  cloak-and-dagger tunnel between the end points that prevents eavesdropping or data modification.6. Network Security PolicyDue in Week Nine Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices.6.1. Data network overviewDue to the large  geographical distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a  larger geographic area than a LAN (technically, a network that covers an area larger than a single building). A WAN can span the  immaculate nation or even the globe using satellites.6.2. Network security services6.2.1. AuthenticationAccess to documents can be restricted in one of two ways by asking for a username and password or by the hostname of the browser being used. For Bloom Design Group emplo   yees will need to enter a user ID and password to access restricted documents and sites.6.2.2. Access controlUnlike authentication, which is security-based on the users identity, restricting access based on something other than identity is called access control. For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners.6.2.3. Data confidentialityThis service protects data against unauthorized disclosure and has two components content confidentiality and  put across flow confidentiality. For Bloom Design group all messages transmitted and  authorized through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents.6.2.4. Data integrityThe goal is to protect data from accidental or malicious modification whether during data transfer, data storage, or from an operation performed on it, and to preserve it for its int   ended use. For Bloom Design Group the only people who will be authorized to make changes or modifications will be the Head of the IT department and anyone else they deem necessary.6.2.5. NonrepudiationA service guaranteeing that the sender of a message cannot deny having sent the message and the  pass receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made.6.2.6. Logging and  superviseThese services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router traffic between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content.6.   3. Firewall systemOutline the roles of the following network security control devices and how these basic security infrastructures are used to protect the companys network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network.  allow how the firewall system is or is not applicable to the companys network configuration in your selected scenario.6.3.1. Packet-filtering router firewall systemThe most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding traffic between networks as well as using packet-filtering rules to permit or deny traffic.6.3.2. Screened host firewall systemThe second firewall example employs both a packet-filtering router and a bastion host. This firewall system provides  high levels of security than the previous example because i   t implements both Network-Layer security (packet-filtering) and Application-Layer security (proxy services). Also, an trespasser has to penetrate two separate systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military  associate company then it doesnt require the most elaborate form of firewall protection.6.3.3. Screened-Subnet firewall systemThe final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while  delimitate a demilitarized zone (DMZ) network.7. ReferencesCite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication  manual of the American Psychological Association (5th ed.). Wash   ington, DC Author.Information Security Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.  
Thursday, January 17, 2019
Religion in ââ¬Ã…To Kill a Mockingbirdââ¬Ã‚ by Harper Lee Essay
The theme of  trust in To Kill a Mockingbird is an highly important one. It stands as a crucial point for  separate themes in the novel  much(prenominal) as  racial discrimination, sexism and discrimination. The community of Maycomb County all  recollect themselves to be  sincere, wholesome  race we discover that they  atomic number 18 using their religion to indulge in other criticisms. Although they listen to the sermons about their religion and pretend that they practise it outside of church building on a Sunday, the rest of their time, their beliefs on social harmony are far from the  faultless Christian morals they believe themselves to have.This is evident in Chapter twenty-four, the scene that involves the ladies of the missionary tea circle. Here the majority of women believe themselves to be utterly perfect southern-belles, who devote their life to discussing the works of deliverer .One thing is apparent, though, the women in the group hold diverse viewpoints and represent t   he mixed liberal, conservative, and hypocritical viewpoints found in the general population of Maycomb county. We see how  alter they actually are when they go into discussion about the Mrunas and how awful it would be to have  peck  much(prenominal) as this living in their community, with  a good deal of children running round all dirty and flea ridden. Here we see the  supernatural irony because, these women have these type of people living amongst them the Ewell family. But although they   may see this similarity, they may refuse to accept it because as Ladies, they cannot accept  much(prenominal) atrocities in their own town.Although the theme of religion is though to be interpreted seriously by every member of the community, it is  just really  clever by the   char community. Indeed, the white people practise it. But, in measures such as when Miss Maudie is condemned for looking after her garden when she could be  rendition the bible. In methods such as enforcement of religion,    people will never  engage it as seriously than if they would have had the chance to learn about Methodists,  quite an than having it drummed into them at birth.Phrases from the Bible such as Do unto others as you would  analogous done unto you and Love your neighbour as you love yourself are not given a second thought as the community continues to be a hypocritical, racist and unjust  companionship. No though for other peoples feelings is given in Maycomb county, no thought for how someone may be feeling, especially if they are black. For the community of Maycomb, does not believe the black people to have any feelings whatsoever. Just as long as the white people still feel they are a perfect community, full of devout, God-fearing people, they do not care who is put to  finis and who suffers.The Bible does not say anything about the ill treatment of black people. It does not commend or apprehend racial or  discriminatory discrimination. So, if these people base their lives on th   e teachings of the Bible, why is their discrimination in their society? Historical reasons. Discrimination and racism had nothing to do with their religious beliefs it was because of a long history of conflict, starting way before Civil War. So, wouldnt you have thought that in the nineteen hundreds, people would have woken up to the circumstance that colour of skin has no preference on a person? But, the people of Maycomb County are so fixed in their ship canal of social class that their racist ways will never change.  calamitous people occupy the lowest class level in the Maycomb society.  non because of their deprivation or the way they speak, it was because of the colour of their skin.In conclusion, religion plays an extremely important part in To Kill a Mockingbird. It forms a  still hunt for other morals and beliefs such as discrimination both racism and sexism and shows the reader what an unjust community Maycomb County is. On the surface of the communities personalities are    holy, devout people. But, as we study their religion along with their morals, the realisation is in fact that theses people use their religion as an excuse to discriminate, not only against black members of the society, but in some cases women. Religion will  always play a big part in society and culture,  eve in present day, but in the early nineteen hundreds, it was  inured properly only by a few people. The rest, use it as a basis to form other such like beliefs and ethics,  qualifying so far away from the holy life Jesus intended, by being evil, self-centred human beings.  
Wednesday, January 16, 2019
QCF Level 2 Health and Social Care Diploma Group A: Mandatory Units Knowledge Workbook Essay
 key out the  oppo berth reasons people communicate.People communicate to express  demand,feelings,ideas,ask questions,share experiences condone how effective  discourse affects all aspects of   actor workEffective communication helps to understand  customers needsExplain  wherefore it is important to observe an  several(prenominal)s reactions when communicating with themsee moredescribe the components of a   individualised development  architectural  designBecause I  drop know from the reactions how the   psyche feels(happy,pain),if the   mortal understand what I am trying to say,if the  mortal is interested in conversationSHC022Introduction to  individualal development in health,  kindly  carry off or childrens and young peoples settings infer what is  needed for competence in own work role (1.2,1.3)Identify standards that  process the  right smart the role is carried  revealThis standarts are including in health and  preventive act 1974,Moving and Hnadling Guidelines,Hasawa,Riddor   ,Coshh chance upon ways to ensure that  someoneal attitudes or beliefs do  non obstruct the quality of work.Treat everyone equaly)no difference in  fetch up,religion,race)Be  subject to reflect on own work activities (2.1)Explain why reflecting on practice is an important way to develop knowledge, skills and practice.Reflecting on  come helps me to see what I am doing good,where(in which areas)I need advice or more  cultivationBe able to agree a personal development plan (3.1, 3.2)Identify sources of  fight for own learning and development.- egotismeducation (internet,books)-Meetings with supervisor and more  preparationDescribe the process for agreeing a personal development plan and who should be involved.In personal development plan should be involved suprvisor and I. For this plan I have to know what I want to learn,what my targets are and  modify with supervisor to see how big progress Ive done and what needs to be changedProfessional discussion with Assessor on SHC022Candidate     tinge Assessor signature SHC023Introduction to equality and inclusion in health, social  business concern or childrens and young peoples settingsUnderstand the importance of equality and inclusion (1.1,1.2,1.3)Explain what is meant bya) diversity=diference(that everyone is  extraordinary and  antithetical)b) equality=treat the people on same way(and treating people in way appropriate to their needs)c) inclusion=including(inclusion is about giving a  honorable chance to be included without discrimination)d) discrimination=wrong judgement establish on  depend on,religion,rase,disability(leave someone out of the team because of judgement)Describe ways in which discrimination whitethorn deliberately or inadvertently occur in the work setting.For example-bus driver wont let wheelchair substance  detestationr and carer into the bus because he doesnt want to make ready the  storm for wheelchair-carer and client  pull up s restorations be different religion and  lymph node  allow celebrat   e own festive days(of religion)  provided wont  get carer do celebrate hers/his religion festive daysExplain how practices that support equality and inclusion  foreshorten the likelihood of discrimination.Be example-to show the  man right attidude towards discrimination (forexample support wheelchair user whos discriminated by refusing enter into bus)Be able to work in an inclusive way (2.1, 2.3)Identify legislation, codes of practice and organisational polices and procedures (where these exist) relating to equality, diversity, discrimination and rights in own role.-Disability Discrimination  interpret-Human Rights Act 1998-Employment equality regulations 2003-Special education need and disability act 2000-The sex discrimination Act 1975Describe how to challenge discrimination in a way that promotes change.action=do something when I see discrimination and not to ignore it question it=ask why and discus itBe able to access information, advice and support about diversity, equality and    inclusion (3.1)Describe situations in which additional information, advice and support about diversity, equality and inclusion may be needed.Theres different methods of obtaining information on diversity,equality and inclusion. -goverment web site (list of all current legislations to protect the rights of individuals -age UK group (can supply materials to hand out to client )I may need this informations to help client who is  want advise on particular subject or if I am trying to obtain information in order to support clientSHC024Introduction to  work of care in health, social care or childrens and young peoples settings.Understand the meaning of duty of care (1.1, 1.2)Define the term duty of care work of care is responsibility towards the person I look after(in meaning to  salve the person  refuge and away from harm)Describe how the duty of care affects own work.Duty of care means it is my part of my job to keep me and my client  base hit so I am following all security rules to ke   ep everything safe and if theres any new changes ,training or update I follow the new rulesUnderstand support available for addressing dilemmas that may  scratch about duty of care (2.1, 2.2)Describe dilemmas that may arise between the duty of care and an individuals rights.The client knows what she/he is doing.Its clients right to decide about own life even if I disagree with clients choise and I have to respect that (for example what is healthy to eat,what activities client wants to do) Explain where to get additional support and advice about how to resolve such dilemmas.I am seeking support and advice from my supervisor or from  subprogram. Way how to  nullify conflicts because of this dilemmas is to make sure individual is aware of the consequencesKnow how to respond to complaints (3.1, 3.2)Describe how to respond to complaints-respond the complaining asap-acknowledge mis regaining-speak about different views on what happened-explaining situation for both sides and appologyIdent   ify the main points of agreed procedures for handling complaints-recorded and  document procedure-complaint is listened to and respected-procedure is clear-it may have formal and  daily optionsHSC024Principles of safeguarding and protection in health and social careKnow how to  appreciate signs of  convolute ( 1.1, 1.2, 1.3)Define the following types of abusea) Physical abuse-if someone physicaly harm other personb) Sexual abuse-forcing into unwanted sex  intimacyc) Emotional/psychological abuse-doing harm with words-if someone behave on way that emotionally attack other persond) Financial abuse-using persons money,property or other  semiprecious things without this persnons knowing(unauthorised,illegal use)e) Institutional abuse-abuse happening in care homes,hospitalscan be any or combination of thesediscriminatory abuse,financial,neglect,physical,emotional,sexual abusef) Self neglect-when person neglect ownself(basic needs,personal hygiene)g) Neglect by others-passive for of abuse   (for example carer should  leave behind care for client but carer doesnt give client an  tolerable caredo not change dirty linen,catheters) Identify the signs and /symptoms associated with  all(prenominal) type of abuse.-physicalbrurses,scratches,change behavior-sexualbrurses,scratches in genital area,change  behaviour-emotinalchanging behaviour-financialthe  stirred person doesnt know where are the money dissapearing -neglectaffected person will shown lacl of personal hygiene,health problems,dirthy clothsDescribe factors that may contribute to an individual  beingness more vulnerable to abuse.-if the individual has comunication difficulties,is socialy isolated,is depended on other persons helpKnow how to respond to suspected or  say abuse (2.1, 2.2, 2.3)Explain the actions to take if there are suspicions that an individual is being abused.I have professional duty to report any wetnessed or suspected abuse to my supervisor or to the office.this information is refered to social  func   tion and it musst be assessedExplain the actions to take if an individual alleges that they are being abused.-let the person speak-ask open questions(those where is no possible to answer yes or no) -dont ask leading questions-take every allegattion seriously-contact and inform supervisor and officeIdentify ways to ensure that evidence of abuse is preserved.-make a  compose record of conversation(date,time on it)-ensure written records are kept in safe place(bills,letters,medication records,bank statements) -record any physical signs of abuse on body(bruising,cuts)-not tidy anything up(wait for police)Understand the  field and   local context of safeguarding and protection from abuse (3.1, 3.2, 3.3, 3.4,)Identify national polices and local systems that relate to safeguarding and protection from abuse.-human rights act 1998-equality act 2000-social servicesExplain the roles of different agencies in safeguarding and protectingindividuals from abuse.-work together to prevent and protect    adults from risk of abuse -support people to make their own choises-investigated actual or suspected abuse and neglectIdentify reports into serious failures to protect individuals from abuse.For example-if I am witness of abuse and I wont report it-if agency will get report of abuse from carer and wont take an  passable acction -if I as a witness of active abuse  cry police and the police wont show upIdentify sources of information and advice about own role in safeguarding and protecting individuals from abuse.Supervisor-safe guarding courseslocal safe guarding team-social servicesindependent safeguarding authorityUnderstand ways to reduce the likelihood of abuse (4.1, 4.2)Explain how the likelihood of abuse may be reduced bya) working with person centred values-encourage in contact with community,support to build up self confidenceb) encouraging active  confederacy-coopretaion with organization for disabled people(be part of disabled comunity)c) promoting choice and rights-by  liv   ing with choises(places where to go for trips),accept the individuals right for own decision but supporting to make sure client is safeExplain the importance of an  ready to hand(predicate) complaints procedure for reducing the likelihood of abuse.Know how to recognise and report  unprotected practices ( 5.1, 5.2, 5.3)Describe unsafe practices that may affect the well-being of individuals-not safe  suffice during moving and handling-incorect use of equipment-not disposing of waste properlyExplain the actions to take id unsure practices have been identified.-inform supervisor-write records of what is wrong + guidenceDescribe the action to take if suspected abuse or unsafe practices have been reported but nothing has been done in response.Keep reporting in  case of abuse(report to supervisor,office again) call police(as nothing has been done foe change and the situaton may cause harm of client)  
Tuesday, January 15, 2019
DBQ- minorities in world war II Essay
The following  heading requires you to write a coherent essay incorporating your interpretation of the documents and your  noesis of the  accomplishment specified in the question. To earn a high score you  be required to cite key pieces of evidence from the documents and draw on your  friendship of the period. It is often claimed that the major Ameri fire wars of the last 150 years  carry resulted in the most important social and political gains of minorities and women. Evaluate this  tale with regard to the experience of minorities and women during World  struggle II. Use evidence from the documents and your knowledge of the period from 1941 to 1945 to compose your answer.Brigadier General B. 0. Davis to General Peterson, 9 November 1943 (Brigadier Davis had fair completed an inspection of  military bases in Massachu dealts, New York, New  tee shirt and Michigan)I was deeply impressed with the high esprit de corps and attitudes of the  diagonal officers and soldiers stationed in the    states visited in the past two months. They were so different from those of the colored officers and soldiers  hardened in the southerly states. While there has been an improvement in  ecumenic conditions, there is  pipe down great dissatisfaction and discouragement on the part of the colored people and the soldiers. They feel that, irrespective of how much they strive to meet  fight Department requirements, there is no change in the attitude of the warf ar Department. The colored officers and soldiers feel that they are denied the protection and rewards that ordinarily result from  keen behavior and proper performance of duty.. The Press news items and reports of investigations  signal that there has been little change in the attitudes of civilian communities in Southern states. The colored man in uniform receives  nonhing but  aggressiveness from community officials. The colored man in uniform is expected by the War Department to develop a high morale in a community that offe   rs him nothing but humiliation and mistreatment. Military  procreation does not develop a spirit of cheerful acceptance of Jim-Crow  police forces and customs. The War Department has failed to secure to the colored soldier protection against violence on the part of civilian police and to secure justice in the courts in communities near-by to Southern stations. In the areas recently inspected, the colored soldier feels that he can secure justice in the civil courts. He has not been set upon by the civilian police. He has not been denied the privilege of occupying empty  seating room in public buses, street cars, etc. taxicabs to serve him. This is not so in Southern communities.President Roosevelt,  executive director Order 9066, February 25, 1942Whereas the successful  prosecution of the war requires every possible protection against espionage and against sabotage to  home(a)- defensive structure material, national-defense premises, and national defense utilities.I hereby authorize    and direct the Secretary of War, and the Military Commanders whom he whitethorn from time to time designate, whenever he or any designated  commanding officer deems such action necessary or desirable, to prescribe military areas in such places and of such extent as he or the  stamp down Military Commander may determine, from which any or  only persons may be excluded, and with respect to which, the  pay off of any person to enter, remain in, or leave shall be subject to whatever restrictions the Secretary of War or the appropriate Military Commander may impose in his  judgement.Korematsu v. United States, 1944. Mr. Justice Murphy, dissentingThis exclusion of all persons of Japanese ancestry, both alien and non-alien, from the peaceable Coast area on a  justification of military necessity in the absence of martial law ought not to be approved. Such exclusion goes over the very brink of  inbuilt power and falls into the ugly abyss of racism.Individuals must not be left impoverishe   d of their  thoroughgoing rights on a plea of military necessity that has neither substance nor  backup.Being an obvious racial discrimination, the  coiffure deprives all those within its scope of the equal protection of the laws as guaranteed by the Fifth Amendment. It further deprives these individuals of their constitutional rights to live and work where they will, to establish a home where they choose and to move about freely. In excommunicating them without benefit of hearings, this  dictate also deprives them of all their constitutional rights to procedural due process. Yet no reasonable relation to an immediate, imminent, and impending public danger is evident to support this racial restriction which is one of the most sweeping and complete deprivations of constitutional rights in the history of this nation in the absence of martial lawCongressman Rankin, Mississippi, February 18, 1942I know the Hawaiian Islands. I know the Pacific coast where these Japanese reside. Even thou   gh they may be the  threesome or fourth generation of Japanese, we cannot trust them. I know that those areas are teeming with Japanese spies and fifth columnists. Once a Jap  perpetually a Jap.You cannot change him. You cannot make a silk purse out of a sows ear.Do not for depict that  once a Japanese al agencys a Japanese. I say it is of decisive importance that we getrid of every Japanese whether in Hawaii or on the mainland. They violate every sacred promise, every canon of honor and decency. This was  demonstrate in their diplomacy and in their bombing of Hawaii. These Japs who had been there for generations were making signs, if you please,  channelize the Japanese planes to the objects of their inequity in order that they might destroy our  oceanic vessels, murder our soldiers and sailors, and blow to pieces the helpless women and children of Hawaii. Damn them Let us get rid of them nowFranklin D. Roosevelt, Fireside Chat on the Home Front, October 12, 1942In order to kee   p stepping up our  performance, we have had to add millions of workers to the total  cut into force of the Nation. And as new factories come into operation, we must find  surplus millions of workers. This presents a formidable problem in the mobilization of manpower. It is not that we do not have enough people in this country to do the job. The problem is to have the right numbers of people in the right place at the right time.In some communities, employers  dislike to employ women. In others they are reluctant to hire Negroes. In still others, older men are not wanted. We can no  thirster afford to indulge such prejudices or practices.Women are welders sic discuss the production of motor mounts and welded parts in a welding booth at the Inglewood, Calif., plant of North American Aviation, Inc. 1942. National Archives and Records Administration.President Roosevelt, Executive Order 8802, June 25, 1941WHEREAS it is the  polity of the United States to encourage full participation in th   e national defense program by all citizens of the United States, regardless of race, creed, color, or national origin, in the firm belief that the democratic way of life within the Nation can be defended successfully  tho with the help and support of all groups within its bordersWHEREAS there is evidence that  for sale and needed workers have been barred from  practice session in industries engaged in defense production solely because of considerations of race, creed, color, or national origin, to the detriment of workers morale and of national unityNOW, THEREFORE, by virtue of the authority vested in me by the Constitution and the statutes, and as a prerequisite to the successful conduct of our national defense production effort, I do hereby reaffirm the policy of the United States that there shall be no discrimination in the employment of workers in defense industries or government because of race, creed, color, or national origin, and I do hereby declare that it is the duty of em   ployers and of labor organizations, in  forwarding of said policy and of this order, to provide for the full and equitable participation of all workers in defense industries, without discrimination because of race, creed, color, or national origin   
Developing Ecotourism
Developing Eco  holidaymakerry The Prospect of Bakkhali Group Project  pull ind  chthonic Rajiv Gandhi   lease Preface This project has been prep ard  d havestairs the aegis of Rajiv Gandhi Chair in Eco -systems &038 Sustainable Development under the supervision of Professor Sarmila Banerjee by the Masters level students in  stinting science with specialization in  re quotationfulness &038 Environmental Economics of the University of Calcutta. Prof. Banerjee has initiated us to the issues  link to economy- surround interface and convinced us  ab  bring out(a)(predicate) the importance of the notion of eco touristry to  ease the entire process   sustain  sack.We  atomic number 18 extremely grateful to Professor Banerjee for her active interest and  sympathize with  softw   ar documentation  exclusively  doneout. In this backdrop we tried to collate  selective in institution on  divergent aspects of Ecotourism from our field trip to Bakkhali, a  lessened  depart of the Sundarban mangro   ve  af tone ecosystem of West Bengal. We  sleep withed our venture in this newly  be activeled terrain of  surroundingsal economics and learnt to oceanrch for information from the internet, write brief descriptions of the issues, prep atomic number 18 presentation slides and fina lly to give an  combine  decide to the entire project.Finally, it has been the collective  ploughsh be of all the students of this course of the batch 2010-2012. Semester IV Resource and Environmental Economics M. Sc. (Economics) University of Calcutta June 8, 2012 ii  fudge of Contents  nary(prenominal) Contents Preface Table of Contents Ecotourism 1. 1 Different forms of tourism in India 1. 2  upcoming prospects of Tourism 1. 3 Impacts of tourism 1. 4 Promoting ecotourism in India 1. 5 The principles  adopted by those   turn oning in Ecotourism 1. 6 Why ecotourism? Page No. ii iii  iv 1-8 2. Ecosystem Approach 2. 1 Ecosystem and its Importance . 2 Ecosystem Approach 2. 3 slaying of Ecosystem Approach 9  1   1 3. Valuing Bio potpourri 3. 1 Why  judge Ecosystem? 3. 2 Motivation for an economic emilitary rating of ecosystem  operate 3. 3 Biosalmagundi 3. 4 Valuation of Bio diverseness 3. 5 Bio vicissitude  stageping 12  15 4. Peoples Biodiversity Register (PBR) 4. 1 Objective of PBR formation 4. 2 Usefulness of PBR 4. 3 Information recorded in PBR 4. 4  major  ship  arouoceanl of collecting data for PBR 4. 5  unifiedness in an Ecosystem 16  18 5. Sundarban  A Special Ecosystem 5. 1 Sundarban Eco   vicinity Introduction 5. 2Sundarban  fresh irrigate Swamp  plants 5. 3 Sundarban mangroves 5. 4 Sand  Dunes Ecological Set  up 5. 5 Biodiversity of Sundarban 5. 6 Livelihood in Sundarban 5. 7 Utilization of Mangrove Resources Comprised 5. 8 Repenny Developments &038 their Impacts 5. 9 Man-Animal Conflict 5. 10 Threats to Sundarban &038 Climatic   fancy 19  33 1. iii 6. Ecotourism in Bakkhali A Fringe  partially of Sundarban 6. 1 Bakkhali 6. 2 Accessibility 6. 3 uniqueness 6. 4 Frasergunj, enthal   py Is primer &038 Jwambudwip 6. 5 Floral  revolution at Bakkhali &038 enthalpy Isand 6. 6 Faunal Diversity at Bakkhali &038  hydrogen Island . 7 Avian Diversity at Bakkhali &038 Henry Island 6. 8 Livelihood on Biodiversity 6. 9 Market Sharing 6. 10 Other Observations 6. 11 Threats from Tourism 6. 12 Our Suggestions iv 34  45 I. ECOTOURISM diversification to  experience one of the fastest growing economic sectors in the world. Tourism has become a thriving global indu stry with the power to shape   incuring countries in both positive and  minus  carriages. Consequently, it is the fourth  immensest  labor in the global economy and in India it contri furtheres to a large  equalizer of the National Income  6. 3% to the national GDP and 8. 78% of the total  transaction thus generating  great  habit opportunities (Wikipedia). 1. 1 Different forms of Tourism in India The Indian g all  everywherenment, in order to boost tourism of  dissimilar kinds in India, has set up the Ministry of Touri   sm and Culture. T his ministry recently launched a  military campaign called I bl I  ff y f I .T  dilute is  mournful toward niche segments of tourism (as shown in figure 1 be scummy).  get into 1 Different Forms of Tourism in India 1. 2 Future prospects of TourismAccording to the latest Tourism Satellite Accounting (TSA) research, released by the  ball Travel and Tourism Council (WTTC) and its strategic partner Oxford Economics in March 2009 1 ? The demand for travel and tourism in India is expected to grow by 8. 2 per cent between 2010 and 2019 and will  lead India at the third position in the world. ? Indias travel and tourism sector is expected to be the second largest employer in the world. Considering the ever growing importance of this industry it is  necessity we look for  guidances that will be sustainable in the  eagle-eyed run. wikipedia) 1. 3 Impacts of tourism Positive Impacts 1. Generating Income and Employment Tourism in India has emerged as an instrument of income an   d employment generation, poverty alleviation and sustainable human  phylogenesis. 2. Source of Foreign  qualify Earnings Tourism is an  burning(prenominal) source of  un wish well ex transfigure  net in India. This has  plausive  push on the balance of payment of the country. 3.    saving of National Heritage and Environment Tourism helps preserve several places which  ar of historical importance by declaring them as heritage sites.For instance, the Taj Mahal, the Qutab Minar, Ajanta and Ellora temples, etc, would  endure been  lousy and dest royed had it not been for the efforts  incurn by Tourism Department to preserve them. Likewise, tourism   at any rate helps in conserving the  inherent habitats of mevery endangered species. 4. Developing  root Tourism tends to encourage the  victimization of mult iple lend oneself infrastructure that benefits the host community, including various  core of  conveys, health c ar facilities, and sports centers, in  sum total to the hotels and   n   obleschool -end restaurants that cater to foreign visitors.The development of infrastructur e has in turn induced the development of   oppositewise directly productive activities. 2 5. Promoting Peace and Stability Honey and Gilpin (2009) suggests that the tourism industry  nates  similarly help promote peace and  stability in developing country  akin India by providing jobs, generating income, diversifying the economy,  fostering the surround, and promoting cross-cultural aw  arness. 6. Contri butions to Government R stock-stillues The Indian government through the tourism department  in like manner collect money in   more(prenominal)(prenominal) far r all(prenominal)ing and  mediate ways that argon not linked to specific parks or conservation  field of studys.User fees, income taxes, taxes on sales or rental of recreation equipment, and  permission fees for activities  much(prenominal) as rafting and fishing  throw out  extend governments with the funds ne eded to  complete  imman   ent resources. Negative Impacts 1. Undesirable Social and Cultural  transmit Tourism  both(prenominal) ms led to the destruction of the  neighborly fabric of a community. The more tourists come into a place, the more the perceived risk of that place losing its identity. 2. Increase Tension and Hostility Tourism  butt increase tension, hostility, and  disbelief between the tourists and the  topical anaesthetic communities when there is no respect and f l y flf . T yf lead to violence and other crimes committed  once against the tourists. 3. Creating a Sense of Antipathy Tourism brought little benefit to the   local community. Moreover, large hotel chain restaurants  oft import  pabulum to satisfy foreign visitors and seldom emp loy local staff for senior  direction positions, preventing local farmers and workers from reaping the benefit of their presence. This has  practically created a sense of antipathy towards the tourists and the government. 4.Adverse Effects on Environment and E   co  logy One of the  roughly important adverse effects of tourism on the environment is increased  squeeze on the carrying  subject matter of the ecosystem in each tourist locality. Increased transport and construction activities led to large  graduated  display panel  de woodlandlandation and destabilisation of  instinctive landforms, while increased 3 tourist  scat led to increase in solid waste  cast aside as well as depletion of  irrigate and fuel resources. Flow of tourists to ecologically sensitive areas  dissolvered in destruction of rare and endangered species due to trampling, killing,  solicitude of breeding habitats.Noise  contaminant from vehicles and  familiar address systems,  irrigate pollution, vehicular emissions, untreated sewage, etc.  overly  turn over direct effects on bio -diversity,  close environment and general profile of tourist spots. 5. Depletion of natural resources Tourism development can put pressure on natural resources when it increases  economic con   sumption in areas where resources are already scarce. 6. Destruction and Alteration of Ecosystem Attractive landscape sites,  much(prenominal) as  flaxen beaches in Goa, Maharashtra, Kerala, Tamil Nadu lakes, riversides, and mountain tops and slopes, are  lots transitional  geographical zones, characterized by species- copious ecosystems.The  terrors to and pressures on these ecosystems are often  solemn beca commit such places are  precise attractive to both tourists and developers. Examples whitethorn be cited from Krushedei Island  safe Rameswaram. Moreover, habitat can be degraded by tourism leisure activities. For example, wildlife viewing can bring about stress for the  brutes and  shift their natural behaviour when tourists come too close. Safaris and wildlife watching activities have a degrading effect on habitat as they often are accompanied by the noise and commotion created by tourists. Figure 2 shows the same impacts classified under  galore(postnominal) other categories   . then, the  take account of the very environmental and socio cultural assets that attract travellers can erode over time. This is  curiously the case where tourism development is unregulated, blinkered by volume growth, and focused  merely on short - boundary economic benefits. This is unsustainable and ir accountable and completely unacceptable in the 21st century. Tourism in India should be  veritable in such a way that it accommodates and entertains visitors in a way that is minimally  invasive or destructive to the environment and sustains &038 supports the native cultures in the locations it is operating in.Moreover, since tourism is a multi-dimensional activity, and  basically a service industry, 4 Figure 2 Classification of Impacts of Tourism it would be necessary that all wings of the  substitution and State governments, private sector and voluntary organisations become active partners in the endeavour to attain sustainable growth in tourism if India is to become a world pl   ayer in the tourism industry.  overly, Eco tourism  unavoidably to be promoted so that tourism in India helps in preserving and sustaining the diversity of the Indias natural and cultural environments. It can simply be summarized as shown in  witness 1. 1. 1Promoting ecotourism in India Fundamentally, eco-tourism means  devising as little environmental impact as possible and helping to sustain the indigenous populace, thereby  advance the  conservation of wildlife and habitats when visiting a place. This is the respons ible form of tourism and tourism development, which encourages going back to natural products in every aspect of life. It is  similarly the  get wind to sustainable ecological development. The International Eco tourism Society  destines eco-tourism as responsible travel to natural areas that conserves the environment and improves the well- world of local   corking deal.  ( wikipedia) Pictue 1 Eco-tourism  simply described The key players in the ecotourism business are    governments at levels, the local authorities, the developers and the operators, the visitors, and the local community. Each one of them has to be sensitive to the environment and local traditions and follow a set of guide falls for the successful development of ecotourism. 1. 2 Principles adopted in Ecotourism The principles that are adopted by those who are   heterogeneous in Eco -tourism can be listed as shown below ? To minimize the negative impacts on environment. ? To build environmental and cultural awareness and respect ?To provide positive experienc es for both visitors and hosts ? To provide direct financial benefits for conservation ? To provide financial benefits a nd empowerment for local the great un serve ? To raise sensitivity to host countries political, en vironmental, and social climate ? To support international human rights (www. ecotourism. org/what-is-ecotourism) 6 and labour agreements scientific and research institutions and non-government organisations can     besides play some roles in promoting ecotourism (i) Create awareness, among all concerned, about the importance of sound eco -practices in tourism development ii) Motivate the local communit ies to increase their involvement in sustainable tourism activities (iii) Organise  teach programs to prepare the local people to take up various vocations related to ecotourism (www. ecotourism. org/what-is-ecotourism) All these principles are summed up in figure 3, where their linkage is  besides shown with the arrow-heads. 6. Emphasizes the  imply for planning and sustainable growth of the tourism industry 1.  forfend negative impacts on natural &038 cultural environment 2. Educates the traveller on the importance of conservation PRINCIPLES OF ECOTOURISM 5.Stressing the use of locallyowned facilities and  run. 3. Directs revenues to the conservation of natural areas and the  heed of  protect areas 4. Brings economic benefits to local communities Figure 3 Principles of Eco -tourism 1. 3 Why e   cotourism?  approximately wilderness areas  across India are  breakable ecosystems that provide a  safe and sound host of ecosystem ser vices to local residents and people  vivacious downstream and continue to  roost important tourist attractions. However, unplanned tourism in such landscapes can destroy the very environment that attracts such tourism in the  initiatory place.Hence, there is a need to move towards a model of tourism that is compatible with these fragile landscapes. Such tourism is low impact, educational, and conserves the environment while directly benefiting the economic development of local communities. It has the 7  field to link to a  all-embracingr constituency and build conservation support while  superlative awareness about the worth and fragility of such ecosystems in the public at large. It  as well promotes the non-tubercular use of wilderness areas, for the benefit of local communities  documentation  almost, and dependent on these fragile landscapes.Thu   s, tourism can be developed a large with the conservation of the ecosystem. 8 II. ECOSYSTEM APPROACH 2. 1 Ecosystem and its importance Ecosystem is a dynamic complex of plants,  faunas &038 micro-organism communities &038 the non-living environment interacting as a functional unit. And it is this  interconnection that forms the striking feature of such a system. Healthy ecosystems are  inwrought for human well- beingness, as they provide inva luable functions and services including sustaining living resources. The health of ecosystems is  so not  besides essential to the environment, but also important to the  creative activity and l y. T b f E y A . 2. 2 Ecosystem Approach Ecosystem approach is basically a strategy for the  interconnected management of land,  body of water and living resources that promotes not   all conservation but also sustainable use in an equitable way. It is based on the application o f  entrance scientific methodologies focused on levels of  biologic organiz   ation, which encompass the essential structure, processes, functions and interactions among organisms and their environment. It recognizes that humans, with their cultural diver sity, are an  constitutional component of many ecosystems.However, till date, it has not been possible to identify any particular form of this approach. Ecosystem approach is based on some principles which  tump over the economy to be anthropocentric. And since ecosystem is a rich resource for human society, the integrated management of the biotic and abiotic components must ensure sustained use so as to secure it for future generations. These principles state that the objectives of management of land, water and living resources are a matter of societal choice and management should be decentralized to the lowest appropriate level.This approach should be undertaken at the appropriate spatial and temporal scale because time and spatial dimensions are  equally important. This approach should also consider all f   orms of relevant information including scientific,  tralatitious and local k forthwithledge, innovative 9 practices and  just about importantly, it should be open to changes. Finally, this should involve all relevant sectors of so ciety and scientific discipline s. 2. 3 Implementation of Ecosystem Approach The International Union for Conservation of Nature and Natural Resources (IUCN) identifies  tercet  flavors for the implementation of ecosystem approach.These steps are in accordance with the  in a  high place mentioned principles (Figure 4). Let us describe these steps in more detail. Figure 4 Major  abuses for Implementation of Ecosystem Approach (Adapted from R. Costanza et al. The value of the Worlds ecosystem Services and Natural Capital, Nature vol. 387(1997) Step A It deals with the  or so difficult issues of defining an ecosystem area identifying th e stake obligeers and developing a relation between the  both. It is best to work simultaneously on defining the ecosystem ar   ea and determining the stakeholders who will support the selection and management of that area.Whether we start with area or with stake holders, 10 it will take substantial time and effort to achieve a workable fit. Howover, this step qualifies as the  more or less important step because a proper management of the ecosystem by the stakeholders and a mutually beneficial relationship between the two can not only bring desirable results but also ensure harmonious coexistence. On the other hand, an improper management  capacity lead to exploitation due to overuse and significant endangering of the ecosystem, disrupting its sustainability for future generations . Step BThis stage involves characterizing the structure and function of the ecosystem, and setting in place mechanisms to manage and monitor it. The most productive way involves scientists and local inhabitants working  unitedly , as the traditional and scientific knowledge are likely to be complementary, though different. Step C    Step C essentially deals with  reducing  marketplace induced distortions on ecosystem. Valuation in case of environmental good has always been a problem since these are non marketed goods. Hence market distortion should be corrected at an early stage.Here we may apply the concept of derived market to arrive at a proper valuation using correct market instruments-Mekong river basin case study showed  overvaluation of dam and irrigation schemes. This should be corrected using best possible knowledge. The  interconnect age between the components should be properly identified while  reservation the cost benefit analysis. Care should be taken to avoid over extraction of resources. Proper incentive should be created among the people for wise use of biodiversity. One may bring political will in necessary issues. 11 III. VALUING BIODIVERSITY 3. 1 Why to value Ecosystem?The services of ecological systems and the natural capital stocks that  prepare them l f f E  l f -support system. They con   tribute to human welfare, both directly and indirectly, and therefore  check part of the total economic value of the planet. For the entire biosphere, ,the current economic value of 17 ecosystem services for 16 biomes, based on  create studies and a few original calculations, is estimated to be in the range of US$1654  gazillion per year, with an average of US$33  jillion per year. Because of the nature of uncertainties, this must be considered as a minimum estimate.Global  rough-cut national product total is around US$18 trillion per year. For example, the average  set benefit in the Med region amounts to about 1% of GDP. Indirect use value such as water-shed protection, contributes about 35% of total estimated value. ( Source Adapted from R. Costanza et al. T l f W l y S N lC l N l. 387(1997)p. 256 table 2) 3. 2 Motivation for an economic evaluation of ecosystem services ? Ecosystems provide a wide array of goods and services of value to people. ? Provision of ecosystems services    often is not factored into import ant decisions that affect ecosystems.Distortions in decision making damage the provision of ecosystems services making human society and the environment poorer. (Valuing Ecosystem servicesadvantages &038 disadvantages of existing methodologies and application to PES by Daniel Perrot Maitre (Seminar on environment services and financing for the protection and sustainable use of ecosystem Geneva,10-11 October 2005IUCN ) 3. 3 Biodiversity  regeneration in the living part of ecology is called biological diversity or biodiversity. This term is most  honey oilly used to replace the more   transparently defined and long established terms, species diversity and species richness.Biologists most often define 12 biodiversity as the totality of genes, species, and ecosystems of a region. An advantage of this  commentary is that it seems to describe most circumstances and presents a unified view of the traditional three levels at which biological variety has bee   n identified . (www. portal. gsi. gov. in/)  there are three forms of biodiversity Ecosystem diversity It refers to the diversity of a place at the level of ecosystems  the variety of species and ecological processes that occur in different  visible settings.Species diversity It is the effective number of different species that are delineate in a  hookup of individuals (a dataset). Genetic diversity It refers to the total number of  contractable characteristics in the genetic makeup of a species (www. portal. gsi. gov. in/) Biodiversity is indeed a major contributor to the economy through the provision of many ecosystem goods and services. It is  subjective to the  set of beauty and tranquillity.  more Australians place a high value on native plants and animals, which contribute to a sense of cultural identity,  phantasmal enrichment and recreation.In fact, biodiversity is central to the cultures of Aboriginal and Torres Strait Islander peoples. There is also a link between biodiver   sity and  continuelihood. This is because a persons  kick the bucketlihood refers to means of securing the necessities of life. Th is extends to include social and cultural means, i. e. the command an individual, family, or other social group has over an income and/or bundles of resources that can be used or exchanged to satisfy its needs.  For instance a fishermans livelihood depends on the  on tap(predicate)ness and accessibility of the diversity of fish.Therefore valuation of biodiversity is very important in our  day-after-day life. (www. portal. gsi. gov. in/) 3. 4 Valuation of Biodiversity The Value of Biodiversity (Figure 5) Includes both Use  determine and Non-Use Values? Use values include direct use (both consumptive and non-consumptive), indirect use, and option values 13 Direct-use Values Hunting, direct -consumption (e. g.  hookup of berries, mushrooms, b l ll  ) ll   b y tourism .  Indirect-use Values Ecosystem services such as pollination, habitat for other species, s   ustaining food chains, and other uses are indirect -use values. Non-use values include bequest values and existence values (http//www. biospherenursery. com/pages/whatisabioscape. html ) Value of Biodiversity Present use value-market based Future use value-option value Direct use value -conscious Existenceexistence value Non use value -ignorant? Figure 5 Fragmented Value of Biodiversity 3. 5 Biodiversity Mapping Biodiversity  social occasion denotes the link between biodiversity and human diversity. It is recognizes the role- played by human diversity in biodiversity conservation.Cultural biodiversity also exists in towns as people use traditional medicines, eat traditional food, wear traditional cloth and can also have an intricate knowledge on culture and biodiversity. Categories of Biodiversity Mapping Bioscape The term Bioscape f l ff b lz l  including human habitat (http//www. biospherenursery. com/pages/whatisabioscape. html).  decorate Landscape ecology is described as a scie   nce that examines the  behavior and patterns of land as a result of the interactions with its ecosystems. The relatively new 14 iscipline of landscape ecology provides insight into both landscape diversity and species diversity and suggests a theoretical and practical basis for conservation planning . Timescape Timescape is the change in pattern over time. It documents landscape pattern, occurrence and exploitation of biological diversity and the dependence of community on the natural resources. IV. PEOPLES BIODIVERSITY REGISTER (PBR) P l B yR (PBR) is a  authenticated register containing comprehensive information on the availability and knowledge of the local biological resource, their use and traditional folklore associated with them.It is one of the significant steps for conservation of biodiversity through sustainable management using indigenous knowledge. 4. 1 Objectives of PBR formation ? To claim justified benefit sharing by the local people for any commercial use of their BD    resources. ? To explore enterprises based on their BD resources ? To develop exhaustive data base to help effective intervention for development &038 conservation Along with this information, the Register will also contain  drawn-out annotations on the landscape of the area, present land use pattern, and some over timescape. 4. 2 Usefulness of PBR Preparation of Biodiversity Register is an attempt to realize the bio diversity at  topical anesthetic Self Government level, States and the whole Country. ? This will also provide information on the current utilization patterns of biodiversity, its economic benefits to the local communities. 4. 3 Information recorded in PBR 15 The information contained in PBR is not only confined to a list of species available in an area but a comprehensive report on the species, their habit, biological produce, their associated market price,  increaseing &038 transport of the produce, regulation on harvesting, technology, l y f ocal level management, la   ndscape related data, over a time span and so on. These information are being documented under landscape, lifescape, peoplescape, and t imescape. Thus, f l biodiversity register includes ? knowledge of local biological resources, their traditional knowledge associated with them, ? data about the local aid &038  practitioner uses of biological resources, ? details about biological resources &038 knowledge. 4. 4 Major ways of Collecting Data for PBR ? Interviews of individual ? Group interviews ? Few observation by volunteers and technical support group ? Existing official document 4. Interconnectedness in an Ecosystem 5. PAYMENTECOSYSTEM SERVICES 4. ECOSYSTEM SERVICES 1. BIODIVERSITY ECOSYSTEM 3. LIVELIHOOD DEPENDENCE 2. ECO-TOURISM Figure 6 Interconnectedness in a Ecosystem 16  sympathetics are now most concerned with the exploitation and preservation of the biotic constituents for commercial harvest and recreation. To achieve these goals, we must be aware of the interconnectedness    of the ecosystem which exhibits not only the characteristics of its components, but also characteristics of its own which arise from combinations and interactions of the components (as shown in figure 6).The interconnected mesh can be more clearly explained as b iodiversity is the living part of ecosystem  with biodiversit y eco-tourism can be developed  eco (tourism) is a major source of livelihood  ecosystem also provides various kinds of services  present to livelihood and biodiversity  thus payment for ecosystem services  this in turn can help in preserving the biodiversity. 17 V. SUNDARBAN  A Special Ecosystem Map 1 Sundarban Eco-region 5. 1 Sundarban Eco-region IntroductionThe Sundarban Delta Complex (map 1), having geo-genetic link to the tectonic Bengal Basin, geographically extends over the easterly India (40%) and Bangladesh (60%). It is characterized by prolific growth of rich and diversified mangrove  plant and forms an integral down drift coastal part of the Bengal Delt   a Complex that overlies huge thickness of Tertiary  leatherneck sediments of the actively subsiding Bengal Basin. It is a  clomp of 102 miracle islands, form the largest mangrove delta complex on the globe in 18 he estuarine phase of the Ganges and Brahmaputra Rivers, and constitute a  ridiculous Biosphere Reserve in the coastal Bay of Bengal. The deltaic complex was declared a reserved forest in 1875-76, under the  forest Act, 1865. A  lumber Division was created in 1879 with headquarters in Khulna. The Reserve Forest has been  put forward for recognition as a Ramsar Site (A Wetland of International Importance). (www. portal. gsi. gov. in/) Sundarban literally means beautiful jungle or forest in Bengali language. The name Sundarbans may also have been derived from the Sundari trees (dominant species) that are omnipresent in this region.This is a region of transition of fresh Ganga water and saline water of Bay of Bengal. Sundarban ecoregion features two characters  forest ecosystem    and sand dunes. The forest ecosystem can again be divided into two clusters fresh water swamp forests and mangroves. 5. 2 Sundarban freshwater swamp forests The Sundarbans freshwater swamp forests lay between the upland  put down Gangetic plains moist deciduous forests and the  unpalatable-water Sundarban mangroves bordering the Bay of Bengal. These are tropical a nd subtropical moist broad-leafed brackish swamp forests.The fertile  vulgarisms of the delta have been subject to intensive human use for centuries, and the eco-region has been mostly converted to intensive  culture, with few enclaves of forest remaining. This eco-region is nearly extinct due to large-scale deforestation and  closedown by human. 5. 3 Sundarban Mangroves Mangrove forest ( photo 2) is a  arboreal community that can be periodically  sink in sea water of the inter-tidal zone of tropical regions . They are the second highest source of  primeval production next to rainforests. They produce high detritus and re   lease nutrients which are a food source of variety of organism.Mangroves provide homes to variety of marine and terrestrial organisms. They act as nurseries and feeding grounds for many fish,  fish and crustaceans and non-resident fish enter the mangroves to feed at high . M l y 19 f fb  . They not only provide a wealth of b yb l f l food web. As with most ecosystems, an intricate relationship exists between mankind and mangrove. Many indigenous costal residents rely on mangroves to sustain their traditional cutlass. They have been sustainably used for food production, medicines, fuel wood, and fishery and construction materials.They are important inter tidal estuarine wetlands along the coast line of tropical and sub-tropical region are exposed to autersopogenic contamination fro m tidal water, river water and land based sources and Sundarban mangrove ecosystem being no exception.  find 2 Trees of Sundarban Mangrove Special Feature of Mangrove Ecosystem 1. Adaptations to low oxygen      blushing(a) mangroves, which can survive in the most inundated areas, prop themselves  above the water level with  mass roots and can then  betroth air through pores in their bark (lenticels).Black mangroves live on higher(prenominal) ground and make many pneumatophores (specialised root -like structures which stick up out of the  primer like straws for  quick) which are also covered in lenticels. These breathing tubes typically  lay down heights up to thirty centimeters, and in some species, over three meters. There are four types of pneumatophore  stilt or prop type, snorkel or peg type, knee type, and ribbon or plank type. Knee and ribbon types may be combined with  reenforce roots at the base of the tree. The roots also contain wide aerenchyma to facilitate transport within the plant. 2.Limiting water loss Because of the  cumber ed fresh water available in salty intertidal soils, mangroves limit the amount of water they lose through their leaves. They 20 can  compel the openi   ng of their stomata (pores on the leaf  rise ups, which exchange carbon dioxide gas and water vapour during photosynthesis). They also vary the orientation of their leaves to avoid the harsh  twelve noon sun and so reduce evaporation from the leaves. Anthony Calfo, a noted  marine museum author, observed anecdotally a red mangrove in captivity only grows if its leaves are mis ted with fresh water several times a week, simulating the  public tropical rainstorms. . Nutrient uptake The biggest problem that mangroves face is nutrient uptake. Because the soil is perpetually waterlogged, there is little free oxygen. Anaerobic bacteria  exhaust nitrogen gas, soluble iron, inorganic phosphates, sulfides, and methane, which makes the soil much less nutritious. Pnuematophores (aerial roots)  throw in mangroves to absorb gases directly from the atmosphere, and other nutrients such as iron, fro m the  hostile soil. Mangroves store gases directly inside the roots, processing them even when the r   oots are submerged during high tide. Evolution of MangrovesFrom low tidal  botch upflat via high tidal mudflat with mangroves to shrimp pond, sandy silt  capacity is lightly increasing. The content of  big elements and minerals is almost unchanged after depth as results of fairly stable,  sedimentary source chronologically. Geo chemical sedimentary evo lution is visually reflected in the regularly changing in geochemical indices, the content of nutrients and heavy metals. Mangroves often take shape in high tidal mudflat of estuaries, in where, sedimentary environment with fine grain is favourable for mangrove seeds to be stored, spring up and photosynthesiz e.In return, the formation and development of mangrove forests, as a sedimentary trap, make the sedimentary environment more favourable for depositing of fine grain sediments rich in clay minerals.  sedimentary deposition rate in mangrove forest tends to be higher than in Thus, these processes are natural companion of the environ   mental transform from low tidal mudflat without mangroves (permanently being under water) into high tidal mudflat covered with mangroves (alternatively being under water). The evolution is depicted in the figure 7 below. 21 Figure 7 Evolution of MangrovesThe transform of low tidal mudflat without mangroves into high tidal mudflat is characterized by a little increase in content of Fepyrite, Statal, Spyrite, Sreduction. The raising in amount of sulphurs can be understood as consequence of higher amount of mangrove root, which is the main sulphur source. The content of sulphurs increase after sedimentary depth in low tidal mudflat is more intensively than that in high tidal mudflat. This may also relate to increasing sulphur source in tidal mudflat. In addition, var iation coefficients of sulphurs content in mangrove forest sediment are higher than those in low tidal mudflat.Thus, the transform process through these two environments leads to stronger sulphurs differentiation. Under th   e right conditions like the formation of a mud -flat, growth of mangroves is initiated. Stabilization of mud-flats is a preliminary process in the  organization of mangroves. Pioneer plant species initiate this process. The roots of these plants help in  stick the soil and also help the establishment of micro -organisms which further help in stabilizing the area. Stabilization starts from the land side and gradually shifts towards the sea.The  introduce plants are spec ies like Porterasia coarctata and some members of the Cyprus family. These are slowly replaced by other mangrove plants and then these mangroves gradually spread towards the sea. Once mangroves grow, the submerged banks are fully stabilized. Then the plant s slowly  pee a stage which is called the climax vegetation. A climax vegetation of mangroves is represented by the complete circle of life where there are different species of plants, animals (both terrestrial and aquatic) and micro -organisms forming an ecosystem    called the tropical salt marsh or the mangrove ecosystem.In case the sediments are not 22 stabilized, submerged banks are washed out. Thousands of deltas are formed and washed out every year  onward they can be stabilized. In the Gangetic delta this situation is quite common. Zonation in mangrove 1. Proximal Zone (Front mangroves) This zone is towards water  bet, subject to regular tidal effect where intensity of soil accumulation and inundation is a  day-and-night process. The mangrove species in this zone are specially adapted with stilt roots, prop roots for stability and anchorage.  master(prenominal) species with these features are genus Rhizophora apiculata and Rhizophora mucronata.On rocky and coral reef substrata, genus Avicennia Spp, Sonneratia Caseolaris are also found.  two Avicennia and Sonneratia produce pneumatophores. 2. Middle Zones (Mid mangroves) Above the Rhizophora/ Avicennia line luxuriant group of Bruguiera gymnorrhiza, B. Cylindrica, Lumnitzera racemosa, L. li   ttoralis, Ceriops tagal and Aegiceras corniculatum occur. Ceriops and Bruguiera develop a strong hold fast in the form of knee roots or  band roots as a special adoption for supporting the  rear bole. 3. Distal Zone (Back mangroves) Towards island area mangroves like Excoecaris agallocha, Heritiera littoralis and Xylocarnus spp occur.Both Heritiera and Xylocarpus produce buttresses. Generally the salinity is on lower side in this zone occurring towards hill sides where run off of fresh water is for a  elongated period. The duration of tidal submersion is low in this zone compared to front mangroves. However, the zonation in mangroves is not so simple and varies from place to place. Every species has its own level of salinity tolerance. Estuaries on east coast show distinct zonation. The high salinity range on the east coast estuaries may be the principal reason for distinct zonation there.The range and force of tidal action also play a determinant role in creation and maintenance of    zones as distribution of seeds or propagules is influenced by tidal action. Also, tides do influence the salinity in an estuary. Land  brass in mangrove ecosystem 23 During high tide silts take a way into the creeks. And when low tide starts the water recedes but the silts are deposited. This is the natural way of sedimenta tion. In this way the land is formed in mangrove ecosystem (figure 8 (a)). But the newly formed land is fragile in nature. to boot the seeds of mangroves fall on this area and there they grow up.The roots of mangrove with its special characteristics hold up the soil. This prevents soil erosion and holds up the land. And the settlement grows around that. This is used for cultivation also. When embankment is built artificially to cultivate and to protect the land from being flooded the natural process o f land formation is hampered. Silt deposition does not take place. Also the mangroves which used to be there die down. The land becomes more fragile and during hig   h tide or during flood the water table increases more than it would previously. The purpose of embankment fails here.It hampers the natural land formation and also destroys the mangrove ecosystem (figure 8 (b)). (a) (b) Figure 8 (a) Natural Land Formation and (b) Land Formation Due To Embankment in Mangrove Ecosystem 5. 4 Sand-Dunes Ecological set-up At the most basic level dunes are simply piles of sand. Wind and waves transport sand onto the beach forming dunes. It results from stabilization of transported sediment, sea weed, debris by vegetation. It is also related to tidal fluctuation. Further accretion results in beach elevation. Migrating dunes helps to  harbour habitation being exposed to sea.Dune ridges are formed by surface wind w ith velocity more than 4. 5 m/s when sand sized 24 particles move by siltation. Travelling dunes  dip areas in eroding coast. In stable coast dunes stabilize 90o to wind direction. Sand tends to be blown from the windward face and to accumulate on    the leeward side. Dunes (picture 3) are found in Sundarban ecosystem which help protects mangroves. Tidal flow causes the formation of the mangrove and the formation of the sand dunes is caused by the wind flows. Thus tidal flow and wind flow works together in Sundarbans and creates the special features of this region, i. . , mangroves and sand dunes which lead to the formation of the beach. The beach here is rich in biodiversity and Sundarban is developing a very good kind of beach-centric ecotourism.  watch 3 Sand-dunes of Sundarban Eco-system 5. 5 Biodiversity of Sundarban A brief account of the floral and faunal diversity in Sundarban is shown in the picture 4 below. Some common mangrove species can be jotted down as ? Hatal(Phoenix paludosa) ? Genwa (Excoecaria agallocha) ? Dhundul(Xylocarpus granatum) ? Kankra (Bruguirea gymnorrhiza) ? Champa(Bruguiera parviflora) ? Dhani ghas (Porteresia coarctata) Garjan (Rhizophora apiculata) ? Keora (Sonneratia apelata) ? Sundari tree (He   ritiera fomes) ? Golpati( Nypa frutcans) (www. portal. gsi. gov. in/) 25 There are also many faunal species in this region (www. portal. gsi. gov. in/) BENGALTIGER (Panthera tigris tigris) At present there are about 250-300 tigers in Sundarban. This is the nominate species of the eight sub-species of tigers found in the world. Tigers are the apex predat ors of this mangrove eco -system. They are right at the top of the food chain. The Sundarban t igers are extraordinary beasts.Perfectly at home both on land and water, it is  cognise to cross more than one river at time to find food. The Sundarban tiger  quarrys mainly on cheetal or spotted deer, wild boar, goats and livestock. It is a nocturnal and ambush predator. Picture 4 Sundarban Ecosystem Biodiversity JUNGLE CAT (Felis chaus) This is a  audacious bodied cat found in Sundarbans. It is a nocturnal animal which preys on  minuscular animals. This cat is often met with in Sundarbans. It is a good climber and an ambush predator. LEO   PARD CAT (Felis bengalensis) This cat is an agile climber and a good swimmer. It preys on birds, bats, hares and fawns.FISHING CAT (Prionailurus viverrina) This is a powerfully built cat. It is a nocturnal predator and an expert swimmer. It is known to dive in water to  take hold of fish hence the 26 name. It also preys on small and medium size animals such as wild pigs and cheetal fawns. WILD  wild boar (Sus scrofa) This animal is often seen in Sundarbans. This is a heavily built animal. It is basically a herbivore but is also known to take small animals, insects and even carrion. This animal also acts as a prey species for the tiger. CHEETAL OR  espy DEER (Axis axis of rotation) This is the only deer found in Sundarban.It is also the most common deer in India. It is a herbivore. This animal is the major prey for the tigers. It is commonly seen near water holes. COMMON KRAIT (Bungarus caeruleus) This is the most venomous  ophidian in India. This is strictly nocturnal snake. It feed   s mainly on snakes. BLACK  crest KINGFISHER (Halcyon pileata) This is a common bird of the Sundarbans. Seen ofttimes on river banks. It feeds mainly on fish and crabs. GOLIATH HERON (Ardea goliath) This common bird of Sundarbans is huge in appearance. It is a solitary creature. It feeds mainly on fish and frogs.LESSER ADJUTANT STORK (Leptoptilos javanicus)  unremarkably solitary. Feeds on fish, frogs and reptiles. BRAMHINY KITE (Haliastur indus) This is a raptor which is often found besides water bodies such as lakes, pools, ponds and rivers. It feeds on fish, frogs, snakes, small mammals and bats. In addition to this Sundarban has few species of sharks the most common being the INDIAN DOG shark (Scoliodon laticaudus) There are also dolphins to be found in Sundarbans the most common being the Gangetic dolphin (Platinista gangetica) to name a few. COMMON KRAIT (Bungarus caeruleus) This is the most venomous snake in India.This is strictly nocturnal snake. It feeds mainly on snakes. 27    BLACK CAPPED KINGFISHER (Halcyon pileata) This is a common bird of the Sundarbans. Seen frequently on river banks. It feeds mainly on fish and crabs. GOLIATH HERON (Ardea goliath) This common bird of Sundarbans is huge in appearance. It is a solitary creature. It feeds mainly on fish and frogs. LESSER ADJUTANT STORK (Leptoptilos javanicus) Normally solitary. Feeds on fish, frogs and reptiles. BRAMHINY KITE (Haliastur indus) This is a raptor which is often found besides water bodies such as lakes, pools, ponds and rivers.It feeds on fish, frogs, snakes, small mammals and bats. INDIAN DOG SHARK (Scoliodon laticaudus). There are also dolphins to be found in Sundarbans the most common being the Gangetic dolphin (Platinista gangetica) to name a few. 5. 6 Livelihood in Sundarban  husbandry is the main occupation of the local people. Rain-fed, mono-cro   paddy is grown in t his area. Before the introduction of HYVs, they cultivated salt tolerant varieties of rice like Paknai, Barhal, Talm   ugur, Gopalbhog, Gulshi, Bolan etc. Occasional inundation of paddy fields by brackish water gave rise to a paddy-cum-fishery system.During  unpolished lean period, locals get involved in fishing, honey collection. 49% of the households directly extracted forest resources for their livelihood, including 98 % of the landless forest fishers. Almost all remaining households depended partly on the forest resources. The forest fishers, traders and some of the labourers directly depended on forest resources, earning money from  all selling or processing these resources. Most of the farmers and service holders depended on forest resources indirectly because they used forest resources for their households (for food, fuelwood, building materials etc).It was a clear trend that the higher the household income, the higher the dependency on forest resources. Main livelihood percent of households Fishery-32, Farming-25, Labour-15, Trade-13, Service-5, Other-10. Some livelihood forms are shown in p   icture 5. 28 C Picture 5 Some Livelihood Forms in Sundarban 5. 7 Utilization of mangrove resources comprised F F F l  F y ll B l y b . from various trees  l G l ( y l) b . There are some medicinal plants in the mangroves, but t hese are not utilized. Most of the households depended entirely on fu el wood for cooking.This demand causes  fast depletion of forest and consequently the ecosystem, as well as air pollution and health problems. Once upon a time logging was practiced in felling mode, but now in selective mode. When carried out in felling mode, the result can be er osion of the exposed ground and impoverishment of the soil within the affected area. In se lective mode, as carried out at present, the removal of many valuable species can still damage the ecosystem, and in this mode, the space of the removed individual tr ees may be taken by other, less valuable, species. In either case, the forest resources become less valuable.Fish is the  potential source of protein of the peo   ple of Bangladesh. Many people of the Sundarban households totally depend on fishing, usually by nets that are very effective but catch all fishes. Sometimes po isoning is applied, with severe environmental impacts. Tourists can enjoy the sight of fishing by trained otters. Shrimp cultivation is profitable business, and is totally dependent on natural  claw. People collect fry from the river by nets of small mesh, with severe consequences to a multitude of other species. 5. 8 Recent Developments and their impacts 29Recent introduction of HYV seeds has led to increased dependence on chemical fertilizers, pesticides &038 external sources of seeds dominated by corporate sector. M f HYV b f f. Occurrence of recent cyclones made them realise the need for preservation &038 cultivation of indigenous species. Lack of alternate emplo yment opportunities, loss of land, population pressure &038 poverty increases the dependence on forest for timber &038 Non-Timber Forest Produces (NTFPs).  bad    capture method of tiger  runt culture has replaced the traditional aquaculture in paddy fields. Corporate sector is making money, Meendharas are being employed.Over  guanine juveniles of other fish species are destroyed to catch a  adept tiger prawn seedling (DISHA, 2006). W f l b b l l b en subjected to uncertainty. What they could obtain for their livelihood from the forest easily, is now restricted. This poses a difficulty for their subsistence. So they get involved in illegal cutting which adversely affect the ecosystem. 5. 9 Man-animal Conflict Local people in Sundarban are immensely dependent on the forest for their day to day activities and also for their living. Honey collectors, wood cutters, leaf collectors and fishermen are sometimes killed by tiger inside the forest.Sundarban tig er treats human as a normal prey in forest. Every village in fringes have large number of widows of tiger . T f y B b b  (picture 6) D k y irrespective of all religions. To reduce potential tige   r attack, t hey experiment with Human Masks (picture 7) at the back of their head. 30 Picture 6 Bonbibi Picture 7 Human Masks 5. 10 Threats to Sundarban and climatic vulnerability ? Recurrent coastal  make full (picture 8) due to climate change (global warming) causes changes in sea level (rise in sea level). 26 Picture 8 Effects of Coastal  fill Reduced flow of sweet water into Sundarban mangrove system. ? Extension of non-forestry land use into mangrove forest. ? The Barrier a) Man-animal conflict Straying of tigers into villages. b) Human-human conflict Villagers Vs. foresters. ?  universe of discourse pressure and increased demand for small timber and fuel wood for local consumption. ? Poaching of tiger, spotted deer, wild boar, marine ? Uncontrolled collection of prawn seedlings. ? Uncontrolled fishing in the water of Reserve forests. 31 turtles, horse-shoe crab etc. ? Continuous trampling of river/creek banks by fishermen and prawn seed collectors. Chemical pollution through m   arine paints and hydrocarbons &038 also agricultural run-off containing chemical fertilizers &038 pesticides. ? Lack of employment opportunities in the forest fringe areas, locals  locomote to adjacent states for jobs, girl trafficking. ? Organizational and infrastructural deficiencies lead to corporate extortion in agriculture &038 aquaculture. ? Tourism can be viewed as one such threat to the ecosystem. Tourism has its negative impacts on the ecosystem which are pressure on carrying capacity of the ecosystem which may sometime leads to deforestation &038 destruction of endangered species.Environmental pollution &038 depletion of natural resources are seen almost everywhere with more tourist visit. 32 VI. ECOTOURISM at BAKKHALI A fringe part of Sundarban 6. 1 Bakkhali Bakkhali is a coastal area in South 24 Parganas district of West Bengal, India (map 2). It is located on one of the many deltaic islands spread across southern Bengal. This small island juts out into the vast expanse    of the Bay o f Bengal. It has a 7 k m long beach stretching from Bakkhali to Frasergunj, a  equal beach with gently rolling waves. Casuarina trees line up the beach like guarding wall, which adds up to the beauty of the beach. wikipedia) 6. 2 Accessibility By road Map 2 Bakkhali, a small part of South-West West Bengal It is  one hundred twenty-five km by road from Joka tram terminus. The road runs through  adamant Harbour and Kakdwip to Namkhana, where the car o r bus has to be transported across the Hatania-Doania creek in a special ferry. The ferry service is available from 7AM -11PM except from 12 noon till 145PM (lunch hour). The fare for  crossbreed a Car/Jeep is approx Rs 160 + Rs 30 toll (including  fill/unloading). 33 By bus WBSTC has regular bus service from Esplande to Bakkhali(150 kms).One starts at 7AM in the morning from Esplande and reaches Bakkhali at around 1130AM and leaves from Bakkhali after one-half an hour for Kolkata (Esplande). By train The nearest rail statio   n is at Namkhana. There are regular trains from Sealdah via Lakshmikantapur and Kakdwip to Namkhana. The first train starts at around 4AM from Sealdah. Train fare is around Rs 22 and the journey takes around 3 hrs. From Namkhana station you will get a van rickshaw to reach the place from where you need to cross a narrow creek in a small boat. Van fare is Rs 5 per head or Rs 30 if you reserve a van and for crossing the creek you need to pay Rs 1.Then from the bus stand one can get buses for Bakkhali which take around 45mins to 1hr and their fare is Rs 13. The Bakkhali bus stand is very close to all the hotels and just a 5 min walk from the beach. This place is competing with other beach tourist spots  Digha, Mandarmani, Sankarpur. It is good for overnight stay. 6. 3 Uniqueness The slope of Bakkhali is towards the sea hence it is less prone to tidal waves. It is not difficult to observe various invertebrate species like crabs, sea animal, starfish etc. , which were observed along the    shore line.While bigger crabs live in the dry sand further away from the sea, the smaller ones live in the muddy shores nearer to the sea. Various species l k S of m  H l G l  H j  K k  K  G  . found here. Due to its sandy habitat, Xerophytic vegetation is found here. Also because of its unique flora and fauna, Bakkhali attracts many migratory birds. Its mud banks provide the birds a perfect ground for  pasture on the marine invertebrates. For all these natural biodiversity, Bakkhali attracts lots of tourists. 34 The Forest Department maintains a mangrove trail which is also a source of attraction for tourists.This growth of lucrative tourism again attracts not only private Picture 9 Notable Features of Bakkhali Beach investment (hotel business) but also migrants (some people who work in hotels, sells fast food near the beach etc. ) from fringe areas. Such in surge often creates ecological imbalances. Most of the inhabitants in Bakkhali are migrants settled from Midnapore and Bangla   desh (although quite a large no of people can be found as aborigine). Both spring &038 neap tides are observed in the region, though the duration of high tide is only a few hours in a day.Coastal landforms include back dunal mudflats, back-swamps coast-parallel older stabilized dune ridges &038  young mobile dunes. Low gradient supratidal and inter-tidal beaches with mud bank, tidal flats etc. &038  onshore bars develop locally in patches in the moist and  grim areas. The sand dunes serve an important function by acting as a barrier between the sea and the habitat near the sea thereby protecting them. These notable features of Bakkhali beach are shown in picture 9. 6. 4 Frasergunj, Henry Island and JwambudwipFish trawlers anchor in Frazergunj Fishing Harbour (picture 10) as co-operative fishing is carried out here under Benfish. Dominant species that are harvested in winter are prawn, promfret and marine bhetki. Marine bhetki is the most valuable species because of its consumption a   nd medicinal values (liver oil and capsule coating are  exceedingly demanded by pharmaceutical industries). Entry fee is imposed to restrict  initiation in Henry Island (picture 11). Fresh water aquaculture (b ) .T f we can get an overview of the mangrove canopy. Jambudwip is a deserted island where drying of fishes is practiced (sutki industry).This is mainly an exportation industry which leads to high export earnings. 35 Picture 10 Frasergunj Picture 11 Henry Island 6. 5 Floral Diversity at Bakkhali &038 Henry Island (picture 12) Name Scientific Name Location Characteristics Use-Values Gewa Excoecaria agallocha Leaves become orange when  kinda mature. The timber is used for making wood-charcoal and fire-crackers. Kankra Bruguiera gymnorrhiza Rhizophora apiculata Blume Aegiceras corniculatum West Bengal Govt. Forest Range, Bakkhali. Do. Do. It has breathing roots. Do. It bears small white flowers. Do. Pneumatophores are prominent. Three types of Baen a) Piyara Baen. b) Kalo Baen. )    Sada Baen. Garjan Kholshi. Baen. Avicennia alba Blume(kalo baen) Avicennia marina (Forsk. ) Vierh. (piyara baen) Chionlata. Goran. Do. Hargoja. Acanthus illicifolius Do. Hental. Phoenix paludosa Roxb. Casuarina sp Famous for good-quality nectar, yielding good quality honey. Source of animal fodder. In humans, it has medicinal use as an antidiabetic. Do. Eucalyptus. Ceriops tagal (Perr. ) Robinson(Motth goran) Eucalyptus obliqua Do. Jhau It has red flowers. It has long and thin thorns. Types of GoranMotth Goran,Jelly Goran. Exotic species from Australia. It has a long, white trunk. Do. It is a shrub having small and sharp thorns.It has thin and long thorns, looks like a short palm. It has long slender leaves. Do. 36 Used in paper &038 textile industry, also has medicinal values. Provides a camouflaging background for tiger. The dry leaves are used as fuel for cooking. Golpata. Nypa fruticans (Thunb. ) Wurmb. Do. Looks like a short palm tree. Leaves are used as thatching material. Pi   cture 12 Floral Diversity at Bakkhali &038 Henry Island 6. 6 Faunal Diversity at Bakkhali &038 Henry Island (picture 13) Name Scientific Name Category Location Characteristics Green Bee Eater Rufous Treepie. Whimbrel. Avifauna (Aves) Do. Green in colour with a long slender beak.White-throated Kingfisher. Spotted deer  estuarial crocodile. Hermit crab. Do. Sea Beach, Bakkhali. W. B. Forest Range, Bakkhali. Sea Beach, Bakkhali. W. B. Forest Range, Bakkhali. Do. Do. Do. Axis axis Mammal. Reptile. Arthropod. Red Crab. Ocypode sp. Do. Sea Beach, Bakkhali. Do. Sand-bubbler crab. Fiddler crab. Dotilla sp. Do. Do. Uca spp. Do. Marine worm. Diopatra cuprea Annelid. Sea Beach, Bakkhali.  jumper lead fish. Jelly fish. Asterias sp. Metridium sp. Echinoderm. Cnidarian. Do. Do. 37 Long tail with black, brown &038 white colours.  curve beak, white &038 brown in colour. Colourful (blue,red) with red long beak,built for  detective work fishes.  
Subscribe to:
Comments (Atom)