Thursday, February 20, 2020

In the news 2 Assignment Example | Topics and Well Written Essays - 250 words

In the news 2 - Assignment Example ed people have been united with their families and the news that the leader of the group had was to be re-united with her grandson elicited emotions in Argentina. Forces that were allied to the government kidnapped babies between 1976 and 1983 in the course of military autocracy which was one of the murkiest eras in a time that was entitled the Dirty war. Carlotto’s daughter was part of a guerilla group when she was arrested and imprisoned in 1977at a time when she was almost three months pregnant. She had to give birth to her so at a military hospital and she was returned to her cell without her baby and later executed. The dictatorship took away Carlotto’s daughter and she had no idea what had happened to her grandson even though she kept her hope. The grandson who was reunited with his grandmother is a 36 years old who is named Ignacio Hurban and works as a music director in a school in Olavarria but initially had doubts concerning the story of his life which led him to contact the grandmothers with the story of his life where he submitted DNA. After the DNA was tested, it was found to be a 99.99 percent match even though the first time the grandson had doubts are not clear. The president of Argentina was among the people who called the grandmother after the news of finding her grandson had been revealed to

Tuesday, February 4, 2020

Social networking Essay Example | Topics and Well Written Essays - 750 words - 1

Social networking - Essay Example The particular study would be evaluated by referring to a variety of its characteristics, such as structure and content/ evidence. Also, the contribution of the study, for understanding the potential implications of social networking sites could be explored. Hak has divided the study into thematic sections, so that all aspects of the issues under discussion are covered. In this context, Introduction is used for explaining to the reader the paper’s key points and objectives. Then, two sections have been used for presenting the findings of the literature in regard to the study’s subject: the first section, entitled as ‘Social Media Networking’ (Hak 2012, p.12) shows the structure and role of social networking sites, as these issues have been analyzed in the literature. The second section, entitled as ‘Security Risks and Trust Zones’(Hak 2012, p.14) explains the security issues involved in the use of social networking sites and describes the struc ture of Security Trust Zones, as tools for protecting the privacy of these sites’ users. At the next level, Hak refers to the ‘Analytic Hierarchy Process’ (Hak 2012, p.15), a tool developed by ‘Saaty in 1970s’ (Hak 2012, p.15). The potential use of this tool for assessing the security risks of social networking sites is analytically explained (Hak 2012, p.15-16). ... Literature is used for showing the various aspects of study’s subject. It should be noted that the literature chosen is recent; mostly studies of 2010 and 2011 have been used, reflecting the actual status of social networking sites as tools for communication. Moreover, academic journals have been preferred, instead of books, aiming to use, as possible, empirical evidence for supporting the assumptions made. Also, a methodology is suggested for facing a key problem in regard to social networking sites: the assessment of security risks related to these sites. In addition, graphs and tables are used, where appropriate, for making the explanations given clearer. In other words, Hak has covered successfully both the theoretical and practical aspects of the issues under discussion. At this point the following issue should be discussed: which is the value of the study of Hak in regard to the understanding of risks related to social networking sites? At a first level, the study of Hak shows that social networking sites can be related to risks, especially security risks. These risks are analytically explained using appropriate literature, so that no doubts can exist in regard to the security implications of social networking sites. Then, the structure of social media networking is explained, so that the users of social networking sites are aware of the potential security gaps involved. The use of graphs, as possible, increases the value of the study of Hak in presenting the security risks of social media networking. Also, the study of Hak provides a methodology for assessing the security risks related to social networking sites. This methodology is based on a model that was first introduced in 1970s but which was never used, up today, for assessing the