.

Thursday, January 31, 2019

The American Dream in Hester Street and Eat a Bowel of Tea Essays

Many years ago, people have im transmigrated to a natural world where they can hope for a more beautiful existence, for the wealth, for the freedoms, for the infract opportunities and most importantly, for the American Dreams. As each new era of foreigners migrate to America, they face the obstacle of conforming to mainstream America. As Hester Street and sap a Bowl of Tea portrayed, immigrants come to this land of opportunities with the hopes and dreams of a better behavior for themselves or their families. In Hester Street, Jake, a Russian Jewish immigrant who stick upd in New Yorks Lower East Side for five years, leaving his married woman behind, and taking up with a new woman and earning enough notes to support his bound hall routes. On the other hand, in Eat a bowel of tea, Wah Gay is a traditional Chinese immigrant who owns a club in Chinatown, and sends all his m unrivalledy to his married woman back up in China, who he has not seen in 20 years because of the unjust immigration laws that had prevented Chinamen bringing their women into the country. These immigrants fall within a lower fond class, as a result they strive to conform to a more facilitating and suitable feelingstyle. As they begin to build a new life in America, they face the process of assimilation. America holds an idea of a mainstream alliance consequently those individuals not fitting this image ar left with feelings of defection and insecurity. As a result, they feel pressured in achieving the American dream. Lets look at the examples the movies give us. In Hester Street, Jake, a self-made Yankee, has abandoned the traditions of his culture by cutting off his beard and earlocks, and he has adopted the mannerisms of his new country, including a new girlfriend who runs a dance hall. When his wife Gitl and parole Yossele join him from the Old World, Jake was embarrassed. He looks ingest his wife because she retains her religious ways, wearing the wigs and scarves. He even insists on calling their son Joey and trying to modernize them both. Jake is a typical immigrant who wants to be assimilated as curtly as possible, once they gain acceptance and recognition, they begin to look down upon the new immigrants coming into the country, sometimes even family members. Its ironic how quickly one forgets the past and repeats history in terms of the mistreatment and hostile hospitality a new immigrant once received. In Eat a... ...against foreigners, but the problems of the dislocated immigrants assay to preserve their culture while adapting to a new one good-tempered exist. New immigrants who desire to conform still have to deal with the way they talk, dress, and behave. Most immigrants have attempted to learn the English language, with their accents barely detectable at times. In addition, they are willing to take any stock available to support the family, and they work in many different jobs that are as physically demanding as they are diverse. The A merican Dream, is about turn something, to the best way to achieve fulfillment of ones life. The dream is and always has been a reality. The more that Americans and immigrants insist on the dream as a right, and tail it with determination, the more likely it will be to remain a live option accessible to all. The dream does not originate from America it derives from us, the people. If we maintain all our efforts, we at any moment in American history are more likely to be what the country had intended to become. With that predicament already visible, every advance we make may very sound lead to another, and every realization of the American Dream will evolve.

Development of Attachment Essay -- Psychology

It has been shown that the relationships infants develop early on in action have lasting effects on their identity and behavior. Extensive inquiry has indicated that the relationship between an infant and its caregivers is particularly important.All children are different, and in order to have a healthy relationship with your child, you should adapt your fostering methods to paroxysm his specific needs. All children differin fundamental ways, two of the most comprehensive creation their temperaments and holdfast styles.A childs temperament is the way in which he reacts to the world, new-made situations, people, and experiences. Attachment is an infants enduring stirred up bond to his parentsor primary caregivers. Both of these factors affect children not only in infancy, but throughout their lives. Temperament has been shown to be a consistent sight of apersons behavior over time, and their style of attachment to their primary caregiver often shapes the quality of platonic a nd romantic relationships with others as they age. A childs temperament can affect his parents reactions and feelings toward him, and subsequently his attachment style.Infants are put into three delimit categories of temperament easy, laborious, and slow to warm up. Easy babies adjust readily to new experiences and are generally happy and easy to calm. Difficult babies are good upset, have intense negative emotional reactions, and have irregular physical functions. Slow to warm up babies react to new stimuli as difficult babies would initially, but with repeated exposure will react more desire easy babies.Easy babies often engender positive reactions and feelings from their parents, which helps produce a secure attachment relationship between the paren... ...t them independently. This not only sets him up for immediate success in school or whatever he is focusing on, but also in the future when dealing with college or devise. He will be more motivated to complete his work to the best ofhis ability and to work past any barriers or conflicts that arise. whole caboodle CitedAllard, Lindsey T., and Amy Hunter. Understanding Temperament in Infants and Toddlers.Center on the Social and unrestrained Foundations for Early Learning. Vanderbilt University, n.d. Web. 17 Nov. 2014. .Davis, Jeanie L. 10 Commandments of Good Parenting.WebMD. N.p., n.d. Web. 17 Nov. 2014. .Siegler, Robret, Judy DeLoache, and Nancy Eisenberg.How Children Develop. 3rd ed. refreshed York Worth Publishers, 2011. 425-98. Print.

Sunday, January 27, 2019

Invention of the Internet Essay

applied science has also been a part of our daily drop deads. The implementation of technology influences the determine of a society by changing expectations and realities. New inventions of technology be usually created to simplify life somehow. maven of the greatest inventions in the outlive hundred years is the meshwork. The of all m expanding internet has revolutionized the way Ameri stools live their lives.The internet has a major impact on society and our culture. The internet has in all broken down the b rules that our ancestors had. With the internet, everything that we could possibly want is at the click of a button. quite a little stop instantly instant message and video impose will mickle half way across the world. People at present work from home, shop from home, do everything they possible want from home. But if people do not waste access to the internet they cannot compete is this in the raw global market place of unending ideas.In the beginning, when the internet source came into play Americas were startled and amazed by the possibilities of colloquy that the World Wide Web brought. He web is mainly a way that brings people together to occur. The web is a layer of schema upon system (Bowell). The Web is a continual ongoing process. It has never stop replicating itself or processing since the first day it began. However, horizontal though in that respect many different systems on the web, no website is subject to special rules. The internet has become a sensation all everywhere the world and more than people use the internet than in other period in history.The internet has been a huge economic boom to our country. We now live in a global market. With the help of the internet, tradees can reach customers worldwide. umteen businesses now receive websites where customers do not even have to construe the store to acquire their products and these companies want your business. The internet has a huge plectrum of items to purchase online. More people use the web to shop than ever before in history (bowell).Online obtain is the process whereby consumers directly buy goods or services from a seller in real-time over the internet. (wiki re) A majority of consumers choose online shopping for a faster and more efficient shopping experience. For customers, shopping online can mean less time traveling and lower cost. Many stores offer special sales and discounts to customers who order online. Also, traveling to the store means that customers can only go during business hours whereby ordering online is more convenient for their schedules. Conveniently, many stores online be available 24 hours a day. Online retailers have seen tremendous jumps in their online earning potential (bowell).Of course in that respect is also disadvantages to online buying. One big disadvantage is the customers concern of how unease it would be to return the item. The customer is not absolutely positive that the item they are buying will satisfy and meet their expectations. Sometimes, returning an item can become a hassle and have to wait long periods of time to actually get the item in hand. Since the customer cannot see the mathematical product they wish to purchase customers are at higher risk of drool buy ordering online.Of course, a major concern of consumers is identity fraud. at that place have been many cases where hackers break into a web site and can steal a customers personal information. One unexpected disadvantage that comes with online shopping is the amount of trash that consumers produce. The more items that people purchase online, the more boxes and advancement they have to throw away. This past Christmas, New York show a 20 percent augment in paper recyclables with a parallel increase of 25 percent of online sales.The biggest buzz virtually the internet is social networking. One of the main uses of the internet is for relationships. The internet has revolutionized the way that peo ple communicate with our friends and the world. People used to write letters and sent them off then waited even weeks to get a reply. Now a eld, people communicating instantly through instant messaging, video chat, face book and e-mails. We can communicate instantly with people all the way across the world.Social networking sites have people set up their own personalizes profile that is just about them. (These sites help fill in the gap) These sites help everyone stay more in touch with their friends and family. Social networking seems to make the world smaller by transport everyone together. It helps us realized the way other people live and the cultures that they have (elliot). The social networking that is in place now more closely mimics personal conversation than e-mail. We are no longer restricted to rely on people in our neighborhood, church, or workplace to provide the interaction we confide (Hoover all). Social networking services expand the pool of people we have the prospect to meet to near limitless possibilities (Hoover all). A very new ordinary fad that has become normal to Americans is online dating. More and more people these days are finding their partners online through dating websites.

Friday, January 25, 2019

Nineteen Eighty Four Essay

Nineteen Eighty foursome is George Orwells nightm be vision of the future. Written in 1948, at the completion of World contend II, Orwell simply switched numbers for his future view. The s tell aparttle chapter is rattling good in the modality that it straight away lets the reader turn in the style of the sassy. The opening is a description of post- state of war London, and the introduction of the main character. Orwell byword the evil in the war just passed, and wrote some it. The imagery use smoke all be linked to the war or London. The novel is not personal, with more reference to the party and regimes, Orwell was a political writer, an uttermost(a) socialist.He is criticizing any political regime, socialist or fascist. Right from the inception the author intends to draw attention to the setting. The chapter is typical of the book as a whole describing Orwells dystopia. The main character we argon first introduced to is Winston Smith. This is a common, English diff erentiate, showing that Winston is in no way separate from the majority. The name Winston can be linked to Winston Churchill, who had just lead England through the war. along with the name, Winston is not presented as a hero, as one would expect of a main character.Winston is thirty nine and had a varicose ulcer higher up his right ankle and is incredibly unfit, resting several clocks on his way up the stairs. We be not, however, given a personality for our hero we have to wait until part II of the novel to take personal detail. The opening passage introduces us to life for Winston. The settings described be not pleasant. Out lieu, at that place is a vile wind and a swirl if gritty dust. at bottom Victory Mansions, where Winston resides, for it cannot be said that he lives, it is not much better. The hallway smelt of boiled cabbage and old rag mats. This gives the painting of buncombe and deterioration. E actuallything is rationed this is a reference to the war. The presen t electric current was cut off during daylight hours. Winston uses blunt razor blades and coarse soap. in that location is no colour described in the opening, the picture of the settings in the readers mind are black and white, therefore giving a smell of a grey, unhappy world. The people of London are not free. There is an imposing poster ein truthwhere one turned, bearing the caption, BIG blood brother IS WATCHING YOU. The man in the poster, the face of a man of about forty-five, with a heavy black moustache and ruggedly handsome features could very well be Hitler or Stalin, another reference to the war. There is a sense of being watched, the enormous face gazed from the wall. It was one of those pictures so contrived that the eyes follow you about when you move. The notion of Big Brother is introduced to us in the first ten lines of the novel, this clearly shows us where Orwells intentions lie. We are introduced to the concept of Hate Week, although no further detail is gi ven.Orwell writes of it as though it is an every day event and nothing obscure should be fancy of it. Big Brother is the antithesis of Winston, strong and powerful vs. frail and weak. The reader gets the impression Winston could never overthrow the party, although we are not yet introduced to his rebellious side as he does not yet have a character. We are introduced to the party slogans. The set out of them is a triangle, representing hierarchy, authority. The words are oxymorons, War and Peace, Freedom and Slavery, Ignorance and Strength.The words are ironic when used next to apiece other. They are each the antithesis of the other. If you take away peoples knowledge, you can tamper with their minds, as shown in the last slogan. Once inside Winstons flat, we are introduced to the telescreens, furthering the notion that no one is free. There are helicopters that sort into the houses and the telescreens that watch you. There is a description of a dulled reverberate but mirrors can not be dull, or the view would be distorted, this is another depicted object from Orwell showing us nothing was clear.We get more description of Winston, even nothing personal, and still anti-heroic, a smallish, frail figure, the meagerness of his body besides emphasized by the blue overalls which were the uniform of the party. We get the impression he is not well. Everything he can see from his window is unpleasant, the world looked cold, it was bust and harsh. References to the war are frequent. The Ninth Three-Year intention is ironic, because it would not be possible, and the Three-Year Plan relates to the plan Germany had after the war.The houses are describes as rotting, and their sides shored up with baulks of timber, their windows patched with unreal and their roofs with corrugated iron. This is war-torn London. The place Winston lives, Oceania is at war. Orwell suggests the war is just a tool used by the party to keep the people oppressed. We are introduced to the Ministries. Their descriptions are the antithesis of the houses described. They are described as startlingly different and they are a wonder to look at.The Ministries are of Truth, Love, Peace and Plenty. The irony lies in the fact that the Ministry of love was the frightening one. Things were done with military precision, even the time is in twenty-four hour clock. The Ministries were guarded by uniformed, armed guards, gorilla-faced guards. Orwell uses head rhyme to emphasize how imposing and horrible they looked. Another war image. The opening chapter is very effective in making the reader wan to read on, as it makes you feel you are reading history.This is because we are reading with hindsight. The reader feels they wishing to get to know Winston better because of what they have so far read. Orwell is effective is his opening because the settings are so well described that you instantly get a mental picture and are intrigued by the contrast betwixt the war-torn London so wel l known and the surreal mood of helicopters looking in windows. It makes the reader wonder what might have happened had the war turned out differently, and Orwells Big Brother, Hitler or Stalin, had been successful.

Thursday, January 24, 2019

Deviance and Social Control Essay

difference is part of every culture and parliamentary procedure, it is the simplicityrain line between acceptable and intolerable air. Each micro society holds its own rendering as to what abnormal behavior very is. The deviant is one to whom that nonice has successfully been applied, deviant behavior is behavior that people label. Through away history, there is no doubt in my mind that deviant citizens have been a contributing part to for each one generation. It is all relative, a label of deviance remains a label of deviance the question that remains really is what is deviance?. Being denominate as an outside is non foreign for some people. Matter of particular it is acceptable and a norm to be labeled as deviant for some people. No matter what group of people you deal with through and through out history or life today, there are social rules written and sometimes unwritten, nonetheless meant to be broken.For example, freshman year I attended St. Rose High School a nd got caught texting my mom on my cellular tele holler while switching classes. Getting to the point, I ended up losing my phone for a month and get holdting in a whole preventative of trouble (I was then silently labeled as deviant for the rest of my time there) for something as simple as texting. If I whipped my phone out in Manasquan High School 99% of the time teachers do not even say anything at all because they could care less. Such a backwards wrong act of defiance should be nationally recognize through out schools everywhere, but its not like that. Deviance is defined in so many different ways it not only differentiates from school to school, it changes in the eyes of parents too. For example, Johhny came home at 1205am on Saturday night, and as a result got grounded for Saturday. Jessie strolled in at 1230am on Friday night, and came home at 100am on Saturday with no troubles at all.What Im trying to say is deviant behavior is not even a real thing, it is precisely de fined by your surroundings. Am I the victim or the crime for getting all of these detentions? Am I really doing anything that terrible compared to everyone else? A lot of questions come up to me that are so simply understood by me I fall apartt even want to take the time to write about them or use my breath to express my opinion. In Mr. rophys class I wrote a piece of music in pen kind of of typing it because my printer had malfunctioned (affirmed by a note from my dear mother) and Mr. dress circle gave me a 0%, even though I did the entire paper by hand. Knowing me, Mr. Marden, of course I then acted deviantly by cathartic the word F$. I didnt even say it towards Mr. Roach or loud so the class could hear it. I just said F%$*. My act of defiance led to 2 old age suspension. Since then, I have been counting every curse word Ive heard by students and teachers in Manasquan High School since then, and have severely counted 647 curse words. Not one of those times did another stud ent get F$%&ing suspended for two days.Its all backwards. fifty years agone if a girl wore a skirt that yielded her knee joint caps people would assume she was a deviant girl. Nowadays girls wear skirts that show just about everything, and hey Im fine with that and it seems everyone else is too. Deviant acts are just a definition by each generation. Things that were once inconceivable are now norms. Being gay 200 years ago was the same as macrocosm the devil. But now people by and large accept it. All around the world deviance behavior is being redefined and rewritten but one thing always stays the same, and that is simply the fact that people will remain being deviant, no matter what the definition actually is. The idea of deviance would not even exist if it wasnt for those types of people. (probably me too, but Im just a deviant changeling that has no idea what Im doing)

Tuesday, January 22, 2019

Key Concepts and Network Architecture for 5G Mobile

G engineering is offering the services in Product Engineering, Documentation, supporting electronic proceedings (e-Payments, transactions) etc. As the customer becomes more and more aw be of the smooth forebode technology, he or she will look for a enough package all together, including all the advanced features a stallular surround can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. The crowning(prenominal) goal of 56 is to design a real radio field that is free from obstacles of the earlier generations.This requires an integration of earningss. This paper represents, introduction to 56 technologies, identify concepts of 56, Features of 56 profitss technology, applications, hardware and software for 56 technologies and network architecture for 56 piano tuner technologies and last section conclude the paper. Keywords?G, www, JIB, DAWN, P, Wi-If INTRODUCTION 56 technology stands for 5th Generation Mobile technology. 56 technology has changed the meaner to use cell phones within very juicy bandwidth. 56 is a packet switched tuner system with wide area coverage and high throughput. 6 radio uses FOOD and millimeter wireless that enables data rate of 20 Mbps and frequence and of 2-8 GHz. 56 is going to be a packed based network . The 56 communication system is envisioned as the real wireless network, capable of supporting wireless World Wide Web (www) applications in 2010 to 201 5 time frame. There are two locations of 56 systems evolutionary and revolutionary. In the evolutionary view the 56 (or beyond 46) systems will be capable of supporting www allowing a passing flexible network such as a Dynamic Dados Wireless Network (DAWN).In this view advanced technologies including born(predicate) antenna and flexible modulation are keys to optimise the dados wireless networks. In revolutionary view 56 systems should be an intelligent technology capable of interco nnecting the entire world without limits. An example application could be a robot with built-in wireless communication with artificial intelligence. substance abuser never experienced ever before such a high value technology. The 56 technologies include all image of advanced features which makes 56 technology most powerful and in gigantic demand in near future.Amazing isnt it such a huge collection of technology be integrated into a small device. The 56 technology provides the fluent phone users more features and efficiency than the 1000 lunar doodle. A user of mobile phone can easily hook their 56 technology gismo with laptops or tablets to acquire broadband internet connectivity. Up till promptly following features of the 56 technology have come to surface- High resolve is offered by 56 for extreme mobile users, it in addition offers bidirectional huge bandwidth. 56 technology excellent quality service is based on Policy in order to evade errors. It provides transporter c lass type gateway that has unequalled steadiness. The 56 technology billing interface is highly advanced making it efficient and appealing. It offers huge quantity of broadcasting data, which is in Gaga Bytes, sustaining more than 60,000 connections. This technology also provides remote diagnostic feature. Provides up to 25 megabytes per second connectivity. Also it supports the private virtual networks. KEY CONCEPTS OF 56 The key concepts discussing 56 and beyond G wireless communications are 1) Real wireless world with no more limitation with approach path and zone issues. ) Wearable devices with AY capabilities. 3) Internet protocol version 6(Pop), where a see care- of mobile IP address is assigned according to location and machine-accessible network. SECRET 2012 4) One unified global standard. 5) Pervasive networks providing ubiquitous calculate The user can simultaneously be connected to several wireless access technologies and seamlessly move between them These access technologies can be a 2. 56, 36, G or 56 mobile networks, Wi-If, WPAD or any new(prenominal) future access technology.In 56, the concept may be further real into multiple concurrent data transfer paths. 6) Cognitive radio technology, also known as smarted allowing different radio technologies to share the same spectrum efficiently by adaptively ending unused spectrum and adapting the transmission scheme to the requirements of the technologies currently share the spectrum. This dynamic radio resource management is achieved in a distributed fashion, and relies on software defined radio. 7) High altitude stratospheric platform station (HAPS) systems.

Related literature and studies Essay

This chapter contains the looked review come ine by the proponents ab out the related ideas regarding the brotherly interneting. The revue of both related studies and literature that atomic number 18 related to the present study. A. connect LiteratureMatt Mickiewicz (2010) express that, favorable net profiting refers to the execution of underframeing networks of wad on specific weave poses. well-disposed networking takes place among people who sh argon some(a)thing. A affable networking rank is barely a means for building these tender networks. These sites are made up of some web representation for to each one network member a list of their links or interests, and some kind of hook or gimmick to isthmus that crabby site apart from the crowd. loving networking sites are web-based, and offer their users the ability to link and build networks freely. Members interact with email or private pass using that sites servers. (http//www.askdeb.com/blog/internet/what-are - cordial-networking-sites/) The present research is similar in a sand that members of the site interact with each other. It for postulate got ease us to know the latest news update about the takeing and the upcoming program that were passing to held. In the other hand, the school allow for also inform if their followers or the students are interested in the program or activities that the school prepared. Like Mickiewicz stated, a companionable networking refers to the act of building networks of people. According to usability expert Jakob Nielsen (2011) whose user-experience research firm Nielsen Norman conference today with easy-to-use well-disposed networking tools now fully entrenched and very earthyplace inside corporate intranets a trend that took off proceed course of study a resultant new trend has emerged.Employees are sharing much of their knowledge more effectively and with more co-workers than ever before. Knowledge counsel has moved from being a clich t o being a reality. Employees are the ultimate knowledge resource, and the winning intranets provided gives to transform their behavior into manageable knowledge. In particular, organizations employ social networking a natural inside the enterprise to give employees mulish and simple ways to communicate with one another and sluice switch over the way work is done at the organization. (http//www.hr.com/en/communities/jakob-nielsen-study-enterpriseintranet-social-ne_girm9g7z.html) The certain research is incompatible in a sense it is referring only to the communication of the employees in a certain organization. While in our website, we are much particular to the communication amidst school officials and students. One of our objectives is to enhance communication among students, might members, and school official and other employees. Tom Geismar (2005) found out that, when it comes to online social networking, websites are commonly used. These websites are known as social sites. well-disposed networking websites function like an online community of internet users. Depending on the website in question, numerous of these online community members share common interests in hobbies, religion, or politics. Once you are granted access to a social networking website you buttocks begin to socialize. This socialising may include reading the pen pages of other members and possibly even contacting them.The present research is similar in a sense that the affair of the website is to build socialization mingled with members. Their common interests is that they are in a same community, same school which they are united. As Geismar stated, socialization may include reading profile pages of other members or even contacting with them. So the purpose is the same, we want to improve communication between students and make it easier for them to get information. We use Social Networking Websites because it is commonly used and more popular. According to Larry Braun er (2007), Social networking sites take a shit each a unique protocol and dont usually provide members with practical how-to advice to assist use their sites effectively. They let us approximate out the how-to on our own. To increase your number of connections, connect without delay to as some(prenominal) other members as you can, especially well-connected members. You can send direct connections messages or emails whenever you wish. Join discussions in groups by invoice or commenting when you assimilate something valuable to add, but dont spam the discussion board or post anything inappropriate.The current research is different in a sense that it is easy to use. Even though we dont provide such guides to use the site, its easy to figure out whats and hows because it is user friendly. And also, the members dont have to connect or add as many friends as they could just to have large connections, its not like Facebook or Friendster. The members will interact with each other by creating post or going away comment. Mark Zuckerburg (2007) stated that, theres confusion around what the intimate of social networks is. A lot of different companies characterized as social networks have different goals some serve the function of business networking, some are media portals. What were trying to do is just make it really in force(p) for people to communicate, get information and share information. We always try to accent the utility component. What we figured is that if we could model what those connections were we could provide that information to a set of applications through which people want to share information, photos or videos or events. Social networking sites not serves as a community, or trying to build a community but trying to make new connections.The present research is similar in a sense were both aiming communication between people, to get information and share information. Members can share photos, video sot link to other members but not priva tely, it will be visible(a) to all the members. Especially the events that will happen or will going to held by the school. It is the perfect location for posting announcements and sharing information. B. Related StudiesYong Yeol Ahn (2007) stated that the Social networking serve are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life social networks. The Internet has been a vessel to expand our social networks in many ways. Social networking services (SNSs) are one successful example of such a role. It provides an online private space for individuals and tools for interacting with other people in the Internet. It help people find others of a common interest establish a forum for discussion, exchange photos and personal news, and many more. The current research is different in a sense that their Social networking services provide users with an online front man that contains shareable pe rsonal information, such as a birthday, hobbies, preferences, photo represents, writings, etc. While our Social networking services offer features of convenience that help users form and maintain an online network with other users.We aim to develop a networking site that only focus to the event and other news that is happening in the school. Jawad Laraqui (2007), found out that an Online social networks are not a new phenomenon. They have evolved belatedly into their current form as the popularity of the Internet increased, and as technical advances allowed services to support more complicated feature sets. In the 90s, the fledgling online communities were each easy to maintain message boards or static homepage style web sites hosted by extremely large companies. As technology became more twopenny it made hosting more advanced social networks with more complex feature sets financially feasible for small companies.The present research is similar in a sense that we are both aiming a social network that has advance features or a unique one that will accomplish the needs of the people. We are going to develop a website that is exclusively for the students and employees of the school. Our school should be competitive to the innovation and enhancement that our technology seeking. Indeed, over the last decade, innovation in this space has always come from small startups. incision Druschel (2007) stated that, unlike the Web, which is largely organized around content, online social networks are organized around users. Participating users join a network, publish their profile and any content, and create links to any other users with whom they associate. An in-depth understanding of the graph structure of online social networks is necessary to evaluate current systems, to design incoming online social network based systems, and to understand the impact of online social networks on the Internet.The present research is similar in a sense that the resulting social ne twork provides a basis for maintaining social relationships, for finding users with similar interests, and for emplacement content and knowledge that has been contributed or endorsed by other users. The only remainder is that only the authorized personnel can edit or have the full control of the networking site. It is for the security and for the privacy of the users. Jasper A. Schelling (2007) studied that, most of the larger social networks share the same properties. User created profiles that describe characteristics, likes and dislikes, combined with a photo, a public friends list of mutual contacts, some form of messaging between users. Some form of blogging and the possibility to upload pictures and music. Looking at these technologies in retrospect its easy to see that the current social networking websites combine several of the older communication services. One of the major deficiencies with the current implementations in social networking services is their complete d isregard of a pecking order of social contacts.The current research is different in a sense that, though hierarchy might actually be too starchy a word to describe the distinctions that people make in their social contacts, people make distinctions in their social interaction that drive how they interact and communicate with them. In our website we are more particular to the comments and suggestion of the users, especially to the students, their suggestion is a big help to the school administration for the good of the school. According to Fred Stutzman (2007), Social network websites enable individuals to represent their social networks in a computer-mediated context. While the exact value and meaning of the social connections delineate in online social networks is variable there are distinct connections between the social networks represented in a computer-mediated context and the real foundation of the many narratives exploring use and outcomes of social network websites, perh aps the most common explores the public sharing of personal identity information. Over the past quaternary years, social network websites have achieved strong market penetration with a wide range of participants.

Monday, January 21, 2019

Information Security Policy Essay

1. Executive Summary due in Week Nine Write 3 to 4 paragraphs gravid a bottom-line summary of the specific measureable goals and objectives of the aegis syllabus, which ignore be utilise to define optimal tribute measure architecture for the selected business scenario.The goal of this security indemnity is to lay out a basic plan for a pay back education carcass to be employ by crown designing theme. This insurance policy leave behind protect the high societys dodges from threats that sewer come from humans and from natural disasters as well. The policy result excessively put into consideration the privacy, reputation, intellectual property and productivity of the rosiness founding convocation. The continued exertion of this nexus depends on being able to door course and use elections within the organization and being able to remote advance with security. Each persons role in the telephoner leave alone be considered and countenance portal entrust b e given to ensure the efficient operation of the business, while non giving entree to those who are non authorized. This policy will to a fault table helping in the societys tenderness to some(prenominal) g overnmental regulations. Any disruptions of service or security connect issues will be dealt with immediately by means of system software system that is automated to handle certain threats. More serious issues will be dealt with by the IT staff whose responsibility it is to oversee the everyday operation of the info system.2. Introduction payable in Week One Give an overview of the company and the security goals to be achieved.2.1. Company overviewThe Bloom visualise Group is a company that offers interior design services to businesses and individuals around the world. There integrated subprogram is located in New York with a importary office in Los Angeles for handling operations on the West coast. They open a web site that offers their customers the ability to do up their designs online and then obtain them through a electronic order processing system. Also, the designers use in force(p) logins and words to inlet the web site. A large number of the workforce work remotely possibly using tablets or ipads connected to secure VPNs or Virtual Private Net work.2.2. apology policy overviewBloom Design pigeonholing already provides secure logins and mesh topologys to their employees so they already have just about character of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to go across for this exteriorise would be system specific.2.3. earnest policy goalsAs applies to your selected scenario, explain how the confidentiality, integrity, and admittanceibility principles of breeding security will be addressed by the instruction security policy.2.3.1. ConfidentialityThe policy I plan to implement will help to protect in createation by re think how t he company stores irritable reading much(prenominal) as employee and client records, trade secrets, and other subtle data.2.3.2. IntegritySince the company will be using battle crys and secure logins the system will not be glide pathionible to the public. So the primary focus should be on the employees. Authentication and verification stack be done using a data log to keep records of employees activity while on the companys VPN. Also, the use of a conflagrationwall will help with integrity as it will pr issuing employees from unknowingly irritateing damaging websites.2.3.3. AvailabilityThe policy I plan to use will help with back-up and recovery by the mathematical use of cloud storage or a substitution data storage center. Although they are already using secure logins for advance fit the whole system needs to be reviewed. This is to make sure altogether authorized personnel have accession to sensitive areas.3. Disaster convalescence PlanDue in Week Three For your s elected scenario, describe the brinystay elements of the Disaster recovery Plan to be utilize in field of study of a disaster and the plan for interrogation the DRP.3.1. Risk Assessment3.1.1. searing business processesThe mission-critical business systems and services that must be protected by this DRP are Payroll, Human Resource information, POS backup media, and Web Servers and their services.3.1.2. Internal, external, and environmental risksExamples of indispensable risks that may affect business are unauthorized access by individuals who are employed by the company, and those who arent employed by the company but still have access to individual stores computer systems, applications, or areas where the hordes and backup media are located. Other external and environmental risks overwhelm fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature.3.2. Disaster Recovery StrategyMost cases, having an alternative site (a gamey site, or heatless site depending on the disaster) would be the correct way of dealing with nearly disasters. With Bloom design convention I think having a untoughened site eagerness would be the best option. Warm sites are cheaper than hot sites but accept more(prenominal) effort. On the other hand, they are more expensive than cold-site facilities but less labor intensive and more in all likelihood to be effective in a disaster. Also, having a backup and holding site to work from, and recover from for the main servers and web services is a good idea.3.3. Disaster Recovery Test PlanFor each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan.3.3.1. Walk-throughsThis test plan would be a great way for the place personnel to come together and formulate a plan of action in the event of an emergency. Due to Bloom Design congregationing being spread across a large area it talent requi re rough video conferencing and traveling on the part of some employees.3.3.2. SimulationsI think this test plan is the most effective when compared to the others. Simulating an unfeigned emergency is a great way for people to get used to operating in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster.3.3.3. ChecklistsThis dormant case of testing would be a good system to implement on a weekly or monthly basis depending on the needs of the company. This will help in detecting problems before they acquire a major issue.3.3.4. Parallel testingSince Bloom Design group is updating their security parameters and do not have an equal image of system already implemented parallel testing would not be appropriate for this security policy.3.3.5. Full interruptionI think this is some other very effective way to test the system in the event of an emergency. However, to minimize inconveniences to th e customers it would have to be done during off hours.4. material Security PolicyDue in Week Five compendium the Physical Security Policy. Merkow and Breithaupt (2006) state, an often overlooked connection between physical systems (computer hardware) and tenacious systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the biddings needed for each category as relates to your selected scenario. These controls may include the pursuitPhysical controls (such(prenominal) as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) Environmental or life- safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning)4.1. Security of the construction facilities4.1.1. Physical entry controlsAt the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction with an access control system that limits entrance/exit to the offices through one main entrance. There will be an employee entrance as well as well as to be accessed by an electronic badge.4.1.2. Security offices, rooms and facilitiesFor the security offices I would implement biometric s fecal matterners due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will utilize electronic badges with a photo and abduce of the employee.4.1.3. Isolated delivery and loading areasFor these areas I would implement electronic key card access with the use of a CCT V system recording to a DVR. With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being made and stooge break he distant environment before opening the door.4.2. Security of the information systems4.2.1. Workplace protectionFor this part of the security policy I would utilize pre-employment screening and obligatory vacation time. This prevents people from hiding illegal activities while performing their duties. Also, I would setup rightd entity controls so operators and system administrators have picky access to computing resources.4.2.2. Unused ports and cablingFor unused ports I would use a human of security equipment that can be plugged into the unused port and can only be removed by someone with a special key. This will help prevent unauthorized access into the lucre. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above mentioned equipment isnt getable then the port should be removed.4.2.3. profits/server equipmentBeing that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room that contains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to abide the equipment to operate at peak efficiency.4.2.4. Equipment maintenanceSince a lot of the equipment is spread across a large region I would utilize remote communication connections to troubleshoot issues. If the maintenance need is more concentrated than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment.4.2.5. Security of laptops/roaming equipmentFor laptops and roaming equipment I would install all devices with a GPS reporter and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room wit h access being tightly controlled.5. nettle Control PolicyDue in Week Seven Outline the Access Control Policy. Describe how access control methodologies work to secure information systems5.1. AuthenticationAuthentication credentials permit the system to asseverate ones identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a naive password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personalsomething that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the ordinarily used systems.With two or three factors to authenticate, an information possessor can gain confidence that use rs who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric examine uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common approach to managing IDs and passwords is to make up a password or PIN vault. These programs use secure methods to topically store IDs and passwords that are protected by a master password that unlocks the vault when its needed.5.2. Access control schema5.2.1. Discretionary access controlThe discretionary access control system will be used for Bloom Design Group because this is the favored approach in the incorporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is t o give people the least amount of access to a system that is needed to perform the job theyre doing. The need-to-know dictates the privilege (authority) to perform a transaction or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations.5.2.2. Mandatory access controlIn a system that uses mandatory access control (MAC also called nondiscretionary access control), the system decides who gains access to information based on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best choice for this scenario. MAC is better suited for military machine or governmental systems.5.2.3. Role-based access controlRole-based access control (RBAC) groups users with a common access need. You can assign a role for a group of users who perform the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to easily assign access to certain groups such as designers, office personnel, customer service associates and so forth.5.3. Remote accessRemote Access Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be applied at a single administered mesh topology point. Having a central service also means that its easier to track usage for billing and for keeping profits statistics. A virtual toffee-nosed mesh topology (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or h er ISP and initiates a connection to the protected network (often using a RADIUS server), creating a cloak-and-dagger tunnel between the end points that prevents eavesdropping or data modification.6. Network Security PolicyDue in Week Nine Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices.6.1. Data network overviewDue to the large geographical distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a larger geographic area than a LAN (technically, a network that covers an area larger than a single building). A WAN can span the immaculate nation or even the globe using satellites.6.2. Network security services6.2.1. AuthenticationAccess to documents can be restricted in one of two ways by asking for a username and password or by the hostname of the browser being used. For Bloom Design Group emplo yees will need to enter a user ID and password to access restricted documents and sites.6.2.2. Access controlUnlike authentication, which is security-based on the users identity, restricting access based on something other than identity is called access control. For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners.6.2.3. Data confidentialityThis service protects data against unauthorized disclosure and has two components content confidentiality and put across flow confidentiality. For Bloom Design group all messages transmitted and authorized through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents.6.2.4. Data integrityThe goal is to protect data from accidental or malicious modification whether during data transfer, data storage, or from an operation performed on it, and to preserve it for its int ended use. For Bloom Design Group the only people who will be authorized to make changes or modifications will be the Head of the IT department and anyone else they deem necessary.6.2.5. NonrepudiationA service guaranteeing that the sender of a message cannot deny having sent the message and the pass receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made.6.2.6. Logging and superviseThese services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router traffic between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content.6. 3. Firewall systemOutline the roles of the following network security control devices and how these basic security infrastructures are used to protect the companys network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network. allow how the firewall system is or is not applicable to the companys network configuration in your selected scenario.6.3.1. Packet-filtering router firewall systemThe most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding traffic between networks as well as using packet-filtering rules to permit or deny traffic.6.3.2. Screened host firewall systemThe second firewall example employs both a packet-filtering router and a bastion host. This firewall system provides high levels of security than the previous example because i t implements both Network-Layer security (packet-filtering) and Application-Layer security (proxy services). Also, an trespasser has to penetrate two separate systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military associate company then it doesnt require the most elaborate form of firewall protection.6.3.3. Screened-Subnet firewall systemThe final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while delimitate a demilitarized zone (DMZ) network.7. ReferencesCite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Wash ington, DC Author.Information Security Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.

Thursday, January 17, 2019

Religion in âہ“To Kill a Mockingbirdâ€Â by Harper Lee Essay

The theme of trust in To Kill a Mockingbird is an highly important one. It stands as a crucial point for separate themes in the novel much(prenominal) as racial discrimination, sexism and discrimination. The community of Maycomb County all recollect themselves to be sincere, wholesome race we discover that they atomic number 18 using their religion to indulge in other criticisms. Although they listen to the sermons about their religion and pretend that they practise it outside of church building on a Sunday, the rest of their time, their beliefs on social harmony are far from the faultless Christian morals they believe themselves to have.This is evident in Chapter twenty-four, the scene that involves the ladies of the missionary tea circle. Here the majority of women believe themselves to be utterly perfect southern-belles, who devote their life to discussing the works of deliverer .One thing is apparent, though, the women in the group hold diverse viewpoints and represent t he mixed liberal, conservative, and hypocritical viewpoints found in the general population of Maycomb county. We see how alter they actually are when they go into discussion about the Mrunas and how awful it would be to have peck much(prenominal) as this living in their community, with a good deal of children running round all dirty and flea ridden. Here we see the supernatural irony because, these women have these type of people living amongst them the Ewell family. But although they may see this similarity, they may refuse to accept it because as Ladies, they cannot accept much(prenominal) atrocities in their own town.Although the theme of religion is though to be interpreted seriously by every member of the community, it is just really clever by the char community. Indeed, the white people practise it. But, in measures such as when Miss Maudie is condemned for looking after her garden when she could be rendition the bible. In methods such as enforcement of religion, people will never engage it as seriously than if they would have had the chance to learn about Methodists, quite an than having it drummed into them at birth.Phrases from the Bible such as Do unto others as you would analogous done unto you and Love your neighbour as you love yourself are not given a second thought as the community continues to be a hypocritical, racist and unjust  companionship. No though for other peoples feelings is given in Maycomb county, no thought for how someone may be feeling, especially if they are black. For the community of Maycomb, does not believe the black people to have any feelings whatsoever. Just as long as the white people still feel they are a perfect community, full of devout, God-fearing people, they do not care who is put to finis and who suffers.The Bible does not say anything about the ill treatment of black people. It does not commend or apprehend racial or discriminatory discrimination. So, if these people base their lives on th e teachings of the Bible, why is their discrimination in their society? Historical reasons. Discrimination and racism had nothing to do with their religious beliefs it was because of a long history of conflict, starting way before Civil War. So, wouldnt you have thought that in the nineteen hundreds, people would have woken up to the circumstance that colour of skin has no preference on a person? But, the people of Maycomb County are so fixed in their ship canal of social class that their racist ways will never change. calamitous people occupy the lowest class level in the Maycomb society. non because of their deprivation or the way they speak, it was because of the colour of their skin.In conclusion, religion plays an extremely important part in To Kill a Mockingbird. It forms a still hunt for other morals and beliefs such as discrimination both racism and sexism and shows the reader what an unjust community Maycomb County is. On the surface of the communities personalities are holy, devout people. But, as we study their religion along with their morals, the realisation is in fact that theses people use their religion as an excuse to discriminate, not only against black members of the society, but in some cases women. Religion will always play a big part in society and culture, eve in present day, but in the early nineteen hundreds, it was inured properly only by a few people. The rest, use it as a basis to form other such like beliefs and ethics, qualifying so far away from the holy life Jesus intended, by being evil, self-centred human beings.

Wednesday, January 16, 2019

QCF Level 2 Health and Social Care Diploma Group A: Mandatory Units Knowledge Workbook Essay

key out the oppo berth reasons people communicate.People communicate to express demand,feelings,ideas,ask questions,share experiences condone how effective discourse affects all aspects of actor workEffective communication helps to understand customers needsExplain wherefore it is important to observe an several(prenominal)s reactions when communicating with themsee moredescribe the components of a individualised development architectural designBecause I drop know from the reactions how the psyche feels(happy,pain),if the mortal understand what I am trying to say,if the mortal is interested in conversationSHC022Introduction to individualal development in health, kindly carry off or childrens and young peoples settings infer what is needed for competence in own work role (1.2,1.3)Identify standards that process the right smart the role is carried revealThis standarts are including in health and preventive act 1974,Moving and Hnadling Guidelines,Hasawa,Riddor ,Coshh chance upon ways to ensure that someoneal attitudes or beliefs do non obstruct the quality of work.Treat everyone equaly)no difference in fetch up,religion,race)Be subject to reflect on own work activities (2.1)Explain why reflecting on practice is an important way to develop knowledge, skills and practice.Reflecting on come helps me to see what I am doing good,where(in which areas)I need advice or more cultivationBe able to agree a personal development plan (3.1, 3.2)Identify sources of fight for own learning and development.- egotismeducation (internet,books)-Meetings with supervisor and more preparationDescribe the process for agreeing a personal development plan and who should be involved.In personal development plan should be involved suprvisor and I. For this plan I have to know what I want to learn,what my targets are and modify with supervisor to see how big progress Ive done and what needs to be changedProfessional discussion with Assessor on SHC022Candidate tinge Assessor signature SHC023Introduction to equality and inclusion in health, social business concern or childrens and young peoples settingsUnderstand the importance of equality and inclusion (1.1,1.2,1.3)Explain what is meant bya) diversity=diference(that everyone is extraordinary and antithetical)b) equality=treat the people on same way(and treating people in way appropriate to their needs)c) inclusion=including(inclusion is about giving a honorable chance to be included without discrimination)d) discrimination=wrong judgement establish on depend on,religion,rase,disability(leave someone out of the team because of judgement)Describe ways in which discrimination whitethorn deliberately or inadvertently occur in the work setting.For example-bus driver wont let wheelchair substance detestationr and carer into the bus because he doesnt want to make ready the storm for wheelchair-carer and client pull up s restorations be different religion and lymph node allow celebrat e own festive days(of religion) provided wont get carer do celebrate hers/his religion festive daysExplain how practices that support equality and inclusion foreshorten the likelihood of discrimination.Be example-to show the man right attidude towards discrimination (forexample support wheelchair user whos discriminated by refusing enter into bus)Be able to work in an inclusive way (2.1, 2.3)Identify legislation, codes of practice and organisational polices and procedures (where these exist) relating to equality, diversity, discrimination and rights in own role.-Disability Discrimination interpret-Human Rights Act 1998-Employment equality regulations 2003-Special education need and disability act 2000-The sex discrimination Act 1975Describe how to challenge discrimination in a way that promotes change.action=do something when I see discrimination and not to ignore it question it=ask why and discus itBe able to access information, advice and support about diversity, equality and inclusion (3.1)Describe situations in which additional information, advice and support about diversity, equality and inclusion may be needed.Theres different methods of obtaining information on diversity,equality and inclusion. -goverment web site (list of all current legislations to protect the rights of individuals -age UK group (can supply materials to hand out to client )I may need this informations to help client who is want advise on particular subject or if I am trying to obtain information in order to support clientSHC024Introduction to work of care in health, social care or childrens and young peoples settings.Understand the meaning of duty of care (1.1, 1.2)Define the term duty of care work of care is responsibility towards the person I look after(in meaning to salve the person refuge and away from harm)Describe how the duty of care affects own work.Duty of care means it is my part of my job to keep me and my client base hit so I am following all security rules to ke ep everything safe and if theres any new changes ,training or update I follow the new rulesUnderstand support available for addressing dilemmas that may scratch about duty of care (2.1, 2.2)Describe dilemmas that may arise between the duty of care and an individuals rights.The client knows what she/he is doing.Its clients right to decide about own life even if I disagree with clients choise and I have to respect that (for example what is healthy to eat,what activities client wants to do) Explain where to get additional support and advice about how to resolve such dilemmas.I am seeking support and advice from my supervisor or from subprogram. Way how to nullify conflicts because of this dilemmas is to make sure individual is aware of the consequencesKnow how to respond to complaints (3.1, 3.2)Describe how to respond to complaints-respond the complaining asap-acknowledge mis regaining-speak about different views on what happened-explaining situation for both sides and appologyIdent ify the main points of agreed procedures for handling complaints-recorded and document procedure-complaint is listened to and respected-procedure is clear-it may have formal and daily optionsHSC024Principles of safeguarding and protection in health and social careKnow how to appreciate signs of convolute ( 1.1, 1.2, 1.3)Define the following types of abusea) Physical abuse-if someone physicaly harm other personb) Sexual abuse-forcing into unwanted sex intimacyc) Emotional/psychological abuse-doing harm with words-if someone behave on way that emotionally attack other persond) Financial abuse-using persons money,property or other semiprecious things without this persnons knowing(unauthorised,illegal use)e) Institutional abuse-abuse happening in care homes,hospitalscan be any or combination of thesediscriminatory abuse,financial,neglect,physical,emotional,sexual abusef) Self neglect-when person neglect ownself(basic needs,personal hygiene)g) Neglect by others-passive for of abuse (for example carer should leave behind care for client but carer doesnt give client an tolerable caredo not change dirty linen,catheters) Identify the signs and /symptoms associated with all(prenominal) type of abuse.-physicalbrurses,scratches,change behavior-sexualbrurses,scratches in genital area,change behaviour-emotinalchanging behaviour-financialthe stirred person doesnt know where are the money dissapearing -neglectaffected person will shown lacl of personal hygiene,health problems,dirthy clothsDescribe factors that may contribute to an individual beingness more vulnerable to abuse.-if the individual has comunication difficulties,is socialy isolated,is depended on other persons helpKnow how to respond to suspected or say abuse (2.1, 2.2, 2.3)Explain the actions to take if there are suspicions that an individual is being abused.I have professional duty to report any wetnessed or suspected abuse to my supervisor or to the office.this information is refered to social func tion and it musst be assessedExplain the actions to take if an individual alleges that they are being abused.-let the person speak-ask open questions(those where is no possible to answer yes or no) -dont ask leading questions-take every allegattion seriously-contact and inform supervisor and officeIdentify ways to ensure that evidence of abuse is preserved.-make a compose record of conversation(date,time on it)-ensure written records are kept in safe place(bills,letters,medication records,bank statements) -record any physical signs of abuse on body(bruising,cuts)-not tidy anything up(wait for police)Understand the field and local context of safeguarding and protection from abuse (3.1, 3.2, 3.3, 3.4,)Identify national polices and local systems that relate to safeguarding and protection from abuse.-human rights act 1998-equality act 2000-social servicesExplain the roles of different agencies in safeguarding and protectingindividuals from abuse.-work together to prevent and protect adults from risk of abuse -support people to make their own choises-investigated actual or suspected abuse and neglectIdentify reports into serious failures to protect individuals from abuse.For example-if I am witness of abuse and I wont report it-if agency will get report of abuse from carer and wont take an passable acction -if I as a witness of active abuse cry police and the police wont show upIdentify sources of information and advice about own role in safeguarding and protecting individuals from abuse.Supervisor-safe guarding courseslocal safe guarding team-social servicesindependent safeguarding authorityUnderstand ways to reduce the likelihood of abuse (4.1, 4.2)Explain how the likelihood of abuse may be reduced bya) working with person centred values-encourage in contact with community,support to build up self confidenceb) encouraging active confederacy-coopretaion with organization for disabled people(be part of disabled comunity)c) promoting choice and rights-by liv ing with choises(places where to go for trips),accept the individuals right for own decision but supporting to make sure client is safeExplain the importance of an ready to hand(predicate) complaints procedure for reducing the likelihood of abuse.Know how to recognise and report unprotected practices ( 5.1, 5.2, 5.3)Describe unsafe practices that may affect the well-being of individuals-not safe suffice during moving and handling-incorect use of equipment-not disposing of waste properlyExplain the actions to take id unsure practices have been identified.-inform supervisor-write records of what is wrong + guidenceDescribe the action to take if suspected abuse or unsafe practices have been reported but nothing has been done in response.Keep reporting in case of abuse(report to supervisor,office again) call police(as nothing has been done foe change and the situaton may cause harm of client)

Tuesday, January 15, 2019

DBQ- minorities in world war II Essay

The following heading requires you to write a coherent essay incorporating your interpretation of the documents and your noesis of the accomplishment specified in the question. To earn a high score you be required to cite key pieces of evidence from the documents and draw on your friendship of the period. It is often claimed that the major Ameri fire wars of the last 150 years carry resulted in the most important social and political gains of minorities and women. Evaluate this tale with regard to the experience of minorities and women during World struggle II. Use evidence from the documents and your knowledge of the period from 1941 to 1945 to compose your answer.Brigadier General B. 0. Davis to General Peterson, 9 November 1943 (Brigadier Davis had fair completed an inspection of military bases in Massachu dealts, New York, New tee shirt and Michigan)I was deeply impressed with the high esprit de corps and attitudes of the diagonal officers and soldiers stationed in the states visited in the past two months. They were so different from those of the colored officers and soldiers hardened in the southerly states. While there has been an improvement in ecumenic conditions, there is pipe down great dissatisfaction and discouragement on the part of the colored people and the soldiers. They feel that, irrespective of how much they strive to meet fight Department requirements, there is no change in the attitude of the warf ar Department. The colored officers and soldiers feel that they are denied the protection and rewards that ordinarily result from keen behavior and proper performance of duty.. The Press news items and reports of investigations signal that there has been little change in the attitudes of civilian communities in Southern states. The colored man in uniform receives nonhing but aggressiveness from community officials. The colored man in uniform is expected by the War Department to develop a high morale in a community that offe rs him nothing but humiliation and mistreatment. Military procreation does not develop a spirit of cheerful acceptance of Jim-Crow police forces and customs. The War Department has failed to secure to the colored soldier protection against violence on the part of civilian police and to secure justice in the courts in communities near-by to Southern stations. In the areas recently inspected, the colored soldier feels that he can secure justice in the civil courts. He has not been set upon by the civilian police. He has not been denied the privilege of occupying empty seating room in public buses, street cars, etc. taxicabs to serve him. This is not so in Southern communities.President Roosevelt, executive director Order 9066, February 25, 1942Whereas the successful prosecution of the war requires every possible protection against espionage and against sabotage to home(a)- defensive structure material, national-defense premises, and national defense utilities.I hereby authorize and direct the Secretary of War, and the Military Commanders whom he whitethorn from time to time designate, whenever he or any designated commanding officer deems such action necessary or desirable, to prescribe military areas in such places and of such extent as he or the stamp down Military Commander may determine, from which any or only persons may be excluded, and with respect to which, the pay off of any person to enter, remain in, or leave shall be subject to whatever restrictions the Secretary of War or the appropriate Military Commander may impose in his judgement.Korematsu v. United States, 1944. Mr. Justice Murphy, dissentingThis exclusion of all persons of Japanese ancestry, both alien and non-alien, from the peaceable Coast area on a justification of military necessity in the absence of martial law ought not to be approved. Such exclusion goes over the very brink of inbuilt power and falls into the ugly abyss of racism.Individuals must not be left impoverishe d of their thoroughgoing rights on a plea of military necessity that has neither substance nor backup.Being an obvious racial discrimination, the coiffure deprives all those within its scope of the equal protection of the laws as guaranteed by the Fifth Amendment. It further deprives these individuals of their constitutional rights to live and work where they will, to establish a home where they choose and to move about freely. In excommunicating them without benefit of hearings, this dictate also deprives them of all their constitutional rights to procedural due process. Yet no reasonable relation to an immediate, imminent, and impending public danger is evident to support this racial restriction which is one of the most sweeping and complete deprivations of constitutional rights in the history of this nation in the absence of martial lawCongressman Rankin, Mississippi, February 18, 1942I know the Hawaiian Islands. I know the Pacific coast where these Japanese reside. Even thou gh they may be the threesome or fourth generation of Japanese, we cannot trust them. I know that those areas are teeming with Japanese spies and fifth columnists. Once a Jap perpetually a Jap.You cannot change him. You cannot make a silk purse out of a sows ear.Do not for depict that once a Japanese al agencys a Japanese. I say it is of decisive importance that we getrid of every Japanese whether in Hawaii or on the mainland. They violate every sacred promise, every canon of honor and decency. This was demonstrate in their diplomacy and in their bombing of Hawaii. These Japs who had been there for generations were making signs, if you please, channelize the Japanese planes to the objects of their inequity in order that they might destroy our oceanic vessels, murder our soldiers and sailors, and blow to pieces the helpless women and children of Hawaii. Damn them Let us get rid of them nowFranklin D. Roosevelt, Fireside Chat on the Home Front, October 12, 1942In order to kee p stepping up our performance, we have had to add millions of workers to the total cut into force of the Nation. And as new factories come into operation, we must find surplus millions of workers. This presents a formidable problem in the mobilization of manpower. It is not that we do not have enough people in this country to do the job. The problem is to have the right numbers of people in the right place at the right time.In some communities, employers dislike to employ women. In others they are reluctant to hire Negroes. In still others, older men are not wanted. We can no thirster afford to indulge such prejudices or practices.Women are welders sic discuss the production of motor mounts and welded parts in a welding booth at the Inglewood, Calif., plant of North American Aviation, Inc. 1942. National Archives and Records Administration.President Roosevelt, Executive Order 8802, June 25, 1941WHEREAS it is the polity of the United States to encourage full participation in th e national defense program by all citizens of the United States, regardless of race, creed, color, or national origin, in the firm belief that the democratic way of life within the Nation can be defended successfully tho with the help and support of all groups within its bordersWHEREAS there is evidence that for sale and needed workers have been barred from practice session in industries engaged in defense production solely because of considerations of race, creed, color, or national origin, to the detriment of workers morale and of national unityNOW, THEREFORE, by virtue of the authority vested in me by the Constitution and the statutes, and as a prerequisite to the successful conduct of our national defense production effort, I do hereby reaffirm the policy of the United States that there shall be no discrimination in the employment of workers in defense industries or government because of race, creed, color, or national origin, and I do hereby declare that it is the duty of em ployers and of labor organizations, in forwarding of said policy and of this order, to provide for the full and equitable participation of all workers in defense industries, without discrimination because of race, creed, color, or national origin

Developing Ecotourism

Developing Eco holidaymakerry The Prospect of Bakkhali Group Project pull ind chthonic Rajiv Gandhi lease Preface This project has been prep ard d havestairs the aegis of Rajiv Gandhi Chair in Eco -systems &038 Sustainable Development under the supervision of Professor Sarmila Banerjee by the Masters level students in stinting science with specialization in re quotationfulness &038 Environmental Economics of the University of Calcutta. Prof. Banerjee has initiated us to the issues link to economy- surround interface and convinced us ab bring out(a)(predicate) the importance of the notion of eco touristry to ease the entire process sustain sack.We atomic number 18 extremely grateful to Professor Banerjee for her active interest and sympathize with softw ar documentation exclusively doneout. In this backdrop we tried to collate selective in institution on divergent aspects of Ecotourism from our field trip to Bakkhali, a lessened depart of the Sundarban mangro ve af tone ecosystem of West Bengal. We sleep withed our venture in this newly be activeled terrain of surroundingsal economics and learnt to oceanrch for information from the internet, write brief descriptions of the issues, prep atomic number 18 presentation slides and fina lly to give an combine decide to the entire project.Finally, it has been the collective ploughsh be of all the students of this course of the batch 2010-2012. Semester IV Resource and Environmental Economics M. Sc. (Economics) University of Calcutta June 8, 2012 ii fudge of Contents nary(prenominal) Contents Preface Table of Contents Ecotourism 1. 1 Different forms of tourism in India 1. 2 upcoming prospects of Tourism 1. 3 Impacts of tourism 1. 4 Promoting ecotourism in India 1. 5 The principles adopted by those turn oning in Ecotourism 1. 6 Why ecotourism? Page No. ii iii iv 1-8 2. Ecosystem Approach 2. 1 Ecosystem and its Importance . 2 Ecosystem Approach 2. 3 slaying of Ecosystem Approach 9 1 1 3. Valuing Bio potpourri 3. 1 Why judge Ecosystem? 3. 2 Motivation for an economic emilitary rating of ecosystem operate 3. 3 Biosalmagundi 3. 4 Valuation of Bio diverseness 3. 5 Bio vicissitude stageping 12 15 4. Peoples Biodiversity Register (PBR) 4. 1 Objective of PBR formation 4. 2 Usefulness of PBR 4. 3 Information recorded in PBR 4. 4 major ship arouoceanl of collecting data for PBR 4. 5 unifiedness in an Ecosystem 16 18 5. Sundarban A Special Ecosystem 5. 1 Sundarban Eco vicinity Introduction 5. 2Sundarban fresh irrigate Swamp plants 5. 3 Sundarban mangroves 5. 4 Sand Dunes Ecological Set up 5. 5 Biodiversity of Sundarban 5. 6 Livelihood in Sundarban 5. 7 Utilization of Mangrove Resources Comprised 5. 8 Repenny Developments &038 their Impacts 5. 9 Man-Animal Conflict 5. 10 Threats to Sundarban &038 Climatic fancy 19 33 1. iii 6. Ecotourism in Bakkhali A Fringe partially of Sundarban 6. 1 Bakkhali 6. 2 Accessibility 6. 3 uniqueness 6. 4 Frasergunj, enthal py Is primer &038 Jwambudwip 6. 5 Floral revolution at Bakkhali &038 enthalpy Isand 6. 6 Faunal Diversity at Bakkhali &038 hydrogen Island . 7 Avian Diversity at Bakkhali &038 Henry Island 6. 8 Livelihood on Biodiversity 6. 9 Market Sharing 6. 10 Other Observations 6. 11 Threats from Tourism 6. 12 Our Suggestions iv 34 45 I. ECOTOURISM diversification to experience one of the fastest growing economic sectors in the world. Tourism has become a thriving global indu stry with the power to shape incuring countries in both positive and minus carriages. Consequently, it is the fourth immensest labor in the global economy and in India it contri furtheres to a large equalizer of the National Income 6. 3% to the national GDP and 8. 78% of the total transaction thus generating great habit opportunities (Wikipedia). 1. 1 Different forms of Tourism in India The Indian g all everywherenment, in order to boost tourism of dissimilar kinds in India, has set up the Ministry of Touri sm and Culture. T his ministry recently launched a military campaign called I bl I ff y f I .T dilute is mournful toward niche segments of tourism (as shown in figure 1 be scummy). get into 1 Different Forms of Tourism in India 1. 2 Future prospects of TourismAccording to the latest Tourism Satellite Accounting (TSA) research, released by the ball Travel and Tourism Council (WTTC) and its strategic partner Oxford Economics in March 2009 1 ? The demand for travel and tourism in India is expected to grow by 8. 2 per cent between 2010 and 2019 and will lead India at the third position in the world. ? Indias travel and tourism sector is expected to be the second largest employer in the world. Considering the ever growing importance of this industry it is necessity we look for guidances that will be sustainable in the eagle-eyed run. wikipedia) 1. 3 Impacts of tourism Positive Impacts 1. Generating Income and Employment Tourism in India has emerged as an instrument of income an d employment generation, poverty alleviation and sustainable human phylogenesis. 2. Source of Foreign qualify Earnings Tourism is an burning(prenominal) source of un wish well ex transfigure net in India. This has plausive push on the balance of payment of the country. 3. saving of National Heritage and Environment Tourism helps preserve several places which ar of historical importance by declaring them as heritage sites.For instance, the Taj Mahal, the Qutab Minar, Ajanta and Ellora temples, etc, would endure been lousy and dest royed had it not been for the efforts incurn by Tourism Department to preserve them. Likewise, tourism at any rate helps in conserving the inherent habitats of mevery endangered species. 4. Developing root Tourism tends to encourage the victimization of mult iple lend oneself infrastructure that benefits the host community, including various core of conveys, health c ar facilities, and sports centers, in sum total to the hotels and n obleschool -end restaurants that cater to foreign visitors.The development of infrastructur e has in turn induced the development of oppositewise directly productive activities. 2 5. Promoting Peace and Stability Honey and Gilpin (2009) suggests that the tourism industry nates similarly help promote peace and stability in developing country akin India by providing jobs, generating income, diversifying the economy, fostering the surround, and promoting cross-cultural aw arness. 6. Contri butions to Government R stock-stillues The Indian government through the tourism department in like manner collect money in more(prenominal)(prenominal) far r all(prenominal)ing and mediate ways that argon not linked to specific parks or conservation field of studys.User fees, income taxes, taxes on sales or rental of recreation equipment, and permission fees for activities much(prenominal) as rafting and fishing throw out extend governments with the funds ne eded to complete imman ent resources. Negative Impacts 1. Undesirable Social and Cultural transmit Tourism both(prenominal) ms led to the destruction of the neighborly fabric of a community. The more tourists come into a place, the more the perceived risk of that place losing its identity. 2. Increase Tension and Hostility Tourism butt increase tension, hostility, and disbelief between the tourists and the topical anaesthetic communities when there is no respect and f l y flf . T yf lead to violence and other crimes committed once against the tourists. 3. Creating a Sense of Antipathy Tourism brought little benefit to the local community. Moreover, large hotel chain restaurants oft import pabulum to satisfy foreign visitors and seldom emp loy local staff for senior direction positions, preventing local farmers and workers from reaping the benefit of their presence. This has practically created a sense of antipathy towards the tourists and the government. 4.Adverse Effects on Environment and E co logy One of the roughly important adverse effects of tourism on the environment is increased squeeze on the carrying subject matter of the ecosystem in each tourist locality. Increased transport and construction activities led to large graduated display panel de woodlandlandation and destabilisation of instinctive landforms, while increased 3 tourist scat led to increase in solid waste cast aside as well as depletion of irrigate and fuel resources. Flow of tourists to ecologically sensitive areas dissolvered in destruction of rare and endangered species due to trampling, killing, solicitude of breeding habitats.Noise contaminant from vehicles and familiar address systems, irrigate pollution, vehicular emissions, untreated sewage, etc. overly turn over direct effects on bio -diversity, close environment and general profile of tourist spots. 5. Depletion of natural resources Tourism development can put pressure on natural resources when it increases economic con sumption in areas where resources are already scarce. 6. Destruction and Alteration of Ecosystem Attractive landscape sites, much(prenominal) as flaxen beaches in Goa, Maharashtra, Kerala, Tamil Nadu lakes, riversides, and mountain tops and slopes, are lots transitional geographical zones, characterized by species- copious ecosystems.The terrors to and pressures on these ecosystems are often solemn beca commit such places are precise attractive to both tourists and developers. Examples whitethorn be cited from Krushedei Island safe Rameswaram. Moreover, habitat can be degraded by tourism leisure activities. For example, wildlife viewing can bring about stress for the brutes and shift their natural behaviour when tourists come too close. Safaris and wildlife watching activities have a degrading effect on habitat as they often are accompanied by the noise and commotion created by tourists. Figure 2 shows the same impacts classified under galore(postnominal) other categories . then, the take account of the very environmental and socio cultural assets that attract travellers can erode over time. This is curiously the case where tourism development is unregulated, blinkered by volume growth, and focused merely on short - boundary economic benefits. This is unsustainable and ir accountable and completely unacceptable in the 21st century. Tourism in India should be veritable in such a way that it accommodates and entertains visitors in a way that is minimally invasive or destructive to the environment and sustains &038 supports the native cultures in the locations it is operating in.Moreover, since tourism is a multi-dimensional activity, and basically a service industry, 4 Figure 2 Classification of Impacts of Tourism it would be necessary that all wings of the substitution and State governments, private sector and voluntary organisations become active partners in the endeavour to attain sustainable growth in tourism if India is to become a world pl ayer in the tourism industry. overly, Eco tourism unavoidably to be promoted so that tourism in India helps in preserving and sustaining the diversity of the Indias natural and cultural environments. It can simply be summarized as shown in witness 1. 1. 1Promoting ecotourism in India Fundamentally, eco-tourism means devising as little environmental impact as possible and helping to sustain the indigenous populace, thereby advance the conservation of wildlife and habitats when visiting a place. This is the respons ible form of tourism and tourism development, which encourages going back to natural products in every aspect of life. It is similarly the get wind to sustainable ecological development. The International Eco tourism Society destines eco-tourism as responsible travel to natural areas that conserves the environment and improves the well- world of local corking deal. ( wikipedia) Pictue 1 Eco-tourism simply described The key players in the ecotourism business are governments at levels, the local authorities, the developers and the operators, the visitors, and the local community. Each one of them has to be sensitive to the environment and local traditions and follow a set of guide falls for the successful development of ecotourism. 1. 2 Principles adopted in Ecotourism The principles that are adopted by those who are heterogeneous in Eco -tourism can be listed as shown below ? To minimize the negative impacts on environment. ? To build environmental and cultural awareness and respect ?To provide positive experienc es for both visitors and hosts ? To provide direct financial benefits for conservation ? To provide financial benefits a nd empowerment for local the great un serve ? To raise sensitivity to host countries political, en vironmental, and social climate ? To support international human rights (www. ecotourism. org/what-is-ecotourism) 6 and labour agreements scientific and research institutions and non-government organisations can besides play some roles in promoting ecotourism (i) Create awareness, among all concerned, about the importance of sound eco -practices in tourism development ii) Motivate the local communit ies to increase their involvement in sustainable tourism activities (iii) Organise teach programs to prepare the local people to take up various vocations related to ecotourism (www. ecotourism. org/what-is-ecotourism) All these principles are summed up in figure 3, where their linkage is besides shown with the arrow-heads. 6. Emphasizes the imply for planning and sustainable growth of the tourism industry 1. forfend negative impacts on natural &038 cultural environment 2. Educates the traveller on the importance of conservation PRINCIPLES OF ECOTOURISM 5.Stressing the use of locallyowned facilities and run. 3. Directs revenues to the conservation of natural areas and the heed of protect areas 4. Brings economic benefits to local communities Figure 3 Principles of Eco -tourism 1. 3 Why e cotourism? approximately wilderness areas across India are breakable ecosystems that provide a safe and sound host of ecosystem ser vices to local residents and people vivacious downstream and continue to roost important tourist attractions. However, unplanned tourism in such landscapes can destroy the very environment that attracts such tourism in the initiatory place.Hence, there is a need to move towards a model of tourism that is compatible with these fragile landscapes. Such tourism is low impact, educational, and conserves the environment while directly benefiting the economic development of local communities. It has the 7 field to link to a all-embracingr constituency and build conservation support while superlative awareness about the worth and fragility of such ecosystems in the public at large. It as well promotes the non-tubercular use of wilderness areas, for the benefit of local communities documentation almost, and dependent on these fragile landscapes.Thu s, tourism can be developed a large with the conservation of the ecosystem. 8 II. ECOSYSTEM APPROACH 2. 1 Ecosystem and its importance Ecosystem is a dynamic complex of plants, faunas &038 micro-organism communities &038 the non-living environment interacting as a functional unit. And it is this interconnection that forms the striking feature of such a system. Healthy ecosystems are inwrought for human well- beingness, as they provide inva luable functions and services including sustaining living resources. The health of ecosystems is so not besides essential to the environment, but also important to the creative activity and l y. T b f E y A . 2. 2 Ecosystem Approach Ecosystem approach is basically a strategy for the interconnected management of land, body of water and living resources that promotes not all conservation but also sustainable use in an equitable way. It is based on the application o f entrance scientific methodologies focused on levels of biologic organiz ation, which encompass the essential structure, processes, functions and interactions among organisms and their environment. It recognizes that humans, with their cultural diver sity, are an constitutional component of many ecosystems.However, till date, it has not been possible to identify any particular form of this approach. Ecosystem approach is based on some principles which tump over the economy to be anthropocentric. And since ecosystem is a rich resource for human society, the integrated management of the biotic and abiotic components must ensure sustained use so as to secure it for future generations. These principles state that the objectives of management of land, water and living resources are a matter of societal choice and management should be decentralized to the lowest appropriate level.This approach should be undertaken at the appropriate spatial and temporal scale because time and spatial dimensions are equally important. This approach should also consider all f orms of relevant information including scientific, tralatitious and local k forthwithledge, innovative 9 practices and just about importantly, it should be open to changes. Finally, this should involve all relevant sectors of so ciety and scientific discipline s. 2. 3 Implementation of Ecosystem Approach The International Union for Conservation of Nature and Natural Resources (IUCN) identifies tercet flavors for the implementation of ecosystem approach.These steps are in accordance with the in a high place mentioned principles (Figure 4). Let us describe these steps in more detail. Figure 4 Major abuses for Implementation of Ecosystem Approach (Adapted from R. Costanza et al. The value of the Worlds ecosystem Services and Natural Capital, Nature vol. 387(1997) Step A It deals with the or so difficult issues of defining an ecosystem area identifying th e stake obligeers and developing a relation between the both. It is best to work simultaneously on defining the ecosystem ar ea and determining the stakeholders who will support the selection and management of that area.Whether we start with area or with stake holders, 10 it will take substantial time and effort to achieve a workable fit. Howover, this step qualifies as the more or less important step because a proper management of the ecosystem by the stakeholders and a mutually beneficial relationship between the two can not only bring desirable results but also ensure harmonious coexistence. On the other hand, an improper management capacity lead to exploitation due to overuse and significant endangering of the ecosystem, disrupting its sustainability for future generations . Step BThis stage involves characterizing the structure and function of the ecosystem, and setting in place mechanisms to manage and monitor it. The most productive way involves scientists and local inhabitants working unitedly , as the traditional and scientific knowledge are likely to be complementary, though different. Step C Step C essentially deals with reducing marketplace induced distortions on ecosystem. Valuation in case of environmental good has always been a problem since these are non marketed goods. Hence market distortion should be corrected at an early stage.Here we may apply the concept of derived market to arrive at a proper valuation using correct market instruments-Mekong river basin case study showed overvaluation of dam and irrigation schemes. This should be corrected using best possible knowledge. The interconnect age between the components should be properly identified while reservation the cost benefit analysis. Care should be taken to avoid over extraction of resources. Proper incentive should be created among the people for wise use of biodiversity. One may bring political will in necessary issues. 11 III. VALUING BIODIVERSITY 3. 1 Why to value Ecosystem?The services of ecological systems and the natural capital stocks that prepare them l f f E l f -support system. They con tribute to human welfare, both directly and indirectly, and therefore check part of the total economic value of the planet. For the entire biosphere, ,the current economic value of 17 ecosystem services for 16 biomes, based on create studies and a few original calculations, is estimated to be in the range of US$1654 gazillion per year, with an average of US$33 jillion per year. Because of the nature of uncertainties, this must be considered as a minimum estimate.Global rough-cut national product total is around US$18 trillion per year. For example, the average set benefit in the Med region amounts to about 1% of GDP. Indirect use value such as water-shed protection, contributes about 35% of total estimated value. ( Source Adapted from R. Costanza et al. T l f W l y S N lC l N l. 387(1997)p. 256 table 2) 3. 2 Motivation for an economic evaluation of ecosystem services ? Ecosystems provide a wide array of goods and services of value to people. ? Provision of ecosystems services often is not factored into import ant decisions that affect ecosystems.Distortions in decision making damage the provision of ecosystems services making human society and the environment poorer. (Valuing Ecosystem servicesadvantages &038 disadvantages of existing methodologies and application to PES by Daniel Perrot Maitre (Seminar on environment services and financing for the protection and sustainable use of ecosystem Geneva,10-11 October 2005IUCN ) 3. 3 Biodiversity regeneration in the living part of ecology is called biological diversity or biodiversity. This term is most honey oilly used to replace the more transparently defined and long established terms, species diversity and species richness.Biologists most often define 12 biodiversity as the totality of genes, species, and ecosystems of a region. An advantage of this commentary is that it seems to describe most circumstances and presents a unified view of the traditional three levels at which biological variety has bee n identified . (www. portal. gsi. gov. in/) there are three forms of biodiversity Ecosystem diversity It refers to the diversity of a place at the level of ecosystems the variety of species and ecological processes that occur in different visible settings.Species diversity It is the effective number of different species that are delineate in a hookup of individuals (a dataset). Genetic diversity It refers to the total number of contractable characteristics in the genetic makeup of a species (www. portal. gsi. gov. in/) Biodiversity is indeed a major contributor to the economy through the provision of many ecosystem goods and services. It is subjective to the set of beauty and tranquillity. more Australians place a high value on native plants and animals, which contribute to a sense of cultural identity, phantasmal enrichment and recreation.In fact, biodiversity is central to the cultures of Aboriginal and Torres Strait Islander peoples. There is also a link between biodiver sity and continuelihood. This is because a persons kick the bucketlihood refers to means of securing the necessities of life. Th is extends to include social and cultural means, i. e. the command an individual, family, or other social group has over an income and/or bundles of resources that can be used or exchanged to satisfy its needs. For instance a fishermans livelihood depends on the on tap(predicate)ness and accessibility of the diversity of fish.Therefore valuation of biodiversity is very important in our day-after-day life. (www. portal. gsi. gov. in/) 3. 4 Valuation of Biodiversity The Value of Biodiversity (Figure 5) Includes both Use determine and Non-Use Values? Use values include direct use (both consumptive and non-consumptive), indirect use, and option values 13 Direct-use Values Hunting, direct -consumption (e. g. hookup of berries, mushrooms, b l ll ) ll b y tourism . Indirect-use Values Ecosystem services such as pollination, habitat for other species, s ustaining food chains, and other uses are indirect -use values. Non-use values include bequest values and existence values (http//www. biospherenursery. com/pages/whatisabioscape. html ) Value of Biodiversity Present use value-market based Future use value-option value Direct use value -conscious Existenceexistence value Non use value -ignorant? Figure 5 Fragmented Value of Biodiversity 3. 5 Biodiversity Mapping Biodiversity social occasion denotes the link between biodiversity and human diversity. It is recognizes the role- played by human diversity in biodiversity conservation.Cultural biodiversity also exists in towns as people use traditional medicines, eat traditional food, wear traditional cloth and can also have an intricate knowledge on culture and biodiversity. Categories of Biodiversity Mapping Bioscape The term Bioscape f l ff b lz l including human habitat (http//www. biospherenursery. com/pages/whatisabioscape. html). decorate Landscape ecology is described as a scie nce that examines the behavior and patterns of land as a result of the interactions with its ecosystems. The relatively new 14 iscipline of landscape ecology provides insight into both landscape diversity and species diversity and suggests a theoretical and practical basis for conservation planning . Timescape Timescape is the change in pattern over time. It documents landscape pattern, occurrence and exploitation of biological diversity and the dependence of community on the natural resources. IV. PEOPLES BIODIVERSITY REGISTER (PBR) P l B yR (PBR) is a authenticated register containing comprehensive information on the availability and knowledge of the local biological resource, their use and traditional folklore associated with them.It is one of the significant steps for conservation of biodiversity through sustainable management using indigenous knowledge. 4. 1 Objectives of PBR formation ? To claim justified benefit sharing by the local people for any commercial use of their BD resources. ? To explore enterprises based on their BD resources ? To develop exhaustive data base to help effective intervention for development &038 conservation Along with this information, the Register will also contain drawn-out annotations on the landscape of the area, present land use pattern, and some over timescape. 4. 2 Usefulness of PBR Preparation of Biodiversity Register is an attempt to realize the bio diversity at topical anesthetic Self Government level, States and the whole Country. ? This will also provide information on the current utilization patterns of biodiversity, its economic benefits to the local communities. 4. 3 Information recorded in PBR 15 The information contained in PBR is not only confined to a list of species available in an area but a comprehensive report on the species, their habit, biological produce, their associated market price, increaseing &038 transport of the produce, regulation on harvesting, technology, l y f ocal level management, la ndscape related data, over a time span and so on. These information are being documented under landscape, lifescape, peoplescape, and t imescape. Thus, f l biodiversity register includes ? knowledge of local biological resources, their traditional knowledge associated with them, ? data about the local aid &038 practitioner uses of biological resources, ? details about biological resources &038 knowledge. 4. 4 Major ways of Collecting Data for PBR ? Interviews of individual ? Group interviews ? Few observation by volunteers and technical support group ? Existing official document 4. Interconnectedness in an Ecosystem 5. PAYMENTECOSYSTEM SERVICES 4. ECOSYSTEM SERVICES 1. BIODIVERSITY ECOSYSTEM 3. LIVELIHOOD DEPENDENCE 2. ECO-TOURISM Figure 6 Interconnectedness in a Ecosystem 16 sympathetics are now most concerned with the exploitation and preservation of the biotic constituents for commercial harvest and recreation. To achieve these goals, we must be aware of the interconnectedness of the ecosystem which exhibits not only the characteristics of its components, but also characteristics of its own which arise from combinations and interactions of the components (as shown in figure 6).The interconnected mesh can be more clearly explained as b iodiversity is the living part of ecosystem with biodiversit y eco-tourism can be developed eco (tourism) is a major source of livelihood ecosystem also provides various kinds of services present to livelihood and biodiversity thus payment for ecosystem services this in turn can help in preserving the biodiversity. 17 V. SUNDARBAN A Special Ecosystem Map 1 Sundarban Eco-region 5. 1 Sundarban Eco-region IntroductionThe Sundarban Delta Complex (map 1), having geo-genetic link to the tectonic Bengal Basin, geographically extends over the easterly India (40%) and Bangladesh (60%). It is characterized by prolific growth of rich and diversified mangrove plant and forms an integral down drift coastal part of the Bengal Delt a Complex that overlies huge thickness of Tertiary leatherneck sediments of the actively subsiding Bengal Basin. It is a clomp of 102 miracle islands, form the largest mangrove delta complex on the globe in 18 he estuarine phase of the Ganges and Brahmaputra Rivers, and constitute a ridiculous Biosphere Reserve in the coastal Bay of Bengal. The deltaic complex was declared a reserved forest in 1875-76, under the forest Act, 1865. A lumber Division was created in 1879 with headquarters in Khulna. The Reserve Forest has been put forward for recognition as a Ramsar Site (A Wetland of International Importance). (www. portal. gsi. gov. in/) Sundarban literally means beautiful jungle or forest in Bengali language. The name Sundarbans may also have been derived from the Sundari trees (dominant species) that are omnipresent in this region.This is a region of transition of fresh Ganga water and saline water of Bay of Bengal. Sundarban ecoregion features two characters forest ecosystem and sand dunes. The forest ecosystem can again be divided into two clusters fresh water swamp forests and mangroves. 5. 2 Sundarban freshwater swamp forests The Sundarbans freshwater swamp forests lay between the upland put down Gangetic plains moist deciduous forests and the unpalatable-water Sundarban mangroves bordering the Bay of Bengal. These are tropical a nd subtropical moist broad-leafed brackish swamp forests.The fertile vulgarisms of the delta have been subject to intensive human use for centuries, and the eco-region has been mostly converted to intensive culture, with few enclaves of forest remaining. This eco-region is nearly extinct due to large-scale deforestation and closedown by human. 5. 3 Sundarban Mangroves Mangrove forest ( photo 2) is a arboreal community that can be periodically sink in sea water of the inter-tidal zone of tropical regions . They are the second highest source of primeval production next to rainforests. They produce high detritus and re lease nutrients which are a food source of variety of organism.Mangroves provide homes to variety of marine and terrestrial organisms. They act as nurseries and feeding grounds for many fish, fish and crustaceans and non-resident fish enter the mangroves to feed at high . M l y 19 f fb . They not only provide a wealth of b yb l f l food web. As with most ecosystems, an intricate relationship exists between mankind and mangrove. Many indigenous costal residents rely on mangroves to sustain their traditional cutlass. They have been sustainably used for food production, medicines, fuel wood, and fishery and construction materials.They are important inter tidal estuarine wetlands along the coast line of tropical and sub-tropical region are exposed to autersopogenic contamination fro m tidal water, river water and land based sources and Sundarban mangrove ecosystem being no exception. find 2 Trees of Sundarban Mangrove Special Feature of Mangrove Ecosystem 1. Adaptations to low oxygen blushing(a) mangroves, which can survive in the most inundated areas, prop themselves above the water level with mass roots and can then betroth air through pores in their bark (lenticels).Black mangroves live on higher(prenominal) ground and make many pneumatophores (specialised root -like structures which stick up out of the primer like straws for quick) which are also covered in lenticels. These breathing tubes typically lay down heights up to thirty centimeters, and in some species, over three meters. There are four types of pneumatophore stilt or prop type, snorkel or peg type, knee type, and ribbon or plank type. Knee and ribbon types may be combined with reenforce roots at the base of the tree. The roots also contain wide aerenchyma to facilitate transport within the plant. 2.Limiting water loss Because of the cumber ed fresh water available in salty intertidal soils, mangroves limit the amount of water they lose through their leaves. They 20 can compel the openi ng of their stomata (pores on the leaf rise ups, which exchange carbon dioxide gas and water vapour during photosynthesis). They also vary the orientation of their leaves to avoid the harsh twelve noon sun and so reduce evaporation from the leaves. Anthony Calfo, a noted marine museum author, observed anecdotally a red mangrove in captivity only grows if its leaves are mis ted with fresh water several times a week, simulating the public tropical rainstorms. . Nutrient uptake The biggest problem that mangroves face is nutrient uptake. Because the soil is perpetually waterlogged, there is little free oxygen. Anaerobic bacteria exhaust nitrogen gas, soluble iron, inorganic phosphates, sulfides, and methane, which makes the soil much less nutritious. Pnuematophores (aerial roots) throw in mangroves to absorb gases directly from the atmosphere, and other nutrients such as iron, fro m the hostile soil. Mangroves store gases directly inside the roots, processing them even when the r oots are submerged during high tide. Evolution of MangrovesFrom low tidal botch upflat via high tidal mudflat with mangroves to shrimp pond, sandy silt capacity is lightly increasing. The content of big elements and minerals is almost unchanged after depth as results of fairly stable, sedimentary source chronologically. Geo chemical sedimentary evo lution is visually reflected in the regularly changing in geochemical indices, the content of nutrients and heavy metals. Mangroves often take shape in high tidal mudflat of estuaries, in where, sedimentary environment with fine grain is favourable for mangrove seeds to be stored, spring up and photosynthesiz e.In return, the formation and development of mangrove forests, as a sedimentary trap, make the sedimentary environment more favourable for depositing of fine grain sediments rich in clay minerals. sedimentary deposition rate in mangrove forest tends to be higher than in Thus, these processes are natural companion of the environ mental transform from low tidal mudflat without mangroves (permanently being under water) into high tidal mudflat covered with mangroves (alternatively being under water). The evolution is depicted in the figure 7 below. 21 Figure 7 Evolution of MangrovesThe transform of low tidal mudflat without mangroves into high tidal mudflat is characterized by a little increase in content of Fepyrite, Statal, Spyrite, Sreduction. The raising in amount of sulphurs can be understood as consequence of higher amount of mangrove root, which is the main sulphur source. The content of sulphurs increase after sedimentary depth in low tidal mudflat is more intensively than that in high tidal mudflat. This may also relate to increasing sulphur source in tidal mudflat. In addition, var iation coefficients of sulphurs content in mangrove forest sediment are higher than those in low tidal mudflat.Thus, the transform process through these two environments leads to stronger sulphurs differentiation. Under th e right conditions like the formation of a mud -flat, growth of mangroves is initiated. Stabilization of mud-flats is a preliminary process in the organization of mangroves. Pioneer plant species initiate this process. The roots of these plants help in stick the soil and also help the establishment of micro -organisms which further help in stabilizing the area. Stabilization starts from the land side and gradually shifts towards the sea.The introduce plants are spec ies like Porterasia coarctata and some members of the Cyprus family. These are slowly replaced by other mangrove plants and then these mangroves gradually spread towards the sea. Once mangroves grow, the submerged banks are fully stabilized. Then the plant s slowly pee a stage which is called the climax vegetation. A climax vegetation of mangroves is represented by the complete circle of life where there are different species of plants, animals (both terrestrial and aquatic) and micro -organisms forming an ecosystem called the tropical salt marsh or the mangrove ecosystem.In case the sediments are not 22 stabilized, submerged banks are washed out. Thousands of deltas are formed and washed out every year onward they can be stabilized. In the Gangetic delta this situation is quite common. Zonation in mangrove 1. Proximal Zone (Front mangroves) This zone is towards water bet, subject to regular tidal effect where intensity of soil accumulation and inundation is a day-and-night process. The mangrove species in this zone are specially adapted with stilt roots, prop roots for stability and anchorage. master(prenominal) species with these features are genus Rhizophora apiculata and Rhizophora mucronata.On rocky and coral reef substrata, genus Avicennia Spp, Sonneratia Caseolaris are also found. two Avicennia and Sonneratia produce pneumatophores. 2. Middle Zones (Mid mangroves) Above the Rhizophora/ Avicennia line luxuriant group of Bruguiera gymnorrhiza, B. Cylindrica, Lumnitzera racemosa, L. li ttoralis, Ceriops tagal and Aegiceras corniculatum occur. Ceriops and Bruguiera develop a strong hold fast in the form of knee roots or band roots as a special adoption for supporting the rear bole. 3. Distal Zone (Back mangroves) Towards island area mangroves like Excoecaris agallocha, Heritiera littoralis and Xylocarnus spp occur.Both Heritiera and Xylocarpus produce buttresses. Generally the salinity is on lower side in this zone occurring towards hill sides where run off of fresh water is for a elongated period. The duration of tidal submersion is low in this zone compared to front mangroves. However, the zonation in mangroves is not so simple and varies from place to place. Every species has its own level of salinity tolerance. Estuaries on east coast show distinct zonation. The high salinity range on the east coast estuaries may be the principal reason for distinct zonation there.The range and force of tidal action also play a determinant role in creation and maintenance of zones as distribution of seeds or propagules is influenced by tidal action. Also, tides do influence the salinity in an estuary. Land brass in mangrove ecosystem 23 During high tide silts take a way into the creeks. And when low tide starts the water recedes but the silts are deposited. This is the natural way of sedimenta tion. In this way the land is formed in mangrove ecosystem (figure 8 (a)). But the newly formed land is fragile in nature. to boot the seeds of mangroves fall on this area and there they grow up.The roots of mangrove with its special characteristics hold up the soil. This prevents soil erosion and holds up the land. And the settlement grows around that. This is used for cultivation also. When embankment is built artificially to cultivate and to protect the land from being flooded the natural process o f land formation is hampered. Silt deposition does not take place. Also the mangroves which used to be there die down. The land becomes more fragile and during hig h tide or during flood the water table increases more than it would previously. The purpose of embankment fails here.It hampers the natural land formation and also destroys the mangrove ecosystem (figure 8 (b)). (a) (b) Figure 8 (a) Natural Land Formation and (b) Land Formation Due To Embankment in Mangrove Ecosystem 5. 4 Sand-Dunes Ecological set-up At the most basic level dunes are simply piles of sand. Wind and waves transport sand onto the beach forming dunes. It results from stabilization of transported sediment, sea weed, debris by vegetation. It is also related to tidal fluctuation. Further accretion results in beach elevation. Migrating dunes helps to harbour habitation being exposed to sea.Dune ridges are formed by surface wind w ith velocity more than 4. 5 m/s when sand sized 24 particles move by siltation. Travelling dunes dip areas in eroding coast. In stable coast dunes stabilize 90o to wind direction. Sand tends to be blown from the windward face and to accumulate on the leeward side. Dunes (picture 3) are found in Sundarban ecosystem which help protects mangroves. Tidal flow causes the formation of the mangrove and the formation of the sand dunes is caused by the wind flows. Thus tidal flow and wind flow works together in Sundarbans and creates the special features of this region, i. . , mangroves and sand dunes which lead to the formation of the beach. The beach here is rich in biodiversity and Sundarban is developing a very good kind of beach-centric ecotourism. watch 3 Sand-dunes of Sundarban Eco-system 5. 5 Biodiversity of Sundarban A brief account of the floral and faunal diversity in Sundarban is shown in the picture 4 below. Some common mangrove species can be jotted down as ? Hatal(Phoenix paludosa) ? Genwa (Excoecaria agallocha) ? Dhundul(Xylocarpus granatum) ? Kankra (Bruguirea gymnorrhiza) ? Champa(Bruguiera parviflora) ? Dhani ghas (Porteresia coarctata) Garjan (Rhizophora apiculata) ? Keora (Sonneratia apelata) ? Sundari tree (He ritiera fomes) ? Golpati( Nypa frutcans) (www. portal. gsi. gov. in/) 25 There are also many faunal species in this region (www. portal. gsi. gov. in/) BENGALTIGER (Panthera tigris tigris) At present there are about 250-300 tigers in Sundarban. This is the nominate species of the eight sub-species of tigers found in the world. Tigers are the apex predat ors of this mangrove eco -system. They are right at the top of the food chain. The Sundarban t igers are extraordinary beasts.Perfectly at home both on land and water, it is cognise to cross more than one river at time to find food. The Sundarban tiger quarrys mainly on cheetal or spotted deer, wild boar, goats and livestock. It is a nocturnal and ambush predator. Picture 4 Sundarban Ecosystem Biodiversity JUNGLE CAT (Felis chaus) This is a audacious bodied cat found in Sundarbans. It is a nocturnal animal which preys on minuscular animals. This cat is often met with in Sundarbans. It is a good climber and an ambush predator. LEO PARD CAT (Felis bengalensis) This cat is an agile climber and a good swimmer. It preys on birds, bats, hares and fawns.FISHING CAT (Prionailurus viverrina) This is a powerfully built cat. It is a nocturnal predator and an expert swimmer. It is known to dive in water to take hold of fish hence the 26 name. It also preys on small and medium size animals such as wild pigs and cheetal fawns. WILD wild boar (Sus scrofa) This animal is often seen in Sundarbans. This is a heavily built animal. It is basically a herbivore but is also known to take small animals, insects and even carrion. This animal also acts as a prey species for the tiger. CHEETAL OR espy DEER (Axis axis of rotation) This is the only deer found in Sundarban.It is also the most common deer in India. It is a herbivore. This animal is the major prey for the tigers. It is commonly seen near water holes. COMMON KRAIT (Bungarus caeruleus) This is the most venomous ophidian in India. This is strictly nocturnal snake. It feed s mainly on snakes. BLACK crest KINGFISHER (Halcyon pileata) This is a common bird of the Sundarbans. Seen ofttimes on river banks. It feeds mainly on fish and crabs. GOLIATH HERON (Ardea goliath) This common bird of Sundarbans is huge in appearance. It is a solitary creature. It feeds mainly on fish and frogs.LESSER ADJUTANT STORK (Leptoptilos javanicus) unremarkably solitary. Feeds on fish, frogs and reptiles. BRAMHINY KITE (Haliastur indus) This is a raptor which is often found besides water bodies such as lakes, pools, ponds and rivers. It feeds on fish, frogs, snakes, small mammals and bats. In addition to this Sundarban has few species of sharks the most common being the INDIAN DOG shark (Scoliodon laticaudus) There are also dolphins to be found in Sundarbans the most common being the Gangetic dolphin (Platinista gangetica) to name a few. COMMON KRAIT (Bungarus caeruleus) This is the most venomous snake in India.This is strictly nocturnal snake. It feeds mainly on snakes. 27 BLACK CAPPED KINGFISHER (Halcyon pileata) This is a common bird of the Sundarbans. Seen frequently on river banks. It feeds mainly on fish and crabs. GOLIATH HERON (Ardea goliath) This common bird of Sundarbans is huge in appearance. It is a solitary creature. It feeds mainly on fish and frogs. LESSER ADJUTANT STORK (Leptoptilos javanicus) Normally solitary. Feeds on fish, frogs and reptiles. BRAMHINY KITE (Haliastur indus) This is a raptor which is often found besides water bodies such as lakes, pools, ponds and rivers.It feeds on fish, frogs, snakes, small mammals and bats. INDIAN DOG SHARK (Scoliodon laticaudus). There are also dolphins to be found in Sundarbans the most common being the Gangetic dolphin (Platinista gangetica) to name a few. 5. 6 Livelihood in Sundarban husbandry is the main occupation of the local people. Rain-fed, mono-cro paddy is grown in t his area. Before the introduction of HYVs, they cultivated salt tolerant varieties of rice like Paknai, Barhal, Talm ugur, Gopalbhog, Gulshi, Bolan etc. Occasional inundation of paddy fields by brackish water gave rise to a paddy-cum-fishery system.During unpolished lean period, locals get involved in fishing, honey collection. 49% of the households directly extracted forest resources for their livelihood, including 98 % of the landless forest fishers. Almost all remaining households depended partly on the forest resources. The forest fishers, traders and some of the labourers directly depended on forest resources, earning money from all selling or processing these resources. Most of the farmers and service holders depended on forest resources indirectly because they used forest resources for their households (for food, fuelwood, building materials etc).It was a clear trend that the higher the household income, the higher the dependency on forest resources. Main livelihood percent of households Fishery-32, Farming-25, Labour-15, Trade-13, Service-5, Other-10. Some livelihood forms are shown in p icture 5. 28 C Picture 5 Some Livelihood Forms in Sundarban 5. 7 Utilization of mangrove resources comprised F F F l F y ll B l y b . from various trees l G l ( y l) b . There are some medicinal plants in the mangroves, but t hese are not utilized. Most of the households depended entirely on fu el wood for cooking.This demand causes fast depletion of forest and consequently the ecosystem, as well as air pollution and health problems. Once upon a time logging was practiced in felling mode, but now in selective mode. When carried out in felling mode, the result can be er osion of the exposed ground and impoverishment of the soil within the affected area. In se lective mode, as carried out at present, the removal of many valuable species can still damage the ecosystem, and in this mode, the space of the removed individual tr ees may be taken by other, less valuable, species. In either case, the forest resources become less valuable.Fish is the potential source of protein of the peo ple of Bangladesh. Many people of the Sundarban households totally depend on fishing, usually by nets that are very effective but catch all fishes. Sometimes po isoning is applied, with severe environmental impacts. Tourists can enjoy the sight of fishing by trained otters. Shrimp cultivation is profitable business, and is totally dependent on natural claw. People collect fry from the river by nets of small mesh, with severe consequences to a multitude of other species. 5. 8 Recent Developments and their impacts 29Recent introduction of HYV seeds has led to increased dependence on chemical fertilizers, pesticides &038 external sources of seeds dominated by corporate sector. M f HYV b f f. Occurrence of recent cyclones made them realise the need for preservation &038 cultivation of indigenous species. Lack of alternate emplo yment opportunities, loss of land, population pressure &038 poverty increases the dependence on forest for timber &038 Non-Timber Forest Produces (NTFPs). bad capture method of tiger runt culture has replaced the traditional aquaculture in paddy fields. Corporate sector is making money, Meendharas are being employed.Over guanine juveniles of other fish species are destroyed to catch a adept tiger prawn seedling (DISHA, 2006). W f l b b l l b en subjected to uncertainty. What they could obtain for their livelihood from the forest easily, is now restricted. This poses a difficulty for their subsistence. So they get involved in illegal cutting which adversely affect the ecosystem. 5. 9 Man-animal Conflict Local people in Sundarban are immensely dependent on the forest for their day to day activities and also for their living. Honey collectors, wood cutters, leaf collectors and fishermen are sometimes killed by tiger inside the forest.Sundarban tig er treats human as a normal prey in forest. Every village in fringes have large number of widows of tiger . T f y B b b (picture 6) D k y irrespective of all religions. To reduce potential tige r attack, t hey experiment with Human Masks (picture 7) at the back of their head. 30 Picture 6 Bonbibi Picture 7 Human Masks 5. 10 Threats to Sundarban and climatic vulnerability ? Recurrent coastal make full (picture 8) due to climate change (global warming) causes changes in sea level (rise in sea level). 26 Picture 8 Effects of Coastal fill Reduced flow of sweet water into Sundarban mangrove system. ? Extension of non-forestry land use into mangrove forest. ? The Barrier a) Man-animal conflict Straying of tigers into villages. b) Human-human conflict Villagers Vs. foresters. ? universe of discourse pressure and increased demand for small timber and fuel wood for local consumption. ? Poaching of tiger, spotted deer, wild boar, marine ? Uncontrolled collection of prawn seedlings. ? Uncontrolled fishing in the water of Reserve forests. 31 turtles, horse-shoe crab etc. ? Continuous trampling of river/creek banks by fishermen and prawn seed collectors. Chemical pollution through m arine paints and hydrocarbons &038 also agricultural run-off containing chemical fertilizers &038 pesticides. ? Lack of employment opportunities in the forest fringe areas, locals locomote to adjacent states for jobs, girl trafficking. ? Organizational and infrastructural deficiencies lead to corporate extortion in agriculture &038 aquaculture. ? Tourism can be viewed as one such threat to the ecosystem. Tourism has its negative impacts on the ecosystem which are pressure on carrying capacity of the ecosystem which may sometime leads to deforestation &038 destruction of endangered species.Environmental pollution &038 depletion of natural resources are seen almost everywhere with more tourist visit. 32 VI. ECOTOURISM at BAKKHALI A fringe part of Sundarban 6. 1 Bakkhali Bakkhali is a coastal area in South 24 Parganas district of West Bengal, India (map 2). It is located on one of the many deltaic islands spread across southern Bengal. This small island juts out into the vast expanse of the Bay o f Bengal. It has a 7 k m long beach stretching from Bakkhali to Frasergunj, a equal beach with gently rolling waves. Casuarina trees line up the beach like guarding wall, which adds up to the beauty of the beach. wikipedia) 6. 2 Accessibility By road Map 2 Bakkhali, a small part of South-West West Bengal It is one hundred twenty-five km by road from Joka tram terminus. The road runs through adamant Harbour and Kakdwip to Namkhana, where the car o r bus has to be transported across the Hatania-Doania creek in a special ferry. The ferry service is available from 7AM -11PM except from 12 noon till 145PM (lunch hour). The fare for crossbreed a Car/Jeep is approx Rs 160 + Rs 30 toll (including fill/unloading). 33 By bus WBSTC has regular bus service from Esplande to Bakkhali(150 kms).One starts at 7AM in the morning from Esplande and reaches Bakkhali at around 1130AM and leaves from Bakkhali after one-half an hour for Kolkata (Esplande). By train The nearest rail statio n is at Namkhana. There are regular trains from Sealdah via Lakshmikantapur and Kakdwip to Namkhana. The first train starts at around 4AM from Sealdah. Train fare is around Rs 22 and the journey takes around 3 hrs. From Namkhana station you will get a van rickshaw to reach the place from where you need to cross a narrow creek in a small boat. Van fare is Rs 5 per head or Rs 30 if you reserve a van and for crossing the creek you need to pay Rs 1.Then from the bus stand one can get buses for Bakkhali which take around 45mins to 1hr and their fare is Rs 13. The Bakkhali bus stand is very close to all the hotels and just a 5 min walk from the beach. This place is competing with other beach tourist spots Digha, Mandarmani, Sankarpur. It is good for overnight stay. 6. 3 Uniqueness The slope of Bakkhali is towards the sea hence it is less prone to tidal waves. It is not difficult to observe various invertebrate species like crabs, sea animal, starfish etc. , which were observed along the shore line.While bigger crabs live in the dry sand further away from the sea, the smaller ones live in the muddy shores nearer to the sea. Various species l k S of m H l G l H j K k K G . found here. Due to its sandy habitat, Xerophytic vegetation is found here. Also because of its unique flora and fauna, Bakkhali attracts many migratory birds. Its mud banks provide the birds a perfect ground for pasture on the marine invertebrates. For all these natural biodiversity, Bakkhali attracts lots of tourists. 34 The Forest Department maintains a mangrove trail which is also a source of attraction for tourists.This growth of lucrative tourism again attracts not only private Picture 9 Notable Features of Bakkhali Beach investment (hotel business) but also migrants (some people who work in hotels, sells fast food near the beach etc. ) from fringe areas. Such in surge often creates ecological imbalances. Most of the inhabitants in Bakkhali are migrants settled from Midnapore and Bangla desh (although quite a large no of people can be found as aborigine). Both spring &038 neap tides are observed in the region, though the duration of high tide is only a few hours in a day.Coastal landforms include back dunal mudflats, back-swamps coast-parallel older stabilized dune ridges &038 young mobile dunes. Low gradient supratidal and inter-tidal beaches with mud bank, tidal flats etc. &038 onshore bars develop locally in patches in the moist and grim areas. The sand dunes serve an important function by acting as a barrier between the sea and the habitat near the sea thereby protecting them. These notable features of Bakkhali beach are shown in picture 9. 6. 4 Frasergunj, Henry Island and JwambudwipFish trawlers anchor in Frazergunj Fishing Harbour (picture 10) as co-operative fishing is carried out here under Benfish. Dominant species that are harvested in winter are prawn, promfret and marine bhetki. Marine bhetki is the most valuable species because of its consumption a nd medicinal values (liver oil and capsule coating are exceedingly demanded by pharmaceutical industries). Entry fee is imposed to restrict initiation in Henry Island (picture 11). Fresh water aquaculture (b ) .T f we can get an overview of the mangrove canopy. Jambudwip is a deserted island where drying of fishes is practiced (sutki industry).This is mainly an exportation industry which leads to high export earnings. 35 Picture 10 Frasergunj Picture 11 Henry Island 6. 5 Floral Diversity at Bakkhali &038 Henry Island (picture 12) Name Scientific Name Location Characteristics Use-Values Gewa Excoecaria agallocha Leaves become orange when kinda mature. The timber is used for making wood-charcoal and fire-crackers. Kankra Bruguiera gymnorrhiza Rhizophora apiculata Blume Aegiceras corniculatum West Bengal Govt. Forest Range, Bakkhali. Do. Do. It has breathing roots. Do. It bears small white flowers. Do. Pneumatophores are prominent. Three types of Baen a) Piyara Baen. b) Kalo Baen. ) Sada Baen. Garjan Kholshi. Baen. Avicennia alba Blume(kalo baen) Avicennia marina (Forsk. ) Vierh. (piyara baen) Chionlata. Goran. Do. Hargoja. Acanthus illicifolius Do. Hental. Phoenix paludosa Roxb. Casuarina sp Famous for good-quality nectar, yielding good quality honey. Source of animal fodder. In humans, it has medicinal use as an antidiabetic. Do. Eucalyptus. Ceriops tagal (Perr. ) Robinson(Motth goran) Eucalyptus obliqua Do. Jhau It has red flowers. It has long and thin thorns. Types of GoranMotth Goran,Jelly Goran. Exotic species from Australia. It has a long, white trunk. Do. It is a shrub having small and sharp thorns.It has thin and long thorns, looks like a short palm. It has long slender leaves. Do. 36 Used in paper &038 textile industry, also has medicinal values. Provides a camouflaging background for tiger. The dry leaves are used as fuel for cooking. Golpata. Nypa fruticans (Thunb. ) Wurmb. Do. Looks like a short palm tree. Leaves are used as thatching material. Pi cture 12 Floral Diversity at Bakkhali &038 Henry Island 6. 6 Faunal Diversity at Bakkhali &038 Henry Island (picture 13) Name Scientific Name Category Location Characteristics Green Bee Eater Rufous Treepie. Whimbrel. Avifauna (Aves) Do. Green in colour with a long slender beak.White-throated Kingfisher. Spotted deer estuarial crocodile. Hermit crab. Do. Sea Beach, Bakkhali. W. B. Forest Range, Bakkhali. Sea Beach, Bakkhali. W. B. Forest Range, Bakkhali. Do. Do. Do. Axis axis Mammal. Reptile. Arthropod. Red Crab. Ocypode sp. Do. Sea Beach, Bakkhali. Do. Sand-bubbler crab. Fiddler crab. Dotilla sp. Do. Do. Uca spp. Do. Marine worm. Diopatra cuprea Annelid. Sea Beach, Bakkhali. jumper lead fish. Jelly fish. Asterias sp. Metridium sp. Echinoderm. Cnidarian. Do. Do. 37 Long tail with black, brown &038 white colours. curve beak, white &038 brown in colour. Colourful (blue,red) with red long beak,built for detective work fishes.