Thursday, November 28, 2019

Black Representation in Postbellum Era Art Followi Essays

Black Representation in Postbellum Era Art Following the abolition of slavery in 1865, it took a substantial amount of time for the representation of African-American people in American art to establish itself beyond the grotesque and the caricatured. Before slavery and the plantations were outlawed due to the civil war, American representation of blacks were shown as cartoon caricatures; as generic, racial stereotypes with no individuality of their own. This is demonstrated by a number of artworks prevalent at the time. Blackness was either relegated to the sidelines of the paintings, sculpture and engravings, or else excluded completely from the image. And although the outlawing of slavery was done in order to generate equality and liberty across the United States, racism was still prevalent, and it would also take some time before the actual identity of blackness in the United States managed to transcend that of an oppressed, racial stereotype, and began to take on and repr esent a history and a culture of its own, instead of merely providing the negative for the representation of whiteness. A great many critics argue that this breakthrough was made ironically by a sculpture made and funded by white people, in the Shaw's Memorial by Augustus Saint-Gaudens. Despite Saint-Gauden's obvious inclinations towards racial stereotyping in words (his memoirs justify this statement), thanks to a number of coincidences, his artistic credibility, and the amount of time he was given to produce this sculpture, he managed to represent blackness not as caricatured, but as a disparate but unified whole. But some critics of the Shaw Memorial still uphold the belief that it is inherently racist. In the following essay, I will look briefly at the history of black representation in the art of post-bellum America, than engage in a closer analysis of the Shaw Memorial, in order to see exactly what is being represented and how. Monumental sculpture in partic ular had a great history in providing people with allusions to the real, held as less of an illusion than the representations made in other arts, such as painting. The representation of Apollo in the famous sculpture had provided people with a benchmark for human aesthetic beauty for thousands of years, and sculpture seemed conducive to the production and the replication of this ideal human form. This has serious implications for the evolution of how Black American slaves in postbellum America were represented. Kirk Savage suggests that: "Sculpture's relation to the human body had always been more direct and intimate than painting's: the sculptor's main task was not to create illusions on a flat surface but to reproduce three-dimensional bodies in real space." HYPERLINK https://www.ukessays.com/essays/arts/black-representation-postbellum-era-4787.php \l _ftn1 [1] Additionally, because of the importance by which public sculpture was held at the time, as a monument dedic ated to, rather than imposed upon the community, the development of a realistic representation of the African American body in the art of the time is not to be underestimated. Savage goes on to say: "The sculpture of antiquity thus became an authenticating document of a normative white body, a 'race' of white men." HYPERLINK https://www.ukessays.com/essays/arts/black-representation-postbellum-era-4787.php \l _ftn2 [2] The fair representation of blackness in sculpture was therefore central to the cause of representing blackness as equal in America. However, it would still be some time before the representation of the hero would be anything but white. This white hero occurred on both sides of the slavery divide, as those from the South would paint a picture of the generous, selfless plantation owner, whereas those from the North would paint an equally white picture of figures fighting for the liberty of black slaves. From the Journal of Popular Culture: "In the postb ellum reminiscences, a slaveholder's chivalric spirit was manifested through feats of selfless generosity." HYPERLINK https://www.ukessays.com/essays/arts/black-representation-postbellum-era-4787.php \l _ftn3 [3] Also, representations of the South didn't differ: "refusing to concede an exclusive grant of heroic title to the friends and relatives of slaveholders, those who had gloried in the 1865 Union victory demanded an equal chance to create their own champions of popular culture. In the manner of their southern counterparts, they sought to 'rescue from oblivion' the 'true' history of an 'unpretending, liberty-loving and Christian people.'" HYPERLINK https://www.ukessays.com/essays/arts/black-representation-postbellum-era-4787.php \l _ftn4 [4] So, despite

Sunday, November 24, 2019

Use Elegant Variation in Your Resumé

Use Elegant Variation in Your Resumà © Use Elegant Variation in Your Resumà © Use Elegant Variation in Your Resumà © By Guest Author This is a guest post by Debra Wheatman. If you want to write for Daily Writing Tips check the guidelines here. W. Fowler coined the term â€Å"elegant variation† to denote the unnecessary use of synonyms to denote a single thing.   One of his examples was a newspaper excerpt in which the writer referred to the same person, the King of England, as Emperor, His Majesty, and the Monarch.   Fowler’s objection to this kind of â€Å"elegant variation† was that â€Å"the effect is to set readers wondering what the significance of the change is, only to conclude that there is none.† When it comes to drafting a strong resumà ©, elegant variation is not only acceptable, but desirable. Your resumà © is a marketing document. The product being marketed is you. The death knell of any marketing campaign is boredom. Boring products don’t sell. If your resumà © comes across as uninteresting, so do you: you probably won’t get put in the short pile; you probably won’t get interviews, and someone with a more exciting resumà © will get the job. Many resumà ©s use the same verbs and phrases over and over again. You can use â€Å"elegant variation† to engage the reader with the use of compelling, absorbing, engrossing, gripping, riveting, and fascinating action verbs and descriptive words. Here are some examples of â€Å"elegant variation† in action – Why say â€Å"led† when you can claim to have spearheaded, propelled, pioneered, orchestrated, officiated, optimized, instituted, inspired, headed, governed, enacted, directed, crafted, controlled, championed, built, or supervised. Why say you â€Å"developed† something when you can use cultivated, advanced, evolved, fostered, amplified, promoted, expanded, actualized, refined, augmented, enriched, extended, magnified, or strengthened. Why â€Å"handle† something when you can address, advance, alter, apply, centralize, compile, conduct, construct, coordinate, determine, execute, exhibit, formalize, govern, oversee, or establish it. Obviously, these words cannot and should not be substituted without understanding context and nuance. It behooves you to spend the time to find alternates whenever possible. There are numerous tools that can help your resume be more stimulating. I have a dog-eared and coffee-stained copy of Roget’s International Thesaurus. This book was a gift from my father when I was in college and is still without a doubt, the most useful resource for writing – period. When I am writing for clients, including business documents, resumà ©s, and cover letters, I keep this book very close by to help me identify synonyms to avoid repeating the same words over and over. The Internet is a wonderful source of new words to use in your career documents. Some examples that I use regularly are dictionary.com and visualthesaurus.com. Job descriptions can provide a plethora of phrases and key words that you should review. Part of what draws the attention of a hiring manager is the use of key words that are related to the job vacancy. It is very easy to identify positions online; review the roles in connection with your rà ©sumà © so you can create some compelling content as you draft your document. Employ some creativity when creating your focused, succinct, cogent, inspirational, targeted, exceptionally results-focused rà ©sumà ©. (How’s that for a few adjectives?) Entice your reader with a taste – not the plate of what you have to offer! Debra Wheatman is a human capital management strategist and the founder of Careers Done Write, a career services firm. Debra is also the Career Doctor, a career advice blog for business leaders and executives. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Business Writing category, check our popular posts, or choose a related post below:Comma After i.e. and e.g.75 Idioms and Expressions That Include â€Å"Break†Sentence Adverbs

Thursday, November 21, 2019

The problem is lack of 60% parental involvement at a local elementary Essay

The problem is lack of 60% parental involvement at a local elementary school negatively affects the academic success of the students - Essay Example This research project examines the importance of parental involvement as well as the consequences of their lack of involvement in their children education. Parental involvement in the education of their children is undoubtedly of great significance in the academic achievement of the student. This paper also investigates the reasons as to why some parents don’t get fully involved, as it has been observed that not all parents participate actively in the education process of their children. The ways through which schools and teachers can have parents get involved actively in educating their kids at home is also closely examined in this paper. Chapter one examines the background of the proposal topic (Lack of Parental Involvement in Education and how it affects children and their academic success) by bringing out the statement of the problem. The purpose of the study and research questions has also been stated. In chapter two the secondary information relating to parental involvement in their children’s academic process has been examined and related to the performance of the child. This has been based on the previous studies carried on the topic. As observed by Bryan (2005) it is very likely for student to perform below their potential if parents are not actively involved in their academic progress. However, despite this problem parents as seen still not to be fully involved in their children school activities. As revealed by Wanat (1992), this problem is mainly as a result of lack of time or expertise in the side of the parent. This project will involve a population of students from both junior primary and senior classes so as to compare the involvement across the levels. Parents’ involvement is basically thought to be more intense with younger children and reduces as the children grow up and move up through the academic ladder (Dixon, 1992). The selection of the population shall be done carefully to

Wednesday, November 20, 2019

Power and Privilege Homogeneous Choice Essay Example | Topics and Well Written Essays - 1000 words

Power and Privilege Homogeneous Choice - Essay Example Additionally, we all have a natural desire to preserve those parts of us that are unique or particularly cherished, and pass them on to our progeny. While racism and prejudice are always an unacceptable approach to our differences, there should also be an allowance for individuals to interact positively with one another while preserving their own culture, traditions, and values. I believe that it is possible to truly respect the differences between individuals and cultures, while retaining the natural comfort level found in individual association with those of similar background and world view. I call this homogeneous choice. As an individual, I am naturally aware of the differences between myself and others. Whether those variations are cultural or behavioral, I know that I can face a personal dilemma as I react to those differences; I can choose to accept them or oppose them in some way. In his article on the subject of diversity, David Brooks points out that it is in my nature to be around others like myself, and that I have the power to organize my life so that my contact with people radically different from me is limited (Brooks 31). That does not make me, however, an opponent of integration or a racist; it doesn't even mean that my personal choices are necessarily intentional. Things like personal comfort tend to occur absent specific and directed analysis, and my respectful reaction to others of different cultures can similarly be natural and uncomplicated. If I like a particular individual, regardless of cultural background, I simply like them. I don't sit around trying to analyze why I like them or what it is about them that makes them likeable; I just know that I am comfortable with them. Similarly, there are people for whom I don't especially care and that discomfort has nothing to do with race, creed, color, or any of the other common prejudicial points of view. I can respect the individual, even though I am not comfortable being around them every day, without being driven by prejudice against their culture; and that is the point. The nexus of these ideas can be articulated one word: Respect. If my responses to the differences in people I meet, and their unique way of perceiving the world, are respectful of their point of view, I can avoid a negative perspective that includes prejudice or racism. Different isn't bad, it is just different. Neither do I have to embrace all of the differences I encounter, or even like them, and include them in my choices for frequent association. I can respect my own perspective as a valid point of view, and extend that same consideration to the people I meet. The guiding principle for me, as for most other people, is personal comfort. I am naturally more comfortable with certain cultures than others, especially my own. As Brooks points out, people are "finding places where [they] are comfortable and where [they] feel [they] can flourish" (30). While he goes on to lament the lack of diversity in American culture, I don't think that it is appropriate to force people out of their personal comfort zones to accomplish a specific diversity goal. In America, the freedom of association is a constitutional right, and for good reason. Individual freedom is about flourishing within a chosen environment and I should be allowed to make those choices that promote my

Monday, November 18, 2019

Calorie Management Coursework Example | Topics and Well Written Essays - 250 words

Calorie Management - Coursework Example he input variable, Y, is obtained from calorific calculator and is known to be affected by age, gender, body activities, weight as well as height of the person (Klingensmith & American Diabetes Association, 2003). The final step involves making a comparison based on the analysed data from the two input caloric. The comparison will present two important cases: 2. Where the value of X variable exceeds the value of Y, then we should compute other explanatory variables M, N and O. Where: M= X-Y, N=M/K and O=N, and K is a constant figure valued at 3500. M, therefore, explains a case where more calories are taken in than expended while N-pounds or O-ounces might have been gained. 3. Where the value of Y variable is greater than X, we again compute M, N and O to act as our explanatory variables. With this regards, M=Y-N, N=M/K while O=N. M=Y-X means that the individual expand more calories than he/she consumes where N-pounds and O-ounces might have been lost. All the data and information on that particular individual is then stored in the computer memory to help monitor the person’s health standards in a given

Friday, November 15, 2019

Drug Target for Pathogenic Amoebae

Drug Target for Pathogenic Amoebae Horizontal Gene Transfer of a Chlamydial tRNA-Guanine Transglycosylase Gene to Specific Algal and Protozoan Lineages: A Putative Drug Target for Pathogenic Amoebae Abstract: tRNA-guanine transglycosylases are found in all domains of life and mediate the base exchange of guanine with queuine in the anticodon loop of specific tRNAs. They are also known to regulate virulence in bacteria such as Shigella flexneri, which has prompted the development of drugs that inhibit the function of these enzymes. Here we report a group of tRNA-guanine transglycosylases in eukaryotes (algae and protozoa) which are more similar to their bacterial counterparts than previously characterized eukaryotic tRNA-guanine transglycosylases. In silico analysis of these bacterial-like tRNA-guanine transglycosylasesrevealed thatthe majority are predicted to be targeted to mitochondria, although some are likely to localize to chloroplasts, the secretory pathway or the cytosol. We provide evidence demonstrating that the gene encoding theseenzymes was acquired by these eukaryotic lineages via horizontal gene transfer which from the Chlamydiae. Given that the S. flexneri tRNA-guanine trans glycosylase can be targeted by drugs, we propose that the bacterial-like tRNA-guanine transglycosylases could potentiallybe targeted in a similar fashion in pathogenic amoebae that possess these enzymes such as Acanthamoeba castellanii. Keywords: mitochondria, tRNA-guanine transglycosylase, queuine tRNA-ribosyltransferase, horizontal gene transfer, tRNA, queuosine, Chlamydiae Abbreviations: TGTase: tRNA-guanine transglycosylase E-TGTase: Eukaryotic tRNA-guanine transglycosylase B-TGTase: Bacterial tRNA-guanine transglycosylase BL-TGTase: Bacterial-like tRNA-guanine transglycosylase HGT: Horizontal gene transfer Introduction Base modification of tRNAshas been implicated in tRNA structure, aminoacyl tRNA synthetase interaction andinfluencing codon-anticodon basepairing[1]. The function of the modification will depend on itstype and the position of the modified base. For example, most bases that are modified within the anticodon loop (positions 34-36) of tRNAsare important for accurate translation by facilitating interactions with their cognate codons in mRNAs [1]. One such modification that influences codon-anticodon basepairingis the incorporation of queuine within the anticodon loop. Queuosine is a modified guanosine analogue found in tRNAs from all three domains of life.Despite its wide phylogenetic distribution, queuosine is only found in a select group of tRNAs (tRNAHis, tRNAAsp, tRNATyr and tRNAAsn) [2].Reduced incorporation of queuosine in these tRNAs alters their codon recognition ability and has been linked to various cancers [3,4]. tRNA-guanine transglycosylases Queuosine modification of tRNA is mediated by tRNA-guanine transglycosylases (TGTases)(also known as queuine tRNA-ribosyltransferases). TGTases catalyze this modification via base exchange where the guanine at position 34 of the tRNA is post-transcriptionally removed and substituted with queuine or a queuine precursor [5].Eukaryotes are not capable of de novo queuine synthesis but acquire it through diet or their gastrointestinal microbiota [6].After its acquisition, the eukaryotic TGTase (E-TGTase) mediates the replacement of guanine with queuine in the anticodon loop. In contrast, queuosine modification of bacterial tRNA is more complex. Prokaryotesuse GTP-cyclohydrolase-like enzymes tosynthesizea queuine precursor(e.g. preQ1) from GTP. The bacterial TGTase (B-TGTase) then mediates the base exchange with guanine to incorporate preQ1, unlike E-TGTases that use queuine itself as the substrate.This incorporatedpreQ1 is then modified by S-adenosylmethionine tRNA ribosyltransferase to e poxyQ, which is further modified to form queuosine [6].In addition to tRNA modification, B-TGTasesplay a role in regulating the expression of bacterial genes.TGTase mutants (vacC) in the bacterium Shigella flexneri exhibit reduced expression of the virG and ipaBCDgenes, which encode virulence factors that facilitate the spread and invasion of the pathogen [7]. This is a result ofthe VacCTGTase beingrequired to modify a single base in virF mRNA, which encodes the transcriptional activator ofvirG and ipaBCD[8].Thus, B-TGTases can modify substrates otherthan tRNA and are important mediators of bacterial virulence. As a result, B-TGTases have served as a targetfor the development of drugs that interfere with their function [9].Here we report a new group of TGTases in eukaryotes that display significantly greater similarity to B-TGTases than E-TGTases. We hereby refer to these proteins as bacterial-like TGTases (BL-TGTases).In silico analysis identified 25 BL-TGTases in distinct protozoa n and algal lineages and the reason for their similarity to B-TGTases is explored in this article. Variation in the subcellular localization of bacterial-like tRNA-guanine transglycosylases To investigate the putative subcellular localization of BL-TGTases, three bioinformatic programs were utilized: Mitoprot [10], Predotar [11] and Target P [12]. The putativelocalizationfor each BL-TGTase was supportedby predictions from at least two of the three programs.Most BL-TGTases possess N-terminal mitochondrial targeting signals (Table 1), suggesting a role in modification of mitochondrial tRNAs.Interestingly, the BL-TGTases from Ostreococcus lucimarinus and Chondrus crispus were predicted to localize to mitochondria with one program (Predotar) but to the plastid with another (Target P). While it is possible that these two proteins may localize to both organelles, further experimentation is required to elucidate their subcellular locations. The BL-TGTase from the diatom Phaeodactylum tricornutum was predicted to localize to the endoplasmic reticulum (ER) of the secretory pathway, indicating it maymodify other substrates in this organelle. Bacterial-like tRNA-guanine transglycosylase genes originated from a Chlamydial gene acquired via horizontal gene transfer While the localization of BL-TGTases varied, all 25 of the proteins exhibited higher levels of amino acid similarity to B-TGTases despite their existence in eukaryotes. A Bayesian analysis of phylogeny using MrBayes [13] withBL-TGTases,B-TGTases and E-TGTasesconfirmedthis similarity(Figure 1).The BL-TGTases were most similar to TGTases from members of the Chlamydiae.In fact, the Chlamydial TGTases were more similar to BL-TGTases than other B-TGTases. Given that Chlamydiaeare bacteria, the topology of the tree in the present study is incongruent with the universal tree of life. Instead, this topology is consistent with a horizontal gene transfer (HGT) event. That is, the genes encoding BL-TGTases originated from a Chlamydial TGTase-encoding gene that was acquired via prokaryote-to-eukaryote HGT. In addition to the strong statistical support for the BL-TGTase-Chlamydial TGTase sister group, there are several other factors that support this notion. The Chlamydiaeare known to be major contributors of genes to several eukaryotic genomes via HGT [14,15]. This includes genes encoding tRNA modification enzymes such as the Chlamydial tRNA guanine methyltransferases found in protozoa, diatoms and algae[16,17] and Chlamydial tRNA genes in vascular plants [18].Similarly to the present study, sister groups were observed between the Chlamydial and the horizontally acquired eukaryotic genes in these cases. Lastly, the majority of eukaryotic lineages in which we identified BL-TGTases have previouslybeen reported to possess HGT-derived genes acquired from the Chlamydiae[16,19]. Thus, the notion that BL-TGTases resulted from the acquisition of a B-TGTase from the Chlamydiaevia HGT in eukaryotes is highlyplausible. Indirect acquisition of a Chlamydial tRNA-guanine transglycosylase in protozoa via anon-Chlamydialbacterial intermediate Interestingly, a B-TGTase sequence from the ÃŽ ´-proteobacterium ‘Candidatus Babela massiliensis’clustered with the BL-TGTases of protistsrather than the B-TGTases (Figure 1). Although the protozoan BL-TGTases displayed similarity to Chlamydial B-TGTases, the possibility of a HGT event from ‘Ca. B. massiliensis’to protistswas present. SinceChlamydiae and ÃŽ ´-proteobacteria are not closely related, the phylogeny of their B-TGTases was investigated. Interestingly, the ‘Ca. B. massiliensis’TGTase clustered with the Chlamydial TGTase clade rather than other ÃŽ ´-proteobacterial (Pelobacter, Geobacter, Myxococcus, Desulfobulbus) B-TGTases (Figure 2). ‘Ca.B. massiliensis’and members of the Chlamydiae are found as obligate intracellular symbionts of protists such as Acanthamoeba, Dictyosteliumand Naegleria [20,21]. The presence of both of these bacteria within the one eukaryotic cell would provide the ideal conditions for HGT between them. Therefore, it is likely that at least two independent HGT events have occurred:1) The Chlamydiae donated a TGTase-encoding gene to an ancestral ‘Ca.B. massiliensis’species; and 2) ‘Ca.B. massiliensis’then donated this gene to theAmoebozoa and Heterolobosea.How the BL-TGTase genes were acquired in the algal lineagesremains to be elucidated, but may have occurred via additional HGT events (either prokaryote-to-eukaryote or eukaryote-to-eukaryote). Bacterial-like tRNA-guanine transglycosylases as drug targets for pathogenic amoebae In addition to their role in queuosine modification of tRNAs, TGTases are important for S. flexneri virulence [7,8].As a result, studies have focused on the development of TGTase inhibitors that specifically target the S. flexneri B-TGTase to treat shigellosis,while the E-TGTases of the human host remain unaffected. Some of these inhibitors,such as lin-benzoguanine,function by occupying the binding site for preQ1[22,23].While most eukaryotic species that possess BL-TGTases are non-pathogenic, we identified a BL-TGTase in Acanthamoeba castellanii, the causative agent of amoebic keratitis and encephalitis.Naegleria gruberi, whichalso has a BL-TGTase, is non-pathogenic, but is closely related to Naegleria fowleri, the etiologic agent of primary amoebic meningoencephalitis, which may possess an unidentified BL-TGTase. Given the development of B-TGTase inhibitors has already been achieved, the BL-TGTasesin pathogenic eukaryotes could also potentially be targeted with the same drugs. Alter natively, new inhibitors could be developed following resolution of the BL-TGTase crystal structure. To confirm BL-TGTases as a putative drug target future research should attempt to characterize these proteins and determine if they have retained their prokaryotic functions and mechanism of action. Concluding remarks In this report, we have described a group of TGTases in algae and protozoa (BL-TGTases). Theseproteins are predicted to localize to various subcellular locations including mitochondria, chloroplasts, the ER and the cytosol, depending on the organism. Lastly, we showed that via multiple HGT events, BL-TGTases were originallyfrom bacteria of the Chlamydiae lineage. The bacterial origin of these proteins could be exploited in the development of drugs similar to those synthesized for the S. flexneri B-TGTase. Research into the identification and synthesis of BL-TGTase inhibitors may provide a novel treatment for infectious diseases which are caused by pathogenic amoebae that possess these proteins.

Wednesday, November 13, 2019

Illinois Michigan Canal is Responsible for Chicagos Size Essay

"Didn't expect no town" -Early Chicago Settler Mark Beaubien The I & M Canal is universally considered the driving force behind the huge surge of growth that turned the tiny settlement on the banks of Lake Michigan named Chicago, in to a huge metropolis and bustling center of trade. Ever since Joliet first crossed the portage between the Chicago River and the Des Plaines River in 1673, explorers, investors, politicians, and farmers alike all agreed that constructing a canal across the continental divide could benefit them greatly. The canal would connect the two largest water systems in the United States, creating a continuous waterway between New York and New Orleans, but more importantly, place Chicago on perhaps the most valuable piece of real estate in North America and in the position to become an international city almost overnight. The plans to build the Illinois & Michigan canal began in the newly started Illinois legislature in 1818. It was driven forward by the new construction on the Erie Canal in New York. Once the Erie Canal was complete only a canal between the Des Plaines and Chicago rivers would be necessary to complete the chain of waterways connecting New York to New Orleans. In 1822, Congress gave Illinois a large portion of land on which to not only build the canal, but to sell to raise funds for its construction. The land contained the portage between the two rivers and about 100 miles of land to the south and west of it. It had just recently been coercively and dishonestly purchased from the local Blackhawk Indians in a treaty that ended the Blackhawk War. As soon as the Erie Canal was completed in 1825, eastern investors quickly realized Chicago's huge potential. The land around what would one ... ...ys to twelve days. The canal remained a profitable enterprise until the year 1866 when the newly completed railroad system proved to be a cheaper and more efficient alternative. Use of the canal did not disappear however until around 1900 when it began to fall into disrepair. The final deathblow to the Illinois & Michigan came when the big, wider, and deeper Illinois Waterway was completed in 1933. However, though no longer in commercial use, the Illinois & Michigan canal remains as a source of recreation and will forever be remembered as the spark responsible for Chicago's leap to prominence. In 1833 the population of the newly incorporated town of Chicago was 250 people, by 1854, only 20 years later, the population had swelled to over 75 thousand. The city of Chicago had ascended from a tiny trading outpost to a thriving metropolis at an unprecedented speed.

Sunday, November 10, 2019

Religion and Terrorism

Terrorism has long plagued the existence of peace and security in society, where secular groups have resorted to violence against non-combatant targets in order to influence the policies of a governmental or nongovernmental organisation. The concept of terrorism, whilst elusive and vague in definition has been categorised into various forms of terrorism, these being dissident, state-sponsored, and religious terrorism to name a few.This paper will argue that the most dangerous form of terrorism is religious terrorism. To deliver an effective argument this paper has been divided into three sections; the first will argue that the most dangerous form of terrorism is religious terrorism by examining what it is, how it is dangerous, and why it is more dangerous than other forms of terrorism.Secondly, this paper will argue that the most dangerous proponent of religious terrorism is the organisation of the Taliban, to support this claim; an analysis of the group will be given, including back ground information, information on the Taliban’s policies and recent activities, and the threat this groups poses on the international community. Lastly, this paper will analyse and critique the current governmental policies combating terrorism, and will then provide policy recommendations which could be implemented by governments, militaries or NGO’s.The justification for this paper is simply that the validation of religious terrorism as the most dangerous form of terrorism will allow for effective international coordination towards combating terrorism. Various parameters of study were encountered in the process of this paper as there is much contention on which is the most dangerous form of terrorism, which gave way to biased opinions and misleading quotations regarding factual information on various organisations implementing terrorist tactics, namely the Taliban.Although the concept of terrorism has no definition which is universally agreed upon, the notion of reli gious terrorism has been defined by Bruce Hoffman (1999), where religious terrorism must have three factors; â€Å"the perpetrators must use religious scripture to justify their violent acts or gains recruits; clerical figures must be involved in leadership roles; and apocalyptic images of destruction are seen by the perpetrators as necessary†.Religious terrorism has arguably been an ongoing occurrence in contentious religious areas for centuries, where religious groups have resorted to violence against non-combatants in order to combat real or perceived threats to their own ideology (Alexander, 1994). Debate on the original terrorist aside, terrorism is quite a modern concept stemming from the French Revolution and the Reign of Terror prompted by Maxmilien Robespierre who targeted the â€Å"enemies of liberty† indiscriminately in the ideology of the â€Å"greater good† (Cooper, 2004).Religious terrorism is thought to be caused by the misinterpretation (or funda mentalist belief) of religious scripture, however the belief in religious scripture is not the problem; it is only when these fundamentalist individuals act on their beliefs through violent means and justify their actions using religious scripture that we encounter the potential threat of terrorist tactics (Mendelsohn, 2009). Furthermore, this fundamentalist behaviour is only worsened when a threat to the religious ideology is perceived (Mendelsohn, 2009).Religious terrorism is reasonably widespread throughout the Middle East, and Southeast Asia, predictably this may be due to the religious zeal in these regions (Alexander, 1994). A United Nations report (August, 2010) showed that 76% of all casualties (in the first six months) in Afghanistan and Pakistan were attributed to the actions of the Taliban and their associate organisations, showing the danger associated with religious terrorism.Although religious terrorism has â€Å"become the predominant model for political violence in the modern world† (Martin, p 171, 2010) it is still not the only medium for extremist violence, as nationalism and ideology still remain strong motivators for radical violence (Martin, 2010). However, religious terrorism still remains a more dangerous form of terrorism when compared to other forms, such as state-sponsored or dissident terrorism. The factors which make this form of terrorism dangerous is the potentially apocalyptic ideology of religion, and furthermore the promise of an ethereal paradise awaiting those who follow this faith completely.This factor seems to provide a motivation arguably more influential towards violent behaviour then other forms of terrorism. Bruce Hoffman (p 92, 1998) stated that â€Å"it is perhaps not surprising that religion should become a far more popular motivation for terrorism in the post-Cold War era as old ideologies lie discredited by the collapse of the Soviet Union and communist ideology, while the promise of munificent benefits fr om the liberal-democratic, capitalist state†¦ fails to materialise in many countries throughout the world†. A stronger motivation for terrorism signifies that more violent activity, and at a higher requency, is to be expected from religious terrorism than state-sponsored or dissident terrorism. In recent times, the frequency, scale of violence, and global reach of religious terrorism has been increasing, while at the same time a decrease in secular, non-religious terrorism has been occurring (Martin, 2010). The fact that religious terrorism provides a stronger motivation is more widespread, causes more casualties than any other form of terrorism, and is increasing in frequency, scale of violence, and global reach, is reason enough to argue that religious terrorism is the most dangerous form of terrorism.Evidence of religious terrorism may be seen in the various attacks conducted on non-combatants throughout 2011. For example, on the 13th of May 2011, two suicide bombers w ere responsible for 80 deaths in Shabqadar, Pakistan, the attacks were claimed by the Taliban and were labelled a response to the death of Osama bin Laden on the 3rd of May 2011 (The Guardian, 13/5/11). Another example may be seen in the terrorist attacks in Somalia on the 4th of October 2011, claiming over 70 lives and injuring many more, the Islamic militant terrorist group Al-Shabaab soon claimed responsibility for the attack.The attacks categorised as religious terrorism predominately occur throughout the Middle-East and Southeast Asia, with the most contentious areas being Afghanistan, Pakistan, and India (Mendelsohn, 2009). To examine Pakistan individually, this region has become a trouble-spot for terrorism resulting in a largely contentious area. The terrorism occurring in Pakistan is predominately religious, resulting in over 350000 Pakistani civilians killed as of 2010 (New York Review of Books, 2011).Pakistan has a long history involving religious conflict, and although m any attempts have been made by the Pakistani government to resolve these conflicts, there is no sign of the conflict coming to an end. The fact that Pakistan is not an overly wealthy nation has contributed to the effectiveness of religious terrorist recruiting, as when individuals have nothing to lose they invest in religious ideology (Mendelsohn, 2009). Although there are many religiously based terrorist organisations, the Taliban is arguably the most dangerous proponent of religious terrorism.It is important to understand the origins, policies, methods, and other information on the organisation before effective policies can be implemented to combat the Taliban’s terrorist tactics. The Taliban is an Islamist militant organisation which has had rule of the majority of Afghanistan from September 1996, however the Taliban-formed state called the ‘Islamic Emirate of Afghanistan’ only gained political recognition as a state from Pakistan, Saudi Arabia and the UAE (Mo ckaitis, 2007).However, the attacks on the USA on the 11th of September 2001 saw the Taliban overthrown during the conflict in Afghanistan. The Taliban regrouped and drafted an insurgency movement to oppose the newly formed ‘Islamic Republic of Afghanistan’, and to achieve their motives the use of guerrilla and terrorist tactics were applied (Mockaitis, 2007). Whilst in power the Taliban enforced an extremely strict interpretation of their holy scripture, becoming notorious in the international community for the poor treatment of women (Mockaitis, 2007).This fundamental following of Holy Scripture and Islam law has seen the Taliban use Holy Scripture to justify their violent actions. Whilst not much is known about the leader of the Taliban, Mohammed Omar, a 25 million dollar reward has been issued by the US department of defence for his capture. The policies of the Taliban were initially to disarm Afghanistan, end the lawlessness and heavily enforce the Islamic or Shari a law on the entirety of Afghanistan (Mendelsohn, 2009).The Taliban have been relatively successful in bringing law and order to around 85% of the country in their control, mainly by disarming or conscripting the tribes of Afghanistan (Mockaitis, 2007). Some of the Taliban’s relentless policies and unyielding nature on issues such as the treatment of Osama bin Laden have isolated them internationally resulting in non-recognition by the United Nations regarding their legitimacy, and the imposition of political sanctions aimed at denying the Taliban any funding or aid (Mendelsohn, 2009).As of yet, the Taliban have failed to develop any plan or policy to revive the state of Afghanistan should they retake political control. The methods or tactics utilised by Taliban forces has predominately been a guerrilla struggle against Western forces, however the use of terrorism has brought much notoriety to the organisation itself. However the question of funding is important, how does the Taliban receive its funding? Twelve percent of Afghanistan lives off the opium trade, which constitutes 30 percent of its gross domestic product (Schmidt, 2010).Whilst the Taliban gain finance through the sale of opium and poppy, the decrease in production of poppy would not work against the Taliban, through simple economics this organisation is able to manipulate opium prices which have seen a downward spiral over the past 5 years due to an over-supply of poppy and opium (Schmidt, 2010). Estimations show that the Taliban has stockpiled over eight thousand tonnes of opium in the event poppy production is eradicated by the US government.However the eradication of poppy in Afghanistan would for a short term aid the Taliban as prices would increase exponentially in the face of low supplies, simple economics being exploited by the Taliban (Schmidt, 2010), (UN World Drug Report, 2009). A report given in 2006 analysing the Taliban likened the organisation to a starfish (decentralised org anisation) as opposed to a spider organisation (centralised) (Brafman, Beckstrom, 2006). â€Å"The spider and the starfish both appear to have a number of legs coming out of one body, but that is where the similarity ends.In the case of the spider, what you see is a clear â€Å"head’s head and a leg’s leg. † However, a starfish is entirely different from a spider because the head is not even in charge of anything. In fact, a starfish does not even have a head. If a starfish is cut in half, it does not die. Instead, what you get are two starfish. The long-armed Linckia starfish can even replicate itself from just one piece of an arm. Unlike the spider, having no brain to give the affirmative on anything, the starfish functions as a decentralized network. (Schmidt, p 72, 2010). A table from this report gives a description of the comparison: (See below) The events which occurred on the 8th of August 1998 are evidence to show the danger and lethality of the Taliban and its policies. On the 24th of May 1997 the Taliban occupied the northern town of Mazar-i-Sharif and on the 8th of August 1998 were responsible for an attack which killed over 8000 people of different nationalities including Uzbekistani, and Shiite Iranian (Kelling, Saludin, Von-Feigenblatt, Alis, Shuib, 2010).In this attack the Taliban also attacked the consulate of Iran killing 10 Iranian diplomats, which incidentally generated Iran’s opposition on the political legitimacy of the Taliban (Kelling, Saludin, Von-Feigenblatt, Alis, Shuib, 2010). The Taliban has taken responsibility for countless attacks on both combatant and non-combatant targets, with no signs of a decrease in the frequency of attacks; the Taliban is an extremely dangerous advocate of religious terrorism.The failure of allied forces to subdue the Taliban as of yet has left Afghanistan coloured with destruction, death and poverty. An article in the International Journal of Interdisciplinary Social Sciences accused the US of â€Å"ignoring the hope and prospect of Afghanistan†, by being oblivious and promoting victory over the Taliban in order to justify the war on Afghanistan (Kelling, Saludin, Von-Feigenblatt, Alis, Shuib, 2010).The US policy to use military power against the Taliban and other terror organisations has made it more difficult to find a conclusive solution to the violence in Afghanistan; additionally the weakness of the United States’ new government in Afghanistan failed to bring stability and therefore enhanced the terrorism from the Taliban (Kelling, Saludin, Von-Feigenblatt, Alis, Shuib, 2010). The question left is how we stop the terrorism?Through government, military and NGO policy development, political, management, financial and administrative â€Å"mechanisms† arranged to reach explicit goals. This paper will therefore examine various responses to terrorism, and the policies put in place by major international actors. After September 2001, t he member of the Security Council (UN) adopted a set of comprehensive measures to combat terrorism; they did so under Chapter 7 of the UN charter, thereby making all decisions compulsory for all members (Boulden, Weiss, 2004).Two resolutions were particularly important, these being â€Å"Resolution 1368 of September 12†, which legitimised all military action against a terrorist organisation; and â€Å"Resolution 1373 of September 28 2001† which broadened the scope of international responses (Boulden, Weiss, 2004). Resolution 1373 stated that â€Å"all states should prevent and suppress the financing of terrorism, as well as criminalize the willful provision or collection of funds for such acts†.The purpose of this resolution was to minimize the financing of terrorism and to encourage member states to deny safe haven to known terrorists, assist states in need of anti-terrorism measures, and to accelerate the exchange of information regarding terrorist activity; i n other words this resolution deeply encouraged international cooperation in combating terrorism. While the resolve of the Security Council (UN) is to be commended, four problems are still to be addressed.First, although member states of the UN agree on the importance of combating terrorism, member states continue to have different views on the precise nature of these threats, and different opinions on the appropriate responses to these threats (Boulden, Weiss, 2004). The US should take responsibility and forge a consensus on the nature of the terrorist threat and what an appropriate response would be.If the US takes consideration of other states and develops a genuine international response effort, then this should convince other states that the US is not only concerned for itself but for the international community as a whole (Boulden, Weiss, 2004). Secondly, the long term implications for the Security Council’s resolution regarding the legitimization of force against terro rist organizations are problematic. Permission to use military force without a proper criteria for reason has been seen as handing a â€Å"blank check† to the USA.Although the US argues preemptive action and covert military action is necessary to combat terrorism, the absence of an international agreement on a definition for terrorism can lead to the possibility of abuse of this â€Å"blank check† (Boulden, Weiss, 2004). To solve this issue, the UN should engage member states in a discussion to answer the important questions, â€Å"when are terrorist acts the equivalent of armed attacks? †, â€Å"Do imminent threats of attack always justify a military response? † (Boulden, Weiss, 2004).Third, the issue of finance always seems to plague attempts at combating terrorism. The implementation of the UN’s counterterrorist measures will therefore continue to be difficult unless financial assonance is given by member states. A solution to this problem would be the investment of funds into the Counter-terrorism committee (CTC), this committee would thereby invest funding into state counter terrorism agencies who lack the financial capacity to effectively fight terrorism (Boulden, Weiss, 2004).Fourth, the war against terrorism has been labeled as the â€Å"long war†, and it is true that the effort against terrorism will take time and finance, however there must also be an effort against the root causes of terrorism; poverty, disease, social disorder, unstable governments, etc (Boulden, Weiss, 2004). The UN has a promising track record when dealing with these problems, therefore the investment into social development programs will allow for significant advancements in the effort against terrorism (Boulden, Weiss, 2004).This paper will now offer a list of policy recommendations. In order to combat terrorism effectively, Thomas Mockaitis (2007) suggests there should be elements of four broad tasks present. 1. Anti-terrorism to prote ct military forces, installations and personnel and to assist member nataions in protecting their citizens and infrastructure from terrorist attack. 2. Consequence management to aide member states in mitigating the effects of an actual terrorist attack. 3. Counterterrorism to take offensive action against terrorist organizations, personnel and facilities. 4.Military cooperation with civilian institutions, government and private, to defend against terrorism. Evidently this system of counter-terrorism has been drafted as a military doctrine labeled the NATO Concept, which provides an excellent framework for organizing an effective response against terrorism (Mockaitis, 2007). Below is a chart which illustrates the three core measures of combating terrorism. ‘Consequence management’ refers to the measures taken by local, state, and national departments to prepare for and if necessary respond to a terrorist attack (Mockaitis, 2007). Counterterrorism’ and ‘Antit errorism’ is the offensive military enforcement of operations against terrorists (organisations, networks, and individuals), and the economic, social, and diplomatic measures to combat the root causes of terrorism (poverty, civil unrest, etc) (Mockaitis, 2007). All three tasks require effective cooperation and rely on the intelligence which lies at the centre of the three and helps organise the effort (Mockaitis, 2007). This paper has argued that the most dangerous form of terrorism is religious terrorism.In order to deliver an effective argument, this paper was divided into three sections; first, it was argued that religious terrorism is the most dangerous form of terrorism by examining defining it, examining how it is dangerous, and discussing why it is more dangerous than other forms of terrorism. Secondly, this paper argued that the most dangerous proponent of terrorism is the organisation of the Taliban, supporting this claim was an analysis of the group, giving backgrou nd information, information on the Taliban’s policies and recent activities, and the threat this organisation poses on the international community.Lastly this paper analysed and critiqued the anti-terrorism policy of the UN, and provided policy recommendations for all member states to implement, namely the policies currently implemented by NATO forces. This paper was written in order to legitimise religious terrorism as the most dangerous form of terrorism, thereby allowing for more effective international cooperation towards combating terrorism. This paper can therefore conclude that the most dangerous form of terrorism is Religious Terrorism. References: Alexander, Y. (1994).Middle east terrorism: Current Threats and Future Prospects. International library of Terrorism. England: Dartmouth Publishing Co. Brafman, O. , & Beckstrom, R. (2006). The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations. New York: Penguin Group Hoffman, B. (1998). Inside terr orism. New York: Columbia University Press. Kelling, M. , Saludin, M. , Von-Feigenblatt, O. F. , Alis, M. , &Shuib, M. (2010). Taliban: How it Emerged and why the U. S and Pakistan Failed? International Journal of Interdisciplinary Social Sciences. Martin, G. (2010).Understanding terrorism: Challenges, Perspectives, and Issues. (3rd Ed). UK: Sage Publications Mendelsohn, B. (2009). Combating Jihadism. London: University of Chicago Press. Mockaitis, T. (2007). The â€Å"new† terrorism: Myths and Reality. USA: Greenwood Publishing Group Inc. Schmidt, F. (2010). From Islamic warriors to drug lords: The evolution of the Taliban Insurgency. Mediterranean Quarterly, 21(2), 61-1. doi: 10. 1215/10474552-2010-005 The Guardian. (May 13, 2011). Pakistan suicide bomb kills 80 as Taliban seeks revenge for Bin Laden. Retrieved November 20, 2011 from http://www. uardian. co. uk/world/2011/may/13/suicide-bombing-revenge-osama The New York Review of Books. (2011). Why they get Pakistan wrong. Retrieved from http://www. nybooks. com/articles/archives/2011/sep/29/why-they-get-pakistan-wrong/ United Nations. (August, 2010). Afghan civilian casualties rise 31 per cent in first six months of 2010. Retrieved from http://unama. unmissions. org/Default. aspx? tabid=1741&ctl=Details&mid=1882&ItemID=9955 United Nations Office on Drugs and Crime (UNODC). (2009). World Drug Report. Received from www. unodc. org/unodc/data-and-analysis/WDR. html

Friday, November 8, 2019

Violence in Society †Sociology Essay

Violence in Society – Sociology Essay Free Online Research Papers Violence in Society Sociology Essay Violence exists in many different forms in our society. Unfortunately, many people believe that violence is the most effective way of solving the problems in our world today. It is a horrible resolution but is usually seen as the only option, and results in tragedy. Basically, man has not yet learned from his past mistakes and is not aware that violence just leads to more violence. Violence today accomplishes nothing and is a futile act that shows how many problems our society has. When used as a way to solve problems, violence is very useless. It is a senseless act because instead of resolving situations and trying to be more open minded, people just choose violence and show their intolerance felt for people unlike them. An example of this would be from the movie Mississippi Burning, when the Ku Klux Klan would chase and hunt down innocent black people and then hang them or shoot them. People would get killed just because of their skin colour or cultural beliefs. These kinds of racism and violence have been present since the 1950’s and 1960’s, when they were used constantly. Another example from these times is found in the life of Martin Luther King Jr. who was a preacher who believed in negotiation and peaceful means rather then violence, as shown in the video Martin Luther King Jr. that was viewed in class. He was just a man who was trying to solve the major issue of segregation experienced by the black people. He sought to copy the idea s expressed by Gandhi, which also dealt with peaceful means to solve problems. Tragically, Martin Luther King Jr. soon after was assassinated and murdered. This goes to show how much hatred and violence exists in mankind. Our world is basically run by our society and the people around us. Then what kind of society are we when we use violence against the helpless, and lack any sort of tolerance for those who differ from us? This goes to show us how many problems our society has these days, and has had for the past decades. An example of this would be Hitler, and how he killed off Jewish people to carry out his objective of â€Å"a perfect world† which consisted of blonde hair and blue eyed people (German culture). This kind of terrorism seems sickening and disgusting. However, there are certain types of people who exist in the world that share the same opinion of Hitler. Other examples include the disaster that occurred on September 11th last year. This was an act of terrorism and hatred. Osama Bin Laden was responsible for these terrible acts of violence towards the United States. These atrocious catastrophes have forever altered our sense of security. The usual way of solving problems that deal with violence rather then peaceful means, are not adequate anymore for the world in which we live. People are starting to realize who the â€Å"good† and the â€Å"bad† are. An example of this would be when peace marches with Martin Luther King Jr. would turn into a riot of innocent people running for their lives from the authorities, who mercilessly attack them and abuse them. These pointless acts led the people to finally realize what kind of government they were supporting, and helped them to understand and be more open minded about what was really going on. Thus, violence itself is not a solution to problems. It is more beneficial to society to question whether or not violence is really the answer. Only through thoughtful discussion and the realization that the solution lies in peaceful negotiation, will there be any hope for the future. Research Papers on Violence in Society - Sociology EssayEffects of Television Violence on ChildrenCapital PunishmentQuebec and CanadaWhere Wild and West MeetRelationship between Media Coverage and Social andTrailblazing by Eric AndersonComparison: Letter from Birmingham and CritoBook Review on The Autobiography of Malcolm X19 Century Society: A Deeply Divided EraAssess the importance of Nationalism 1815-1850 Europe

Wednesday, November 6, 2019

Free Essays on Eastern And Western Russia

. Peter was the first to reform and simplify the Cyrillic alphabet used for Russian. In the late 18th and early 19th centuries., partly as a result of the work of the great Russian writer Aleksandr Pushkin, the Russians succeeded in throwing off the dominance of Church Slavonic and in developing their own tongue into a literary language, which was, nevertheless, influenced and even enriched by the Church Slavonic legacy. Literary Russian is based on the dialect used in and around the city of Moscow, which became the leading cultural center of the country in the 15th century. Extensive reforms, aimed at simplifying and standardizing Russian writing and grammar, took place after the Revolution of 1917. Western influence manifested itself though a number of translations and also through the establishment of the first theater in Russia. The Westernizing process was greatly accelerated under the rule of Peter I, and at the same time the Russian alphabet was revised... Free Essays on Eastern And Western Russia Free Essays on Eastern And Western Russia Russia is the world’s largest country by land area, and it ranks sixth in terms of the most densely populated countries. Russia occupies much of Eastern Europe and all of Northern Asia. Because of the fact that Russia is divided by its location within these two continents accounts for the diverse cultural aspects found within the country. This also accounts for the split between East and West, between traditional Russian values and Western influence. These differences may be seen in many ways, some of which include: Russian language, literature, art and architecture, music, and politics. The development of the Russian language is not easily traced historically because until the 17th century, the religious and cultural language of the Russian people was not Russian, but Church Slavonic. When Peter the Great undertook the task to Westernize Russia in the early 18th century, the Russian language was subjected to Western influences and absorbed a number of foreign words. Peter was the first to reform and simplify the Cyrillic alphabet used for Russian. In the late 18th and early 19th centuries., partly as a result of the work of the great Russian writer Aleksandr Pushkin, the Russians succeeded in throwing off the dominance of Church Slavonic and in developing their own tongue into a literary language, which was, nevertheless, influenced and even enriched by the Church Slavonic legacy. Literary Russian is based on the dialect used in and around the city of Moscow, which became the leading cultural center of the country in the 15th century. Extensive reforms, aimed at simplifying and standardizing Russian writing and grammar, took place after the Revolution of 1917. Western influence manifested itself though a number of translations and also through the establishment of the first theater in Russia. The Westernizing process was greatly accelerated under the rule of Peter I, and at the same time the Russian alphabet was revised...

Monday, November 4, 2019

Logbook Essay Example | Topics and Well Written Essays - 1250 words

Logbook - Essay Example The defender is left for dead by the striker but he manages to stick a foot and catches the striker on his right leg and he goes down. In my opinion Mario Ballotelli is a very competitive player with what is known in sports psychology as a NACH personality. He has the in-built desire to succeed in all that he does as a player and has very high levels of motivation. In sports psychology the personality of the player if of importance especially as relates to the mental toughness of the player, self-efficacy and arousal. Self-efficacy is influenced by four main factors and these are vicarious experiences, performance accomplishments, verbal persuasion and emotional arousal (Russell, 2008). Vicarious experiences involves seeing your competitor as someone with the same skill set as yourself or as someone with lower sets of skill therefore enhancing an individual’s confidence that they can be able to achieve and complete their set tasks. Arousal can be defined as an individualâ€⠄¢s cognitive activation and psychological awareness (Singh, 2005). In my opinion Ballotelli exhibits aggression as based on the aggressive cue theory as first proposed by Leonard Berkowitz. The theory seemed to suggest that certain social settings and environment would make acts of aggression acceptable. Therefore I would employ the concept of arousal regulation in sports science .This is where the player uses techniques such as meditation and breathing in order to achieve the optimum cognitive state for maximum results. I would also use the concept of self-talk on the player. The player can use this technique in order to remain calm. Goal setting is a classic coaching principle that can be used in such a situation. I as the coach can set a specific number of matches that he expects the player to go without having any discipline issues (Blair, 2012). In this particular scenario, Alvaro Negredo, the new star player of the team is

Friday, November 1, 2019

The shift by manufacturing and service firms from acting as standalone Essay

The shift by manufacturing and service firms from acting as standalone entities, to being parts of wider networks of firms, may have important implications for - Essay Example The strategy is the choice which leads an outcome, and among different strategies the company chooses the one that suits better with the company and helps in achieving the best. The term "Comparative Advantage" means that the companies shares the best resources with each other in order to provide various prices of the product that provide the edge for the advantage. The last term "Networks of Firms" means that the firms are now trying to adopt the strategy that were similar to the networking of different departments within a single organizations. The networks of firms between different companies are a simple strategy that is used to provide comparative advantage to the companies involved in networking. The new term the roadmaps is now in used in which the different companies across the world adopt the process of networking through which they use to share information's, technologies and different issues related to business in order to provide a standardized product to the world. Usual ly this strategy is adopted in order to provide the quality product at a very low cost as the companies are using the cost-effective strategy. The companies use to share their resources, information's and technology that lower their cost when they work alone. The strategy is used in order to capture the global market with minimum uncertainty. The strategy is not even the cost-effective but also it reduces the time cost. The companies do not need to spend their time in allocating resources and information. From the last few years the departments of a single company is using the techniques of networking. This help in improving the communication levels within the departments and enhance the better management system. Usually this networking helps the prime activities to communicate very efficiently with the support activities. These enhance the quality system and process among the departments. Similar is the case with the roadmaps. The roadmaps development helps in sharing the different resources and information among different companies that enhances the operational cost of each product and provide quality with low price tag on the product. The strategy of roadmaps is only used when you require the standard product and for diversifying the product at global level with minimum uncertainty it is consider that the roadmaps strategy works very well. Starting our main topic, the Roadmaps, it is very similar to the networking of different departments. But the only thing is that developing the roadmaps is very complicated and complex process and need a lot of time in developing the different phase of the roadmaps. The roadmaps development is divided in three phases. While description of these phases we are using the simple ways rather making it more complex. The very first step or phase is the preliminary which itself consist of three phases or steps. The very first step of the phase 1 is satisfying the essential conditions, the second step is providing leadership or sponsorship and the very last step is defining the scope of technological road map. The step of satisfying the essential condition involves the organizations to satisfy on the rules and regulation in order to work together. Different planning horizons with perspectives are drive out within each organization and thus these are