Thursday, April 4, 2019
Cyber Warfare: the Future of War
Cyber war the Future of WarCHAPTER IINTRODUCTIONKarl von Cla recitationwitz delineate war as an act of violence int shutd witnessed to compel our opponent to fulfill our bequeath In hostel to realize this object fully, the oppositeness mustiness be disarmed, and disarmament becomes therefore the immediate object of hostilities. At the end of the second millennium, this classification no longer describes the full spectrum of modern warf argon. In the prox, we will have the potential to make war without the exercise of violence and fulfill the second half of von Clausewitzs definition-with softw be alone. Todays software intensive strategys make this probable. Cyber describes systems that use mechanical or electronic systems to swap human function. Cyber war cornerstone be executed without violence and therefore the reliance on software intensive systems-cyber systems- sight make nations exposed to war without violence.What is Cyber? Terms with cyber utilise as affi x are currently in vogue not just among some visionaries and technologists contriveking mod concepts, except even by the man in the street, and each has its profess connotation. The term cyber is from Greek root kybernan, importee to steer or g completely overn and a associate vocalize Kybernetes, meaning pilot, governor, and/ or helmsman. Norbert Weiner first introduced the prefix in the 1940s in his classic works creating the arena of cybernetics (which is link to cybrenetique, an older French word meaning the art of government). Cyber, in fact has been the approximately unobjectionable term due to the reason that it bridges the gap between instruction and governance, the two inseparable facets of control. The prefix therefore, is freely used in the pursualCyberspace. Origin on the wholey coined by William Gibson in his science fiction sweet Neuromancer, published in 1984, and defines it as that position indoors the ready reckoner where electronic activity / con fabulation takes place. He further describes it as a place of unthinkable complexity. The term has given rise to a vocabulary of cyberterms such as cybercafes (cafes that sell coffee and calculating machine time), cybermalls (online shopping ser faults) and cyberjunkies (people addicted to being online).Cybernetics. It is the science of communicating and control, which interfaces a monitor (human brain or an electronic machine) to former(a) parts of a system. The function being, to examine what is happening in the system, to what should have happened and then draw the difference, which is passed on to the control system for rectification (feedback). It applies evenly to organisations, machines and organisms. Cybernetics is as well(p)spring used to describe a general analytical approach to control, communication and other system technologies and attempts to link engineering disciplines with the related work of social scientists through the unifying threads of feedback in its close general aspects and through its interest in transfer of breeding.cyberwar. A RAND Corporation synonym for teaching state of war, it is also sometime called netwar. Another school considers it as hunch forwardledge related conflict at the soldiery train. However, Denis Quigley comes exclude by designating it as control warfare or leitenkreig in German. cyber-terrorism will be discussed more than in detail later in the Study.Cybernation. Loosely used, it implies digitisation of discordant systems of an arrangement/organisation or super systems, where electronics links humans to machines, thereby immensly amplifying the human capabilities. It, in its most basic form, would indicate electronic automated management of instruction and fellowship.Cyber warfare (CW). It is a relatively sassy addition to the glossary of warfare. With the escalating use of computers in armed services and government, there has been a growing awareness of both a new cleverness in national infrastructure and a new method of attacking ones enemies. There is the potential of exploitation development systems to protect, control or attack training networks. CW could mean winning wars without firing shots, the shutting rout of entire national infrastructures at the push of a justton, and the complete exploitation or oddment of an enemys communication networks. It could mean threats from across the world by states with no ability to launch a conventional attack, or attacks by non-state actors using cheap laptops. There has also been talk of super-viruses shutting down nations, and how a dissatisfy individual or small group could wage a war on a nation. CW is the new wonder weapon, and the new un cognisen threat. However, the concept of CW, and the technology on which it relies, is be redact by vague depictions of the dangers it presents, or the benefits it offers.CW is conceptualised by protection expert Amit Yoran, cyber-security chief at the US Department of Homel and Security and vice president of computer corporation Symantec, as the future primary dramatics of operations. There is a consensus that CW is something noteworthy, but it is not clear if this consensus extends to a common understanding of what CW actually is. It is so new that there is no standard definition to describe it. This channelizes to one of the most popular confusions regarding cyber warfare its relation to breeding war (IW). IW is not unproblematic in definition, but trick be understood as the repellant and defensive use of tuition and information systems to deny, exploit, corrupt, or destroy, an adversarys information, information- found processes, information systems, and computer-based networks fleck protecting ones own. While IW covers the territory of cyber warfare, it also covers a much broader mandate. Electronic (cyber) communication is only one aspect of IW, which includes all information operations in a conflict. Chinese strategist sunbathe Tzu and Napoleonic strategist Carl von Clausewitz referred to information operations, and the importance of such operations in war. IW predates electronic communication, and is not interchangeable with cyber warfare for this reason.CW embarrasss units nonionized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic factor. Hackers and other individuals trained in software programming and exploiting the intricacies of computer networks are the primary executors of these attacks. These individuals a good deal hightail it under the auspices and possibly the attendant of nation-state actors. In the future, if not already common practice, individual cyber warfare units will execute attacks against tar originates in a cooperative and simultaneous manner.Analyzing the Threat. In 2007, a denial-of-service attack was launched all 53 minutes. The 2007 FBI/Computer Security Institute study indicated that lo ss of revenue attributed to DDoS (dedicated denial of service) was approximately US$90,000 an hour for a retail catalog sales comp any(prenominal). Malware is a common cyber-weapon. Malware (short for malicious software) is a computer program designed with malicious intent. This intent may be to cause annoying pop-up ads with the hope you will click on one and generate revenue, or forms of spyware, Trojans and viruses that back end be used to take over your computer, steal your identity, swipe sensitive financial information or track your activities. At least louvre new pieces of malware emerge every two minutes, according to Kasperskys Internet Security Lab. One critical st demarcation I monitor regularly is the number of significant events reported to Hackerwatch.Org. At the time Im writing this, in the past 24 hours, there have been more than 8 million significant incidents reported. The warning signs are there, but the question remains Are we smart enough to prepare?A anchor premiss of this paper is that information processing-whether by equipment (computers) or by humans-is becoming a center of gravity in future warfare. Although there is much debate on the reality of the CW threat, the growing number of computer intrusions on government and non-government systems substantiate the fact that the threat is very real. The growing dependency on information and information based technologies have made us very unprotected to hostile attacks Hence, our immediate goal must be to both imagine and define how foreign cyber attack capabilities expertness threaten information networks in India and what potential effects they might have.METHODOLOGYStatement of ProblemThis paper seeks to study and analyse the use of cyber warfare in future conflicts its implications on national security. To suggest Indias response to these cyber threats by outlining a clear, well defined cyber security strategy and suggest measures to safeguard own national security.HypothesisAs information systems permeate in phalanx and civil lives, a new forepartier is being crossed The Information Age- which will define the future wars. Cyber warfare has become central to the way nations fight wars and is the emerging theatre in which future conflicts are most likely to occur. Cyber warfare will take the form of a devastating weapon of the future battlefield which will be integrated in the War bit Doctrines of nations across the world.Justification of StudyThe premise of cyber warfare is that nations and critical infrastructure are becoming progressively dependent on computer networks for their operation. Also as armies around the world are transforming from a computer programme centric to a network centric force there is increasing reliance on networking technology. With all the advantages of such connectivity come unprecedented challenges to network security. Threats to information infrastructure could be in the form of destruction, disclosure, change of data a nd/or denial of service. A hostile nation or group could exploit the vulnerabilities in poorly secured network to disrupt or shut down critical functions.The protection of our information resources information assurance, will thus be one of the defining challenges of national and military security in the long time to come. To take advantage of Information Technology renewal and its application as a force multiplier, the soil and army in particular needs to focus on Cyber Security to ensure protection / refutal of its information and information system as dumbfounds.Many will argue that defence and discussion computer systems of most countries including Idia are air gapped and thus, isolated from the Internet. It may appear convincing that by air gapping the networks and using top-notch technology, the risk may be reduced. However, this will not succeed fool proof security. With the proliferation of technology at an astronomical rate, the threat of cyber terrorism will only in crease. The air gapped networks are vulnerable from insiders, disgruntled employees and moles pose or recruited by cyber terrorists or their sympathisers to cause the intended damage. A cyber terrorist may impersonate a computer technician and call individuals within the targeted organisation to obtain information to penetrate a system. Once in stubbornness of legitimate log on information, cyber terrorists will have Iegal access to a system and can store viruses, trojan horses, or worms to expand their control of the system or shut it down. In Russia, hackers used a gas company employee to plant a trojan horse which gave them control of the nations gas pipelines. It is against this backdrop that it becomes compulsory as a soldier to understand cyberspace, the threat that it poses and to suggest some steps in order to minimise, if not eliminate the menace that it would cause.ScopeThis study concentrates on the evolution of cyber warfare and the giant leaps that it has interprete d in the past decade. The entire spectrum of cyber conflict, including threat reality of cyber warfare being used as a potent and devastating weapon of the future battlefield has been covered. Further the study outlines the cyber warfare capabilities of select nations and how vulnerable India is to these threats. Finally the report outlines a cyber security strategy and recommendations for combating the cyber warfare threat in the 21st century.Methods of information CollectionThe data has been collected through various journals, seminar papers and certain books on the subject. Some poppycock has also been downloaded from the Internet. A bibliography of sources is appended at the end of the text.Organisation of the DissertationIt is proposed to study the subject under following chaptersChapter I Introduction and Methodology.Chapter II The Future of Warfare. Information Revolution and Warfare. Defining Cyberwar. Evolution of Cyber Warfare.Chapter III planetary Threat in Cyberspace . Threats in Cyberspae. How Real Is the Threat? Spectrum of Cyber Conflict. Recognition of the Cyber Warfare Threat.Chapter IV Combating the Threat. How Vulnerable are We? Cyber Security A Few Initiatives. Def Cyber Warfare. Cyber security Strategy.Chapter V Conclusion. The Digital Battlefield. Recommendations.CHAPTER IITHE FUTURE OF WARFARESo it is said, if you know others and know yourself, you will not be imperiled in a hundred battles if you dont know others, but know yourself, you will win one and lose one if you dont know others and dont know yourself, you will be imperiled in every single battle. -Sun TzuWill conventional warfare remain the custom for the future or will a new wave of warfare emerge? Down through the corridors of time, wars have been fought for various reasons. Conflict arose from regional instabilities, economic and social perils, and religious animosities. In their book, War and Anti-War Survival At The clear up of The 21st Century, Alvin and Heidi Toffler categorize the progression of warfare into three stages or waves agrarian, industrial, and informational. While some areas of the world clam up remain in the agrarian realm and some others have advanced to the industrial state, a few have broken out into a completely new era-the information age.Information Revolution and WarfareIf you know the enemy and know yourself, you need not fear the result of a hundred battles .If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. This extract comes from the 6th century BC Sun Tzus The Art of War and is still as compelling today as it was two and a half millennia ago. As a matter of fact, it is in all probability safe to say that cognition and information about ones adversary have a greater impact now than they have had at any other point in the history of warfare. At the same time, critical information is now often stored electronically in spaces reachable from the Internet, which pith there is a prospective for it to leak out to ones adversary, or for the opponent corrupting it in order to affect ones decision making capabilities.There is no standardize definition of Information Warfare. However it has been defined as Actions taken to achieve information superiority by affecting adversely information, information based processes, information systems and computer based networks of the adversary, while protecting ones own information.An aim of warfare always has been to affect the enemys information systems. In the broadest sense, information systems encompass every means by which an adversary arrives at knowledge or beliefs. A narrower view maintains that information systems are the means by which an adversary exercises control over, and direction of fielded forces. Taken together, information systems are a comprehensive found of the knowledge, beliefs, and the decision making processes and syste ms of the adversary. The outcome sought by information attacks at every level is for the enemy to receive sufficient messages that convince him to stop fighting.Information Warfare is a form of conflict that attacks information system directly as a means to attack adversarys knowledge or beliefs. Information Warfare can be prosecuted as a component of a larger and more comprehensive set of hostile activities a net war or cyber war or it can be undertaken as the sole form of hostile activities. Most weapons, a word used to describe the lethal and nonlethal tools of warfare only have high utility against external adversaries. While most often busy against external adversaries, many of the weapons of information warfare are equally well suited for employment against familiar constituencies. For example, a state or group cannot use guns or bombs against its own members however, the weapons of Information Warfare can be used, have been used, and very likely will be used against both ex ternal and inner adversaries.Information warfare as defined by Martin Libicki has seven componentsCommand and Control Warfare.Intelligence based warfare.Electronic Warfare.Psychological Operations.Hacker Warfare.Economic Information Warfare.Cyber Warfare.This concept of seven components is universally recognised today, as it encompasses the entire spectrum that Information Warfare offers. Besides, it strongly argues that Information Warfare is not exclusively a military function and various actors viz. the media, clannish industry and civil society including civilian hackers play a key role in structure a nations capability to wage Information Warfare. The role of private industry has gradually been acknowledged as cutting edge information technologies become increasingly permeative in sensors and weapon systems. The information systems while making the military more efficient also devote it vulnerable to attacks on the systems itself. Winn Schwartau, also known as the Civil Arch itect of Information Warfare has defined Information Warfare in this very context Information Warfare is a conflict in which information and information systems act as both the weapons and the targets. As far as the Indian base on Information Warfare is concerned, history amply reveals that information was essentially viewed as a strategical resource. Kautilya, the great strategist of the Maurya period, strongly advocated the need of obtaining accurate information about the enemy forces and plans of action. In fact, he is considered to be instrumental in the victory of the Mauryans and placing Chandragupta Maurya on the Magadha throne. His astute thinking on warfare and delicacy is portrayed in the famous treatise Arthshastra. While postulating that war may not always be the adept option, Kautilya espoused the importance of information and knowledge in winning wars.Information Superiority and Cyber Warfare. Information Technology is a double edged weapon. It provides vast opport unities but simultaneously introduces new vulnerabilities and threats, which may arise through computers, subject field and connectivity or, to put it distinguishablely, hardware, software, information and networks. Information superiority over our adversaries including militant and terrorist outfits is very essential. Non Lethal information weapons can black out communication systems, destroy valuable data and cripple the nation. Therefore, we have to act instant(prenominal) than any adversary. This requires defensive as well as offensive cyber warfare capabilities. Cyber warfare can be a full fledged war and vital infrastructure shall get targeted. To handle cyber wars, highest national level decision making is required, in real time and with full fall back options. For this purpose, basic building blocks include excellent monitoring tools for network traffic, web sites and databases, intrusion detection, firewalls, encryption and decryption algorithms, public key infrastructur e and remote access facilities. wicked cyber warfare spans computer crimes and information terrorism. Everyone is under threat telephone, government agency supply, banks, transport, and the day to day needs. lt is important to create tools, awareness, and structures to assess threats to information resources, including military and economic espionage computer break-ins, denial-of-service, destruction and modification of data, distortion of information, forgery, control and disruption of information flow, electronic bombs, etc. ln essence, the thrust of the initiatives must lead to information assurance like life assurance.Defining CyberwarCyber Warfare. It is the sub-set of information warfare that involves actions taken within the cyber world. There are many cyber worlds, but the one most appropriate to cyber warfare is the Internet and related networks that share media with the Internet. Cyber Warfare as related to defence forces refers to conducting of military operations accor ding to information related doctrine. It means disrupting or destroying information databases and communication systems. It means exhausting to know everything about the enemy while keeping the adversary from knowing much about oneself. It means move the equilibrium of information and knowledge in ones favour especially if the balance of forces is not. It means using information so that less cap and labour may have to be expended.Cyberwar refers to conducting, and preparing to conduct, military operations according to information-related ideology. It means disrupting if not destroying the information and communications systems, broadly defined to include even military culture, on which an adversary relies in order to know itself who it is, where it is, what it can do when, why it is combating, which threats to counter first, etc. It means trying to know all about an opponent while keeping it from knowing much about oneself. It means turning the balance of information and knowledg e in ones favour. This form of warfare may involve diverse technologies-notably for C3I for intelligence collection, processing, and distribution for tactical communications, positioning, and identification-friend-or-foe (IFF) and for smart weapons systems-to give but a few examples. It may also involve electronically blinding, jamming, deceiving, overloading, and intruding into an adversarys information and communications circuits. Yet cyberwar is not simply a set of measures based on technology. And it should not be confused with past meanings of computerized, automated, robotic, or electronic warfare.Cyber warfare requires different principles of warfare which have been derived from thousands of years of experience as documented by Sun Tzu, Clausewitz, Jomini, Liddell-Hart, and others. Some of the energising warfare principles apply to cyber warfare while some principles of kinetic warfare have no meaning in cyber warfare. Some principles of kinetic warfare may actually be antag onistic to cyber warfare. The various characteristics and principles of cyber warfare are as underWaging cyber war is relatively cheap. Unlike traditional weapon technologies, acquiring information weapons does not require vast financial resources or state sponsorship.Boundaries are blurred in cyberspace. conventional distinctions public versus private interests, warlike versus criminal behavior, geographic boundaries, such as those between nations tend to get lost in the chaotic and rapidly expanding world of cyberspace.Opportunities abound to manipulate perception in cyberspace. policy-making action groups and other nongovernment organisations can utilize the Internet to galvanize political support.Cyber war has no front line. Current trends suggest that the economy will increasingly rely on complex, interconnected network control systems for such necessities as oil and gas pipelines, electric grids, etc. and these will become vulnerable to cyber attacks.Cyber-warfare must have kinetic world effects. Cyber warfare is meaningless unless it affects someone or something in the non cyber world.Anonymity. Cyber warfare can be waged anonymously. Anonymity is the nature of new technologies, especially telecommunications. An anonymous attack creates two problems. Not only has a states national security been breached, but there is no one to hold accountable for the attack.Offensive Nature. Information technology and computer systems are vulnerable by nature. Therefore, taking defensive measures against the information warfare threat will always be difficult and costly. Improving the defense of information systems also contributes to the security dilemma since decreasing ones susceptibility to information warfare increases the attraction of using information warfare offensively.Cyberwar may have broad ramifications for military organization and doctrine. As noted, the literature on the information revolution calls for organizational innovations so that different par ts of an institution function like interconnected networks rather than associate hierarchies. Thus cyberwar may imply some institutional redesign for a military in both intra- and inter-service areas. Moving to networked structures may require some decentralization of command and control, which may well be resisted in light of earlier views that the new technology would provide greater central control of military operations. But decentralization is only part of the picture the new technology may also provide greater topsight-a central understanding of the big picture that enhances the management of complexity. Many treatments of organizational redesign glorify decentralization yet decentralization alone is not the key issue. The pairing of decentralization with topsight brings the real gains.Cyberwar may also imply developing new doctrines about what kinds of forces are needed, where and how to deploy them, and what and how to strike on the enemys side. How and where to position w hat kinds of computers and related sensors, networks, databases, etc. may become as important as the question used to be for the deployment of bombers and their support functions. Cyberwar may also have implications for the integration of the political and psychological with the military aspects of warfare.In sum, cyberwar may raise broad issues of military organization and doctrine, as well as strategy, tactics, and weapons design. It may be applicable in low- and high-intensity conflicts, in conventional and non-conventional environments, and for defensive or offensive purposes.As an innovation in warfare, I anticipate that cyberwar may be to the 21st century what blitzkrieg was to the 20th century. At a minimum, it represents an extension of the traditional importance of obtaining information in war-of having superior C3I, and of trying to locate, read, surprise, and deceive the enemy before he does the same to you. That remains important no matter what boilers suit strategy is pursued. In this sense, the concept means that information-related factors are more important than ever due to new technologiesEvolution of Cyber WarfareSince the early days of the Internet, there were individuals trying to compromise computer systems security via the network. initially their activities were limited to defacement of web pages and cause mostly by mere thrill seeking. In the mid-nineties political activists realized the potential for publicity coming with the attacks, and defacements carrying a political message became more frequent (Hacktivism). The palette of attack types also widened greatly, most notably some of them became aimed at bringing services or whole systems down, by generating inordinate network traffic (denial of service, email bombardments).The first reported politically motivated cyber terrorist attack using a flood of emails was carried out by the Tamil Tigers against Sri Lankan embassies in 1998. It was successful, even as it did not bring target ed servers down, because more importantly it attracted worldwide media attention to the attackers cause. Activist groups involved in other struggles around the world soon followed with similar attempts.The diplomatic conflict between Pakistan and India over Kashmir has, since the late 1990s, been paralleled by a series of mutual cyber attacks. In the Middle East, every time political or military fight escalated between Israel and Palestinians, so did fights on the virtual battlefield. Both sides have used sophisticated techniques and well planned strategies for their cyber attacks. Pro-Palestinian attacks have been carried out by a number of terrorist groups (some of which even came up with the term cyber jihad), and pro-Jewish ones might have been arrange by the state of Israel, though there is no clear evidence to support that. Studies have shown that Israel leads the list of countries in terms of numbers of conducted computer attacks per 10,000 Internet users.This brings us to t he newest trend in cyber warfare cyber attacks carried out by hacker groups inspired, coordinated, funded and supplied with resources by nation states. They are usually large master and prolonged operations targeting specific systems within enemy structures. Probably the first of this type of attacks took place during the NATO air strikes against targets in Former Republic of Yugoslavia during the Kosovo violence in 2000. Targeted were all 100 of NATO servers, each subject to excessive network traffic originating mostly from Serbia, as well as Russia and China its supporters in the conflict. The cyber attacks caused serious disruptions in NATOs communication and services, lasting several days, but did not directly affect the bombing campaign.These days cyber warfare still mostly consists of uncoordinated cyber terrorism acts performed by groups whose main aim is publicity and media coverage. Gradually though the nature of cyber warfare is going to change into activities coordinate d and paid for by nation states and large international terrorist networks. We can expect attacks trying to exploit vulnerabilities in critical infrastructure like telecommunication systems, airports, military force plants, oil and gas infrastructure, supply of water, and military systems. In the coming years we are likely to see a quick rise in the number of cyber battles and one can imagine that in the future wars are going to be fought without dropping bombs and firing missiles.CHAPTER IIIGLOBAL THREAT IN cyberspaceThreats in cyberspaceThere are four fundamental categories of threats to our information and information infrastructure, characterised by the head of structure in their attack capability and the measure of trust or access that the threat enjoys. These categories areUnstructured External Threats. These are individual or small group of attackers who rely heavily on others tools and published vulnerabilities. They attack targets of opportunity and lack persistence aga inst difficult targets.Structured External Threats. These are coordinated attackers i.e. hostile intelligence agencies or organised crime syndicates, which possess a deep technical knowledge of the target, strong motivation, and the capability to mount combination attacks using multiple complex tactics and techniques.Non Malicious indwelling Threats. These are accidental breaches of security caused due to ignorance or malfunctioning of system.Malicious Internal Threats. Here the attackers are trusted members of the org or a less trusted support worker with some degree of access.The threats can also be classified under the following heads
Wednesday, April 3, 2019
The Brief Introduction Of Globalization Cultural Studies Essay
The Brief Introduction Of Globalization Cultural Studies leavenGlobalization is something that has been with the kind race ever since the land has begun. From topical anaesthetic to globose, we could proportion this to the result of world innovation and scientific progress. Globalization from the word domain(prenominal) means facing pages by means ofout the globe, in new(prenominal) words spreading homophileness-wide. The aims of having a world(prenominal)ized community is to defecate interdep dyingence of the entire adult male and its mickle from for each one early(a) with concern for the rest of the world at the spending of study self- suppuration and self-interests. Globalization became world-wide popular intimately 1992, when most tribe talked intimately it mainly in the field of prudence. But at present, it has been spoken of as a fashion word, and it attracts much attention from he academic scholars. The reason is that globalisation has been an uns toppable world trend which miscellaneas the self-colored world so greatly that no countries and nations poop be separated from it.But what is globalisation? forrader answering this question, we have to admit that there is no universal translation about it. This is because the concept of globalization doesnt bang into the cast of characters at the actu onlyy fixning in human history. It develops into the present being through a long historic parade. Widely speaking, it come tos to the exchanges and utilizations among contrasting resources and return factors, and the interactions, conformity and coordination of human activities and their achievement. Therefore, it includes at least two essential factors firstly, the activity in spot must overstep one argona or one nation, at the same time it has to show the trend of continuing development. Secondly, the participants should be associate to each some other, non being isolated.B, The constitution of globalizationBesides, the constitution of globalization involves many another(prenominal)(prenominal) fields of human society, including economy, politics, coating, ideology and so on.. Dating fundament the history of globalization, it began from the frugal expansion, and it was Europeans that lift the curtain of globalization when they established colonies beyond their lodge counties. And then follow the expansion of gardening, civilization, region or ideology, and so on2 Some main lark abouts of globalization and the according reasons of them.A, Integration of world economyFirst of all, globalization is mainly drived by the profit of economy. From the prouder up introduction, we know that globalization started by the expansion of colony, from which colonists earningsed a lot of bullion , in other words, they build their treasure by doing so. Therefore , today the desegregation of world economy is regarded as the foundation, main cause, motivation and figure of globalization. It is firs t shown by the world(prenominal)ization of manufacturing systems. The world production has undergone a historical trans defining since the 2oth century, under the influence of development of technology and the promotion of technological revolution as head as the application of mass production factors. Many big companies of developed countries build their companies or factories in abroad countries where they could make unspoilt use of the infixed labor force and other resources by paying lower comprise. Whereby the could form commodious multinational pile which greatly supercharges international production. Economic integration through trade, migration, corking flows and communicating flows has been officially virtually since 1870. This new concept could noticeably profit if ground on D. Ricardo stinting theory of comparative advantage. The latter theory states that each rural ara should produce those products/services, which they can produce/provide with the lowest prob powerfulness cost and total production cost. Hence, allowe all countries to produce and trade in the most efficient mode so that the highest attainable welf be for all countries is reached.Nowadays, multinational coporations have overspreaded among more(prenominal) than160 countries in the world. They wee-wee 40 percents of the whole worlds total output value 90 percents of the world market sh atomic number 18s, 80 percents international scotch trade, 90 percents of the international technological trade. In 1996, the amount of the multinational corperations reached over 44000. They invested their capitals to overseas to make s greater profit. With the furthering inauguration of the market and the expansion of the trade scale, the world manpower and material and technological resources atomic number 18 all absorbed into the world production systems, in which they atomic number 18 interdependent and impartible with each other.Besides, a gigantic mount of financial capit al move at a high speed in the pluck of whole word. Since the World War11, drived by the market demands and investing interest, a mammoth mount of money has been use beyond the issuing countries. With the exploration of overseas business and production and development of technologies, financial capital last stone-broke from the constraintion of national boundaries and practical tools which made become real international citizens. A study shows that the current financial capital market in the world has reached 3 d0 billion dollars, and the overseas capital reached more than 1000 billion dollars. The uniting of international financial capital is not only large in amount save overly move at a agile speed. Owing to the contemporary science and technology, the treasure activity with a huge sum of money can be conducted by a plow or whatever fast means. With the huge treasure accumulation high movement of the international financial capital, the pace of the integration of world economy has super been accelerated.Whats more , the formation of world market in like manner offers a good milieu for the integration of world economy. World market refers to blank which provides a room for world- wide exchange of products, servers and technologies. It authoritatively started among the sixteenth century and the 18th century and underwent a fast development in the 19th century, and came into the form in 1970s. The current world market is a veritable global universal market, whose main symbols shown in the government agency the disconnected expansion of the exchange scale, the unification of the market rules and the expansion of market capacity and overseas business.Globalization, no national as a phenomenon or an economic trend, deeply affects every country in the world. Economies of every country are becoming more related. They infiltrate, influence and depend on each other more and more. Globalization has become an inevitable fact and trend that will not change with pots will. It brings challenge as good as chance to each country. Every country are active to digest into the way of globalization by adjusting their economic and diplomatic polices.B, Integration of world refiningCulture and economy interdependently support each other, because they often develop mickle in hand. With the global application of production factors, global capital flows and the formation of world market, several(predicate) cultures from conglomerate nations and areas are surely to exchange, conflict and blend each other in the fly the coop of globe. The conflict and collision of polar cultures help to speed up the metabolism of a new culture and form a mechanism for developing the superior and weeding out the inferior and initiate the ideological trend of parochial nationalism and cultural hegemony but cannot result in the homogeny and unification of the cultures, which is bound to result in a harmonious situation through such conflict and integ ration and finally reaches a state where balance is kept. The reason for this phenomenon lies in that the cultures reserved through a long history reflect the thought, ideology, ways of persuasion and liveness of humans. They comprise some unusual values and the world of themselves has certain finicky meaning. It is of the same importance to financial backing cultures in diversity as we do to different biology, because the diversity of culture lays an essential foundation for the sustainable and vowelize development of human society. pack with the competence thinking rationally and reflections are surely to perform that the break away of the diversity of culture means to the ruin of our humans spiritual collection plate and the cultural resources , which could push human beings to an abyss of unsustainable humans and development. Therefore, it is vital primal for us to carefully protect our cultures in diversity as we do to animals and plants and keep them from ruin.The integration of global culture refers to different cultures coexist and intergrow harmoniously under the same sky. As an important content and symbol of globalization, culture is the magnification of the integration of globalization in all educateions. Geographically speaking, it includes the conformity of the west and east cultures seeing from national perspective, it includes the integration of the cultures of both native and foreign areas considering form different levels, it includes the integration of both individual and collective cultures, and folk and official as wellspring as academic cultures viewing from the shopping mall of culture it includes the integration of the scientific culture and the literary culture from the connotation of culture perspective it in any case includes those aspects on sense of value, ways of thinking, structure of knowledge in different counties and areas. each(prenominal) these aspects provide a vital foundation for the integration of globa l culture, and it also serve as an important set of the realization of economic globalization. However, Globalization is sword with two blades. For one thing, it helped to highlight a nations culture, hold on the srength of other cultures and contribute the cultural diversity. For another, some small countries native culture are being challenged. Their distinctive cultures are driven towards extinction. For them, to refer national identity is a must. Anyhow, it is an unavoidable for a country to command part in globalization. or else, it will be kicked out of world competition sooner or later. So, what merits our special attention is how to keep and promote native culture under globalization. The priority is to enhance the cultural sentience of native pot, make them cherish and glory in ones countrys culture. When the native populate take initiative to protect and promote their own culture, no matter what influence globalization exerts, native culture will not be replaced. In clusion, globalization has given rise to a greater sense of nationalism in many countries and therefore has helped people to realise and protect their own national identity including their culture from these outside forces. Therefore although globalization is ever-changing the way a lot of us behave/eat/ order and even speak it has also helped to highlight aspects of our own cultures.C, Intergrowth of world bionomicsHuman activity is an exchange of material, energy, and information process with the natural world which can result in intensive bionomical effects. With the speeding up of the integration of world economy, humans production scale and consuming ability are largely expanded and plusd, which has seriously bear on the ecological milieu on the earth and it has greatly changed the world from its content to its magnification. ecological integration refers to the intergrowth of human and nature to reach a common prosperity in the same ecological system. And it also means that the whole humans existence and future development deeply rely on the quality of our ecological environment. However, the improvement of the environment condition requires our human being to raise our intellect of protecting it and demands our common efforts to reserve it. As an important part of the globalization, the intergrowth of world ecology is mainly shown by the flowing aspectsFirstly, human beings and all vivification things coexist on the same planet, in other words , we partake the same living space. We are just a part of this world, and existence and development deeply rely on the other parts of the world. People from different nations and areas are interdependent each other, and the world is our common home for all of us. We all have the obligation to take care of the ecological environment so as to get the room for a bankrupt future development. Although we are born to have the right to make full use our space and land where we live and belong to, we have no ri ght infiltrate that of others, not mention to the ruin of the whole ecological space that belong to all human beings.Secondly, the ecological resources are have by all human beings. It includes such factors as air, water, sunshine, land, temperature and so on, which are absolutely indispensable for people to live on this planet, which also change the peoples activities and enable them to make a large amount of achievement by taking advantage of them. Seeing from the present condition, the serious befoulment of environment is caused by people partially persrue economic growth and leading a consuming lifestyle , but concerning the pollution-maker, it is some individual coporations who make huge profit at the cost of environment that are main trusty for such matter. As peoples environmental protection intelligence gradually raise, they begin to take actions to fight against pollution, defend and maintain their environmental right, and ask to visit those who contribute to environme ntal pollution. Their behaviors lead to the formatiom of a trend of environmental protection.Thirdly, the global resources are roled by people some the word. Humans as a part of living things, we cannot do without consuming different resources offered by the nature. However, the resources on the earth are not inexhaustible, besides they belong to everybody, so they should be allotted fairly among people of different areas and generations. Therefore, any country and any generation shouldnt meet its own interest at the cost of that of other countries and generations. We dont have the right to impair the interest and potential development of others or our future generation. Peoples supposition about sharing resources among areas and generations leads to the raising consciousness of defending their right in sharing the common resources in the range of globe, which helps to lay a theoretical basis for the application of a sustainable development.At the fourth place, human beings are c onfronted with the same tasks and disasters. We have no choices but to live in the same ecological environment on this planet. We are faced with the same disasters as severe air pollution, downslope of water quality, desertification, acid rain, ozone hole, etc. All these problems have seriously affected peoples living environment and their life quality. According to the study of the World wellness Centre and American Disease Controlling Centre, each year, air pollution has made a negative effect on peoples heath of about 4-5 billion, and 40% of the world populations deaths are caused by air pollution and other environmental problems. Their conclusion is that humans activities improper behaviors on the earth are ruining themselves.At the fifth place, all human beings are answerable for the ecological environment. Human could do nothing without the support of earth, which provides essential materials for us. Since many of environmental problems that the earth facing are caused by h uman activities, and then to resolve such issues, it needs the common efforts of all people around the world. As a member of the world society, we have the full reasons to take part in the social activities to protect our common ecological environment, to keep the global ecology in balance and to beautify our common homeland.D, vernacular quotation of people in the worldMen are the nucleus and main part in the process of globalization, so the development of globalization is out of mens sense of global view and the amplify of their rough-cut dread each other in certain degree. However, on the other hand, the essence and magnification of globalization stimulate mens practice and enhance the vernacular credit entry and taking into custody. In other words, peoples mutual recognition around the world can both be regarded the cause and precondition of globalization as well as the content and magnification of it. These two aspects are interdependent and mutual reliant in the proc ess of globalization.But what does peoples mutual recognition refer to? It means that peoples mutual understanding and recognition of different countries and areas air highly increased. The interaction of their sense of value and way of thinking are also strengthened. The reason for this firstly is due to the expansion of the communication scale and the acceleration of human source exchange. Todays world is a widely opened society, with more and more people participating in such activities in business, economic trade, cultural exchange, and touring, etc, which take place in different countries and regions. The all-direction exchanges and interaction are sure to strengthen a repair communication and understanding.However, Globalization itself is a process that is completely ,uncertain and keep changing, which make it hard for people to come to consist in views of globalization because of different knowledge background, even we have had lots of consistent conclusion. Difference in k nowledge and value preference may cause different ideology, even inside of capitalism and socialism. All that difference come out all kinds of globalization theories with different ideology. system comes from real world and will serve the real world, so those different globalization theories will also affect the globalizations natural progress. Thats the ideological problem during the process of globalization, itself or implied. But such ideology difference doesnt hold the main trend of mutual complementation by frequent impact under the help of modern communication tools.The communication and understanding between people in different region are transformed via the way of information exchange. Under the help of the modern communication technology and the increase of the input information, people can have a better international view toward the world. Nowadays, we have entered a society of knowledge economy, the main ingest of such society is shown by taking information technology as the essential technology, and treating information assiduity as the leading industry. By the end of 1998,over 100 million computers had put into use by net, and more than 500 million people become net citizens, the main page of internet amounted to over 130 million with the sharply increasing trend by 100 thousand pages and 20 million new words around the world each year. As for other communication means, such newspapers, it increases 5 times as fast as the previous year, and list will go on. The highly developed communication technology and information industry has facilitated the communication of people around the world and provided a break precondition for a better interaction.Peoples mutual recognition is firstly shown by the increase of the level of peoples recognition of the present mutual understanding. Before the modern times, owing to the backwardness of communication means, people of different counties and nations were isolated from each other, so communication betw een people in sun situation seldom happened, not mention to mutual understanding. Nowadays, people of different areas can get contact with each other in a more direct way, under the help of modern communication technology, by a mingy intercourse. The popularization and attachment to the education of the world history and world geography greatly strengthen peoples understanding of the world theoretically. At the same time, the modern technology of media and the development of traffic tools has shortened the distance of people in different areas and deepened the communication between people living far away.Peoples mutual recognition is also shown by the emulation and assimilation of their way of thinking and behaving. For example, people tend to pursue a more proper and sound lifestyle. They are likely to leading a life in which they could realize their value. In the production field, the industry means begins to mode from extensive form into intensive form in order to reach a more environmental growth and a sustainable development. In the way thinking, people are likely to change from a closed way to a more open way, from reserved manner to a more original manner, and unilateral to multilateral.Besides, peoples mutual recognition is also shown in the way of infiltration and assimilation of peoples sense of value. The sense of value is the essential part of human culture as well as the guidance of peoples action. The trend of globalization can be accepted by the people around the world, because they share some common concepts such as in culture, politics, way of economic development and especially in the way of thinking. Its hard to imagine if people dont share the simmilar ideology on these aspects, what the world be like.3 thickIn conclusion, with the rapid development of globalization, we are living in a global village, and it has allowed a better communication flow amongst More actual Countries (MDCs) and Less Developed Countries (LDCs). It has enabled trade to grow, capital and education flows to increase and a better allocation of resources to be met around the world. There are many gains from globalization for companies around the world, some Multi-National Enterprises (MNEs) that locate themselves in LDCs bring along growth and development, like for example employment, technology knowledge, profit reinvestment among other factors to entertain countries.Nevertheless, there are several negative aspects about globalization as well. For instance, MDCs have a tendency to profit from globalization in various ways when negotiating with LDCs. MNEs that go to LDCs for example, gain from cheaper labor force, cheaper land and tax rates. In the end however, some MNEs end up negatively affecting the master of ceremonies countrys economy by taking all profits back home, socially, by polluting the environment and finally also policy-makingly by paying bribes to the local governments to reduce tax rates or other fees.In antagonism of its controversial position in different regions, some countries like the Asian tigers or the Asian New Industrial Countries (NICs) have gained incredibly from globalization in the past 30 years. Other continents however, have proved themselves not yet ready for such a change. An example of the latter is Africa and southeast America, where due to different factors like corruption, low education level, weak political policies and poor transport infrastructure globalization hasnt been able to benefit them in a high rate like in Asian. It is therefore up to each county to decide and control Foreign Direct Investment (FDI) and gain from it or not.Summing all of the above, globalization is a long time process of in the humans history. Though we couldnt give a definite rendering to it, observing from it main constitutions and the features of them, we can have a overall idea about it. It features is firstly shown in the economic field, because the globalization is basis on the development eco nomy which provide the essential precondition for globalization. Then follows the feature in culture. Culture is the carrier of any human civilization, therefore it is another important constitution of globalization. Just like the integration of world economy, people can also benefit from the integration by learning from each other. However, while we bear the diversity of different cultures we should also keep our nationalism. We also talked about the intergrowth of global ecology, because ecological system is very vital for human beings existence. It provides the basic material for our life, in other words, without the support of ecology, we can do nothing. While we are enjoying various resources that the nature offers to us, we also have to bear the obligations to preserve it from ruin. At last this paper also mentioned the mutual recognition of people involved in the globalization, because this is another precondition of globalization, as well as an important factor for mutual un derstanding. With the mutual recognition and understanding globalization can be achieved and can have a better development. It is true that there may be some negative effects of globalization, however, with its more merits , we have to admit that the trend of this tide will continue.
Sustainable Dive Tourism in the Red Sea
sustainable Dive passistry in the redness oceanAbstract oceanrch has shown that the shipboard soldier and red precious chromatic useats at heart the ablaze(p) sea are cosmos subjected to levels of ill-use from the effects of plunk event activities in the arenas that evictnot be sustained in the long term. With this area of touristry set to increment dramatic only(a)y within the next decade, at that place is an pressing acquire for the effort s consumeholders and environs organisations to work unitedly to breach and implement sustainable plunk tourism policies that bequeath each(prenominal)ow the naval eco-system to recover, or at to the lowest degree halt the received pace of degradation.The explore conclusions from this lease show that at that place is a terra firma(a) go outingness on the unwrap of the come down consumer to accept the need for such(prenominal) cling toion policies. At present, this is not a station that is shared by all of the industry shareholders. This study highlights the fact that there is an urgent need for dive tourism stakeholders, irrespective of this individual goal, to work together in partnership in order to develop systems and policies that will push and protect the fascinating naval and precious precious chromatic intent that exists beneath the bolshie Sea for the enjoyment of future tense(a) generations. skirt of Contents (Jump to)AbstractChapter 1 Introduction1.1 Introduction1.2 Aims and Objectives1.3 OverviewChapter 2 Literature Review2.1 Introduction2.2 oceanic tourism surroundal thing2.3 naval surroundings protection2.4 sustainable come down tourism2.5 The Red Sea and nosedive tourism2.6 succinctChapter 3 Methodology3.1 Introduction3.2 Choice of seek method3.3 The questionn businesses and interviews3.4 work of the researchChapter 4 Research Findings4.1 Introduction4.2 result to corpo mark questionnaire4.3 Response to dive club questionnaireChapter 5 Analysis an d discussion of findings5.1 Introduction5.2 Research findings5.3 DiscussionChapter 1 Introduction1.1 IntroductionAs some academics acknowlight-emitting diodege, including cook (2000), Ryan and Page (2000) and Mowforth and Munt (2003), since the liberalisation of transport in the middle part of the lowest century, tourism has become the terra firmas fastest growing and largest industry. This is manifest by the fact that over the past dickens and a half decades multinational touring car arrivals make grown by nearly ternary (Weaver 2005, p.2) and by 2020 this go through is expected to exceed 1.6 billion. As El-Adli and Bashandy (2003) rightly ob do, globalisation and technological advances, which allowed international travel to become accessible to the masses, has been partially amenable for fuelling this growth pattern.Initially, this blowup of tourism took the form of mass excursions, such as package tours with travellers flocking to the areas of beach, sea and sun, usually for a two week spend vacation. However, more(prenominal) new-fangledly an increasing play of holidaymakers meet become more discerning. Encouraged by media attention on foreign locations, the mass tourist sector has given way to the traveller seeking a modern and more fulfilling get wind, wanting to explore natural habitats that are foreign to their interior(prenominal) experiences. As a result, due to the uniqueness of their climate and geographical position, the worlds development countries chip in become the point for those travellers who want to experience premierhand the wonders of genius and its exotic species of fauna and wildlife (Mowforth and Munt (2003, p.1).One area of nature that has oddly attracted the attention of this new breed of tourist is the growing by-line in experiencing the beauty of shipboard soldier life in its natural setting. This has led to an explosion of diving event tourism throughout many areas of the world, particularly the n aval get down regions off the coasts of countries wish Australia, the Caribbean and the warmness East, which boast some of the worlds most unusual and exotic species of underwater plants, fishes and shipboard soldier life. For many thou spines of people, diving in exotic locations throughout the world is a tourism experience that cannot be equalled by any an opposite(prenominal)wise water sport or waste activity, hence its increasing popularity.Perhaps understandably, realiseing the recent increase in pertains some the detriment that human activity is make to the planet and its natural milieu, it was not surp come up that the explosion of marine tourism attracted the attention of milieualists, concerned some whether the natural environs could survive the impact of this growth. This has led to a superfluity of research studies during the past two decades seeking to assess the level of disparage marine tourism is causing to the inhabitants of these natural environment s. The consensus is that the present growth rate poses a real threat to marine life and that mea accrediteds need to be adopted within the tourist industry that will reduce and face-lift these risks (Weaver 2005). In otherwise words diving tourism must keep to adopt and implement a more sustainable form _or_ system of government.In formation what is meant by sustainable tourism, McKercher (quoted in Ryan and Page 2000, p.157) endured the following explanation Sustainable tourism is defined as when tourism is sustainable, the natural and cultural resources and the environmental, sociable and economic well- existence of an area are maintained forever.However, with the international tourism industry having effectively been given a free reign to develop throughout the world (El-Adli and Bashandy 2003, p.1), the difficulties macrocosm faced is how to resolve the conflicting demands of all the stakeholders within the marine destinations in order to reach agreement upon policies tha t will shroud the conflicts of over-use and environmental change. As some academics remark, there are those who designate that the term sustainable cannot be applied to an industry that is seeing close unparalleled growth and which, by its very nature, demands environmental prostitute as infrastructure is created to house these tourists (Wahab and Pigrim 1997, p.2). Others believe that it is imperative that new sustainable tourism products are intentional to limit the environment suffering being caused to marine destinations (Buhalis and Costa 2006, p.4). However, as these actors admit (ibid, p.230), the problem is how to resolve the dichotomy of creating products that go steady tourists goals and ensure sustainable growth.It is the publish of balancing the needs of the marine environment with those of the tourism industry, particularly as it relates to diving, that has prompted this research study. To provide a focus for this research it is intended to use the Red Sea are a of the Middle East as a case study. The reason for this election can be found in Sarha et als (2004, p.1) overview of the area, which can be summ swot upd as follows The Red Sea is ace of the most important repositoriesIt has attracted a significant increase in tourist activity, particularly divingTourism accounts for 10% of Egypts GDP and 4% of employment1.2 Aims and ObjectivesWith the concentration of this research being related to the Red Sea, the figure of the study is to identify the level of damage being caused to the marine environment within this destination and to judge the current level of sustainable measure that are being introduced to address these ejects. From this evaluation the research will provide an assessment of the effectiveness of sustainable diving tourism in the region.To assist in focusing upon and achieving the aims draw preceding(prenominal), the following objectives let been set for the research being conducted Marine environmentTo provide an ov erview of the marine environment, which will include an question of the types and causes of the damage that is being done to this environment and the programmes designed to address this problem.Diving TourismTo provide a greater mind of the attractions and component factors related to diving tourism, specifically its relationship to exotic locations. This will include an overview of the current standards that are relevant within this sector of the tourism industrySustainable tourism for the diving industryTo assess and evaluate the current sustainable programmes that are being recommended and introduced into diving tourism. The assessment will conduct measures being considered by all stakeholders, including the diving industry, tour operators, destination managers and the international community.In all of the above objectives particularly attention will be paid to their relationship to the Red Sea marine environment in the Middle East.1.3 OverviewIn chapter two a critical liter ature is undertaken, which is intended to focus upon the main issues that arise from the aims and objectives of the research question, videlicet the environmental impact of marine and coastal tourism. This round off will too focus upon the contri neverthelession that diving has upon this situation and an examination of the diving tourism in the Red Sea area together with an overview of some of the actions that are being taken to address this problem. Chapter three provides an overview of the methodological psychoanalysis used for this research, which includes and explanation of the reasons for this choice and the process by which supplemental and ancient data was collected, analysed and evaluated. Following on from the methodology outline, the findings from the analysis of both the subaltern and ancient researches are presented in chapter four and these are discussed in decimal point in the following chapter (5). The research is then brought to a conclusion in chapter six, where appropriate observations and recommendations are make. Attached to the main body of this research is a bibliography of the resources relied upon for the study together with appendices containing other development that is considered of value. This includes copies of the aboriginal questionnaires and interview transcripts.Chapter 2 Literature Review2.1 IntroductionAs previously mentioned, sustaining the natural habit of the marine environment in the face of its increasing attr alive(p)ness to tourists, particularly plungers, has become a contentious issue. in that location are many stakeholders to consider when looking at the process of sustainable tourism and, achieving a brace between financial reliance and environmental protection, especially if the resort has no prior knowledge in dealing with these issues, has proved to be pregnant with difficulty (Weaver 2005, p. 26 and 61).This critical literature review is intended to consider the currently published arguments and d iscussions that address these various issues and provide a deeper understanding of the problems that need to be resolved with all the wide variety of stakeholders.2.2 Marine tourism environmental issueThe marine environment forms an important part of the worlds eco-systems. It not only provides a source of forage and other natural resources for some of the worlds population, but to a fault is in itself a living environment that is home to wide tramp of underwater plants and living creatures. Each of these relies upon the other for their waitd life (Cote and Reynolds 2006, Carleton enlighten and McCormick-Ray 2004 and Roberts 2007). Furthermore, it similarly influences the CO2 levels within the atmosphere. The bio- differentity that exists beneath the oceans can therefore be seen to be important to the natural balance of the planet and any issue or activity that upsets this balance is likely to confine serious consequences to the long-run health of the world and its population .Of particular importance to this research is the area of the marine environment that includes the chromatic lower eco-system, as this is the area that attracts the highest level of tourist involvement, attracting millions of visitors each year. As can be seen in from table Table 2 included in appendix 1, there are a number of coral reefs world wide, covering a total area of just under 285,000 km2.The eco-system of the coral reef is unique in the assorted level of services these regions perform within the biodiversity systems and the range of products it contains (see table 1). there invite been countless studies over recent years that have put down the levels of damage that can be caused to coral reef and the manner in which this affects the ability of the reefs to sustain their eco-systems in the longer term. The studies of Jameson et al (2007), Cesar (2003), and Agarwal and Shaw (2007) are amongst recent academics who warn that ignoring these issues will have serious adverse consequences. Although causes of damage have been highlighted to include such factors as increases in carbon emissions, the consequence of air and sea travel and marine faming and fishing, diving tourism has as well been shown to have a direct impact on the reef in this respect. so it has generated its own expanding area of research attention (Ryan and Page 2000, p.275). In general it is considered that damage from diving tourism manifests itself in the activities of several industry stakeholders The diving fraternityNumerous academic studies have been conducted to assess the level of damage caused to the coral reef by divers (Cesar 2003, barker and Roberts 2004 amongst others). Most have concluded that inexperience within this marine environment is one of the theme causes of this damage (Barker and Roberts 2004, p.482).Hawkins and Roberts (quoted in Cesar 2003), attributed 95% of all diver coral damage being the result of misuse of fins and hands, for example by kicking or bru shing against the coral or using hands to grab onto coral and propel the diver through the water. In addition, insufficiency of care with equipment is other contributory factor. Lack of buoyancy training or knowledge will ofttimes result in a situation where a divers scuba equipment will knock or fall against the coral, causing breakages. These results are confirmed by other studies carried out by Barker and Roberts (2004), who recorded 261 incidences of contact being made with the coral whilst observing 353 active divers, in other words incidences were give-up the ghostring in approach 74% of dives. However, the also found that when accompanied by guides, this level of accident fell by around 80% (barker and Roberts 2004, pp. 485 and 488). This proved to the authors that guided dives were an important element of marine protection policies.The destination resortIncreased levels of diving tourism have had an impact upon the local infrastructure of the resorts. To meet the demands of these tourists, in some cases sand is being taken from the beaches in order to fulfil construction requirements for lying-ins such as hotels ( portmanteau word 2000, p.1023). In other words, through these and other actions, resort hotels and other service providers and retailers are damaging the reefs to provide their businesses with better opportunities (Mowforth and Munt 2003, 282).Furthermore, the continual expansion of tourism resorts in coastal areas is creating more sewage and other trumpery than local infrastructures can handle (Brown 2000, p.48), which meaning that some of this effluence is finding its way into the seas surrounding the coral reefs. The level of waste that is being produced increases the incidence of damage caused to the fragile eco-system of the coral reefs.Tour operatorsTour operators, whether these are international tour companies or local tour operators such as diving clubs are also criticised by the environment community, mainly because of the dama ge their methods of operations cause to marine sites. This criticism relates generally to two main issues. The first is the lack of knowledge and training that they provide to the diving tourist and and so the lack of supervision (Agarwal and Shaw 2007). Research like that undertaken by Gladstone (2000) and Wilkinson (2006) indicates that when divers are being instructed and supervised in groups, the level of damage reduces significantly.The other criticism levelled at tour operators is aimed at those who use boats as platforms from which to make diving excursions. As Weaver (2005, p.83) and Prior et al (1995) point out, the drop and dragging of anchors can and does damage corals. This area of activity has change magnitude latterly because beaches have become more exclusive in some exotic areas, Restricted from beach access, independent operators have had no choice but to move their operations to sea (Hess and El-bakry2007).National and local authoritiesThe other stakeholder wh o actions, or inactions, have an impact upon the marine coral reef environment are the local and national governments and authorities. The problem in this respect is often related to the condition of the national economy and that countrys position in terms of economic growth compared with other nations (Cote and Reynolds 2006). Many coral reefs are situated close to developing countries. Many governments in developing countries, either due to lack of resources and the need for the revenue produced from marine tourism, lack the political will or inclination to take steps to protect the marine environment, irrespective of the consequences (Wilkinson 2006 and Roberts 2007).As can be seen, the actions of all of the above contributing causes of damage are leading to the depletion of coral reefs at sea (Brown 2000, p.69). It is against the difficulties outlined above that marine environmentalists have needed to develop marine protection deemed acceptable by all industry stakeholders.2.3 M arine environment protectionAs Cote and Reynolds (2006), Carlton-Ray and McCormick-Ray (2004) and Orams (1999) research reveals, there have been a number of proposals put forward by various interested parties that are designed to reduce the impact of diving tourism on the marine coral reef environment. Some of these measures, including more supervision, charging fees to allow tourists to take part in dives in specific areas and closer control of resort planning regulations had been right away aimed at improving other stakeholders behaviour.Some of these, including floating and submerged walkways (El-Adli and Bashandy 2003), are designed to improve environment use and enjoyment. However, other protection measures have been more restrictive. For example, a method of zoning is being implemented in a number of marine areas, which are seen as a means of prohibiting diving in areas that are considered particularly sensitive. Similarly, the use of mooring buoys for boats, whilst cut back the damage caused by anchors, can also be used in conjunction with zoning to direct divers away from certain marine areas (El-Adli and Bashandy 2003).2.4 Sustainable diving tourismTourist destinations and tour operators have all be quick to exploit the expansion of recreational diving activities in areas of marine beauty (Wahab and Pigrim 1995, p.284) and that includes enjoying their hobby in the more exotic areas of the world that include the coral reefs eco-systems (Mowforth and Munt 2003, 147). Most observers and academics and observers are of the opinion that if they wish to continue with this pleasure activity, divers and their organisations need to change their practices to a more sustainable form (Mowforth and Munt 2003, p.4). As organisations such as the Coral Reef federation (2008) advice suggests, many of these conservation measures are based largely on honey oil sense.For example, perhaps the most basic tone of advice is that which promotes the escorting of skills su ch as buoyancy and avoiding physical contact with the reef (Kenally 2006). These skills will eliminate damage being caused either by physical or equipment contact. Another aspect of good diving is to stay clear of the sea bed and learn body control that avoids accidental contact (Coral Reef Alliance (2008).In addition to this advice for diving activities whilst in the water, the Coral Reef Alliance (2008), also provides the following recommendations for divers when they are shore-side, which consists of the following Support coral lay and other conservation projects byPaying user fees in accept coral parks and conservation areas that are actively supporting coral reef conservation.Encouraging and supporting the use of dive moorings.Participating in cleanupsVolunteering your skillsDonating used equipment such as cameras, dive gear or reef ID books.Avoid purchasing souvenirs made from coral, turtles or other marine life -often this is illegal, and its never environmentally wise.Spea k up make sure your dive buddies understand these simple but important conservation practices. tooth root Coral Reef Alliance (2008)2.5 The Red Sea and diving tourismA stated previously, the increase in diving tourism is rising exponentially and there is little sign of this rate decreasing in the near future (Gladstone 2000, p. 1016). Although this endangers coral reefs throughout the world, as Prior et al (2007) and Harriott (2002), suggest, one of the most vulnerable sites has to be the Red Sea (see figure 2). As Hess (2007), also explains, because of its location in relation to Europe and other world nations, the coral reefs in the Red Sea act like a magnet in terms of attracting diving tourists, which places an additional hindrance upon the marine environment.Although, at least up to 2004, the condition and status of the coral reefs bordering the Red Sea and Gulf of Aden is generally good, with live hard coral cover averaging 20-50% (Hassan et al 2002), research carried out sin ce that comment was made indicates that there potential issues in terms of diving damage to be communicate in the area.Egypt is planning to continue the expansion of its tourism industry, for which it has set a target of receiving 16 million tourists by 2017 (Shaalan 2005). A segment of this increase tourist population will be attracted by diving activities, act a trend that has been evidenced since the turn of the century (see table 2).Already, with in excess of 250,000 dives per annum along part of the Red Sea coast, other research has revealed disturbing evidence of coral reef damage from diving activities. For example, in a survey conducted by Zakai and Chadwick-Furman (2002, p. 179), significant evidence of diver damage was reported. This survey reported the following conclusions Around 10 incidents of coral damage per dive, ranging from sediment to contact damage.Damage levels were related directly to the frequency of diving activities, and were not affected by the geographi cal design of the area.Similarly, contrary to Hassan et als (2002) research, a similarly study carried out by Cesar (2003, p. 7), refuted claims that the coral reef remained unaffected, reporting in this case that 40% of dive sites have less than 30% coral cover, with one third having significant levels or broken and damaged corals.The consensus of opinion amongst academics who have studied this specific location, which includes Gladstone (2000), Cesar (2003), Zakir and Chadwick-Furman (2002) and Shaalan (2005), is that without the introduction of serious levels of marine protection and diving control policies, the current levels of damage to the marine eco-system in the area will be exacerbate. This qualification lead to irreparable damage to this environment.As Shaalan (2005) also comment, all of the stakeholders, including the government, tour operators and resort managers and the divers themselves, have a role to play in introducing a range of policies and practices to ensure a level of sustainable tourism will be achieved and halt the current degradation to the coral environment that is taking place.These concerns are aptly summarised by Jameson et al (2007, p. 309) who state that From a historical perspective, at the Small Giftun site from 1987 to 1996, percentage hard coral cover decreased by 43% and algal cover increased over fourfold. If the diving tourism industry is to sustain itself in the Egyptian Red Sea, every management effort must be made to minimise controllable sources of stress on the coral reef system.2.6 drumheadFrom the analysis and examination of the literature indentified within this chapter, it is apparent that the marine environment is being subjected to environmental damage. Furthermore, whilst there might be some vindication for those within the diving community to say that they and their activities are not completely responsible for this damage, to major(ip)ity of research studied indicates that there are adapted levels of da mage being caused by this sector of the tourism industry to example the need for protective action.In addition, current decisions being made regarding the future of tourism in Egypt, which suggests that 55% of the future growth is anticipated to occur within coastal regions along the Red Sea (Hawkins and Roberts 1994), confirm that the goad of need to implement sustainable practices and policies to protect the marine and coral reef environment in the region. Furthermore, it suggests that the timescale of this introduction is limited.The results of the primary research conducted for this study, which also concentrates upon the Red Sea area (see chapters 4 and 5), will provide an indication of the levels of accountability felt by stakeholders in the diving sector and the level of their lading to change.Chapter 3 Methodology3.1 IntroductionThe research question chosen for this research, namely to study the impact of diving upon the marine and coral reef environment was motivated b y two main situations. Firstly, it is intended to examine this issue in an area that has indicated a preparedness to increase the current levels of diving tourism within the next decade by significant numbers. Secondly, the complexities of stakeholder demands within the region suggest that the creation of marine environmental protection policies that will satisfy the needs and of all those involved. Bearing in mind these limitations, the aim of the research therefore is to evaluate the effectiveness and efficiency of current and future sustainable tourism policies in the region, specifically those related to the diving sector.There has been a considerable amount of research conducted into the environmental damage being caused to the marine environment and eco-systems of the coral reefs in the Red Sea. However, despite these advances, it is the authors view that, although the plans and policies for sustainability suggested by various environmental academics are to be applauded, their successful implementation is dependent upon the views of others. Unless agreement is reached between all the stakeholders to take action any new initiative is doomed to failure. Therefore, a major part of the focus of this research project is to assess how and if the views of commercialised stakeholders and diving service users, in other words the divers themselves, coincide with those of the policy makers.3.2 Choice of research methodAny study relating to issues of a commercial or economic nature can be conducted through the choice of a number of methods. The options available consists of research study using vicarious data collection processes, which can combine a case study investigation with pre-existing literature of sufficient expertise to provide an great overview of the subject matter. Alternatively, the research can choose the more focused bridle-path of conducting questionnaire and interviews with representatives from the sector being studied. In the case of this spec ific research into diving in the Red Sea, it was decided that, in isolation, the independent use of one of the above would not provide sufficient depth the research project embarked upon. It was therefore the authors decision to use a combining of both methods as this was deemed to enable the achievement of a more valued resolution to the research question (Denscombe 1998).In reaching this decision, the author also considered the limitations that can apply to these research methods. For example, one area that is often of concern with the collection of primary data is the achievement of an appropriate sampling that would serve as a sufficient representation for the industry as a whole. The issue to be aware of in this case is to ensure that, whilst the primary process can result in the revelation of data and information that might be difficult to obtain through other methods, its analysis should be kept free from personal or organisational bias. One method of ensuring the lack of bi as, which contributed to the authors choice of research method, is to use the secondary data collected for the process of cross-referencing and comparison with primary findings. This ensures that the research retains a balanced and accurate approach to the issues and results being studied.3.3 The questionnaires and interviewsIn view of the issue of diving and marine conservation being studied for this project, the process of primary data collection in this case
Tuesday, April 2, 2019
Study on the issues of organizational structure
Study on the issues of organizational body twist reappearance on organizational social body anatomical bodily structure, in particular hospital structure has suffered a great deal of transformation over the past few decades. The structure not only represents the culture and position, but in like manner exhibits and evaluates the correlation amidst individuals who work at bottom a hospital, so as to facilitate the productivity and job skill (Madden, Courtney, Montgomery, Nash 2006, p.283). Laschinger, Finegan, and Sharmian (2001, p.60) indicate that a reasonable organizational structure has signifi sack upt impact on promoting work efficiency in hospital, indeed weaken health administer service house be precondition to uncomplainings. Moreover, it is considerred that the shape of organizational structure can be largely affected by different factors, such as organizations imagination, relegating, and strategy (Madden et al. 2006, p.272). Consequently, a intimately -structured health take organization will facilitate self-development, so as to enhance satisfaction on both perseverings and employee.1.2 Thesis StatementA critical psychoanalysis of the organizational structure and the dealingship to the accusation and vision in regards to deem Repatriation General infirmary in Sydney, Australia.1.3 ScopeThis paper will be separated into three sections, which contain background information of the health cargon facility, so critically consider the organizational structure in relations to its thrill, and last but not least, a sound reasonable oddment and recommendation will be elicited according to analysis.Background culture of the Health C atomic number 18 FacilityThis paper will direction on the critical analysis of Concord Repatriation General Hospital, which is in like manner simply know as Concord Hospital in Sydney, Australia. Concord Hospital represents not only one of the close superior hospitals with the provision of a clutc h of sparety yard bird and outpatient services in Sydney, but in like manner an educational facility for offering training and placement opportunities for medical students. Moreover, the hospital has make up a comprehensive system, which received highly appreciation by Australian Council on Health shell out Standards for providing timely and excellent patients care, in particular, destroy Unit plays a major role across the states (Concord Repatriation General Hospital (CRGH), 2009). jibe to Concord Hospital (2008), the combined mission controversy and vision state that practising clinical excellence, leading in t apieceing, contributing to health research, responding to the special needs of Veterans, and changing with the needs of the community. And this can be achieved throughout victorious care of individual patient needs providing eccentric services promoting aim-headed lifestyles as healthy as valuing health care teams (CRGH, 2008). Thus, from its organizational item of view, the primary or principal goal of Concord Hospital is more consumers concentrated, in order to provide weaken health care services. For example, a five-year programme finished by the hospital in 2006 in regarding to great works provides assistance in the expansion of care and services for patients in several areas, such as Aged Care and Rehabilitation, co-locating some specialties outpatient and inpatient services, so as to bring benefits to both patients and non-patients (CRGH, 2008).Figure 1 illustrates the flesh out organizational structure of Concord Hospital. It can be seen that there are five branches smooth the stairs General Manager, which comprise handler of Medicine, Director of Nursing, Director of Corporate and Clinical Support Services, Director Performance and Informatics, as well as Demand Management Unit. The Academic and Research lies alongside with the colligate of broken line (CRGH, 2008).Figure 1 The detail organizational structure of Concord Hos pital (CRGH, 2008)CRITICAL ANALYSIS3. 1 Critical analyse the hospital organizational structure in relation to its missionAccording to Figure 1, the organizational structure of Concord Hospital can be treated as line or running(a) structure, as it classifies besides disciplines together (Robbins, Bergman, Stagg, Coulter 2006, p.336). It is shown that both its mission accomplishment, and hospital collaborates its structure with mission are more likely to reflect positive employee action (Bart, DeGroote, Bontis, Taggar 2001, p.19). In addition, this organizational structure not only enormously shows the culture and target of the hospital, such as build up Anzac Research Institution, but also offer a clear line of office, which points out the power structure lies within different departments, so as to maximum benefits healthcare services to patients and employee (Madden et al. 2006, p.283).3.2 The advantages and limitations of the structure for health care deliveryConcord Hospital i s more establish upon a creation of functional structure. Chain of command, as a concept of organizational design states the berth is developed and ranked from upper train of the hospital to its lower position (Robbins et al. 2006, p.327). According to figure 1, the chart deploys the hierarchy from the advanced to lower level position, for example, Director of Nursing to Assistance in Nursing. Critically speaking, this face of organizational structure shows the ability of economizing expenditure, it can be considerred that this organizational structure not only minimizes the recurrence of employee and capital, but also increases the efficiency in use of resources, so as to deliver better quality of care to patients in a particular treatment unit. By contraries, it cannot be denied that professionals or staff can be isolated to a lower place this structure with very limited information in regarding to other departments work. Again, the privation in exchange of thoughts between employees may induce the downside of quality in healthcare services that provided to patients (University of Western Sydney (UWS)2010, p. 19).3.3 The key lines of authority and right for achieving organizational goalsThe key lines of authority and duty in Concord Hospital to be broken down into several subordinates. According to figure 1 (CRGH, 2008), each level of authorities from upper to lower level has been detailed illustrated under different specialties. It is believed that the authority is generally derived from managerial level, and then tasks are condition to employee to complete (Robbins et al. 2006, p.327). In other words, for those who are in higher level have preponderant rights than lower level employee. This organizational structure also purely explains the hierarchy of work, and the responsibility of each level(Madden et al. 2006, p.283). For instance, nursing manager has sheer(a) authority and occupies full responsibility in managing nursing related stuff. It can be thought that authorized person needs to utilize resources expeditiously and effectively, thus assists in achieve organizational goals via granted lines of authority and responsibility (Chandler 2003, p.48).3.4 The profit of the structure in relation to the doing of the organizations mission and goalsThe utility of the structure of an organization should encourage in the achievement of organizational mission and vision. It breaks down organizations employee into specific sections, in order to produce harmonious valuation account between each other (Mintzberg, Quinn, Ghoshal 1995, p. 352). It is obviously that Concord Hospital establishes a full range of departments for providing better quality of care to patients. For example, the Centre for knowledge and Research on Ageing (CERA) links the hospital itself with its teaching university focus on the provision of effective care, and better their living standards among ageing patient group (The University of Sydney, 2010). This a ccordingly shows the comprehensive quality of care to be given to a specific group of patients in order to enable the hospital missions which are providing quality services to patients, leading in teaching, contributing to health research to be accomplished (CRGH, 2008).3.5 Aspects of the structure which facilitate or interrupt performance and potential solutionsOrganizational structure can be seen as an effective tool for promoting interaction between various departments within an organization. in like manner the distribution of responsibility between specialties in the hospital aims to speed the combining of healthcare services among patient (Stoelwinder, Blandford, Perkins 2006, p.319-320). The traditional structure is used by Concord Hospital which classifies same groups of professions into one specialty, it can be seen that this type of structure mainly concentrate on professional training and development, then better quality of care can be given to patient. Nevertheless, it is undeniable that the structure affects the provision of efficient healthcare services, as health professions are grouped into different facilities, which leads to the lack of coordination and communication between departments, thus compromise on healthcare to be given to patient. Whereas, some mixed structures can be considered under this circumstance, such as a traditional functional structure mixes with product structure, so as to not only benefits healthcare professions, but also brings much more attention to patient care (Stoelwinder et al. 2006, p. 322).4. CONCLUSIONThis paper concentrates on the critical analysis of organizational structure and relationship to mission and vision for Concord Hospital. The hospital is one of the most superior hospitals with the provision of a range of specialty inpatient and outpatient services in Sydney. Concord Hospital has a combined mission statement and vision, and this can be achieved throughout taking care of individual patient needs providing quality services promoting healthy lifestyles as well as valuing health care teams.The organizational structure of Concord Hospital by using line structure shows that its mission accomplishment, and hospital collaborates its structure with mission are more likely to reflect positive employee action. Moreover, it can be considered that this organizational structure minimizes the recurrence of employee and capital, as well as increases the efficiency in use of resources, so as to deliver better quality of care to patients in a particular treatment unit. By contraries, it cannot be denied that professionals or staff can be isolated under this structure with very limited information in regarding to other departments work, the lack of communication results in the downside of quality in healthcare services that provided to patients.The key lines of authority and the duty in Concord Hospital to be broken down into several subordinates. It is believed that for those who are in hig her level have predominant rights than lower level employee. Furthermore, the utility of the structure of an organization assists in the achievement of organizational mission and vision. Overall, the structure of Concord Hospital is considerably well designed. It is obviously that the hospital establishes a series of full range departments and specialties for providing better quality of care to patients. The organizational structure in terms of type, authority lines, and structure utility has largely impacts on its organizational mission and vision.
Monday, April 1, 2019
Holes By Louis Sachar: Character Analysis
Holes By Louis Sachar Character AnalysisIntroductionHole is a young write by Louis Sachar and has already won Newbery Medal. The plot of the novel is about the breeding of multiple characters and a leading character with whom the whole story of the novel is linked. business relationship is written in main two parts referring as flashback and current or present situation.Characters in the StoryThe major characters in the novel are Stanley Yelnats and Zero ( push around Zeroni). Present characters are Stanley Yelnats, Mrs. Bell, Stanley Yelnats III, BarfBag, Alan, Theodore, Jos, Ricky, Twitch, Attorney General, Ms. Morengo, Clyde mellifluous Feet Livingston and Mr. Sir. Other past characters are Elya Yelnats, Madame Zeroni, Stanley Yelnats II, Kate Barlow, Myra Menke, Igor Barkov, Charles Trout Walker, surface-to-air missile, the Onion Man, Mary Lou and Sheriff.Brief Overview to StoryThe storyline is the story occurred in past along the present storyline. Stanley is an regrettabl e young boy because his family had been harassmentd for humankindy ages before his great-great gramps had not kept his promise. Stanleys father was a failure inventor and after inventing something apply waste tennis ball. Financially Stanleys family was poor and believes that it is the result of the aversion that his family has been passenger car for ages. On the other side t present is another story of Kate Barlow who is an quick lady and teaches in unmatchable class room school. She used to jazz Sam the onion boy who a black guy. The townspeoples people were anti-Semite(a) and did not like Kate in love with a black man to whom Kate love because he was a nice man. One day Sam was killed after Kate kisses him and the death of Sam moulds Kate furious that she decides to take revenge of Sams death. Stanleys great-great grandfather Stanley I, who had not kept his promise, migrate to America and earn money just now he was robbed by Kate Barlow and after that Stanleys family consistently facing financial crises. In present situation Stanleys was falsely accused of stealth and trialed. At the demise of the trial he was asked to choose either going jail or jet plane Lake Camp. Since Stanley has everlastingly thought it as some kind of pass camp he chooses going gullible Lake Camp. Having reached the camp it was revealed on him that the Green Lake Camp is not in any way like summertime camp and on the contrary it is rather a digging camp. here(predicate) Stanley somehow adjusted and began to part in the digging. He overly makes fri closedowns here like Zero (Hector Zeroni). One day Stanley finds that the warden is after something as she was keenly interested in digging. Stanley with his friend Zero finds the treasure which later cognize as his grandfathers lost treasure and he becomes legal owner of the treasure. any of explosive Stanleys fate turns in to his favor and his father finds the formula for removing feet stink and Clyde Sweet Feet b ecome its primary endorser. Zero has confesses that he stole the post I actual, just because he lived by himself and was compel steal to survive. The sudden change in fate stems from the reality that Zero was actually Hector Zeroni, and was the great-great grandson of Madame Zeroni. The promise was eventually been kept. A Yelnats lifted a Zeroni up to the mountain, carrying the curse and changing his familys fate.Comparison of Stanley Yelnats IV and Kate Barlows LivesKate Barlow was a humble, kind and intelligent lady. zippo has thought that this kind lady impart turn to become revengeful person and will cause the destruction and unhappiness of someone look. Kate Barlow was a teacher and teaches in a one-room school in Green Lake one hundred and ten years before it was made Camp Green Lake. She was in love with a guy Sam he sells onions in the town. Kate loves him because he was compassionate, brave, and elegant. Sam was a black man and the people of town were racist and did no t like when they know that she loves Sam. Though Kate was a innocence herself yet she was not racist and believes in good and nobility. Kate was very happy here to find a true love in her bearing and it was her the luckiest moments when she knows that she is in love with Sam. But the death of Sam was revealed as grim for her and it was the most jinxed moment of her life because the death of Sam turns her life into another direction. Death of Sam makes her revengeful and later she lived a idiotic life. She later on robs Stanleys great-great grandfather and thus Kate Barlow and Stanley Yelnatss family get connected into range of mountains of life.Stanley Yelnats, who was an ugly as he was three times heavier than other dominion boys and poor young boy, was great-great grandson of Stanley I who was robbed by Kate Barlow. Stanleys family had been poor and suffering from financial crises since his great-great grandfather was robbed by Kate Barlow. Stanleys family has another trag edy in their life as his family was cursed due to miscommitment of his great-great grandfather with Madame Zeroni. The great-great grandfather of Stanley was in love with Elya Yelnats and wishes to hook up with her but her father had builded her marriage with the big pig. To him, he will allow the marriage of his daughter with the man who brings the biggest pig. Madame Zeroni helped the great-great grandfather of Stanley on the delimit to take her up on the mountain to drink stream water. Her condition to take her up on the mountain was so intense that she would curse him and his generation if he had not taken her up for helping him. overdue to some reason he could not manage to bring her up on the mountain and they migrated to America. Here he was robbed by Kate Barlow and after that he thinks that he got Madame Zeronis curse. Due to this event Stanley and his family always think in the like manner and believe that they are unlucky and cursed. However, being accused of theft w hich was false and he had not committed the crime was fiercely unlucky of him because he was punished for the crime which he had never committed. At the end of the trial when he was asked to choose to go either to jail or Green Lake Camp, he chose to go to Green Lake Camp because he had always dreamed of summer camps and thought it one of them. But it was very ill of him when he reaches at the camp and sees that there was neither a lake nor it was special K and that his decision of coming here was wrong. Apparently feels himself unlucky because there was so much hardworking involve in the camp. Boys were here to dig for expression their characters. He had not realize that destiny intends to change his life and make him lucky. He began to digging here and one day he realized that the warden is after some treasure. He eventually finds the treasure and got released from camp as a result of being proved that he is innocent. The treasure that he found later came to know that it was t he same value which Kate Barlow has robbed from his great-great grandfather and inhumed it here. Fortune was so much in his favor that his fathers formula also works and it was successful.
Subscribe to:
Comments (Atom)