Sunday, May 17, 2020

Indian Ban On Tobacco Advertisements - 1469 Words

INDIAN BAN ON TOBACCO ADVERTS IN FAVOUR According to the World Health Organization (WHO), tobacco accounted for over 3 million deaths in 1990, the figure rising to 4.023 million in 1998. It is estimated that tobacco related deaths would rise to 8.4 million in 2020 and to 10 million in about 2030. Internal industry documents released in the United States, described 14 – 24 year olds as â€Å"tomorrow’s business†. However, a study on tobacco consumption and employment, showed that effective policies to reduce smoking were likely to increase, and not decrease employment. The reason for this was that when people stopped smoking, the money did not disappear from the economy. It was spent on other goods and services, which showed, were more labor intensive. This in turn produced more jobs. On February 6th, 2001 the Government of India (GOI) announced that it would in a short time table a bill banning Tobacco Companies from advertising their products and sponsoring sports and cultural events. The objective of such a ban was to discourage adolescents from consuming tobacco products and also arm the government with powers to launch an anti-Tobacco Program. In view of the aforementioned, a study by the WHO concluded that, ‘the ban was not unusual keeping in view the international precedents’. Countries like France, Finland, and Norway had already imposed similar bans. In 1981, the Supreme Court (of Appeal) in Belgium ruled that the ban on tobacco advertising was notShow MoreRelatedBanning Tobacco Advertising Ban On The Public Health Of Their People976 Words   |  4 Pagesbanning Tobacco companies from displaying any source of advertising or sponsoring any public events. The advertising ban took effect from May 1, 2004. In October 2, 2005, the Government of India prohibited any new programs or movies from showing any actors or actresses smoking as it glorifies smoking and sends a bad message to its viewers. According to a CNN article written by Leo Juarez, some actors seem to support the smoking censorship but some film directors seem concerned that the ban might leadRead MoreEthical Challenges Of Tobacco Advertisements1170 Words   |  5 PagesETHICAL CHALLENGES OF TOBACCO ADVERTISEMENTS 1 Ethical Challenges of Banning Indian Tobacco Advertisements Poitier Stringer University of the People ETHICAL CHALLENGES OF TOBACCO ADVERTISEMENTS 2 Ethical Challenges of Banning Indian Tobacco Advertisements The tobacco industry has long presented ethical challenges for governments that are tasked with looking after the public good. Tobacco producers have provided significant revenue for many economies, yet they specialize in the manufacturing and distributionRead MoreThe Ethics Of The Indian Government959 Words   |  4 PagesTobacco Advertising was the hot topic it was in the late 90 s and early 2000 s, but it is still something we should strive to understand and functionally work with. The European Union and the United States have banned advertisements from television, while only the United States has banned tobacco advertising for sporting events. The Indian government had enacted an initiative to ban tobacco advertising in sporting events in 2001 to help curb the appeal of tobacco use in minors. The ethicalRead MoreThe Government Of India ( Goi ) Proposed Ban On Tobacco Advertising946 Words   |  4 PagesThe Government of India (GOI) proposed ban on tobacco advertising was not unusual keeping in view the international precedents. Countries like France, Finland, and Norway had already imposed similar bans. An example is Belgium whose Supreme Court (of Appeal in 1981, gave its ruling that a ban on tobacco advertising was not unconstitutional. In a case which started in 1991 and ended in 1997, RJ Reynolds Tobacco Company, marketer of Camel cigarettes, was forced to withdraw its mascot, Joe Carmel, anRead MoreThe Government Of India ( Goi ) Proposed Ban On Tobacco Advertising947 Words   |  4 Pages1. The Government of India (GOI) proposed ban on tobacco advertising was not unusual keeping in view the international precedent s. Countries like France, Finland, and Norway had already imposed similar bans. An example is Belgium whose Supreme Court (of Appeal in 1981, gave its ruling that a ban on tobacco advertising was not unconstitutional. In a case which started in 1991 and ended in 1997, RJ Reynolds Tobacco Company, marketer of Camel cigarettes, was forced to withdraw its mascot, Joe CarmelRead MoreIndia s Government Should Ban Tobacco Advertisements900 Words   |  4 Pagesthe issue of tobacco advertising, and weigh the merit of each opposing viewpoint on whether or not India’s government should ban tobacco advertisements. 1. Those vouching for the ban of tobacco advertisements in India say that doing so is not unconstitutional, as it is meant to guard health of the general public. They also advocate that the state has the right to step in, when the general interest of its civilians may be at possible risk. Additionally, it was said that the ban would not hinderRead MoreBan Of Ban On Tobacco988 Words   |  4 Pages Those in favor of the ban on tobacco advertisements and sponsoring of cultural and sporting events in India noted that they were not the first country to be taking these steps. In fact, many European countries had previously invoked bans on tobacco beginning decades before. In both Belgium and France the ban was deemed to be constitutional as the main motivator behind this ban was public health, and not necessarily the desire to stop the tobacco industry from partaking in trade. BeyondRead MoreBan On Tobacco By The Government Of India1078 Words   |  5 PagesBAN ON TOBACCO BY T HE GOVERMENT OF INDIA INTRODUCTION According to Brown Williamson Tobacco Corporation â€Å"From an ethical standpoint, it would be wrong to try to cause people to take the risk of smoking. But even beyond the moral issue, for a product such as cigarettes well known to have serious health risks, it would be difficult even to understand how an advertising campaign could be devised to convince people to smoke. India s tobacco problem is very complex; the quote above depicts how ethicallyRead MoreThe Ban Of The Tobacco979 Words   |  4 PagesFor me tobacco is one of the useful but useless products that are consumed by some class of the human race in general. In the year 2001 the Government of India had announce an intention to lay an embargo on the advertisement of tobacco in the media in general, in-order to prevent luring the younger generation from getting involved in this act and also to arm the government with powers to launch an anti-Tobacco Program. After the declarations made by the government there is a negative uprisingRead MoreTobacco Advertising And The Indian Government997 Words   |  4 PagesTobacco Advertising and the Indian Government An Analysis of the Case Study In February of 2001, India joined many developed nations in a long-held and ongoing debate; that of the ethical responsibility of government in regards to the advertising of tobacco products. By 2001 many other nations had already decided to either place bans on or strongly restrict the advertising of tobacco products in an attempt to curb usage and thereby avoid the ill health effects associated with the product. While the

Wednesday, May 6, 2020

Tyranny in Macbeth - 874 Words

The only character responsible for the tyranny of Macbeth is the man himself. Discuss. In the Shakespearian play, Macbeth cannot be solely responsibly for the tyranny that he causes. Macbeths close relationship with lady Macbeth and his own ambitions to become king lead him to many evil actions. This relationship causes many fatalities, which is turn leads to changes in the personality of lady Macbeth and this can be seen, as she has difficulty in coping with the situation that she has put herself in. However, slow reactions by other characters in the play, may have been the cause many unnecessary events to occur. But, theses may not have mattered is it wasn’t for the apparitions given to two characters by the evil sisters, these†¦show more content†¦This contradicts to the actions of lady Macbeth after the tyranny that Macbeth causes. The crazy state of Lady Macbeth, which eventually caused her death, could have been non-existent if she hadn’t been the motivation and just as much the driving force behind her husband’s ruthless leadership. On the other hand, there are some characters that are also somewhat responsible for their lack of involvement, or failure to react quickly to the suspicious murder of King Duncan. These two characters are Banquo and Malcolm; although they are not directly involved in the cruel regime of Macbeth, they could have reacted quicker and they may have stopped many unfortunate events from occurring. Malcolm fleeing the country it fear of his life, takes the eye off Macbeth and immediately makes him a suspect. If he had stayed and put forth his suspicion of Macbeth, he may have stopped Macbeth from ever even becoming king and therefore taking away the likelihood of tyranny in the paly. More importantly, the way in which Banquo dealt with the issue, and his hesitation to reveal the prophecies of ‘weird women’ cause his own fatality. However, Banquo may feel his actions can be justified as he has also received prophecies that he ‘should be the root and father of many kings.’ This all goes back to the evil sisters and their prophecies, which started all of theShow MoreRelatedTheme Of Kingship In Macbeth938 Words   |  4 Pagestechnique under th e rule of James I through the prevalent theme of kingship throughout Macbeth, demonstrating the tyranny of the fictional Scottish King as the antithesis of the English monarch. Disassociation is established throughout the play as Macbeth is instead affiliated with the Bolingbroke dynasty, upholding the Tudor myth. This is achieved primarily through illegitimacy to the throne as unworthiness leads to tyranny, and ultimately, monarchical abuse (McCauliff 22). This parallels the progressionRead MoreMacbeth834 Words   |  4 PagesThemes in Macbeth This resource is designed as a reference guide for teachers. We have listed the major themes and motifs within Macbeth and provided examples of scenes where you can study them. Themes †¢ †¢ †¢ †¢ Ambition Kingship Fate and free will Appearance and reality Motifs (Recurring elements and patterns of imagery in Macbeth which support the play s themes) †¢ †¢ †¢ †¢ †¢ †¢ Nature / The natural world Light and darkness Children Blood Sleep Visions Registered charity no. 212481 Read MoreThe Internal Thoughts and External Influences of Macbeth1178 Words   |  5 Pagesand events. Throughout Shakespeare’s Macbeth, the main character is faced with many pressures, both internal and external. Although his pressures are external at first, they later become internal and affect his character as well as his sanity. Macbeth feels externally pressured by his wife and the three apparitions given to him by the witches. Consequently, he begins to feel mentally pressured by his fear to secure the throne, his paranoia, and his sense of tyranny and blood lust. These pressures causeRead More The Breakdown and Restoration of Order in Macbeth Essay1299 Words   |  6 PagesThe Breakdown and Restoration of Order in Macbeth   Ã‚  Ã‚   When Macbeth kills King Duncan in William Shakespeares tragedy Macbeth, there is a breakdown of order throughout Scotland. This breakdown is evident through three main factors; within the person, mainly through Macbeth and Lady Macbeth, through the kingdom and through nature. From a completely ordered nation into the depths of chaos - Scotland collapsed from the lack of strong leadership. In the end, when resolution is reached, thisRead MoreMacbeth : Macbeth 1411 Words   |  6 PagesPeter Klimek Mrs. Moeller Macbeth Rough Draft 3/7/16 Ambitionz Az Macbeth Macbeth is a character in a play by Shakespeare with a tragic flaw. He had a quick rise to power and shortly after that a fall. Macbeth’s tragic downfall is a consequence of his vaulting ambition which is fueled by greed, fear and arrogance. Lady Macbeth and the three witches also have a major key in influencing his emotions. They manipulated the emotions he felt so he acted more rashly on them. Macbeth was a guy that couldRead MoreMacbeth Irony1610 Words   |  7 PagesMACBETH DRAMATIC IRONY The story of Macbeth written by the infamous William Shakespeare is an excellent storyline known and taught as a great piece of literature. Even after the creation of this tale almost 400 years ago, this wonderful written work is still admired and known all over the world. It is an adventure of a noble and truthful hero who is overcome by the lust for power and by greed. His aroused hunger for authority and supremacy leads to him losing his path and turning to the wayRead MoreAnalysis Of Macbeths Downfall1008 Words   |  5 PagesIn William Shakespeare’s The Tragedy of Macbeth, Macbeth, a once honored and valiant Thane, abandons all virtue after three meddling witches prophesize his ascent to the Scottish throne. Consumed by his ambition and encouraged by his malevolent wife, Macbeth sets forth on a downward spiral of murderous treason and tyranny that subsequently leads to his own demise. This Shakespearean tragedy explores betrayal, manipulation and the blood lust that ad joins a relentless climb for power. Hovering behindRead MoreEssay on The Sense of Evil Conveyed in Shakespeares Macbeth798 Words   |  4 Pagesand reality, guilt, ambition, violence and tyranny and order and disorder. Several quotes are weaved into the text in order to express more clearly the theme Shakespeare is attempting to convey. The themes all come together to enhance the dark symbolism of evil, and how it is actually conveyed. The most prominent theme throughout Macbeth is ambition. Macbeth and Lady Macbeth risk their innocence and will in order to pursue the throne. Lady Macbeth sees her husband as a coward, and thereforeRead MoreMotivation in Macbeth975 Words   |  4 Pagesnot only presents the actions of characters, but also helps us to understand what motivates characters to act the way they do. The tragedy, Macbeth, is a play where there are many dreadful events, and strong motivations behind them. Macduff and Macbeth are two characters of Macbeth who encounter great, but not always good, motivation for their actions. Macbeth is a heroic character at the beginning of this play unseaming men from the nave to the chops. He has much potential as a warrior, and hasRead MoreEssay on Imagery of Blood in William Shakespeares Play Macbeth1080 Words   |  5 PagesImagery of Blood in William Shakespeares Play Macbeth In the play Macbeth , William Shakespeare uses blood as a symbol throughout the whole story to show the different emotions and themes within the context of the play. It’s a bit ironic for someone whose name means â€Å"the son of life† that he has to take so many lives instead of being a father to the people he was trying to rule. The play refers to blood in three key points to create great imagery in this play, guilt, honor, and family/ancestry

Secure Software Development Cycle

Question: How secure software development cycle can provide help to mitigate SQL and other vulnerable attacks. Answer: Introduction This paper is about Secure Software Development Cycle and how it can provide help to mitigate SQL and other vulnerable attacks. Software Development Cycle is used to develop software solution in an active and reliable manner. But security of this development cycle is very much necessary to maintain. Secure Software Development Cycle is also known as S-SDLC refers to incorporating security into Software Development Life Cycle. In every phase, security will be highly preferred or stressed by developers. Incorporating security into software development framework provides various benefits to developers and users. There are some important reasons available for using S-SDLC, but the main reason is that it gives prevention from hackers and phishers. These attacks are vulnerable to computer systems and networks. Besides these attacks, Secure Software Development Life Cycle can control SQL attacks. In next segment of this report, we will discuss that how S-SDLC is beneficial for SQL Attacks. Discussion Secure Software Development Lifecycle can control SQL attacks, but before emphasize on this topic, it is important to discuss SQL attacks. SQL attack is also known as SQL injection attack. It is related to insertion or injection of SQL query via the input data from client side to application. A successful SQL injection or attack can read sensitive data from the application database, modify data, insert and delete data from the database. This SQL attack command injects the data-plane input to effect the execution of predefined SQL commands. S-SDLC provides help to control SQL injection in a way that while developing, security process tools and coding techniques are used, and the database coding is also done in a secured way. That is why it becomes difficult for hackers to access the database through an SQL injection. SQL injection enhances confidentiality and integrity of the database and this is necessary to get rid of SQL injection. Besides SQL injections, other attacks that put bad influence over database are virus attacks, malware, and denial of service attacks. These are some common attacks for computer and internet users. Secure Software Development Life Cycle is helpful to mitigate these attacks in a way that during the development cycle, at each phase virus and malware identification and scanning is implementing. This effort provides virus free software solution to users. In this way, secure software development life cycle is helpful to control SQL and other attacks effectively. After discussing secure software solution, now in next segment of this report, we will analyze some essential topics of an article that is about monitoring of security threats, vulnerability assessments and secure software development life cycle and some other important concepts. The purpose of analyzing this article is to explore the importance of secure software development lifecycle. (Owasp.org, 2016) Analysis of Article Security Posture This article delivers information about the security posture, and this is an essential aspect of maintaining security in organizations. Security posture is a security plan for business, and it consists of steps from planning to implementation. All technical, non-technical policies, procedures and controls are mentioned in it, and these can provide prevention from internal and external threats. This security posture is also active to get prevention from hackers, phishers, Spammers and Script Kiddies. Security Posture Assessment Security Posture Assessment is also known as security assessment, and it is a testing or examining process about client current infrastructure and system to identify issues regarding security, vulnerability, and possible loopholes. This security posture consists of different types of controls, Initial Baseline, Continuous Monitoring, Remediation, Performance Baseline and Tools such as protocol analyzers (Wireshark) and monitors for network i.e. HIDS and NIDS. These all tools are highly recommended for network monitoring to maintain security in an appropriate way. (Darryl MacLeod, 2012) Bypass of Security Equipment Besides above security posture and its other essential factors that are useful to maintain security for a long time, another solution is related to Bypass of Security Equipment. It provides help to target attacks against detection. Some ways in bypass of security equipment are failsecure/hardfail, and it reacts to failure in secure ways, and it is considered to be best security option. On other side softfail is reflected to be the least secure way to respond to failures. Next essential topic that is covered in this article is related to system auditing. This system audit is helpful to support procedures, security of systems and recovery of disasters. System Audits In this, baselines are state of IT practices and functionality of system at a specific point in time. This is a basis for comparison or measurement and provides necessary visibility to control change. System Audits can maintain security posture, policies and procedures and the focus of system audit is above discussed baselines. Besides this, right for access, storage, and retention policies are also come under system audit. (InfoSec Resources, 2013) From above discussion, it is cleared that the purpose of the article is to emphasize on essential activities and tools that are necessary to maintain security appropriately. Today with the advancement of technology, security concerns are also increasing, and users have to face issues like database violations and information leakage, etc. To handle these situations, security posture will be helpful enough. Before using security tools and techniques for maintaining security in computer systems and networks, vulnerability assessment is necessary. So that we can know about actual amount of risk in case of security. Vulnerability Assessment According to vulnerability assessment, risk occurs due to threat, assets and vulnerability. Assets can be any item of economic value that is owned by individual or business. Threat can be any circumstance that can put harmful impact over asset or can damage it and vulnerability is security weakness of asset and due to this weakness threat has occurred for asset. While assessing vulnerability regarding security some essential aspects are considered such as risk, impact and probability. Different tools are used for implementing vulnerability assessment such as penetration testing through network mappers (nmap, angry IP scanner, LanSpy). These above discussed processes like system audit, vulnerability assessment, and bypass security equipment can be used for secure software development cycle by developers for developing highly secure, reliable and quality software solutions for IT users. References Darryl MacLeod. (2012). What is Security Posture? Retrieved 17 March 2016, from https://darrylmacleod.wordpress.com/2012/03/09/what-is-security-posture/ 20 Critical Security Controls: Control 6 - Application Software Security | The State of Security. (2013). The State of Security. Retrieved 17 March 2016, from https://www.tripwire.com/state-of-security/security-data-protection/20-critical-security-controls-control-6-application-software-security/ InfoSec Resources. (2013). Introduction to Secure Software Development Life Cycle - InfoSec Resources. Retrieved 17 March 2016, from https://resources.infosecinstitute.com/intro-secure-software-development-life-cycle/ Owasp.org. (2016). SQL Injection - OWASP. Retrieved 17 March 2016, from https://www.owasp.org/index.php/SQL_Injection