Tuesday, February 25, 2020

Provide an Ethical Argument against the Use of Dolphins in the US Navy Essay

Provide an Ethical Argument against the Use of Dolphins in the US Navy for Military Purposes - Essay Example Our villages are the most avidly practicing customary and traditional Subsistence users in the United States. The socioeconomic characterization of our region is similar to a Lesser Developed Country (LDC). Before the Magnuson Act, our people stood on the shores of their seasonal food camps and watched international fleets fish off our coasts, destroying species and stocks in their wake and affecting our Subsistence needs. Most prevalent were the Japanese; whose economists dubbed our region, "The Fourth World," to describe the phenomena of third world standard of living conditions within a first world country. Since the early 1970's, and prior to the MIAPA, AVCP subcontracted marine mammal studies and traditional knowledge reports through scientific and technical staff of Nunam. Kitlutsisti (Stewards of the Land). We joined in lobbying the UN and the U.S. and Russian governments to ban high seas driftnet fishing and succeeded. Nunam Kitlutsisti was eventually absorbed into the Department of Natural Resources (DNR) of AVCP. Since then, AVCP has been an actively participating in meetings with the Indigenous Peoples Council on Marine Mammals (IPCoMM), the Eskimo Walrus Commission (EWC), and the Alaska Beluga Whale Committee (ABWC). For decades, AVCP has tried to improve the growing-pains of the assimilation process for Yup'ik Cup'ik immersion into Western economy standards, while maintaining an enduring Native culture. AVCP coordinates regional, social, educational, economic and land / resource management programs. The DNR is extensively involved in programs with the Yukon Delta National Wildlife Refuge (YDNWR), and the Alaska Department of Fish and Game. On shared resource issues we work extensively with other Native regional groups along with the Washington Department of Fish and Wildlife, Oregon Department of Fish and Wildlife, and the California Department of Fish and Game. AVCP has been co-managing programs with YDNWR and the Togiak National Wildlife Refuge in the following programs: Western Alaska Brown Bear Management Area Agreement, Qauilnguut (Kilbuck) Caribou Herd Management Plan, Lower Yukon Moose Management Plan, Yukon-Kuskokwim Delta Goose Management Plan (Waterfowl Conservation Committee), Imarpigmiut Ungungsiit Murilkestfit (IUM) (Watchers of the Sea Mammals), Lower Kuskokwim Moose Management Plan, Kuskokwim River Drainage Fisheries Association, Kwethluk Counting Tower (Salmon spawning monitoring), Lower Kuskokwim Moose Management Area. Imarpigmiut Ungungsht Murilkestiit (IUM) (Watchers of the Sea Mammals) AVCP / IUM currently represents 26 coastal villages and voices concerns regarding marine mammal Subsistence and the health and viability of the Bering Sea. With the development of an Iced Seals Commission under our marine mammal program, we are fully prepared to involve all Iced Seals Subsistence user groups in the State of Alaska. AVCP / IUM intends to develop the scientific, traditional and technical expertise we need to become full partners in cooperative management to the benefit of federal partners and for the conservation and Subsistence use

Sunday, February 9, 2020

Analyze the impact of technology on a field of study of your choice Essay

Analyze the impact of technology on a field of study of your choice - Essay Example It is observed that today mobile devices proliferate in corporate environments as these devices can be easily connected to company networks. Although these devices have become an integral part of the modern life, they raise certain potential challenges to the cyber security. According to experts, it is relatively easy to hack mobile devices as compared to other computer devices. Hence, they are highly prone to data theft. In addition, today mobile devices are widely used for cyber crimes because this practice reduces the chances of being caught. Despite numerous advantages including high productivity and greater convenience, mobile devices raise severe threats to cyber security. According to a study conducted among IT professionals (as cited in Dimensional research, 2012), nearly 89% of the organizations connect mobile devices to their corporate networks. Roughly 65% participants responded that their employees used private mobile devices to access the corporate networks. The particip ants also indicated the major mobile platforms used to access corporate networks were Apple iOS (30%), BlackBerry (29%), and Android (21%). Majority of the participants (64%) argued that there has been an increase in mobile devices-related security risks to their organizations over the past two years (Dimensional research, 2012). ... For instance, it is often observed that employees connect their personal mobile devices to unprotected company networks like Wi-Fi in order to access internet. This practice increases the chances of malware attacks on the company networks and subsequently the malware-affected network may cause to lose the valuable business information stored in the company’s mobile devices. In addition, fraud employees can easily copy sensitive company information to their personal mobile devices within seconds and such issues can challenge the firm’s cyber security. Similarly, mobile devices are extremely prone to theft and loss due to their small size and high portability. If mobile devices reach the hands of third parties, they can access the data stored in it using highly advanced applications even though those devices are password-protected. Due to their small size, it is easy for external people to steal mobile devices. Evidently, data theft by individuals would more harmfully aff ect an organization than data loss due to malware attacks. In case of data theft, there might be a possibility of leaking the sensitive data to business competitors. This type of data loss or theft from mobile devices would extremely impact individuals too. Probably, people will store their family-related images and videos and other personal documents on their mobile devices. If such data are accessed by unauthorized people, this would cause great troubles to the users. Kuspriyanto and Noor (2012) point that the use of NFC (near field communication) in mobile payments systems make mobile platforms vulnerable to financially motivated cybercrimes. Evidently, such issues often cause users to suffer huge financial losses. Today,