Friday, January 31, 2020

Hezbollah Essay Example for Free

Hezbollah Essay Hezbollah, Arabic for â€Å"Party of God†, is also known as Islamic Jihad for the Liberation of Palestine, the Organization of the Oppressed on Earth and as the Revolutionary Justice Organization (Global Security, p. 1). Hezbollah (also Hizbullah and Hizballah) is a Lebanese social, political and paramilitary organization founded in 1982. Hezbollah’s historical and political background was the Israeli Defense Force’s presence in Lebanon (1982-2000), the Lebanese Civil War (1979-1990) and the plight of Arab Palestinians, many of whom had fled to Lebanon, where their presence â€Å"changed the historical balance between Muslims and Christians† (Bennett, 2005, p. 214). In the war, Lebanon’s various religious communities vied for power and Hezbollah was established as by Shi’a to strengthen their traditionally weak political position, with help from Iran and Syria. Committed to making Lebanon an Islamic state, to the liberation of Israeli occupied territory (which it claims means dismantling the Israeli state) Hezbollah was named a terrorist organization by the USA in 1994. One scholar describes the organization, which has seats in Parliament and in the Cabinet, runs a large social welfare program, as â€Å"a moderate, mainstream political party† (Harik, 2007, p. xiv). Harik says that Hezbollah â€Å"is considered a legitimate resistance force all over the Arab and Muslim worlds† (p. 7).   Azani discusses Hezbollah as a â€Å"social protest movement† (2009, p. 1). This raises the question whether the US is correct to label Hezbollah a â€Å"terror organization† and why it does so?   Harik says that no one has ever proved that Hezbollah has ever attacked a civilian (p. xiv) or that it was responsible for attacks on US personnel (p. 193). In responding to these questions, what follows examines the history of the organizations, its aims, programs and activities and why the US regards it as a terrorist organization. The Shi’a in Lebanon Modern Lebanon was created after World War I, when the Great Powers defeated the Ottoman Empire and divided the Middle East among themselves as League of Nations mandates. These newly created states were to be given independence when they were considered ready for self-determination. The Lebanon became a French mandate. Lebanon was religiously diverse, with Christians in a small majority, followed by Sunni Muslims, followed by the Shi’a. Under four centuries of Ottoman rule, the Shi’a were suspected being Iran’s fifth column. Consequently, the community was â€Å"impoverished and underdeveloped† (Norton, 2009, p. 12). Under the French, an attempt was made to share power between the main communities. The Marionite were given the Presidency, the Sunni the office of Prime Minister, which left the Shi’a with the Speakership, a â€Å"position with far weaker constitutional powers† (Norton, p. 12). This was based on the 1932 census, which, says Norton, was â€Å"the last official census ever conducted in Lebanon† (p. 12). This arrangement continued after independence in 1943. The Shi’a community in Beirut was very small; most lived in the south and in the Beqaa valley. Azani says that the â€Å"political awakening† of the Shi’a began in the 1960s and 1970s, led by Imam Musa al-Sadr, â€Å"a Shiite cleric with the characteristics of a religious and political leader.† Born in Iran to a Lebanse family he studied at the great centers of Shi’a learning (p. 48). From 1959, al-Sadr was Mufti of Tyre and â€Å"in less than two decades he succeeded, with strenuous activity, charisma and high rhetorical ability, in organizing the Shi’a community, characterized for hundreds of years by passivity and isolationalism, and in mobilizing it into collective activity for the realization of social and political goals† (pp. 48-49). The influx of Palestinian refugees into South Lebanon upset the traditional power of the Shi’a elite in the region. The increasing politicization of Shi’a leaders in Iran impacted their role in Lebanon. From the 1970s, the number and influence of clerics increased, with al-Sadr and the future founder of Hezbollah, Sheikh Muhammad Hussein Fadlallah, leading a movement that wanted to bring about an Islamic revolution in Lebanon, following the Iranian revolution of 1979. The Lebanese Civil War and the founding of Hezbollah On the one hand, the Shi’a in Lebanon were finding their political voice, encouraged by co-religionists in Iran. On the other hand, the security situation in Lebanon was deteriorating. The tradition of good relations between communities was breaking down with Christians being depicted as pro-Israeli, while Muslims were aligned with the Palestinian cause. April 13, 1973 a Christian paramilitary group ambushed a Palestinian bus in retaliation for the killing of a Christian earlier that day (Bennett, 2005, pp. 213-5). Fighting began between different communities, Sunni, Christian, Druze and Shi’a. In 1976, unable to stop the fighting the President asked the Syrians and other Arab leaders to â€Å"end the war.† Bennett remarks that as a result of the civil war, the word â€Å"Shia† entered the Western vocabulary (p. 215). The revolution in Iran would reinforce the word’s presence in the media. It was in the context of the civil war that Hezbollah was founded. The Palestinian Liberation Army was raiding Israel from across the border. Al-Sdar mysteriously disappeared in August 1978 (Norton, 2009, p. 29). This led to Israel invading Lebanon in June 1982, and to Hezbollah’s formation. From the start, committed to liberating Palestine, Hezbollah also raided across the border. However, its immediate aim was to end Israel’s presence in Lebanon. Between spring 1983 and the summer of 1985, Hezbollah â€Å"launched an unprecedented wave of suicide bombings which included an attack on the US Embassy and US Marine branches in Beirut in October 1983 and the US Embassy annex in Beirut in September, 1984† followed by the taking of Western hostages, according to Global Security (p. 1). Hezbullah’s Aims and Structure The organization’s Consultative Council has 12 senior scholars at its head and a Directing Council under its Secretary-General.. The organization’s charter sets out three objectives: 1. to expel the Americans, the French and their allies definitely from Lebanon, putting an end to any colonial entity. 2. to submit the Phalanges [Christian militia] to a just power and bring them all to justice for the crimes they have committed against Muslims and Christians. 3. to permit all the sons of [Lebanese] people to determine their future and to choose in all liberty the form of government they desire. [Hezbollah] call[s] upon them all to pick the option of an Islamic government, which alone is capable of guaranteeing justice and liberty for all. Only an Islamic regime can stop any further attempts at imperialist infiltration (Richardson, 2006, pp. 83-4). Hezbollah and Israel From 1978, a UN force was deployed in Lebanon to oversee the withdrawal of Israeli forces under Security Council Resolution 425. However, it was not until 2000 that Israeli troops were completely withdrawn. Until then, Hezbollah carried out attacks on Israelis targets. After the withdrawal, Israeli continued to launch missile strikes and raids into Lebanon and Hezbullah â€Å"in retaliation, launched rocket attacks in Northern Israel on an almost regular basis† (Bajpai, 2006, p. 594). According to Global Security, Hezbollah â€Å"operates against Israel in four main way†: 1. brimging terrorists and collaborators through the border crossings usinf foreign documents. 2. setting up a terrorist organization inside Israel and Judea, Samaria and the Gaza strip. 3. cross-border operations – smuggling weapons and terrorists 4. financial support for Palestinian organixzations and groups. Others do not use the word â€Å"terrorist† but represent Hezbullah’s activities as legitimate resistance to Israel, which has defied UN Resolutions to withdraw from all occupied territory. Bajpai writes, â€Å"even after its formal withdrawal from Southern Lebanon in 2000, Israel engaged in frequent military incursions† (p. 594). In 2004, the UN called for the disbanding and disarming of all Lebanese militia (Resolution 1559). However, in the elections of 2005, Hizbollah won 14 seats (out of 128), and was awarded 2 cabinet posts. By 2008, Hizbollah had eleven out of thirty cabinet seats (Council on Foreign Relations, p. 1). In the 2009 election, it lost a seat but still received 10 seats in the 30 members Cabinet. Hartik says that Christians have supported Hezbollah, which makes it harder for â€Å"its enemies to float the fundamentalist stereotype of a raging gang of religious fanatics whose main aim was to put enemies of the faith to the sword† (p. 79). Other Christians are outspoken in criticizing Hezbollah as the stooge of Syria and Iran and as setting itself up as a state within the state (Azani, p. 231). As well as carrying out military or terrorist action, depending on the commentator’s perspective, it spends millions on welfare and education work, funded by Iran. In 2006, Hezbollah’s operatives crossed the Israeli border and captured two IDF soldiers. This came a month after Palestinian operatives had captured an Israeli soldier (Global Security, p. 1). In response, a 34-day war followed during which Israel launched air strikes, killing â€Å"56 citizens including 37 children† (Bajpai, 594). As a result of this war and Hezbollah’s resistance, its popularity within the Muslim world increased. The war ended with a UN brokered cease-fire and another Resolution calling for the disarming of all militia. Hezbullah did succeed in preventing a full-scale invasion. The Global Security report on Hezbollah states that in addition to funding from Iran and help from Syria, the organizatuon engaged in fund-raising around the world (p. 2). The report makes no mention of its extensive social program but the Council on Foreign Relations however describes it as a â€Å"major provider of social services† (Council on Foreign Relations, p 1.) Acts Attributed to Hezbullah In addition to the acts mentioned above, according to CFR, Hezbollah lists the 1985 hijacking of TWA flight 847 and the attacks in Argentine on the Israeli Embassy (1992) and on a Jewish community center (1994). Azani refers to links with other organizations across the globe. He lists an attempt to destroy US ships in Singapore in 1995 and arrests of members in 1997 for planning an attack in a US Embassy. The 9/11 Report said that Al-Qaeda operatives train at Hezbollah camps (p. 203). He refers to other arrests made in 1999 and in 2001 when plans to attack targets in South and North America were foiled.   He says that the global network is spread across forty countries and every continent, including Europe where activists have also been arrested. In Germany, two charities funding the organization were shut down (p. 205).   However, Hartik points out that while Western attention focuses on its â€Å"guerilla activities† in the Lebanon it is social welfare activities that attract support, making it in her view a â€Å"mainstream† organization. It has achieved more in this field, she says, than any other party (p. 81). On the other hand, it has refused to disarm. After 2001 and the terrorist attack on the Twin Towers in NY, the US has repeatedly asked Lebanon to shut Hezbollah down and to close bank accounts. Lebanon has refused to do this, claiming that Hezbollah is not a terrorist organization, which Syria also denies. Syria is one of four countries considered â€Å"state sponsors of terror† by the US State Department. In April 2010, reports began circulating that Syria had given SCUD missiles to Hezbollah. Syria denies this.

Thursday, January 23, 2020

The Success of Stephen King as a Screenwriter Essay -- Stand by Me Ste

The Success of Stephen King as a Screenwriter Movies are becoming more and more popular with new special effects and stories that are intriguing and gripping. Movies now have lasting effects on viewers, since the stories are becoming more involved and more in depth. Screenwriters are constantly trying to create better screenplays to have made into motion pictures, yet there are thousands, if not millions, of screenwriters out there trying to earn a wage. The Writer’s Guild of America reports that in one year an average of 40,000 screenplays will be submitted and out of those only 120 will be made into motion pictures. (Field 5) Stephen King, who has no affiliation to being a screenwriter, has written numerous novels that almost everyone knows without them having ever read one word. Stephen King has a way of writing that appeals to both readers and film lovers. King who is an author of books has beaten out millions of screenwriters in the movie business. What is funny is that King himself does not expect a movie adaptation when he writes his stories. Stephen King’s writing style is the main reason why King’s novels are almost always found on the big screen. King purposely uses images in his novels that tell stories themselves. These images help enhance the story as the reader reads King’s work. These images are ones made by the reader and are limited to just the images we see on screen. Of course some of the better King movies do have wonderful imagery that can be associated with the same image the reader would have made in his mind. One popular movie that was based on King’s work is Stand by Me, which has terrific examples of this imagery. Stand by Me is based on King’s novella â€Å"The Body† which can be found in Different Seasons. â€Å"The Body† is a coming of age story about a boy named Gordie Lachance. Gordie is faced with the death of his brother, but is confused about his feelings. He knows he should be mourning for him, but he does not seem to have any remorseful feelings towards his brother. The story is about Gordie and 3 of his close friends on a journey through the woods to find a dead body. Throughout their journey they face all types of obstacles and go through a series of ups and downs. In the end they find the body and face a climatic altercation with the neighborhood gang. The four boys end up scaring the gang away and go home wi... ...y of King’s stories it is good to stop and actually take in the image that King is describing to us. The image that he gives us isn’t just for graphic purposes but actually to enlighten the story. A lot of symbolism can be found in the images King chooses, as explained above. King has a director’s mindset and uses images that a good director would use. It’s up to the reader to take these images and learn and analyze them to fill gaps in the story. A story can become much more complete when looking at a picture rather than reading in between the lines. Works Cited Bare Bones: Conversations on Terror with Stephen King, ed. Tim Underwood and Chuck Miller (New York, NY: Carroll & Graff Publishers, 1992) 282. Bergmooser, Mark. â€Å"The Outsider’s guide to selling to Hollywood.† Writer’s Digest Vol. 78 (1998): 34. Field, Syd. Selling a Screenplay: The Screenwriter’s Guide to Hollywood. New York, NY: Bantam Doubleday Dell Publishing Group, Inc., 1989. King, Stephen. â€Å"The Body.† Different Seasons. New York: Penguin Books USA, 1982. 293-436. Mayer, Geoff. â€Å"Stand By Me,† Metro (9/1/1992): 56-59. Wukovits, John F. Stephen King. San Diego, CA: Lucent Books, Inc., 1999.

Wednesday, January 15, 2020

Life Transitions Counseling Essay

A detailed and very interesting research about the problems of classifying, analyzing and coping with life transitions in our life, was written by Lawrence Brammer, Ph.D., who is Professor Emeritus of Counselor Education at the University of Washington in Seattle. This work was published by the Educational Resource Information Center.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In his research L. Brammer introduces the concept of life transitions and presents the most common types of such transitions. After that he addresses to three theoretical models of life transitions, which are supported by tips on counseling them. And in the end of the article the author presents some attitudes and skills necessary for successful coping with changes and life transitions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The author defines transition as a sudden and fundamental life change, which brings certain disconnection with the past. He classifies the transitions as positive and negative (painful and tragic) in respect to human reaction, as voluntary and involuntary by human factor of the cause, and as on-time and off-time transitions by expectations. Also, he defines developmental, social and political changes among the transitions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to this research, there are three ways of human perception of life transitions. These approaches are based on the developments of other specialists in this field. The first approach was suggested by Bridges (1980), who offered using metaphors from classic literature when describing life transitions.   Counseling approach in such case can be focused on encouraging people to look for some meaningful metaphors when managing with their life transitions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The second concept is called Social Interaction Model, which was created by Schlossberg (1984). This specialist offers to consider social and personal characteristics of an individual when coping with life transitions, like age, maturity, sensibility to stresses, etc. According to this model, the counseling approach will concentrate on analyzing the impact of transition on the person and looking for the inner and outer resources, which would help the person to cope with the situation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     The third model is called Predictable Overlapping Stages, which was created by the author himself, using the works of Kubler-Ross, Parkes and Hopson. This model presents the development of human perception of hard life transitions, like sudden death of a close person, etc. The author states that there are some stages, which any person experiences when coping with a hard life transition. Firstly, there are initial feelings of confusion, discomfort and shock, followed by the stages of denial and fantasy, then very long process of mood stabilization comes, which is accompanied with depressions, mood disorders, and then one or another level or recovery comes. Counseling in this case is also focused on determination, on which stage the person is now.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the end of the research there are some concepts about coping attitude and skills, which are mostly based on the developments in psychological literature. The author states that coping with life transitions is self-initiated problem solving, which requires development of proper and satisfactory coping resource. Also, the author offers some directions, which can be effective for creating the concept of recovery when coping with life transitions. Those are: creating support networks, cognitive reframing, analyzing personal stress responses, etc.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   This research is very constructive and useful; it reveals some interesting theoretical information about view on life transitions and the ways of coping with them. The author suggests studying the problem more thoroughly, and in the conclusion he directs the readers into the most important field of studying life transitions: learning more about particular human personalities, about ourselves and our surrounding.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Maybe the only disadvantage of this research is the absence of more practical information on coping with life transitions. Other numerous researches introduce mental (acknowledging the problem, looking for some positive sides, fighting with anxiety and depressions, etc.) and physical (doing exercises, interacting with other people, paying attention on nutrition, etc) tips, which can be very helpful in our daily activity when managing with transitions. Besides, the majority of life transitions is connected with stresses, so coping with life transitions frequently becomes coping with stress. It is also important point, which had to receive more attention from the author of this research. But in any way, the work of Laurence Brammer is very useful, especially for students and specialists, who are interested in studying the perception of life transitions and stresses by human psychology. Bibliography:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Brammer, L. M. (2001). Coping with Life Transitions. Educational Resourse Information Center. ERIC Digest. ED350527. Retrieved December 1, 2005, from .      

Monday, January 6, 2020

Ethical Issue In Information Systems Essay - 898 Words

When the internet was considered a global information system in 1995 millions of Americans participated in virtual communication. People began to communicate with each other and personal information began to be placed online by the stroke of the fingertips to their own computer. So the question is the privacy of individuals trusted online? Can people snoop around and see personal information? Of course people can if guidelines are not set in place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the†¦show more content†¦So with all these new technologies implemented into the network there is no way people can think there information is fully protected? In my opinion, I believe terrorist attacks is just a front for the United States government to spy on the people. As of today, the United States government is getting hit hard on this issue of invading average citizen’s phone conversations and tapping into other countries privacy. According to (CBS News, 2013), Germany and France want the United States to sign a no spying deal. I always felt like I could not trust the U.S. government years ago and now events are coming to light in this country where United States citizens can see from a broader scene. Another bill which was passed by Congress is the United States Patriot Act. This Act features a three-tiered system, erected for the dual purpose protecting the confidentiality of private telephone, face-to-face, and computer communications. One of the procedures the act permits is the authority to intercept communications to and from a trespasser within a computer system (with permission of the system’s owner) (DARPAs Information Awareness Office., 2003). This procedure alone leaves too much room for the government to snoop into people business and I believe this is one of the procedures that got United States government the mess they are in now withShow MoreRelatedEthical and Social Issues in Information Systems20165 Words   |  81 PagesChapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individualRead MoreEthical issues and the use of Personally Identifiable Information in computer systems, applications, and the internet2169 Words   |  9 Pagesï » ¿ Ethical issues and the use of Personally Identifiable Information in computer systems, applications, and the internet. Professor Strayer University - CIS 324 This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happenRead MoreEthical Issues Involving Information Accounting1193 Words   |  5 PagesIntroduction Ethical issues involving information accounting is a part of doing business and a large part of personal human ethics. Accounting ethics refer to codes or moral systems used to determine right and wrong in accounting. Accountants have a challenge with the arrival of information technology to observe business ethics in the field of accounting. Technology needs to be appreciated and used by accountants in the most important ways to improve efficiency, regulatory compliance, enhanceRead MoreInformation And Communication Technologies ( Icts )909 Words   |  4 Pagesmonitoring system is a vital part of telemedicine and free soft ware in the current world machines like one above makes the monitoring of the patient easy to an extent that every potential danger is clearly understood before it causes any problem to the patient. The monitoring systems like infant warmer makes alarms when temperature rises or falls, Numerous risk points contribute to alarm- and monitoring-related adverse events, including alarm fatigue, com-munication breakdowns, training issues, and equipmentRead MoreEthical Hacking1028 Words   |  5 Pageson complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the Ethical Hacking as a course in TertiaryRead MoreTechnology Applications For Nursing Care995 Words   |  4 PagesSpecialty 4 2.2 Use of Computers a Necessity in Health Care 5 2.3 The Open Source Soft Ware In Nursing 5 2.4 Physiologic Monitoring System 5 2.5 The Significance of Technology Applications to Nursing Care. 5 2.6 Electronic Health Record 6 2.7 Future Uses of Telehealth 6 2.8 Legal and Ethical Aspects 6 2.9 Ethical, and Professional Issues In Information Security 6 2.10 Ethical Applications in Informatics 7 3.0 Critical Evaluation: 7 3.1 PERSONAL LIFE: 7 3.1.1 Nursing Informatics as a Specialty 7 3.1.2Read MoreEthical Considerations of Health Information Management1711 Words   |  7 Pages Ethical considerations of health information management Health information management Introduction For better internalization of ethical considerations of health information management, it is vital to comprehend how medical institutions perceive their interpretation of health information. It is also essential to intercede how these institutions practice managerial ethics towards the notion. Information is a representation of data in a manner, which is in the form of symbols (Meadow et alRead MoreEthical Ethics And Ethical Hacking968 Words   |  4 Pagesdevelopments and issues that have arisen in regards to the internet. One development and issue is ethical hacking. To understand ethical hacking one must be able to define what it means to be a hacker. â€Å"A hacker is an individual who intends to gain unauthorized access to a computer system† (Laudon Traver, 2015). Oxford Dictionaries defines an ethical hacker as â€Å"a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent† (Ethical Hack erRead MoreThe Code Of Ethics For Nurses1082 Words   |  5 PagesIntroduction The code of ethics for nurses provides a framework on ethical principles that nurses are supposed to follow while providing patient care. Under this code, nurses are not allowed to pry into information on patients not directly under their care, and they could not share any patient information to individuals who are not privileged to know such information. (American Nurses Association, 2015). Ethical issues related to electronic health records (EHRs) are extremely beneficial toRead MoreCyber Security And The Internet Essay1696 Words   |  7 Pagesto be coordinated through an information system protocols. The information system is the management of the information data base of an organization or an institution. Information is assumed to be a significant asset, organisations strive to gather, retain and protect their valuable intellectual property to place them in a prominent business platform over their competitors. The proficiency and efficacy of the cyberspace in its application in accounting, finance, system designs, manufacturing etc.,