Powered by ProofFactor - Social Proof Notifications

Enhancing Democracy Through Compulsory Voting

In this essay, my argument would be based on the controversial assertion that compulsory voting is core to the achievement of a perfect democracy. Compulsory voting is being practiced in various countries including Australia, Argentina, and Belgium. In compulsory voting, it is mandatory for every citizen who is registered as a voter to vote failure to which the government imposes penalties which may be in the form of fines or some cases restricted access to government resources. This essay would determine whether compulsory voting has enhanced the reflection or the will of the people in regards to selecting their leaders.

 

People Also Read

 

I will now present the best single argument supporting the claim that compulsory voting is key to democracy. Firstly, democracy is all about the majority will of the people, the principles of democracy are entrenched in the fact that a leader comes from the people, and the best way to determine the people’s choice is through a popular vote which is definitely the majority vote. Compulsory voting leads to voter satisfaction, this is because it leads to an increase in voter turnout, therefore, many citizens will be satisfied with the results as it is a reflection of the majority of valid voters. When citizens are satisfied with election results there are always minimal cases of election petitions as well as violence which is common in the countries which practice voluntary voting, for example, most countries in Africa such as Ivory Coast, Kenya, Gambia, Uganda, and even the DRC Congo. The voter turnout in these countries is usually low meaning the majority do not vote, and unexpected results eventually lead to election violence, a tragedy which could have easily been avoided if the voting was compulsory.

In my opinion, the best and most singular objection towards the argument that holds a substantial basis is compulsory voting is a key to democracy. Compulsory voting can be viewed as a major form of dictatorship as well as infringement of a citizen’s freedom of expression which is documented within the Bill of Rights. Citizens may decide to express themselves or demonstrate their level of dissatisfaction by either having the electoral preparation or the leaders vying for the seats by, or by simply making the decision not to vote. Furthermore, compulsory voting instills fear in the citizens, whereby citizens will only turn up to avoid the penalties rather than actually taking the exercise as a civic duty, this in itself is a poison to democracy. Democracy and freedom to write an essay that explores this topic of Buddhist thought. This can be any form of expression that goes hand in hand, one cannot override the other.

Nevertheless, as a response to the previous objection to the claim presented in the previous section. For one to be a valid voter of a nation, he or she has to have attained an age where he is considered an adult, of sound mind and be an individual who has the ability to make the right decisions and at the same time take responsibility for his or her actions. By imposing the law that makes it compulsory for them to vote it doesn’t change the fact that a larger percentage of them already have a favorite candidate and they often have their mind set on the leader they are going to elect even before Election Day, compulsory voting, therefore, eliminates the obstacles and excuses that the citizens use for not voting, and offer them a mandatory chance to elect their leaders. Compulsory voting brings a sense of belonging and patriotism, which makes leaders have the interest of the country at heart which is part of the fruits of democracy.

In light of the consideration discussed in this essay, I can conclude that compulsory voting is a key to democracy. Democracy is about numbers, and compulsory voting brings the numbers to the polling stations. The number of leaders with more numbers becomes the leader and this stands as the basic foundation of democracy.

Work cited

Singer, Peter. Ethics in the Real World: 82 Brief Essays on Things That Matter; with a New Afterword by the Author. , 2017. Print.

5/5 - (12 votes)

Exploring the Importance of Plot and Theme in Crafting a Compelling Story

Introduction

When most people participate in book reading, they tend to get truths from these books and perceive some truths too. In most cases, the readers are asked to discuss about the book topics they currently finished reading and sometimes expected to give others these books as recommendations if they had a stronger effect on them. This made me wonder why some books are considered very important by readers and they go to the extent of turning them into their lives guidebooks. I realized that this is because different books bring light to different people’s lives and give them teachings that are essential to their lives. Despite all these, it can be said not everyone likes every book they come across, in simpler terms, every good story has a special something in it. In most cases, it is the central characteristics like the book theme or the plot the book has. These two things can be described as key features in having a good story as these features need to be harmonized very well in order to coming up with reading experience that most readers will love.

 

People Also Read

 

 

Our first example is a plot that is knit tightly and compressed is considered as a very essential factor in having a good story. When main characters occupy a situation that is interesting enough and believable, it gives the readers an opportunity to think. If at all this was not the case, then no one would be reading the story and if they did, then there would be a feeling of antipathy from the reader to the work (Korthagen, 2014). Another thing a good story should have is processing the conflicts of the main character via a resolution. This enables readers to have courage and confidence that they can be capable of accomplishing the same feats and it can also widen the viewpoints of the readers indirectly. A very good example is seen in Charlotte Perkins book “The Yellow Wallpaper” which gives a description of the main character’s emotional illness. This arouses the minds of the readers, gives them a chance of indirect experience and also gives those readers who have members of their families suffering from this kind of emotional illness confidence and courage.

The second aspect a story needs to have in order to be successful is having a theme that is very clear. If a story does not give the readers a chance to realize and acquire something from it, then this story will be remembered for a very short while and will be forgotten by the reader despite how it may have an interesting plot or good characters. On the other hand, when a story has a very complicated and complex theme, it may bring confusion to the readers. For a story to be classified as a good one, it must have a theme that is clearly transmitted because without this, the readers will not feel any emotion but cynicism and will make them avoid the books of that writer. A very good example of such a book is “Royal Beatings” a book written by Alice Munro. It is a very interesting book with uncommon materials but the theme is not as clear as expected and it leaves most of the readers very confused.

Conclusion

In conclusion, as much as there are lots of features that a good story needs, for a book and the author to be successful, the theme and the plot of the book are taken as the most important of all the other features. Clearly, these themes need clear harmonization so that the perfect and unique moments can be created. If one of the features is either too weak or superior, the story cannot be good. The things that cause impression to the readers and bring them to the realization of a major thing from a story are the reasons for the reading and therefore, their presence is the one condition that a good story must have.

References

Korthagen, F. A. (2014). In search of the essence of a good teacher: Towards a more holistic approach in teacher education. Teaching and teacher education, 20(1), 77-97.

5/5 - (11 votes)

Safeguarding Critical Infrastructure: Resilience in the Face of Threats

ABSTRACT

Creating efficient protection, alleviation, and improvement measures for critical infrastructure systems are vital especially in the face of increasing natural and artificial dangers and threats. Some interdependencies among infrastructure organs include the power to influence security, rescue, and revival measures. Recognizing different interdependencies is important in the reduction and minimization of the tremendous failures among composite interdependent infrastructure systems. Critical Infrastructure represents an immense, global sector. As such, ensuring its total protection at all times and in every place is usually difficult. Regrettably, some attempted terrorist attacks against critical infrastructure will probably be successful (Bagget, 2018). An efficient aspect of an all-inclusive plan to defend critical infrastructure is being able to reduce the impact of terrorist attacks through adaptation-impact reduction, emergency response, and recovery. Presently, the United States government is moving homeland Security policy from that of asset-level critical infrastructure protection to all-dangers critical infrastructure resilience, developing the need for a uniting framework for assessing the resilience of critical infrastructure systems and the economies that rely on them.

Critical Infrastructure Interdependency

 

People Also Read

 

Introduction

In the present day, the public’s security is fundamentally intertwined with different infrastructures and key asset provisions. Damage to critical assets can lead to extensive loss of properties, loss of human life, and profoundly affect a nation’s prestige and confidence. As such, these infrastructures are critical to national security, economic security, and public safety. Generally referred to as Critical Infrastructures, they, whether physical or virtual, are very important to any nation, that their loss would bring devastating consequences to the entire nation. This paper’s main objective is to bring an understanding of the importance of recognizing how the interdependencies among components of and infrastructures systems help in enhancing asset designs and protection. This paper gives the reasons why dependable infrastructures are necessary, examines themes related to critical infrastructure protection, and explores the term infrastructure interdependency to highlight the fact that upholding public wellbeing needs dependable interdependent systems.

What is Critical Infrastructure?

Efforts need to be combined to ensure the security and protection of certain vulnerable targets, like infrastructure and public environments, against terrorism. Even though each country determines that which makes up its critical infrastructure, member countries and academicians have tried to establish a common understanding (Kamien, 2012). Critical infrastructure is referred to, by several authors, as, “the fundamental capabilities, technical systems, and organizations accountable for the dissemination of assets” (Lewis, 2006). Critical Infrastructure according to the European Commission is, “an asset 2006or a system which is necessary for the maintenance of crucial societal functions”. Different countries have also adopted their own definition of critical infrastructure (Lewis, 2006). The United Kingdom, for instance, regards critical infrastructure as comprising of national resources, service, and structure that sustain the economic, political, and social life of the UK, whose loss would; result in great loss of lives, significantly impact the economy and be an urgent concern for the government (Bagget, 2018). Critical infrastructure includes but is not limited to: communications, emergency services, energy, water, transport, economics, civil service, health, industry, finance, food, radio, and commercial facilities. Most countries continue to depend on infrastructure and assets found partly or wholly out of their jurisdiction and have no control over.

The Private sector, in almost all states, owns the critical infrastructure. According to an estimate by Kamien (2012), over 80 percent of Western Countries’ critical infrastructure is held and managed by the private sector. As a consequence, wherever the location of the infrastructure, the national government has no power in ensuring total security of critical infrastructure and may mostly depend on the private sector for this purpose (Lehr, 2018). As such, there is a need for a well-defined public and private sector partnership for a policy on the protection of critical infrastructure.

There is significant tension in establishing which assets should be regarded as ‘critical”. Since there are intense interconnection, networks, bumps, links, and interdependencies between sectors-enabled by cyberspace-it is usually difficult to give priority. Furthermore, that which should be regarded as “critical” undergoes alterations over time (TRADOC, 2006). Decision-makers are often not willing to be responsible for the political risk of removing items from a “critical list”, leading to resource wastage. Usually, ‘critical lists’ and priorities are a representation of the popular fears and political priorities and do not precisely mirror risks and probabilities (TRADOC, 2006). It is this uncertainty that deters the development of security measures. Additionally, the fact that some major infrastructures are self-healing-for instance roads continues to be functional even without lighting-is always left out of consideration. Thus, establishing which assets are critical often needs detailed judgment and calculation.

What are the steps of a proper critical infrastructure protection cycle?

Critical Infrastructure Protection is a conception that involves the awareness of and response to serious happenings concerning the critical infrastructure of a state or region. The American Presidential directive created a state program of Critical Infrastructure Protection (Miller, 2016). The Critical Infrastructure Protection program was created for the primary purpose of securing the exposed and interconnected U.S assets. The directive provided for some parts of the national infrastructure being more critical to the nation and its citizens as opposed to others. In the directive, the U.S is described as having several critical infrastructures that so important to the nation that its destruction would greatly affect the nation’s security, economic status, and public safety.

In the directive, the Department of Defense was responsible for the protection of the most important aspect of the nation’s infrastructure since it was impractical to offer protection to all critical infrastructures in their different locations; therefore focus was put on protecting the critical defense infrastructure (DHS, 2013). The Department of Defense Critical Infrastructure protection cycle is built on six major steps to develop a framework for an all-inclusive solution for infrastructure protection (DHS, 2013). The steps in the cycle happen before, during, and after a happening that may harm the critical infrastructure. The steps include:

Analysis Assessment

This step happens before the event of infrastructure degradation like terrorism. It carries the most weight compared to other steps in the cycle. Here, identification of infrastructures of importance to the success of the operation is done and their weaknesses and interdependencies established. After, an assessment is carried out to determine the operational impact of assets loss or dilapidation (DHS, 2013). This step involves following five key procedures; identification of critical assets, Infrastructure characterization, Operational impact analysis, vulnerability assessment, and finally interdependency analysis. This step applies

Remediation

This step involves addressing all the known weaknesses and vulnerabilities. It involves taking deliberate, precautionary measures to solve notorious virtual and physical vulnerabilities before an event happens (Miller, 2016). The idea behind remediation is to ensure that critical assets and infrastructures are more reliable, available, and can survive an attack. Examples of remediation actions are education and knowledge, operational process, or routine alterations.

Indications and Warnings

This step can be done before and/or during an infrastructure attack. It involves everyday sector observation to evaluate the mission readiness abilities of critical infrastructure assets and to see whether there are any looming events or attacks to report about (Kamien, 2012). Indications are preliminary activities that identify a probable infrastructure attack that is going to happen or is being deliberated (Bagget, 2018). Indications rely on contributions at the tactical, operational, theatre, and strategic levels. At the tactical level, information is disseminated by asset owners; the operational level relies on information from the NDI sectors; at the theatre level, contributions are made by regional assets like the allied intelligence, and coalition forces; the strategic level is then informed by the intelligence, security bodies and the non-governmental sectors (Allen, 2016). On the other hand, a warning is a practice of signaling those who possess assets of impending danger or attack.

Mitigation

This step also takes place before or after an attack. It comprises of afore-planned harmonized activities in response to infrastructure warnings or incidents. Alleviation steps are taken before or during an attack on critical infrastructure. These mitigating activities are meant to reduce the asset losses arising from an attack or event, allow for incident response, and reinstate back the infrastructure service as soon as possible (Allen, 2016). A major purpose of the mitigation step is to lessen the operational impact on other critical infrastructures in the event of a loss of a critical asset.

Incident Response

This step is done after an infrastructure attack. It involves the plans taken to get rid of the cause of an infrastructure attack. For instance, in the wake of the 9/11 attacks on the pentagon and World Trade Centre, all non-military airplanes were grounded over the U.S to avert any other attacks of the same kind (Kamien, 2012). Response actions involve several activities including talking emergency measures from both the public and the security bodies.

Reconstitution

This is the last step usually happening after an infrastructure attack. It is usually concerned with the steps taken to re-establish or renovate a critical infrastructure capability after it has undergone damage due to an attack. It is often the most challenging step of them all (Lehr, 2018).

Step one is the most crucial part of the Critical Infrastructure Program cycle since it is vital to identify the right assets for infrastructure protection. The analysis and Assessment step is the foundation of all the other five steps in the cycle of Infrastructure protection (Kamien, 2012). There being no solid start, the rest of the cycle would be flawed, resulting in a protection strategy that fails to do what it is intended for.

Why critical infrastructure protection is a ‘moving target’

With all the benefits that the internet comes with, it might be easy to forget that this heightened interconnectivity also carries with it high chances of fraud, theft, and many other cyber threats. Attacks on critical infrastructure can have immense consequences like the loss of life and national insecurity Terrorist operations like planning, recruitment; research and propaganda are now supported and aided by cyberspace (Miller, 2016). According to the United States Cyber Consequence Unit, a single attack on U.S critical infrastructure would total to more than 700 billion dollars in losses (Bagget, 2018). Therefore guarding the nation’s assets against cyber-attacks should be a major focus for the United States government. More importantly, it is a great challenge to guard the infrastructure against remote attacks that can be operated from a distance to disable the Industrial Control Server’s system (Lehr, 2018). No matter how much effort is put into trying to protect critical infrastructure, a significant number of systems are still susceptible to advanced cyber attacks. As such it is paramount to have solutions to curb these remote attacks on critical infrastructure (Miller, 2016). This would involve creating a cyber moving target defense system of securing a nation’s critical assets from cyber attacks.

Moving target defense is the present day’s most impactful security innovation opportunity. Moving target approaches are a whole new model for approaching the security of critical infrastructures. Rather than protecting unchanging infrastructure by noticing, preventing, observing, trailing, or remediating threats, moving defense renders the attack surface force (Allen, 2016). A force moving target attack surface inflicts asymmetric drawbacks against cyber enemies. Moving target techniques comprise of system randomization, bio-inspired Moving Target Defense, dynamic network configurations, cloud-based Moving Target Defense, and dynamic compilation.

What is critical infrastructure interdependency, and why does it matter?

Interdependency is a bidirectional association between two infrastructures where the operations of one infrastructure impact those of another infrastructure and vice versa. Interdependency can also be regarded as the inclusion of two dependencies where the comprehension of the interdependency needs thoughtfulness, evaluation, and categorization of the two, one-way dependencies (TRADOC, 2006). Critical Infrastructure interdependencies comprise of a risk multiplier: they can exist as a hazard or a danger, affect the flexibility and defense activity of critical infrastructure, and result in surging and intensifying failures. Interdependencies are present at individual levels and between levels (TRADOC, 2006). Critical Infrastructure Interdependencies affect all components of risk.

Conceptually, interdependencies mean the associations among aspects of different infrastructures in a general system of systems. However, practically, interdependencies among infrastructures heighten the general intricacy of the system of systems (Bagget, 2018). The composite interdependent relationships among different infrastructures are characterized by several connections among infrastructures, feedback and feed-forward paths, and complex branching systems (Allen, 2016). The connections lead to an elaborate web that, depending on the distinctiveness of its connections, can send out shocks all over the economic scene and across multiple infrastructures (Miller, 2016). Clearly, it is not possible to make a comprehensive analysis of or comprehend the conduct of a certain infrastructure in seclusion from the setting of other infrastructures. Rather, it is paramount to consider several interconnected infrastructures and their interdependencies as a whole (Miller, 206). There are different types of interdependencies and each has its own characteristics and effects on infrastructure.

Why is there a shift away from ‘protection’ to ‘resilience’ and ‘survivability’?

For over two decades now, the United States’ major concern regarding the nation’s infrastructure has been sole to protect the infrastructure. These assets include, but are not limited to, communication systems, transport systems, and the internet, which together are the backbone of the U.S economy and society (CIPP, 2007). Because of the attack of September 11th attack on U.S soil, the Department of Homeland Security became more focused on finding out how these infrastructures function at the time of, and after the occurrence of such threats as terrorism. To comprehend this performance, Homeland Security has majorly laid focus on running consequence analyses that approximate the effects on these infrastructures as a result of threats (Bagget, 2018). Apart from focusing on consequence analysis, Homeland Security also seeks to recognize the value of comprehending restoration and recovery processes that the critical infrastructures go through after a threat (DHS, 2013). The idea of critical infrastructure resilience involves both of these concerns, and Critical Infrastructure Resilience has been made a vital component of the nation’s Critical Infrastructure.

After having solely focused on Infrastructure protection for many years, the 9/11 attack changed the government’s efforts towards critical infrastructure security. After the attack, two major presidential directives that entirely focus on protecting the nation against terrorist attacks were issued (DHS, 2013). The directives were: The Homeland Security Presidential directive stating that in the event of a threat, an effective set of protective measures would be implemented by efficient infrastructure agencies; and another directive which calls for strengthening of crucial assets (CIPP, 2007). The Homeland Security council recommended that the Department of Homeland Security should be more concerned with Critical Infrastructure Resilience as the main purpose of critical Infrastructure delivery.

Protecting every vulnerable asset against every possible threat is not possible; all vulnerabilities can never be eliminated. As such making resilience the main strategic objective would catalyze synergetic actions that are balanced across the three components of risk; Infrastructure protection alone is a weak strategy (Bagget, 2018). Moreover, it is almost impractical to describe a preferred result-just what amount of protection is satisfactory-when the main objective is to lessen liabilities. Additionally, Critical Infrastructure Resilience, according to the Directive of Homeland Security, is not a substitute for Critical Infrastructure Protection; rather it is an all-inclusive objective intended to facilitate systems-level saving strategies (DHS, 2013). Adoption of Critical Infrastructure Resilience as the goal provides a readily quantifiable objective-determining the amount of time needed to reinstate full functionality of the affected assets, hence survivability.

Conclusion

The efficiency and wellbeing of contemporary urbanized societies are built upon the existing infrastructures. When working flawlessly together these assets that power the urban world, such as information and communication systems, electricity, transport, emergency services, and financial services are the driving forces of the urban world’s existence. Nonetheless, the interdependency of these critical infrastructure systems also renders them susceptible to attacks from both natural and man-made threats. It is therefore upon the national governments to develop key strategies to avert such attacks to strategize on the best recovery procedures after such attacks happen on our critical infrastructure.

Bibliography

Allen, Gregory/Derr, Rachel (2016): Threat Assessment and Risk Analysis. An Applied Approach. Amsterdam et al.: Elsevier. E-book available at https://www.sciencedirect.com/science/book/9780128022245(accessed 29/06/2018)

Bagget, Ryan/Simpkins, Brian K. (2018): Homeland Security and Critical Infrastructure Protection. Westport, CT, and London: Praeger

CIPP (2007): Critical Thinking: Moving from Infrastructure Protection to Infrastructure Resilience. CIPP Discussion Paper Series, George Mason University School of Law, Critical Infrastructure Protection Program, February; at

DHS (2013): NIPP 2013. Partnering for Critical Infrastructure Security and Resilience. Washington D.C.: Department of Homeland Security (pages 18-20);

http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=C359CF09E0E785A43C91C0A1871A9B4E?doi=10.1.1.169.9384&rep=rep1&type=pdf (accessed 29/06/2018)

Kamien, David G. (2012): The McGraw-Hill Homeland Security Handbook.New York et al., McGraw-Hill

Lehr, Peter (2018): Counter-Terrorism Technologies: A Critical Assessment. Amsterdam et al.: Springer

Lewis, Ted (2006): Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation.

Miller, Erin (2016): “Terrorist Attacks Targeting Critical Infrastructure in the United States, 1970-2015.” Report to the Office of Intelligence and Analysis, U.S. Department of Homeland Security. June. College Park, MD: START. https://www.start.umd.edu/pubs/DHS_I%26A_GTD_Targeting%20Critical%20Infrastructure%20in%20the%20US_June2016.pdf(accessed 29/06/2018)

TRADOC (2006): Critical Infrastructure Threats and Terrorism. Fort Leavenworth, Kansas: US Army Training and Doctrine Command, 10 August; at http://www.fas.org/irp/threat/terrorism/sup2.pdf(accessed 29/06/2018)

5/5 - (12 votes)

Creating a New Government: Strategies for Post-Revolutionary Leadership

Instructions

Your country just overthrew its dictator, and you are the newly elected President. Unfortunately, due to the divisions in the country and the years of war, economic, military, and political structures are non-existent. A group of loyalists to the old dictator have been detonating bombs, murdering civilians, assassinating leaders, and terrorizing towns with help from a neighboring country’s dictator.

Create a comprehensive plan for your new government. While creating this government identify the governing style, functions of various branches of government, principles that govern leaders, the maintaining of the public good, which economic structure is most beneficial to your citizens, at least two domestic programs, ways to create national unity, ways to combat terrorism and violence, and international organizations to join. (See rubric for specific ways to meet the requirements of the paper.)

 

People Also Read

 

Introduction

My country has been under the rule of our former president for the last 10years. It has not been easy for us the citizens as the president has brought a lot of division due to racism, wars between people of different races, and corruption. The president has been leading in favor of one race despite the different races that live here. He has been a dictator and for the last 5 years since his second term, the corruption rate has gone even higher. Public funds have been misused and the elected and close representatives, who have been very close to him, have used these funds for their personal satisfaction. The country got tired of his dictatorial rule and formed a coalition National Resistance Movement and the people aliased with the armed forces to overthrow him. This went well but the president did not take it well and so he paid goons with the help of our neighboring country which has a dictatorial ruler itself to demolish and destroy most of the public infrastructures like buildings and roads. They have been killing leaders and their close families in cold blood and terrorizing different towns non -stop. In this paper, I will discuss various policies and actions I am going to take to bring unity once more in my country as the newly elected president.

The governing style I will use as a new leader is the democratic style. I will offer a better way of handling situations in my government as compared to the previous leader. As a democratic leader, I will value the opinions of my people and will give them a chance to express their wants and when making final decisions I will put them into consideration. I will not give room for a gap to be between me and my people to grow because I will involve and work with them most if not all the time. As a democratic leader, I will urge my people through their elected representatives to come up with their ideas that they want to be implemented. As a newly elected leader who wants to make a difference from the previous manipulative leader, this would be the best style to work with the rest of the country and make a difference. The branches of the government are divided into three major parts; the legislative branch, judicial branch, and the executive branch. The judicial branch deals with the interpretation and application of the law. The federal judiciary members include the Supreme Court, Courts of Appeal, 94 district courts, and 13 Courts of Appeal of the United States, the president nominates them and the states do the confirmation (Maddex, 2014). However, federal judges are obligated to hold their seats until their resignation, death, or removal through impeachment by Congress.

The Executive branch is headed by the president and is stated in the Constitution’s Article II that; the president has the power and authority to accomplish a nations’ law. Additionally to his role as the armed forces commander in chief and state head, this government branch is inclusive of the Cabinet, the Vice President, the State Department, 13 executive departments, and Defense Department. Unlike Congress members, the Vice President and the President are elected via the Electoral College system. Lastly, we have the legislative branch of the government. This is the branch that has the power of making the country’s law. It was further divided into two major branches; the Senate and House of Representatives. The people of the nation elect the Members of Congress. As much as each state is entitled to two representative senators, the number also depends on how big the states’ population is.

The two public good domestic programs and how they will meet the public good Economic structure may include; first and foremost, the free-rider problem. When members of the public decide to buy public goods, this problem arises. As public goods are offered for free, most consumers choose to be free riders as there is no cost they pay to use these goods (Teece, 2013). People will never pay willingly to use a public good. The government has no intention of acquiring any profit from these goods as compared to private businesses. A very good example of public goods is the streetlights. They shine as bright despite the number of individuals who are using them. The government does this for the people and uses tax to pay for it. Business people can therefore use these lights to work even later in the night and hence the economy of the state grows as more tax is paid.

Secondly, I would use fairness. Most public goods are used to benefit some people and not some and it is not fair to everyone. The topic of the distribution of public goods is contentious and I would be a very different president. I would ensure that these goods are fairly and equally distributed to the citizens despite race or color. This will give me a chance to make a difference and hopefully it will bring peace to the country. Imagine a country where every person believes the distribution of public funds as free, fair, and just, is that not a peaceful and corporative nation? In cases where the citizens have to pay for funds, they pay equal amounts despite their social status, color, or race.

Conclusion

I have seen and experienced poor governance and in my ruling as a president, I would make a difference so that the coming generations will not go through what I have experienced. I would apply all the rules and ensure each governmental branch has respected and done its duties well. I would use the democratic method and listen to what the people of my country have to say and try my very best to implement them. The public funds I would ensure that every individual uses it and if there are chances of paying then each person pay equally.

References

Maddex, R. L. (2014). Constitutions of the World. Routledge.

Teece, D. J. (2013). Business models, business strategy, and innovation. Long-range planning, 43(2-3), 172-194.

 

5/5 - (9 votes)

Ethics in Interpersonal Communication: Responsibilities and Impact

Ethical obligation

A person is considered ethical if he/she can differentiate between wrong and right, good or bad. In such a situation my responsibility as an ethical person is to first ask myself if my action in such a scenario will be of benefit or not and if the majority of the people will reason with my response. If a certain behavior is unethical, it will remain so no matter the outcome. In this case, my obligation as an ethical person is to address the issue and point out its effect on the victim and this will be of benefit to all the parties involved. It will be so right to go in this direction because I feel that I will be doing the correct thing. As much as it is my right to remain silent to avoid any conflict, my cultural and moral values do not allow me to do so.

 

People Also Read

 

Action was taken

My best option to address this issue is by verbally communicate with the mother. This might not be easy but it all depends on how I will approach her. First of all, I will speak to her politely and calmly as a concerned person and try to calm her down first. Assuring her that she is not yelling at her child out of hate but out of anger and frustration but it is obvious that she loves her child. I will explain to her that it is her right to discipline her child but at the same time let her know the effects of how she is doing it and the outcomes altogether. Talking to the child about respect and following instructions from the mother will be very helpful especially when such a talk comes from a stranger.

Such a scenario has never happened to me, but in case it does, at first, I will be so saddened by what is happening in a public place. In the end, I will be so happy to be of great help if my way of handling it works. if it does not work I will also be proud of myself for taking a broad move and try to be of help.

Interpersonal communication

Interpersonal communication is the way that people who have a relationship and are connected in one way or the other interact either verbal or nonverbal. Interpersonal communication is very important to connected people because it defines the nature of that relationship.

Five purposes

To learn about yourself/others

Interpersonal communication says a lot about who you are and what your values are. This can be explained by the things research we do, the issues we discuss, and the photos we portray in public.

To help others

How we communicate with one another can make a great difference in other people’s lives. For example in the situation where you can approach a stranger and hint to him/her that what they are doing is wrong and that they might find themselves on the wrong side of the law.

To relate to others

Interpersonal communication builds and defines the relationship. For example, if you communicate in a nice and friendly way with another person most probably you will build a friendly relationship.

To influence others

Communication has influential effects. How people communicate can persuade someone to go by your words.

To play with others.

For a play to be successful there has to be an understanding. This can also be in a nonverbal manner.

Model of communication

Channel

Feedback

Sender/receiver

Encoding/decoding

Sender/receiver

Encoding/decoding

Feedback

Messages

The sender and receiver each send and receive messages to and from one another. A sender or receiver can encode or decode a message to be able to send feedback. The sender and receiver can pass messages either in gestures or by words. For communication to be successful there has to be a medium or channel to pass the message. During interpersonal communication, there can be several kinds of interruptions that inform of noise.

Work Cited

DeVito, Joseph A. Interpersonal Communication Book, The, 14th Edition. Pearson, 2016. [Textbooks.com].

5/5 - (10 votes)