StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

I attaced all information below.(file) - Essay Example

Cite this document
Summary
Freedom, Justice and society are very important concepts that have been well discussed by eminent philosophers such as Aristotle, Machiavelli, Rousseau and Locke. Observations and philosophical works by these eminent thinkers have always been based on personal experiences in…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
I attaced all information below.(file)
Read Text Preview

Extract of sample "I attaced all information below.(file)"

Wall Street Journal: Review of articles on Community Freedom, Justice and society are very important concepts that have been well discussed by eminent philosophers such as Aristotle, Machiavelli, Rousseau and Locke. Observations and philosophical works by these eminent thinkers have always been based on personal experiences in public, political or diplomatic arenas. Some of these ideals are evaluated in the modern context by comparing them with facts from articles published in the Wall Street Journal, which are listed below:‘Fake but Aristotelian’ by James Taranto (Published 16th October, 2009).

‘The Power Trip’ by Jonah Lehrer (Published 14th August, 2010).Editorial of Wall Street Journal (Published 26th July, 2001).The first article listed above compares some of the teachings of Aristotle regarding social benefits with the recent policies of President Barack Obama (of the United States) over major changes in the American healthcare system. As such, this article discusses community from the perspective of a nation-state. The second article evaluates the notion of power and its influence on individuals as they move up the organizational ladder.

The article contradicts the suggestions of the 16th century philosopher, Machiavelli, who suggested that a leader should prefer dominance and fear to love in the course of attaining eminence. The third article suggests that property rights in America have diminished people’s freedom. Using the arguments of Rousseau over issues such as property rights and individuality, the article’s author highlights the fact that these rights have enhanced people’s greed thereby diminishing the good for the society (i.e., a nation-state).

Aristotle was a firm believer in democracy and maintained that a nation was supposed to based on a constitution that catered to the aspirations of the middle classes. In his philosophical work titled ‘Politics’, Aristotle says the following about democracy (Aristotle, 1977):“If liberty and equality, as is thought by some are chiefly to be found in democracy, they will be best attained when all persons alike share in the government to the utmost.”Thus, social justice according to Aristotle was applicable to all peoples who were unqualifiedly equal.

The Patient Protection and Affordable Care Act (PPACA), which was passed in 2010, is an attempt in this direction by the Obama administration at delivering healthcare to poor and middle-class Americans (especially those without adequate medical insurance) and ensuring that more funds are allocated towards providing universal healthcare.Jonah Lehrer compares the recent events in Hewlett Packard with regards to the downfall of its CEO (Chief Executive Officer) against the principles suggested by Machiavelli on leadership and observes that his teachings do not find any place in the modern context.

In today’s organizational structures where a single person no longer holds absolute power, the author found that others senior members in the organization were quick to identify and expel individuals with Machiavellian qualities. As a result, no one is able to garner total control over an entire organization and has to go by the checks and balances stipulated by peers. The article describes a previous study conducted at the University of California at Berkeley where individuals were rated based on the level of respect and their place within the local social hierarchy.

Citing this study, the author notes that (WSJ, 2010):It turned out that the Machiavellian sorority members were quickly identified by the group and isolated. Nobody liked them, and so they never became powerful.The author uses this example to evaluate the ascent of people like CEO Mark Hurd, thereby assuming that corporate ascent and social respect were related and mutually dependent upon one another. On the other hand, the third article discusses the Rousseau model and observes that its principles were applicable only to medieval times.

While his teachings were instrumental for important events such as the French revolution, the author notes that these same principles have given unaccounted power to corrupt government bureaucrats at the expense of the common man. Lack of accountability has allowed politicians to administer laws through capricious and corrupt means. Once again, these conclusions are based on the assumption that developing and communist nations are the ones most affected by corrupt politicians and bureaucrats.

The article does not provide a similar insight into similar practices in developed countries that have led to similar environmental pollution and degradation. The recent oil spill off the coast of Louisiana in 2010 is one such example of the weak laws that protect oil companies and absolves politicians of any blame.The healthcare plan introduced by Obama has nevertheless met with stiff opposition from the public, as there was a growing opinion within the public that the president had sided with the healthcare industry.

Griffiths (2009) says that in embracing an overhaul of the nation’s healthcare system, Obama had assumed that he would get the necessary support from the Republicans and other conservative groups. While this has not been the case, it appears that Obama has a Machiavellian perception of the public and views them as susceptible to open manipulation (Caton, 2008). On the other hand, the American public believes that much of the stated benefits will be given to the uninsured thereby escalating taxes.

Instead, it seems that people are willing to withhold benefits to a certain section of the society, thereby demonstrating an Aristotelian tendency. Aristotle always believed that the actions of the government were based on the structure of the country’s political leadership and its people. He further believed that the latter did not have any significant influence through mediums such as public debate or opposition and that the state held the upper hand under such circumstances. The passing of the PPACA by Congress despite intense public opposition is testimony to this philosophy.

The application of Machiavellian principles in HP’s case follows the principles promulgated by Machiavelli in his work titled ‘Prince’ whereby the notions of internal debate and conflict are cited as important elements that serve to strengthen an organization (or even a nation state) and maintain the balance of power (Griffiths, 2009). The firing of HP’s CEO in the wake of numerous allegations clearly suggests that these principles do indeed work in practice.The above arguments clearly indicate the importance of community in the thoughts of medieval philosophers and goes on to show their applicability even in the modern context.

The question over whether these principles follow in total conformity in relation to modern dynamics of society and community is a different phenomenon that requires further analysis.References1. Aristotle (1977), Aristotle: Politics. New York: Forgotten books.2. Griffiths, G. (2009). Politics and philosophy: Niccolò Machiavelli and Louis Althussers aleatory materialism. London: Brill.3. Caton, H. (2008). The politics of progress: the origins and development of the commercial republic, 1600-1835.

University Press of Florida.Linkshttp://online.wsj.com/article/SB10001424052748704322004574477342864992048.htmlhttp://online.wsj.com/article/SB10001424052748704407804575425561952689390.htmlWall Street Journal Editorial, 26th July, 2001.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“I attaced all information below.(file) Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
I attaced all information below.(file) Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/history/1580630-i-attaced-all-information-belowfile
(I Attaced All Information below.(file) Essay Example | Topics and Well Written Essays - 500 Words)
I Attaced All Information below.(file) Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/history/1580630-i-attaced-all-information-belowfile.
“I Attaced All Information below.(file) Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/history/1580630-i-attaced-all-information-belowfile.
  • Cited: 0 times

CHECK THESE SAMPLES OF I attaced all information below.(file)

Management information system

According to (Caldwell 175) computer security has five fundamental functional areas which are listed below: Risk Avoidance This is a basic security fundamental which deals with questions like unrestricted internet access, business engaging in risky activities and standardization on a desktop operating system.... Some of them are listed and described briefly below: Viruses A virus is such a program that when it is executed it works within the security policy completely....
8 Pages (2000 words) Essay

Denial of Service Attacks (DoSs)

However, if an attacker gets a success in deceiving security configuration, he/she can be able to get access to the /etc/passwd file as well as can get all files and, in the end, the usernames and passwords which are stored on the web server (Kennedy, 2005).... For instance, an attacker can insert an executable instruction like that , inside a legal web site form below the appearance of an HTTP (hypertext transfer protocol) request in an attempt to get access to that particular web server....
7 Pages (1750 words) Essay

Types of Devices and How They Are Cloned

Some of the common uses of cloning are outlined below: Reinstatement of the computer after a crash Without a doubt, a clone of boot drive is believed to be a critical tool for retrieval from a state that occurs due to a system crash or failure.... For instance, some of the well-known firms such as Dell, HP, Gateway, Sony and Compaq as well as many other manufacturers all make Windows-based computers....
10 Pages (2500 words) Essay

Berkeley Internet Name Domain Spoofing Attack

A non-recursive name server is secure from cash poisoning and also DoS attack because a non-recursive name server will just respond to the queries that send to it directly and will not send queries so it does not cash any information or data.... In this assignment, the writer will focus on securing BIND from the spoofing attack and the configuration needed to log that specific data transfer....
9 Pages (2250 words) Assignment

Proven Practices for Securing Website against Distributed Denial of Service Attacks

om which is a file-sharing website.... Later on, all the servers were moved to the Amazon cloud seeking protection from these attacks (Crosman, 2014).... It is eminent that these DDOS attacks are now considered to be a major threat for all businesses, government organizations, websites, online banking, etc....
16 Pages (4000 words) Research Paper

A Concept to Avoid and Minimize Security Risks in Cloud Computing

… According to the report this computing technology greatly influence the way people use computers and access to their personal data or information.... This essay talks about a cloud which is basically a network in which certain servers are attached in the form of cluster....
9 Pages (2250 words) Essay

Vulnerability in the Communication System

The UXSS is a type of scripting that may deny the user access to the PDF file at the point at which they may want to access the file.... This case study "Vulnerability in the Communication System" focuses on the problem that the system run by the organization does not have necessary checks against information stored in PDF format because the company uses Adobe Reader and the Adobe Acrobat to access PDF files.... Theft of information exposes the establishment's operations to individuals who may be neither employees nor consulting on contract....
6 Pages (1500 words) Case Study

Information Security Management

The command that worked was DOS FIND to find the file to change.... This file was overwritten using the following command Then I craft another command to overwrite that file.... Then malicious information is input as shown below; The figure below shows entry into the system in WebGoat site The second stage is SQL injection.... This is when the credit card is stolen using SQL injection all possible inputs are taken into consideration as shown in the screenshot below This is done using the following code in SQL injection The code shows how various input is used to affect the security of the systemThe third stage is very severe as the hacker Defaces the site by injecting the command with the intention of accessing the web main page....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us