Free Essay

Throughout the World There Has Been an Increase in Discussions Regarding “Censorship of the Internet, Explain How Censorship Can Work in Some Instances but in Others It Can Be a Detriment to Society.

In:

Submitted By kellych3107
Words 2583
Pages 11
Censorship of the Internet – a detriment or a necessity?
Kelly Chan

A research paper for Matthew Mansour in response to:
Throughout the world there has been an increase in discussions regarding “Censorship of the Internet, explain how Censorship can work in some instances but in others it can be a detriment to society.

TABLE OF CONTENTS

1.0 INTRODUCTION 2.0 What is Censorship? 3.1 Self Censorship 3.2 Censorship as Protection

1.0 Introduction

The Internet has undoubtedly developed into the biggest source of global information and media since its modest inception in the late 1960’s. With the increasing ease of worldwide access due to cheaper methods of producing technology and education, bridging the digital divide. However, Government censorship and regulation of access to certain content available on the internet in various countries has raised issues about whether it is effective, regarding each country’s purpose in imposing censorship and whether it is detrimental to the growth in knowledge and progress of society.

In this research paper, the role of Censorship in society and the inherent need for appropriate regulation of different levels of access to available information, based on morals and the responsibility we have to the younger generation to protect them from unsuitable content is discussed along with the technology we have to ensure this.

The varying degrees of censorship between China and Australia will also be comparatively examined in order to demonstrate the restrictive grip it may have on society in terms of freedom of speech, expression and quality of information and how it represents the present state of our global society and the counter-effects it may have as a result.

Finally, the importance of Censorship or internet security as a security measure for the storage and transfer of sensitive, confidential information as well as a means to keep the information available for all end users in order to keep the Internet a credible source of information and knowledge is explored.

2.0 What is Censorship? Internet Censorship can be broadly defined as the “suppression of ideas, information or artistic expression by anyone, whether government officials, church authorities, private pressure groups, or speakers.” In essence, government censorship of the Internet can be categorised into four categories:

1. Government policy to encourage Internet industry self-regulation and end-user voluntary use of filtering/blocking technologies;
2. Criminal law penalties applicable to content providers who make content “unsuitable for minors” available online;
3. Government mandated blocking of access to content deemed unsuitable for adults; and 4. Government prohibition of public access to the Internet.

2.1 Self-Censorship
The use of self-censorship, through the use of filtering/blocking technologies reflects the increase in understanding of the evolving nature of the Internet by end users as they become more aware of the personal options they have regarding what and how much information they wish to view, associated with the advances beyond Web 2.0. On the simplest level, end-users can employ the use of spam filters, such as Norton® to sort through unsolicited “junk” emails that often carry viruses and legitimate emails. Similarly in schools and libraries, blacklisting and keyword blocking are two of the most commonly used techniques to censor information. This kind of censorship software allows the administrator to comply a list of sensitive keywords, with the software then denying access to websites that contain these certain words, are commonly employed. Not only does this allow more productive environment for school children to learn it, it filters out the unnecessary information that will not benefit their education. In the workplace, it is estimated that 30% of web surfing is not work-related and that 20% of employees from a range of companies examined by the Securing Computing Corporation (2005) visited pornographic websites at work. Not only does this reduce work productivity, it has been found that pornography is most commonly shared on P2P file sharing networks and are responsible for consuming up to 80% of the bandwidth which has a crippling effect on the network.

2.2 Censorship as Protection Category 2 and 3 establishes that some information needs to be blocked (for purposes relating to the protection of children, prohibition and confinement of illegal activity, religious and cultural ideals) and also highlights the importance of maintaining a freedom of speech, especially under a democratic government. Hence it is important that the government needs to find a sliding scale between how much to block.

Currently in Australia, there are many laws such as Broadcasting Services Amendment (Online Services) Act 1999 (BSA Act) that give authoritative power to organisations such as the Australian Communications and Media Authority (ACMA) to ‘regulate internet service providers and content hosts in censoring prohibited (and potentially prohibited) content. The Classification Board is also a central part to the filtering content, namely films, video games and artistic publications available to Australian citizens through the National Classification Code. This provides a less direct alternative to censorship as opposed China’s policy (see 2.4 below) in that it does not order immediate cuts or change; instead it can refuse to approve classification and make media “illegal for hire, exhibition and importation in Australia”.

This sort of censorship can be highly beneficial to society when it comes to protecting minors from viewing unsuitable material that has become widely available on the Internet such as pornography, adult material and explicit content. Recently in Australia, two of the biggest internet service providers, Telstra and Optus have announced they would block access to a list of websites deemed to contain content of a child pornographic nature by the ACMA.. Despite doubts being raised regarding the effectiveness of censorship here due to the fallibility of even the strongest firewalls and filtering systems, thought must be paid to the safety of children on the Internet. Whilst censorship of this form has shown to be beneficial in that it does most of the heavy work, ultimately it is the responsibility of parents and community leaders to lead by example through education and to exercise control over the type of content accessed by those in their care.

2.3 Is Censorship restricting our personal freedom?
The issue of removing inappropriate, explicit content from the Internet also raises the issue of whether the democratic system and the rights that flow from it have been violated. By eliminating words, phrases and names from search engines, blocking or limiting access to certain websites deemed inappropriate for the wider community, the right for people to freely access and contribute information is denied and the promotion of transparency between the government and its citizens crushed. The Internet is so widely used because it allows users to become “their own publishers”, and as Hilary Clinton in the video “Remarks on Internet Freedom” argues, free flow of information will result in “stronger societies, encouragement of creativity and entrepreneurship” which is under threat due to increasing presence of censorship.

However, even freedom of speech has its limitations. Information that incites hatred or violence; discrimination on the basis of race, religion, ethnicity or sexual orientation is intolerable; highlighted by current events such as the Muslim riots in Sydney sparked by a single message spread through Facebook and suicide cases of today’s youth due cyber-bullying through Twitter and other social networking sites.

Closely related is the issue of freedom of expression through music, media and various art-forms. It is through this medium that people freely convey ideas, emotions and opinions however; these ideas may conflict with people of power. Every time a word is beeped out on the radio, television or an edited version of it is played is an example of censorship. We claim that this is done in order to protect the younger generation from being exposed to profanities at a young age and content that they are not mature enough to deal with, however, censorship can have a detrimental effect in this sense. If a song is completely censored from the public, it is more than likely to be reported through mass media and the Internet and has the effect of generating more attention to it as opposed to if it wasn’t banned.

3.0 Censorship in China and Australia
It may also be because there is a general consensus of disagreement in the public or it may challenge/threaten the ideologies of controlling regimes or private pressure groups. The news article “Lady Gaga and Katy Perry: banned in China for being too vulgar” showcases inevitable clashes between different cultures and the misunderstandings and fear (in this case, the fear of exposing the nation’s youth to “poor taste and vulgar content”) that fuel the demand for censorship. This is just one of the many examples of the driving force behind the creation of the “Great Firewall of China”.
3.1 Censorship in China
With more online users than any other country at over 500 million people, the monitoring of the internet usage in China is extremely stringent owing to their ruling communist government and their driving desire to protect their cultural identity.
In order to heavily restrict the content inflow and outflow in the country, the government utilises several techniques such as shielding the domain names as sensitive words, shielding the IP of the domain names and interfering with the DNS analysis. In doing so, its citizens’ are refused the right for public political discussions (in the fear of rebellion against the Chinese Communist Party sparked by the Tiannamen Square protests in 1989). Additionally, the information in which they have access to is severely limited, denying students, businessmen and scientists knowledge of the current trends hence reducing their understanding of the global society despite having the second largest economy. The government also has in place, censors that monitor exchanges of information between end users in the search for sensitive key words considered harmful, threatening or explicit. As a result, blog sites such as LiveJournal have been censored and websites such as Twitter and Facebook banned due to the viral nature of the exchange of information and external influences through these medium.
Recently in 2010, China has, in conjunction with the police, even taken a further step in increasing their censorship grip on its citizens by monitoring text messages for “pornography, violence, fraud, suggestions of terrorism, instigations to crime and gambling”, a clear violation of basic human rights and privacy as the content seized could be easily distributed. Whilst the government has offered its citizens a heavily washed down version of Facebook and Twitter through Weibo and QQ, it is still heavily monitored with posts deemed offensive and in violation of the government policy being deleted without warning.
3.2 Censorship in Australia
In comparison to Australia’s censorship framework, the Australian government only aims to guide internet users to making informed decisions regarding what type of content is appropriate for their use using limited censorship for explicit, harmful content that is generally regarded as distasteful, illegal and/or inappropriate and filters everything else via a classification code. In a sense, Australians, as part of a democratic government, get the freedom of choosing how to increase their pool of knowledge via the internet with a mutual understanding between the citizens and government of the certain limitations that come with having this freedom.
The comparison of these countries’ censorship policies highlight the notion that despite having the same desire to protect its citizens from negative, harmful content - they have different motivations and methods behind its imposition. Whilst in China, the need for censorship is heavily politically driven combined with the fear of outside influences; in Australia, there is an inherent need to protect the younger generations from harmful content and to give its citizens relative freedom to individually choose what content they wish to view through the classification code.
4.0 Maintaining the Internet as a safe medium of content transmission
In the present era, information can be transferred, edited and published in a matter of seconds. For example, a pair of shoes can be bought from Italy in Australia with a few clicks of a button on a site like eBay. Hence, businesses are taking advantage of this now and relying more and more heavily on the Internet to conduct operations and to reach out to more potential customers. This also opens up the possibility of online crime such as identity theft through the unsafe transmission of sensitive data hence the use of censorship technology such as encrpytion and safe access port is vital. Censorship undoubtedly plays a large role in maintaining the stability of society hence this technology needs to be extended to a national level in order to protect national security. From an economic perspective, for example, company information that can alter share prices dramatically must also be protected in order to keep the economy in a balanced state.

http://www.telegraph.co.uk/news/worldnews/asia/china/6996885/C hina-begins-monitoring-billions-of-text-messages-as-censorship-increases.html http://www.abc.net.au/unleashed/31248.html

Considering that the internet was originally created for the purpose of sharing information between academia and military as well as help research, censorship will ensure that this information remains relevant and accurate. Sites such as Wikipedia, which allows anyone to contribute and edit information on any topic would be redundant as a source of credible information without censorship.

3.
In conclusion, it is clear that censorship plays an extremely vital role in regulating a society that is becoming more and more technologically aware of the advances associated with Web 2.0. With the exponentially increasing amount of information level available on the 'Information Superhighway' harmful, explicit content will undoubtedly arise and as a society, we have a moral obligation to protect the younger generation and provide them with substantial, relevant knowledge to grow as an individual.
Equally as important is that the use of strict online censorship regulation laws will restrict the its illegal distribution (piracy and illegal downloading) of music and media, limiting access to porn (child pornography in particular) and greatly reduce the damage of internet scams and viruses; the main motivation for this being to halt the moral decay of society. Conversely, this sort of strict online regulation can have a detrimental effect on society as it ultimately threatens an individual's right to freedom of speech and expression. We explored an extreme case; China, where censorship is heavily imposed as a result of a strong communist political influence and fear of external influences and compare to the democratic censorship policy of Australia, where there is a focus on individual rights and protection of the younger generation through the national classification code and strict laws regarding illegal content.
In the interest of keeping the content available on the Internet relevant, censorship is an ideal method to regulate sites such as Wikipedia as well as keep sensitive information transferred between businesses and the government in order to protect national security and maintain a stabilized economy. Hence, censorship has undoubtedly earned a place in the protection of today's technological era given that a balance between the motives of the government and the rights of its citizens is achieved.

--------------------------------------------
[ 1 ]. “Definitions of censorship” http://www.pbs.org/wgbh/cultureshock/whodecides/definitions.html
[ 4 ]. Lecture Notes
[ 5 ]. Lecture Notes
[ 11 ]. “Remarks on Internet Freedom", accessed at on 10/11/2012
[ 12 ]. Remarks on Internet Freedom", accessed at on 10/11/2012
[ 21 ]. “China begins monitoring billions of text messages as censorship increases”, (Malcom Moore 2010), accessed at on 6/11/2012.

Similar Documents

Premium Essay

Isys100

...6) Throughout the world there has been an increase in discussions regarding “Censorship of the Internet”, explain how Censorship can work in some instances but in others it can be a detriment to society. Introduction Since electronic devices such as computer, smart phone and tablet have generalised and the number of internet users is getting bigger, internet contains tremendous amount of information from trivial one to even significant information that could occur a social problem. Every information is exposed through the internet and people could touch those information easily. As these reasons, government wants to control and monitor the internet access in many nations, including North Korea, Iraq, China, Myanmar, Syria, Turkey, Vietnam, Uzbekistan, Maldives, and Tunisia so on. This, government control or suppression of what can be gain access to, distributed, or watched on the internet, is called internet censorship. The definition of internet censorship is a way used by government or religious institutions to supervise or regulate the public access to offensive or harmful materials (Turban, 2012) This topic is very sensitive subject to decide whether it should exist or not. There is a sharp division of belief between people who approve and disapprove. This report is going to illustrate how the censorship works by some method, why the internet censorship is necessary, and the disadvantages of internet censorship, finally it talks about examples and current situation...

Words: 2055 - Pages: 9

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 2009 Report to Congress of the U.S-China Economic and Security Review Commission 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...

Words: 185166 - Pages: 741

Premium Essay

50 Key Concepts in Gender Studies

...50 Key Concepts in Gender Studies Jane Pilcher & Imelda Whelehan Fifty Key Concepts in Gender Studies i Recent volumes include: Key Concepts in Social Research Geoff Payne and Judy Payne Key Concepts in Medical Sociology Jonathan Gabe, Mike Bury and Mary Ann Elston Forthcoming titles include: Key Concepts in Leisure Studies David Harris Key Concepts in Critical Social Theory Nick Crossley Key Concepts in Urban Studies Mark Gottdiener The SAGE Key Concepts series provide students with accessible and authoritative knowledge of the essential topics in a variety of disciplines. Cross-referenced throughout, the format encourages critical evaluation through understanding. Written by experienced and respected academics, the books are indispensable study aids and guides to comprehension. JANE PILCHER AND IMELDA WHELEHAN Fifty Key Concepts in Gender Studies SAGE Publications London • Thousand Oaks • New Delhi iii © Jane Pilcher and Imelda Whelehan 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, transmitted or utilized in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without permission in writing from the Publishers. SAGE Publications Ltd 1 Oliver’s Yard 55 City Road London EC1Y 1SP SAGE Publications Inc 2455 Teller Road Thousand Oaks, California 91320 SAGE Publications India Pvt Ltd B-42 Panchsheel Enclave Post Box 4109 New Delhi 100 017 British Library...

Words: 86432 - Pages: 346

Free Essay

Ombusman

...Strengthening the Ombudsman Institution in Asia Improving Accountability in Public Service Delivery through the Ombudsman About the Asian Development Bank ADB’s vision is an Asia and Pacific region free of poverty. Its mission is to help its developing member countries reduce poverty and improve the quality of life of their people. Despite the region’s many successes, it remains home to two-thirds of the world’s poor: 1.8 billion people who live on less than $2 a day, with 903 million struggling on less than $1.25 a day. ADB is committed to reducing poverty through inclusive economic growth, environmentally sustainable growth, and regional integration. Based in Manila, ADB is owned by 67 members, including 48 from the region. Its main instruments for helping its developing member countries are policy dialogue, loans, equity investments, guarantees, grants, and technical assistance. Strengthening the Ombudsman Institution in Asia Accountability is essential for good governance, and in many Asian countries the ombudsman is the key accountability institution. Originating in the West, the concept of the ombudsman arrived relatively late in Asia. Yet more and more ombudsman offices are being established in Asia, and they play a critical role in the fight against incompetence and injustice on the part of government officials. This report presents in-depth research on Asian ombudsmen, with a focus on best practices and emerging issues, especially in the context...

Words: 148083 - Pages: 593

Premium Essay

Managing Cultura Differences

...MANAGING CULTURAL DIFFERENCES SIXTHEDITION MANAGING CULTURAL DIFFERENCES SERIES Managing Cultural Differences: Global Leadership Strategies for the 21 st Century, Sixth Edition Philip R. Harris, Ph.D., Robert T. Moran, Ph.D., Sarah V. Moran, M.A. Managing Cultural Diversity in Technical Professions Lionel Laroche, Ph.D Uniting North American Business—NAFTA Best Practices Jeffrey D. Abbot and Robert T. Moran, Ph.D. Eurodiversity: A Business Guide to Managing Differences George Simons, D.M. Global Strategic Planning: Cultural Perspectives for Profit and Non-Profit Organizations Marios I. Katsioulodes Ph.D. Competing Globally: Mastering Cross-Cultural Management and Negotiations Farid Elashmawi, Ph.D. Succeeding in Business in Eastern and Central Europe—A Guide to Cultures, Markets, and Practices Woodrow H. Sears, Ed.D. and Audrone Tamulionyte-Lentz, M.S. Intercultural Services: A Worldwide Buyer’s Guide and Sourcebook Gary M. Wederspahn, M.A. SIXTH EDITION MANAGING CULTURAL DIFFERENCES GLOBAL LEADERSHIP STRATEGIES ST FOR THE 21 CENTURY 25TH ANNIVERSARY EDITION PHILIP R. HARRIS, PH.D. ROBERT T. MORAN, PH.D. SARAH V. MORAN, M.A. JUDITH SOCCORSY Editorial Coordinator Elsevier Butterworth–Heinemann 200 Wheeler Road, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Copyright © 2004, Philip R. Harris, Robert T. Moran, Sarah V. Moran. All rights reserved. No part of this publication may be reproduced, stored in a...

Words: 229816 - Pages: 920

Premium Essay

Essential of Strategic Management

...(Chapter 3) ● Human Resource Strategy and Productivity at Wal-Mart (Chapter 4) ● How Wal-Mart Became a Cost Leader (Chapter 5) ● Wal-Mart’s Global Expansion (Chapter 6) ● WalMart Internally Ventures a New Kind of Retail Store (Chapter 8) ● Sam Walton’s Approach to Implementing Wal-Mart’s Strategy (Chapter 9) Strategy in Action Features A Strategic Shift at Microsoft (Chapter 1) ● The Agency Problem at Tyco (Chapter 2) ● Circumventing Entry Barriers into the Soft Drink Industry (Chapter 3) ● Learning Effects in Cardiac Surgery (Chapter 4) ● How to Make Money in the Vacuum Tube Business (Chapter 5) ● The Evolution of Strategy at Procter & Gamble (Chapter 6) ● Diversification at 3M: Leveraging Technology (Chapter 7) ● News Corp’s Successful Acquisition Strategy (Chapter 8) ● How to Flatten and Decentralize Structure (Chapter 9) Practicing Strategic Management Application-based activities intended to get your students thinking beyond the book. Small-Group Exercises Short experiential exercises that ask students to coordinate and collaborate on group work focused on an aspect of strategic management. Exploring the Web Internet exercises that require students to explore company websites and answer chapter-related questions. Designing a Planning System (Chapter 1) Evaluating Stakeholder Claims (Chapter 2) Competing with Microsoft (Chapter 3) Analyzing Competitive Advantage (Chapter 4) How to Keep the Salsa Hot (Chapter 5) Developing a Global Strategy (Chapter 6) Comparing...

Words: 223966 - Pages: 896

Premium Essay

Essentials-of-Strategic-Management-by-Hill-Jones

...(Chapter 3) ● Human Resource Strategy and Productivity at Wal-Mart (Chapter 4) ● How Wal-Mart Became a Cost Leader (Chapter 5) ● Wal-Mart’s Global Expansion (Chapter 6) ● WalMart Internally Ventures a New Kind of Retail Store (Chapter 8) ● Sam Walton’s Approach to Implementing Wal-Mart’s Strategy (Chapter 9) Strategy in Action Features A Strategic Shift at Microsoft (Chapter 1) ● The Agency Problem at Tyco (Chapter 2) ● Circumventing Entry Barriers into the Soft Drink Industry (Chapter 3) ● Learning Effects in Cardiac Surgery (Chapter 4) ● How to Make Money in the Vacuum Tube Business (Chapter 5) ● The Evolution of Strategy at Procter & Gamble (Chapter 6) ● Diversification at 3M: Leveraging Technology (Chapter 7) ● News Corp’s Successful Acquisition Strategy (Chapter 8) ● How to Flatten and Decentralize Structure (Chapter 9) Practicing Strategic Management Application-based activities intended to get your students thinking beyond the book. Small-Group Exercises Short experiential exercises that ask students to coordinate and collaborate on group work focused on an aspect of strategic management. Exploring the Web Internet exercises that require students to explore company websites and answer chapter-related questions. Designing a Planning System (Chapter 1) Evaluating Stakeholder Claims (Chapter 2) Competing with Microsoft (Chapter 3) Analyzing Competitive Advantage (Chapter 4) How to Keep the Salsa Hot (Chapter 5) Developing a Global Strategy (Chapter 6) Comparing...

Words: 223966 - Pages: 896

Premium Essay

Cornalcornalcornal

...Management Kenneth Fee The University of Sunderland © 2013 The University of Sunderland First published September 2013 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without permission of the copyright owner. While every effort has been made to ensure that references to websites are correct at time of going to press, the world wide web is a constantly changing environment and the University of Sunderland cannot accept any responsibility for any changes to addresses. The University of Sunderland acknowledges product, service and company names referred to in this publication, many of which are trade names, service marks, trademarks or registered trademarks. All materials internally quality assessed by the University of Sunderland and reviewed by academics external to the University. Instructional design and publishing project management by Wordhouse Ltd, Reading, UK. Contents Introduction vii Unit 1 The contemporary world of business and management Introduction 1.1 1.2 The global business environment The importance of developments in the global environment Case Study 1.3 Organisational decision making and performance vii 1 3 10 14 17 19 19 20 Self-assessment questions Feedback on self-assessment questions Summary Unit 2 Globalisation Introduction 2.1 2.2 Definitions and indicators of globalisation...

Words: 84990 - Pages: 340

Free Essay

As, Ca, Pdf

... © EssaysforIIM.com 2014-15 Issues for IIM PI Process http://www.essaysforIIM.com   Contents  US‐CHINA ENVIRONMENT DEAL  8  OIL PRICE  9  PAYMENT BANKS  11  SHADOW BANKING  13  NBFCs  14  NEW DEFINITION OF FDI  16  REFORMS IN POWER DISTRIBUTION  16  SECURITIES LAWS (AMENDMENT) BILL 2014  18  JUVENILE JUSTICE BILL, 2014  18  HUMAN DEVELOPMENT: INTERNATIONAL COMPARISON  19  INEQUALITY  20  SOCIO‐ECONOMIC PROFILE OF STATES AND INTER‐STATE COMPARISONS  21  ASER 2013: Main Findings  23  SKILL DEVELOPMENT  24  HOW INDIA NEEDS TO FACE CLIMATE CHANGE  24  AGENDA FOR ECONOMIC REFORMS  28  INFRASTRUCTURE  30  WHY LONG‐RUN MATTERS  30  FIVE PRONGED STRATEGY TO CONTROL INFLATION  31  URJIT PATEL COMMITTEE  32  Some Major Issues in India's Merchandise Trade Sector  32  MAKE IN INDIA OPPORTUNITY  34  Make for India or Make in India – The debate begins!  37  VULNERABILITY COMPARISON OF INDIAN ECONOMY  38  PM JAN DHAN YOJANA  39  COOPERATIVE FEDERALISM  40  ZERO DEFECT, ZERO EFFECT  41  DIGITAL INDIA  42  TWO FACTOR IDENTIFICATION ISSUE  43  MINSK AGREEMENT  44  WILFUL DEFAULT  44  © EssaysforIIM.com 2014‐15   Page 1 Issues for IIM PI Process http://www.essaysforIIM.com   ‘MAKE IN INDIA’  45  Features of the ‘Make In India’ campaign ...

Words: 128478 - Pages: 514

Free Essay

Magryb

...islamic leviathan religion and global politics John L. Esposito, Series Editor University Professor and Director Center for Muslim-Christian Understanding Georgetown University islamic leviathan Islam and the Making of State Power Seyyed Vali Reza Nasr Islamic Leviathan Islam and the Making of State Power Ú seyyed vali reza nasr 1 2001 3 Oxford Athens Chennai Kolkata Nairobi New York Auckland Bangkok Bogotá Buenos Aires Cape Town Dar es Salaam Delhi Florence Hong Kong Istanbul Karachi Kuala Lumpur Madrid Melbourne Mexico City Mumbai Paris São Paul Shanghai Singapore Taipei Tokyo Toronto Warsaw and associated comapnies in Berlin Ibadan Copyright © 2001 by Seyyed Vali Reza Nasr Published by Oxford University Press, Inc., 198 Madison Avenue, New York, New York 10016 Oxford is a registered trademark of Oxford University Press All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of Oxford University Press. Library of Congress Cataloging-in-Publication Data Nasr, Seyyed Vali Reza, 1960 – Islamic leviathan : Islam and the making of state power / Seyyed Vali Reza Nasr. p. cm.—(Religion and global politics) Includes bibliographical references and index. ISBN 0-19-514426-0 1. Malaysia—Politics and government. 2. Islam and politics—Malaysia. 3. Pakistan—Politics and government—1988...

Words: 112674 - Pages: 451

Premium Essay

Mister

...CHAPTER SEVEN: Race CHAPTER EIGHT: The World Beyond Our Borders CHAPTER NINE: Family Epilogue Acknowledgments About the Author Also by Barack Obama Copyright Prologue IT’S BEEN ALMOST ten years since I first ran for political office. I was thirty-five at the time, four years out of law school, recently married, and generally impatient with life. A seat in the Illinois legislature had opened up, and several friends suggested that I run, thinking that my work as a civil rights lawyer, and contacts from my days as a community organizer, would make me a viable candidate. After discussing it with my wife, I entered the race and proceeded to do what every first-time candidate does: I talked to anyone who would listen. I went to block club meetings and church socials, beauty shops and barbershops. If two guys were standing on a corner, I would cross the street to hand them campaign literature. And everywhere I went, I’d get some version of the same two questions. “Where’d you get that funny name?” And then: “You seem like a nice enough guy. Why do you want to go into something dirty and nasty like politics?” I was familiar with the question, a variant on the questions asked of me years earlier, when I’d first arrived in Chicago to work in low-income neighborhoods. It signaled a cynicism not simply with politics but with the very notion of a public life, a cynicism that—at least in the South Side neighborhoods I sought to represent—had been nourished by a generation of broken promises...

Words: 120305 - Pages: 482

Free Essay

One Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.

...SSAYS ON TWENTIETH-C ENTURY H ISTORY In the series Critical Perspectives on the Past, edited by Susan Porter Benson, Stephen Brier, and Roy Rosenzweig Also in this series: Paula Hamilton and Linda Shopes, eds., Oral History and Public Memories Tiffany Ruby Patterson, Zora Neale Hurston and a History of Southern Life Lisa M. Fine, The Story of Reo Joe: Work, Kin, and Community in Autotown, U.S.A. Van Gosse and Richard Moser, eds., The World the Sixties Made: Politics and Culture in Recent America Joanne Meyerowitz, ed., History and September 11th John McMillian and Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed., Rethinking the Cold War Eric Foner, ed., The New American History. Revised and Expanded Edition E SSAYS ON _ T WENTIETH- C ENTURY H ISTORY Edited by Michael...

Words: 163893 - Pages: 656

Premium Essay

Discrimination of Hindus

...                 “All  human  beings  are  born  free  and  equal  in  dignity  and  rights.”   “One  should  never  do  that  to  another  which  one  regards  as  injurious  to   one’s  own  self.    This,  in  brief,  is  the  rule  of  dharma.    Yielding  to  desire  and   acting  differently,  one  becomes  guilty  of  adharma.”   “Thus,  trampling  on  every  privilege  and  everything  in  us  that  works  for   privilege,  let  us  work  for  that  knowledge  which  will  bring  the  feeling  of   sameness  towards  all  mankind.”   Swami  Vivekananda,  “The  Complete  works  of  Swam  Vivekananda,”  Vol  1,  p.  429     Mahabharata  XII:  113,  8     Universal  Declaration  of  Human  Rights,  1948,  Article  1     "All  men  are  brothers;  no  one  is  big,  no  one  is  small.  All  are  equal."   Rig  Veda,  5:60:5           ©  Hindu  American  Foundation  2012   Endorsements  of  Hindu  American  Foundation's  Seventh  Annual  Report   Hindus  in  South  Asia  and  the  Diaspora:...

Words: 82692 - Pages: 331

Premium Essay

Law of Trust

...Consolidated Reader-Friendly Edition of the Treaty on European Union (TEU) and the Treaty on the Functioning of the European Union (TFEU) as amended by the Treaty of Lisbon (2007) 2008 1 THE LISBON TREATY The Readable Version Editor: Jens-Peter Bonde © IND/DEM Group in the European Parliament email: jp@bonde.dk Cover: Henry Abela Publisher: Foundation for EU Democracy Printed at Notat Grafisk, Denmark - 2008 ISBN: 87-87692-72-4 EAN: 978-87-87692-72-4 2 Introduction The Treaty of Lisbon changed name from the "Reform Treaty" when it was amended and signed in Lisbon, Portugal, by the prime ministers and foreign ministers of the 27 EU Member States on 13 December 2007. The treaty retains most of the content of the proposed EU Constitution which was rejected in the French and Dutch referendums on 29 May and 1 June 2005, respectively. The Lisbon Treaty amends the Treaty on European Union (TEU) and the Treaty establishing the European Community (TEC), which is renamed "Treaty on the Functioning of the European Union" (TFEU). Following the parliamentary ratification of the Lisbon Treaty by all Member States by the end of 2008, it is aimed to have the Treaty come into force on 1 January 2009. Whereas the EU Constitution was to be subjected to a referendum in ten Member States, only Ireland is holding a referendum on the Lisbon Treaty. This is a consolidated version of the Treaty of Lisbon, including all articles in the TEU and the TFEU as amended by the Treaty...

Words: 176192 - Pages: 705