Thursday, December 26, 2019
Social Media And Its Effects On Society - 1296 Words
Algorithm has become a term that is constantly intertwined with social media. Online platforms have become a place where archives and algorithms are used to provide us with content as well as a platform for users to participate and share information (Louw Carah, 2015). Algorithms are used to connect people to the content that interest them without the need to search for it on their own (Hallinan Striphas, 2014). Charlie Brookââ¬â¢s Black Mirror episode, Be Right Back (2013), has triggered us to think about how the information that we share on social media is archived and used to create customised forms of content and continuously engage us on media platforms. In this essay I will be discussing key ideas drawn from the episode. Firstly, databases are created from archives which grow as participation of users increase over time. Secondly, the information is made useful by sorting and analysing them with algorithms to create customised content for users. Thirdly, personalisation of content has benefits, however, it raises some consequences on the society. I will further illustrate the ideas from real world examples such as Netflix and Facebook. Databases are created from accumulation of archives as users participate. Data is any type of content that is collected from activities that happens on the platform converted to a digital form (Carah, 2016). Platforms watch and learn userââ¬â¢s actions to predict future behaviours (Louw Carah, 2015). In the film, the media platform wasShow MoreRelatedSocial Media And Its Effects On Society1597 Words à |à 7 PagesSociety Crumbles into Smithereens One Post at a Time You are walking out of the new Star Wars movie, posting about how superb it was, when suddenly you are swooped up and thrown in the back of a vehicle. No one would have thought posting about how you were there earlier would provoke such a situation. After all, social networking is ââ¬Å"safeâ⬠and ââ¬Å"friendly.â⬠Now, social media is defined as ââ¬Å"A form of electric communication through which users create online communities to share information,â⬠accordingRead MoreSocial Media And Its Effect On Society1711 Words à |à 7 Pagesinfluence usually are not the first words you would expect to come to mind when thinking about the term ââ¬Å"social media,â⬠yet with a little digging you will soon realize it could be the perfect description. Social media can be defined as forms of electronic communication through which users create online communities to share information, ideas, personal messages and other content. Most often social media is understood as a p ositive concept because of the ways it has allowed us to attain cheap and easilyRead MoreThe Effects Of Social Media On Society1359 Words à |à 6 PagesIn a broad sense, Social media refers to elements such as websites, television, blogs, IM, and other applications that enable users to create and share various forms of content such as messages, pictures, and information, or to be able to participate in social networking. Social media depends on web-based applications, which allow a high level of virtual interaction on various levels such as social, professional, and educational levels. Social media has had various contributions to the developmentRead MoreSocial Media And Its Effects On Society1592 Words à |à 7 Pagesdevelopment of vast social media networks has improved our communications and interactions. These networks, such as Facebook and Twitter, are essential to how information is shared and criticized. The Social Media Handbook defines social media as ââ¬Å"networked information services designed to support in-depth interaction, community formation, collaborative opportunities and collaborative workâ⬠(Hunsinger, 2014 p.1). Having an account or profile on these sites is more than a social norm; it is a requirementRead MoreSocial Media And Its Effects On Society1359 Words à |à 6 PagesPeople may say social media is good for you but is it really? Everyday, everywhere I always see people on social media calling people bad names, not being able to communicate face to face with each other. Social media, social media, social mediaâ⬠¦ oh what is has done to the world, so many students grades have dropped, criminals PROMOTE crimes. Ultimately, what is at stake here is social media will one day take over the world. Peopleââ¬â¢s safety will be in danger, crimes will increase, people will getRead MoreSocial Media And Its Effect On Society1601 Words à |à 7 Pagesrecent editorial titled ââ¬Å"Hazards of Social Mediaâ⬠on your LinkedIn page on February 10th, 2016. It was very interesting to read your perspective on social media and its effect on society. Having an undergraduate major in Psychology at the University of Southern California and currently conducting research on social media usage at the Brain and Creativity Institute of USC, I have spent significant time researching the issue of social media.Though I agree that social media can be hazardous if not used effectivelyRead MoreSocial Media And Its Effect On Society998 Words à |à 4 Pagesis bound to be a shift in social norms. As the times change, so does societ al views on acceptable values. One such possibility is the standard value accepted by mainstream society in which the way a female body is sexually portrayed in the media. It appears that society has not only accepted this standard, but has increasingly encouraged a more sexualized representation of the female body. Social media is an informational highway about what is accepted by the larger society and inferred by the individualsRead MoreThe Effects Of Social Media On Society Essay1644 Words à |à 7 PagesSocial media has become prominent parts of life for many young people today. Most people engage with social media without stopping to think what the effects are on our lives, whether positive or negative. Are we as a society becoming more concerned with Facebook friends than we are with the people we interact with face-to-face in our daily lives? What will the longterm effects of today s social media use be? There are many positive aspects, but there are equally as many dangers that come withRead MoreSocial Media And Its Effect On Society1151 Words à |à 5 PagesSocial Media The Workplacesââ¬â¢ Largest Enemy Being employed means that an individual will in most cases have coworkers and bosses; the environment shared between the employees is known as the workplace. In the time before technology, people being fired from their jobs was not an unheard of situation. The difference now is people are being terminated from their jobs because of something they posted on social media. If this was not the case, it would set a precedent that posting inappropriate or hurtfulRead MoreSocial Media And Its Effects On Society Essay1396 Words à |à 6 PagesIn our modern world, the use of social media is overwhelming and second nature due to the availability. Several people all around the world possess some form of an electronic device that is capable of accessing social media, rather it be Facebook, Twitter, Snapchat, Instagram, and many more. ââ¬Å"Technologyââ¬â¢s rampant popularization over the past decade in terms of social media has meant that texting, Facebook, and Twitter have inevitable take n over as the most efficient ways of communicating with each
Wednesday, December 18, 2019
The Weapons Of Mass Destruction - 2359 Words
During past decades Americans have become more familiar with terms such as weapons of mass destruction. This term in particular set off an atmosphere of fear as well as devastation in a personââ¬â¢s mind. Such instruments are often referred to chemical bombs, radiation, or anthrax. These are weapons can cause mass casualties. This paper will attempt to explain the types of weapons of mass destruction that are often deployed in the world today. Further it will expand on the protocol implemented by the United States government in order to combat the use of these weapons of mass destruction. Furthermore, this work will explore current practices to detour the future use as well as production of such massive arms by other nations. Finally, it will define what could occur if the world collective does not adapt a national agreement when dealing with such devices. U.S. Capacity for Combatting Weapons of Mass Destruction The world as we know it today can be a cruel place to live in. There is a lot of evil lurking around every corner and if one is not careful, evil will strike them down. Terrorism is a problem not only in the United States, but all around the world. While terrorism does not have one specified meaning it has come to simpler terms as a person or a group of people who has one intended purpose and that is to change the way the government operates through violence and death. There are many types of weapons that can cause mass destruction. Chemical, biological, or evenShow MoreRelatedThe Weapons Of Mass Destruction1665 Words à |à 7 PagesWeapons of Mass Destruction are a huge risk to the society due to the mass amount of lives that can be taken with the detonation or use of a weapon of mass destruction. In the past an estimated 4,186,000 - 4,385,000 people have died due to a weapon of mass destruction (WMD). If all the WMDââ¬â¢s as of now in the world were released A WMD is by definition of United States Law any destructive deviceâ⬠¦any weapon that is designed or intended to cause death or serious bodily injury through the releaseRead MoreThe Weapons Of Mass Destruction1770 Words à |à 8 Pagesdevelopments in weapons of mass destruction planning? ââ¬â¹Weapons of mass destruction, or WMD, provides a fundamental problem for governments and other organizations such as hospitals and schools. If WMDs manage to fall into the hands of terrorists, perhaps during a civil war, the potential for devastation and casualties is high. Therefore planning efforts to avoid WMD scenarios remain at the top of priority lists. This literature review will highlight the meaning of weapons of mass destruction, what someRead MoreWeapons of Mass Destruction790 Words à |à 4 PagesWeapons of Mass Destruction Weapons of Mass Destruction (1) Introduction (2) The Term * 1 Early uses of term * 1.1 Evolution of its use * 2 Definitions of the term * 2.1 United States * 2.1.1 Strategic * 2.1.2 Military * 2.1.3 Criminal (civilian) * 3 Common hazard symbols * 3.1 Radioactive weaponry/hazard symbol * 3.2 Biological weaponry/hazard symbol (3) Treaties * 1 General * 2 Delivery systems * 3 Biological weaponsRead MoreWeapons Of Mass Destruction Of Nuclear Weapons904 Words à |à 4 Pagescontroversy over weapons of mass destruction of nuclear weapons is still an uprising fear and subject in the heart of the American people, our allies, our enemies, and to the rest of the world who simply just knows of the presence. Soviet Russia started that fear in the 1960s, becoming the first large source of nuclear power and weapons (Cowley, 1996). Nuclear weapons undoubtedly brought change on the overview of maritime warfare. The fear of this destructive source of weapon brought politicalRead MoreNuclear Weapons Of Mass Destruction1057 Words à |à 5 PagesKarla Ximena Leyte Though Paper #3 Weapons of mass destruction and their ability to challenge security and create large-scale obliteration have become the most significant threat in international politics, causing vast concern of the consequences that may arise if they were to emerge in the hands of dangerous non-state actors. Chemical, nuclear, and biological weapons not only possess the ability to end the life of many but also pose negative effects on the environment and global economy. WhileRead MoreBanning Weapons Of Mass Destructions2663 Words à |à 11 PagesJacob Brown Dr. Wells 4-30-15 English 101 Banning Weapons of Mass Destructions Wonââ¬â¢t Work August 6, 1945, the United States launched an attack on Hiroshima that had never been seen before. No military in the world knew how to defend themselves from such an attack and no civilian felt safe from the oncoming onslaught (Oppenheimer). An atomic bomb was dropped on that day from a United States Air Force B-29 bomber over the city of Hiroshima. The radiation falling on the city and the leveling ofRead MoreNuclear Weapons And Weapons Of Mass Destruction1079 Words à |à 5 Pages Nuclear Weapons Ever since World War two we have feared destruction and what could be the aftermath of nuclear bombs. We had a whole era in history to dedicate being terrified of weapons of mass destruction. We had bomb drills, duck and cover drills. The United States had TV drills if an attack were to happen on United States soil. For many Americans this was not hysteria, but a reality that could happen. The first World war chemical weapons were used then outlawed for combat. ââ¬Å"Unlike whenRead MoreThe Proliferation Of Weapons Of Mass Destruction3041 Words à |à 13 Pagesglobal security and what are possible solutions? Proliferation of Weapons of Mass Destruction and Threats to Global Security The proliferation of weapons of mass destruction is one of the foremost threats challenging global security today. The United States should take an offensive strategy and re-emphasize its nuclear program due to the current affairs around the globe and the growing threat of the use of weapons of mass destruction against our citizens, allies and vital interests. à The existingRead MoreWeapons Of Mass Destruction ( Wmd ) Essay2029 Words à |à 9 Pages Are Weapons of Mass Destruction (WMDââ¬â¢s) able to be used ethically in time of war without consequences? A question with many different answers from all over the world, from children, adults, and elders alike. Today, we will review quite a few things about WMDââ¬â¢s, such as what uniquely defines the ability of WMDââ¬â¢s from that of the average weapons. We will also view who created them, and why they created them in the first place. Furthermore, we will look into what was stated earlier: Are WMDââ¬â¢s ableRead MoreS cientists and Weapons of Mass Destruction860 Words à |à 3 PagesA weapon is a thing designed or used for inflicting bodily harm or physical damage. Although, whoââ¬â¢s the creator of a weapon that can inflict physical damage? The answer is patriotic scientists. These scientists believe they are creating a weapon that is protecting their country and themselves. Starting with simple weapons, people have developed with more advanced methods to kill one another in a war or anywhere. This helps us understand that a scientist shouldnââ¬â¢t have an obligation to create a weapon
Tuesday, December 10, 2019
Challenges in Cyber Security for Business ICT Sector
Question: Discuss about theChallenges in Cyber Security for Businessfor ICT Sector. Answer: Literature Review Introduction Cyber security was never a concern before the emergence of the internet. Cyber-crime began when many computers started to connect to the internet. The breach of security was as a result if malicious individuals are wanting to test their skills by bringing the internet down stealing data from other computers and sending viruses to those computers connected to the internet(Ashibani and Mahmoud, 2017). Business success is vital for the economy of a countys long-term sustainable growth (Bingham and j Bector, 2017). These businesses with time have incorporated the ICT sector, which has seen them improve the efficiency in ways of obtaining information and its effective use (Carayannis, Campbell and Euthymiopoulos, 2013). Studies done in the past supported that the ICT sector presents many opportunities to the business community in the developing countries (Christou, 2014). Due to this, more emphasis has been put on developing business models that incorporate the information communication technology (ACS Cybersecurity Guide, 2017). The model is designed in such a way that it incorporates the security features. (Czosseck and Geers, 2015) argues that the service providers have realized the value of business ICT solution and are now focused on providing business models that have security features, with some providing the full range technological services as well as security solutions (TechRepublic, 2017). (Jabee and Afshar, 2016), states that businesses experience cyber security challenges due to interconnections,which expose the businesses to malware and hackers. Moreover, these businesses are still exposed to administrative and operational overheads once they procure the security solutions. In most cases, networks that are poorly secured pose a potential link to cyber security chain (Johnson, 2013). These weak links come about due to, outdated virus protection or an outdated firewall (Kalaimannan et al., 2016). For instance, if a malware virus finds its way into a computer system can become a botnet through which other systems are attacked(Lehto, 2013). Madnick et al (2014) argued that internet service providers are not in identification and removal of botnets as they have a high-cost implication, this makes the businesses to under invest. The Cyber Security Policy and Regulations Powers, (2014) states that the availability of the internet almost everywhere for businesses in both developed and developing countries, complements the human effort to search for information and provide communication. Some argue that the cyberspace growth should not be monitored through regulations and ought to grow without government interventions. Others give a different perspective and champion the monitoring of the growth in the cyberspace should be regulated using both domestic and international laws. The second lot that acknowledges the idea of regulating the cyberspace argue that failure to implement these regulations, may limit the current growth and development gains. Before, the cyber security threats were treated as mostly technological problems (Robinson, Jones and Janicke, 2015). Recently, the perspective has changed to incorporate the economic issues and aspects of users behavior. Singh (2012) emphasized that there is a need to come up with a strategy that considers th e disparities in the legal system and the fragmented policies. He continues to say that interconnectivity has become one of the key infrastructures in business communication, and the need to maintain information confidentiality, integrity and availability require the enactment of laws that are drafted for cyber security purpose. However, Fortune.com, (2017) explains that security is never foolproof as some security technologies are developed as attack technologies. These technologies include password crackers and software that scan networks for vulnerabilities are some of the examples. While the original intention of developing such technologies is to test the strength and stability of the existing network, malicious users, use these tools to find security holes, which are then used during the attack. Tracy (2014) acknowledges that the cyberspace knows no national borders and also that interconnected network is a disaggregated realm in which various components of threats and respons e may influence several networks on a broader scale where regulations is still a concept rather than the rule. The Nature of Cybercrime Threats Cybercrime assumes many forms ranging from denial of services, manipulation, extortion blackmail, and destruction. Moreover, the tools used to conduct this crime are as well many such as social engineering, spyware, ransomware, malware and alteration of physical devices such as ATM skimmers (Voeller, 2014). This shows that the attack surface presents a lot of possible attacks from vulnerable hardware and software. For instance, if a hacker targets the attack on Apple product such as the iPhone and everyone in your neighborhood happens to own one, the attack surface can range from dozens to thousands depending on the size of the population that own the iPhone. In the case where the attack is more severe in that it attacks, the iPhone product regardless of the geographical region. Then the attack surface increases up to millions of I phones worldwide. The threat is further escalated in cases where hardware and software might provide multiple vectors for attacks. During an attack, the i Phone might be having multiple vulnerabilities that could lead to its exploitation in an event there is an attack. In some cases, multiple exploits might be used simultaneously to hack the device, a case presented by the FBI when they hacked San Bernardino shooters iPhone. In cases where the attacks are launched on a plant that power, the infrastructure the case can be life threatening when an attack hits a power station and shuts it down. Apart from the power plants, the attacks might target the stock and currency exchange firms, which might result in global financial crisis and even war (Singh, 2012). The funny thing about cybercrime is that it is constantly taking place even when one is using a modem to connect to the internet. The modem is continuously feeding answers to questions that will help identify whether there are loopholes in your IP address, which will virtually allow the software to communicate to and from computers and networks. According to Fortinet, a network secur ity service company, in every 5 minutes, there are 500.000 attacks that occur on their network. At this point, it is clear that anything controllable by technology is vulnerable to cybercrime as hackers have demonstrated they can attack just about anything, from cars where they remotely turned a jeep off on a highway to medical devices by sending fatal dose to drug pumps. This, therefore, calls for the importance of cyber-security that will counter the new types of threats for the government, industries, and at the individual level. Cyber SecurityImplications The degree of networking makes virtually every element in the cyber space to be at risk. These elements at times make it difficult to estimate the extent of security measures (Tracy, 2014). In many cases, it is very hard to estimate the true cost of a security incident. As a result,companies focus on fixing the damage caused by the security incident rather than tracking the incident or assessing the cost. It is evident that the effect of the botnet is expected to grow as powerful networks continue to emerge and interconnectivity continues to thrive. However, through the advancement of technologies, more advanced defenses can be introduced, Voeller (2014) posit that the cause of cyber security situation is because of adverse inter- connectivity. Studies should therefore in the future focus on mitigating the uncertainties and shift focus on improving the vulnerability measurement. As the technology continues to advance, the number of new threats also continues to increase. The network attacks take place both internationally and locally, due to the cross-border nature of cyber security. This makes it difficult to scrutinize the emerging cyber threats through the efforts of stakeholders (Robinson, Jones and Janicke, 2015). This problem can be solved through working together of all the stakeholders, to enable each state to protect their interests, which will be similar to how regional integration takes place in other sectors, only that it will be for the cyber-space. According to Powers, (2014) threats can come from entities such as state agencies or private corporations against each other from any part of the world. Cyber Security and the Stakeholders Perception According to Madnick et al (2014), the decision made on internal and external risks are largely dependent on stakeholders perception, and this has a major impact on the cyber-security. Lehto (2013) posit that, that the decision makers perception has a great correlation with the roles they play and their actions, which influences their cyber security strategy. However, in some cases, the perceived risks are predictable and quantifiable (Kalaimannan et al., 2016). The main aim of interconnectivity is to provide the end user with extensive socio-economic benefits, although in the process of accessing this benefits there are some potential threats associated. These threats reduce the confidence of the user, while the lack of privacy and security breaks the users trust (Johnson, 2013). Therefore, the stakeholders need to be well informed on the relevance of a secure internet and its benefits. To attain this, a holistic approach that encompasses regulatory, legislative law enforcement on t he technological field is required (Jabee and Afshar, 2016).TechRepublic, (2017), states that there should be an integrated perception on how risk is handled the benefits derived as well as the incentives, to help develop a framework that aligns the perceptions of stakeholders of cyber security risks. The opportunities Cyber Security The internet presents many vulnerabilities to our computing system due to the continuous advancement of technology. However, the threats of attacks from the internet are continuously teasing us and make us to develop new ideas, new ways and new products that aim to curb cyber security. The rise of the threats also gives rise to new economic opportunities, and new ways of conducting business (Czosseck and Geers, 2015). The opportunities that are driven by cyber security include The Data-Driven Economy In the recent times, data has become king from machine learning to the internet of things. The analysis of this data from every aspect of life is what will lead to new insights and products. This is evident due to the advancement of local information system industries e.g. the Fin-tech sector. However, more opportunities involving data will start to emerge exponentially once the products and services involving data are unveiled. According to ACS Cyber security Guide, (2017), new ways are already in place that helps to mine data and produce new services e.g. the robot lawyer. With the help of cyber security as the building block, the level of investment and development in technology business will be guaranteed of prosperity (Christou, 2014). Wealth Creation The advancement in technology has led to increased wealth for over a decade, with household names such as Google, Facebook and Apple dominating the market. This has led to the creation of internet of things that involve cars, fridges and even televisions. This has presented a fruitful opportunity for the ICT sector. However, for all this to be possible, it requires cyber security will be required to form the basis of every new technology for the future (Carayannis, Campbell and Euthymiopoulos, 2013). Cyber Security as Job Growth According to Bingham and Bector, (2017), duties in cyber security are very much in demand, which has a growth of 57% in the last year only. The roles in cybersecurity include the chief information security officer, security engineer, security architect and the security analyst. All these opportunities are developing a workforce. The Future of Cyber Security According to Surf Watch labs, 2016 was the year that hacking went mainstream. However, 2017 will be the year that hackers get innovative with increased creative hacks. In the past, cybersecurity was regarded as the duty of the IT departments. Right now, it is no longer their realm as smart companies continue to integrate security into their systems and the same time the hackers are evolving. According to the studies, cyber criminals follow money trails. This is the reason why ransomware attacks grew quickly because it is easy to operate. Due to this, smart companies should embrace proactive policies to curb such threats (Ashibani and Mahmoud, 2017). Conclusion The world is quickly evolving into a world of internet things at breakneck speed. The evolution has been so rampant that devices and products are being discovered daily. The evolution has managed to create a lot of business opportunities as well as threats. The most impacted sector by the development of technology is the business sector. This sector has evolved to the extent that it relies on the support of the information technology to run its activities. The over reliance has created a platform where cyber security issues have marred the benefits that are derived from this sector. Cyber security has largely affected businesses as well as the individual level ranging from identity theft to stealing of data and fraud. The cyber security concern has led to the evolution of ways which business models are now developed in that they incorporate the security measures that help reduce threats and attacks on the company websites and its networks. However, cyber security has also helped in d iscovering new ways of dealing with malicious software as well as created job and investment opportunities in the economy. The challenges in cyber security have triggered the advancement of technology in cyber security such as the security measure that has ensured that the internet will never be brought down again. References Ashibani, Y. and Mahmoud, Q. (2017). Cyber physical systems security: Analysis, challenges and solutions.Computers Security, 68, pp.81-97. -Bingham, R. and j Bector, R. (2017).EVOLVING CHALLENGES IN CYBER RISK MANAGEMENT. [online] Global-Risk-Center. Available at: https://www.mmc.com/content/dam/mmc-web/Global-Risk-Center/Files/MMC%20GRC%20-%20Evolving%20challenges%20in%20cyber%20risk%20management%20-%202016.pdf [Accessed 26 Apr. 2017]. Carayannis, E., Campbell, D. and Euthymiopoulos, M. (2013).Cyber-development, cyber-democracy and cyber defense. 1st ed. Christou, G. (2014).Cyber security in the European Union. 1st ed. ACS Cybersecurity Guide. (2017).Cybersecurity Threats Challenges Opportunities. [online] Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf [Accessed 26 Apr. 2017]. Czosseck, C. and Geers, K. (2015).The virtual battlefield. 1st ed. Amsterdam: Ios Press. TechRepublic. (2017).Experts predict 2017's biggest cybersecurity threats - TechRepublic. [online] Available at: https://www.techrepublic.com/article/experts-predict-2017s-biggest-cybersecurity-threats/ [Accessed 26 Apr. 2017]. Jabee, R. and Afshar, M. (2016). Issues and Challenges of Cyber Security for Social Networking Sites (Facebook).International Journal of Computer Applications, 144(3), pp.36-40. Johnson, M. (2013).Cyber crime, security and digital intelligence. 1st ed. Farnham, Surrey: Gower Pub. Ltd. Kalaimannan, E., John, S., DuBose, T. and Pinto, A. (2016). Influences on ransomwares evolution and predictions for the future challenges.Journal of Cyber Security Technology, 1(1), pp.23-31. Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies.International Journal of Cyber Warfare and Terrorism, 3(3), pp.1-18. Madnick, S., Choucri, N. and Ferwerda, J. (2014). Institutional Foundations for Cyber Security: Current Responses and New Challenges.SSRN Electronic Journal. Powers, G. (2014).U.S. national cybersecurity. 1st ed. Robinson, M., Jones, K. and Janicke, H. (2015). Cyber warfare: Issues and challenges.Computers Security, 49, pp.70-94. Singh, T. (2012). Emerging Challenges to Cyber Security-Internet Monitoring with Specific reference to National Security.International Journal of Scientific Research, 1(2), pp.129-131. Fortune.com. (2017).The Cybersecurity Challenge Every Business Should Prepare for. [online] Available at: https://fortune.com/2016/01/26/davos-cybersecurity-challenge-business/ [Accessed 26 Apr. 2017]. Tracy, R. (2014). IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards.Information Systems Security, 16(2), pp.114-122. Voeller, J. (2014).Cyber Security. 1st ed. Wiley.
Tuesday, December 3, 2019
Night And A Farewell To Arms Eliezer And Frederic Essays
Night and A Farewell to Arms: Eliezer and Frederic Night and A Farewell to Arms: Eliezer and Frederic In Night and A Farewell to Arms, the reader follows the characters of Elie Wiesel and Ernest Hemingway through their personal struggles between love and war. In Night, Eliezer faces malnutrition, Nazis, and concentration camps, while Frederick Henry, in A Farewell to Arms, struggles with love, patriotism, and religion. Despite their differences, the journeys of these two young men are remarkably similar; they both are prisoners of war, they both lose the person they love most, and they both face a bleak and dismal fate. Frederic and Eliezer are both prisoners of war but in different ways. Frederic has a strong emotional attachment to the war. "Don't talk about the war," he says after abandoning the front, "it was over...but I did not have the feeling it was really over" (Hemingway 245). For Frederic the war captured his mind in a way that he cannot escape. Eliezer is also a POW but in a more concrete and physical way. Before being imprisoned, Eliezer is stripped of his clothes, his self-respect, and his identity, and he is forced into barracks. "The barracks we had been made to go into were very long...The antechamber of Hell must look like this. So many crazed men, so many cries, so many bestial brutality" (Wiesel 32). It is only love that allowed Frederic and Eliezer to survive their prisons. Catherine Barkley is Frederick's true love. "I felt damned lonely and was glad when the train got to Stresa...I was expecting my wife..." (Hemingway 243-244). This quote shows the physical and emotional yearning that Catherine inspires in Frederic. This desire for her is what helps him through the war. Eliezer's love, on the other hand, is directed towards his father. Eliezer feels that his father is his only possesion that the Nazis cannot take from him. "I'll watch over you and then you can watch over me. We won't let each other fall asleep. We will look after each other" (Wiesel 85). The loss of both Eliezer's father and Frederic's fiance ones is what inevitably leads to a dismal future. The tragic fall of these two young characters is directly related to the toll their prisons place on them and the absence of the ones they love. "I had not seen myself since the ghetto. From the depths of the mirror a corpse gazed back at me" (Wiesel 109). As Eliezer looks at himself, he sees that he is a hollow boy. Fredrick also has nothing to live for at the end of A Farewell to Arms. Hemingway uses rain to symbolize death. Correspondingly, at the end of the novel, Frederick "...went out and left the hospital and walked to the hotel in the rain" (Hemingway 332). Frederick is not physically dead but rather emotionally dead. Throughout Elie Wiesle's Night and Ernest Hemingway's A Farewell to Arms similarities become apparent. In both, the main characters are semi-autobiographical. More importantly, both of the main characters, Eliezer and Frederic, become prisoners of war, experience the loss of a love one, and face a bleak future. Ultimately, by taking their respective main characters and showing how imprisonment and personal loss can lead to emptiness, Elie Wiesel and Ernest Hemingway that truly express the hardship of war.
Subscribe to:
Posts (Atom)