Sunday, March 15, 2020

Coursework on Business Law

Coursework on Business Law Coursework on Business Law: UNITED STATES V RADTAKES United States Court of Appeals, Eighth Circuit, 2005 415 E3d 826 The defendants, a man and his son were charged with the offence of conspiracy to defraud the Us and Internal Revenue Society (IRS). The defendants paid employees on an ad hoc basis with check written from the Companies bank account instead of chanelling them through the Companies’ payroll as required by law. Consequently, they withheld no taxes or union benefit payment. Held guilty as charged. Circumstantial evidence should be permitted to prove committing of a crime when there is sufficient evidence presented to the jury with no intentions of defrauding the crime accused. Defendants charged with a conspiracy are not actually the real committers of the fraud. Once one is a suspect of defrauding, one has a chance to present his witnesses and prove ones innocence in front of a jury. The most significant defence to circumstantial evidence is the truth behold behind the evidence being produced. When the evidence has substantial truth and has a witness to support the evidence, the defendant might get a chance to prove on the crime committed. Once the evidence presented is insufficient proving that the defendant acted with intentions to commit the crime is difficult. Another circumstance to be permitted is by having absolute privilege on the crime committed. For instance, evidence adduced by witnesses in court and the defense arguments and counter claims during court proceedings, statements made by judges whilst hearing and determining a matter be for them, and statements made in the course of parliamentary proceedings cannot back up any action for defamation, irrespective of whether or not they were made without considering how true, false or weird they are. In addition, honest opinion is a good defense in action of defamation in many commonwealth jurisdictions. This is to say, if an individual make a defamatory statement whilst expressing a genuine opinion about the injured person while opposing a fact, the alleged statement cannot maintain a claim for liability against the statement made while presenting the evidence. On viewing a statement as an expression of piece of evidence or opinion it can depend upon its background, notwithstanding the fact the defendant creating the statement is considered to be knowledgeable enough to know if a statement made is true or false. For instance if an employer calls you a thief, in the ordinary course of things it may not be regarded as an opinion since a statement cannot be made out of the blues. Some jurisdictions instead of basing so much significance on what is a fact or an opinion in, they have opted to admit that statements which seem to be realistic normally hold circumstantial evidence. The penalty for theft should not vary according to the value of the property taken but should get an equivalent sentence accord to the property theft with an exceptions of white collar crimes. The defendant stands to be convicted of the theft if proven guilty, deprives or withholds information that is crucial in decision making. A defendant can be awarded penalty of the actions one has committed once; one has intent to conduct business secretly to their own benefit or to benefit other parties, either by stealing the organizations resources or using without authorization. A defendant convicted of a certain offense of theft should be charged according to a range set by the crime law section 1209.039 that specifies a variety or ranges that are to be charged to specific crimes (Simmons, 2007). A suspect who has not been involved in previous crimes and found guilty of theft should be charged less than fifty dollars while those convicted of theft felony should be charged an amount exceedin g fifty dollars in any occurrence. White collar crimes are non violent crimes which involves embezzlement of funds, frauds, bribery and insider trading. They pose a great danger to the subject country’s security and also it economy. Once a defendant is found guilty of this crime, the legislature deters to the crime by ensuring every offender, with no exceptions, serves a jail term equivalent to the amount in dollars that he stole. Essentials of a bad check law are determined by the standards set by the statutory provision to determine the validity of the check. A crime committed by means of bad check, an issuer is supposed to have knowledge that a check or money order is not liable for payment if it is post dated or has a notice of refusal. The check law presupposes that the minimum threshold of conduct required of corporations and incorporated associations according to their money orders and payments. This law enforcement on a corporate scale normally includes fines imposed on a corporation. Individual accountability for commercial offense has to be proven in order to take place by the party responsible. For example, a corporation may be expecting payments on selling a product that is defective and instead sell it regardless of its defectiveness. However, if one can prove in a court of law that with evidence that the check is valid and the company president specifically had knowledge or he had all reasonable grounds to believe that the check was forged or defective and yet authorized the sale, one can sue the corporation, but one cannot hold the corporation criminally liable. Given that a corporation cannot be jailed and do jail time, all one can do is to use the evidence to penalize the corporation and fines or court rulings. Halls employees acted unethically since they committed an act of defamation, this can be a good example of a statement that came with it a not so good impression of an individual, company, assembly, product, government, or nation (Simmons, 2007). The statement is prepared as though it were true, when in fact the statement is false. It as slander as it was made with spoken words, sounds, gestures and sign language. Defamation may be in any other form, like in printed pictures or words. To be considered defamation, the indictment has to be false but put in a way that it appears to be true, and to earlier be communicated to people other than the individual being defamed. If one believes you have been a victim of defamation, one can get justice by introducing a civil suit. However, one will have to show that the statement made was phony; prove that the statement did harm to the accused; and prove the statement didn’t undergo adequate investigation to know whether it was true or a lie. Buck acted ethically by hiring an investigator to obtain the information though behind their back. He used different types of defamation to bring them to justice. There are different types of defamation, per se, which means and shows that the defamation is a given and not necessary have to provide proof of harm. Defamation per se is when someone mistakenly says that you have an illness (for example they can say you are suffering from a serious and contagious disease) when someone wrongly claims you are guilty of misconduct sexually, when someone wrongly states that you have committed an offence, or when someone says, you are not in shape to venture into business. In such cases, the possible evidence needed is that the statement was prepared. Thus Buck did the right thing as there was nothing to hide. Public policy granting merchant’s immunity from false imprisonment and detaining innocent persons is has been admitted as a good defence in a number of jurisdictions (Simmons, 2007). If an individual makes an opinion in opposition of existence of a certain fact, the declaration may not sustain a claim for liability against the evidence presented. On viewing a statement as an expression of piece of evidence or opinion it can depend upon its background, irrespective of the fact that the defendant creating the statement is entrusted by the community to be the one to know if the evidence or statements made are true or not. To this extent therefore, public policy is an act that injures someone in some way, and the victim may consider suing the wrongdoer. Legally, they are called general wrongs, as opposed to criminal ones. Interest protected by the tort includes; getting an attorneys to obtain inquiries about defamation activities from those people in disagreement with neighbors or any the community at large, and have ultimately suffered from this lies. The rule most be worried by that type of behavior is defamation of character and a reason of action which is defined to include libel and slander. Generally, tort is telling lies on another person, which exposes a person to take the blame falsely. A slander is an oral defamatory statement which is made intentionally to injure the reputation of someone (Simmons, 2007). Libel, on the other hand is the making of defamatory statements in writing whether in a print or permanent medium, for instance, magazines and newspapers. Essential condition for a tort of defamation include: A counterfeit and offensive statement regarding others; The written statement of another person (this is a person that may be directly or partially affected by the said statement); If the issue involves a lot of people, mistake amounting at least to carelessness of the publisher Harm to the defamed or injured party. In tort law, the statement made is published especially when a third person is involved (Elliot Quinn, 2009). However, it is not mandatory that the statement be in print. Getty and Texaco acted unethically since the injurious statement was directly touched the status of the injured party. Albeit, depending on the laws of the authority it may be sufficient to set up mental anguish. Most authorities are normally so aware that defamation exists, where the claims are alleged to cause harm to the plaintiff. Examples of unethical judging include: Statement referring to a persons specialized character or reputation; Claims that an single person is promiscuous; Allegations that an individual is infected with S T D Allegations that the individual has devoted a crime of moral magnitude While activities for unethical have their inheritance in common law, most influence have enacted statutes which alter common law. This may significantly alter material elements of the cause of an action, margin when a suit is instituted, or vary the defenses to an action for offense. The defendant may be called upon to apologize prior to the applicants search for non-economic remuneration. The state farm acted ethically in the case, their business ethics go further than simple legality. They describe ways in which a business should behave and the manner in which it conducts affairs it is legally obligated to. The firm’s ethics are not the best way of conducting business as they are principles to get upheld and experienced. They describe the spirit of the rule, as opposed to law and order. The most important defense for the organization ethically is to act accordingly to the truth, which is, an unlimited security to a certain action for offense. Another defense to defamation events is right to have something. For example, where a witness stand in court and makes a statement, point of view being ruled in court by the judges, declarations made in the course of parliamentary proceedings or by the bench, are privileged ordinarily, and cannot cling to a claim for denouncement, regardless of how false or offensive they are. A defense predictable in most jurisdictions i s an opinion if the human being makes a statement of belief as contrasting to fact and evidence brought forward, the testimonial may not hold up a cause of action for offense (Elliot Quinn, 2009). Whether viewed as a turn of phrase of fact or opinion a statement can depend upon the context it upholds, that is, whether an individual is making the statement or not, would be viewed by the society as being in a place to know whether it is true or not. Some countries have got rid of the distinction between opinion and fact, and as an alternative hold that any testimonial that suggests a truthful foundation can support reason of action for denouncement. Security afforded by the tort disagreement with society’s awareness in free competition offers a justification comparable to an opinion that is reasonable to comment on stuff of public awareness especially in the society. For example, if a mayor of a given town is caught up in a bribery scandal, by expressing the outlook that one believes the accusation are true and are not likely to sustain a claim for offense. A defendant may also attempt to demonstrate that the indeed the statement made against the applicant were true since he was lowly regarded in that society to mitigate damages resulting from the offensive statements. A defendant who sends out a message without regard to the truthfulness of its content can plead the justification of innocence. For instance, the post office’s accountability is delivering letters which are defamatory, since it is not aware of content of the letter. Unusual defense is that of voilence non fit injury where the plaintiff consented to t he allocation of the statement. As a rule, tort lawsuits in opposition to a next of kin are brought apart from any divorce, termination or other relative’s law case. New York, Alabama, Georgia, and Tennessee, however, it allows or encourages combining the tort case with relations law case; Alabama requires it. An individual can also become a public figure by appealing in actions which produce public relations within a thin area of attention. For example, a lady named Terry kolas was insulted by a television show; Already married with offspring, and wrote correspondence to advertisers in order to try upholding them from stopping their cling up for the show. Ms. Kolas’s actions made her became the center of mockery in a very big way. As these jokes existed in her public outlook, normally making fun Mrs. Kola being formal and critical, they were exempted since she was a limited public figure. While individuals targeted by lies May decide to sue, there are important reasons why activities for offence may not turn out to be what is expected. The public relations resulting from a denouncement lawsuit can generate a larger audience for the counterfeit statements which had been initially made. If a magazine or news show comes up with a story of a lawsuit, false allegations previously not known to many may immediately be made public. As Medias are much more suitable to air proceedings in a lawsuit than covering their eventual resolution, the remaining outcome may be that people heard of the defamatory statements, but under no circumstances learn how the court case resolute. Another emerging issue is that offense cases may be hard to win, and small rewards given alternatively after the case is done. Attorneys taking up this type of cases are not normally openly willing to take a contingent fee, and if suddenly if the fees is added, there may be a guarantee that denouncement action will be successful and can be in excess of the total amount claimed. Another substantial or main worry in most cases is that, no matter if a statement made may be totally false, the plaintiff can luck to come up with substantial evidence to prove defamation. In such cases people look at it in the form that the plaintiff lost by understanding that the alleged statements were true. For such selected cases, a defamation action can be used to bring about or to come up with a reasonable or logic sum of money to claim liability, can possibly face apparently negative publicity that may ultimately lead to falsefully accusing and innocent person, and if it supposedly doesn’t succeed, it may be reasonable to conclude that all what was said might have some composed truth in it. Normally, while many plaintiffs have the capability to succeed in prosecuting defamation actions, the opposite should also be adequately evaluated or considered when reaching an agreement on if or not litigation should be pursued. Defamation is said to be a statement which brings about not a so good character of a government, person, group, company, country or product (Simmons, 2007). The statement is given in a way that it tends to appear totally true, but alternatively it is not true but totally and completely false. Defamation may also be considered to be committed in various ways such as gestures, sounds, spoken words or sign language. Defamation can be in many different ways. This ways may be like in the form of pictures, printed words or libel. In order for a statement qualify to be defamation, the claim at hand has to be made falsefully, but has to be well composed in order to appear true, and the supposed false information to be spread over to different people not involved in exception of those being defamed. If one believes that you are indeed a supposedly victim of defamation, what is right to do in order to get you can get justice is to bring a civil suit. However, the greatest challenge is trying to bring out that the statement made was not true; next is to try and show how much damage that false statement did to you; show how baseless the statement made was and how it lucks evidence as to whether it is true or a lie. There are different types of offenses that are defamation per se, this means that the insult is given and there is no need to make available proof of damage. Defamation per se occurs when an important person claims with no prove that one has a foul disease, like an STD, when someone wrongly claims that one is guilty of sexual criminal behavior, or when someone claims that one is not fit to conduct a business. In such defamation per se cases, the only evidence required is that the declaration was made. When the denouncement is a statement that is made against public figures recognized by masses of people, like government members, performing artists, large corporation’s officers and enough evidence must be present so as to win in a lawsuit (Yeats, 2005). The defamed individual must offer prove that any statement liable was made with actual malice and with taking no notice of the truth, the person who has been defamed must have done so with the objective of doing harm with a reckless pay no attention to for the truth. If you have been the injured party of the offense, the best action to take is talk to a libel and slander attorney who will easily help you recover the damages made during the entire process. Public policy granting merchant’s immunity from false imprisonment and detaining innocent persons is a good defense in virtually all jurisdictions, if an individual makes an opinion opposing truthfulness of a fact, that the declaration may not affect any action carried out on evidence presented. On viewing a statement as an expression of piece of evidence or opinion it can depend upon its background, not regarding the fact that defendant making the statement is normally seen and believed by the community to know how true a statement is. Legally, torts are communal wrongs and not considered as criminal wrongs. Some tort acts like battery, however, they may occur to be both torts and crimes; the criminal may be in a position to face both civil and criminal sentence. Under long-established law, relatives were forbidden from accusing each other in an action for tort. The justification laid down those permitting members of a family to sue each other would lead to family breakdowns. However, today, many states have been acquainted with that if family members commit a tort to someone else; where there are a relative’s relations. Thus, they no longer forbid a wronged member from suing the other. In these states, next of kin may sue one another either during their marriage period or after separation. An injury shows that one is in the mistaken; hence the phrase and the person responsible for tort show one of his/her wrong. Torts may be dedicated to other forces such as trespass, which may be damage to the individual, may include imprisonment; property ownership; or may be dedicated without any force. Torts of this normal olden time are to the absolute or relation constitutional rights of an individual’s, or to personal property in ownership or real property, in possession, reversion or incorporeal, : the damages may either be by misfeasance or nonfeasance. Defamation may be in a very small amount of other forms similar to them, To be considered offense, example, in televisions, the indictment has to be false and has to be impacted some truth in them, to be aired to the nation other than the individual being defamed. If one is seen and believed to have been a victim of offense, one is liable to justice by introducing a communal suit. However, there need to be provision that the statement made was phony; prove that the statement did harm to the accused; and prove that the alleged defamatory statements were made without due regard to their truthfulness or that they would amount to an innuendo. One acted ethically by hiring an investigator to obtain the information though behind their back. He used unusual categories of denouncement to bring them to justice. There are different types of denouncement per which means and exemplify that the defamation is a given and not necessary have to provide proof of harm. It is trite to conclude that even thought in most torts intention or motive is irrelevant, this only applies as a general rule. Thus, as an exception to this general rule, in tort of defamation intention is relevant and that’s why malice has to be established in every claim for defamation.

Friday, February 28, 2020

The Americas Research Paper Example | Topics and Well Written Essays - 750 words

The Americas - Research Paper Example This essay compares the perspectives, issues, and the concerns of the Aztec and the Inca peoples, and with relation to their contacts with the Europeans. For a thorough comparison of the perspectives, issues and concerns of the Aztec and the Inca peoples, this essay will analyze five major issues thus: religion and rituals; structures, architecture or earthworks; agriculture trade and their reasons for decline. The paper will use historical methodology to do this comparison. The paper thus will analyze and interpret both primary and secondary sources. The online e-core material shall also be used to supplement the primary sources. The Aztecs was a group in Mexico that had around ten thousand members while they controlled an empire of more than 22 million people. They, however, had never developed a bureaucratic system as the Europeans. Andreas and Overfield (129) observe that the Aztecs political system allowed their kings to remain in power as long as the kings continued to send tribute. They held both religious and political power. The kings were seen as the representatives of the gods, and they also controlled the civil powers. The Aztec believed that a religion was a very important element in keeping the conquered peoples in control, especially the use of the sacrificial system. In 1519 with the arrival of theSpanish in the current day Mexico, with 11 ships, the capital city of the Aztec was Tenochtitlan (Sahagun and Anderson 128). The Inca, on their part, had a sophisticated bureaucracy, and they had incorporated the ideas into their culture to form a true and unique empire. Their empire consisted of bet ween nine to 12 million people. The Aztecs were led by emperors thought to have demigod powers, while the Inca were led by a supreme ruler, also seen as a god. Just like with the Aztecs ruler with absolute political and religious powers, the Incan ruler was an authoritarian ruler who controlled movement, marriage

Wednesday, February 12, 2020

Management Dissertation Proposal Proforma Research

Management Dissertation Proforma - Research Proposal Example Yes Degree Programme: MBA in Finance & Accounting Specialization Track: General _______ Finance ---X--- Marketing_______ [Please check as appropriate] Other___________________ (please specify) DATE: January 10, 2012Aims of dissertation Background of the research Financial markets across the world have been reporting increasing integration within the as well as across different boundaries. There are several factors that have drastically grown the financial markets in the last decades particularly in the developing countries and some of these factors are globalization, deregulation and advancement in technology (Abraham, Seyyed, and Al-Elg, 2001). Financial markets around the world are not uniform and this is the reason why an investor is able to make more profits then he should have by capitalizing on the opportunity created because of differences in prices (Masih, and Masih, 2002). Gain of one investor would result in the loss of another. However, if these markets are integrated and made uniform then an investor would not be able to make such gains (Stulz, 1981). With the passage of time, financial markets around the world have being integrated among themselves. The term market integration is referred to as a market where there are no obstacles for investors like legal restrictions, taxes, transaction costs etc (Solink, 1974). There are several advantages or benefits for integration among stock market and this is the reason why investors, financial analysts as well as policy markets have been paying considerable attention towards this subject. Some of the most important advantages of market integration are that investors investing in different parts of the world would expect the same amount of return from the investment as arbitrage opportunities would not exist. Also as the expected return would be the same therefore if an investor would like to earn higher return then it would have to take more risk and thus reward to risk ratio would be balanced. Also becaus e of market integration, the overall economy becomes more stabilized. It also encourages more people to make investment as there would be fewer chances of loss of investment as the overall productivity of the country would improve. If the Kuwait market is integrated with the global financial market, then the overall productivity and efficiency of the country would improve and more investment opportunities would emerge in the country. Also this would encourage more local business as well as foreign investors to invest in this market thus the GDP of the country would improve. These are the most important benefits that Kuwait market or any other market would experience if the financial market is integrated with the global market. Integration of financial market has become an important topic in today’s world as investors are able to invest in different markets in order to make the most of the opportunities prevailing in different regions (Kearney, and Lucey, 2004). Different scho lars and researchers have been focusing on this topic and considerable amount of research has already been done in order to analyze the impact of

Friday, January 31, 2020

Individual report Coursework Example | Topics and Well Written Essays - 2000 words

Individual report - Coursework Example This was further aided by a comparison with competitors in the industry and how their positioning either presents threats or opportunities. The comparisons show that BMW is well placed to take advantage of the key purpose of the existence of the single market, which is for the benefit of the half-a-billion European Union citizens. The key opportunities are seen in the need for clean energy and removal of tariffs while threats are in the form of pricing, substitutes and new entrants. It is concluded that although threats occur, BMW has significant growth opportunities in the European Union’s single market. The single European market (SEM) is a trade bloc composed of European Union (EU) member states with the objectives of simplifying the existing rules of trade through the bringing down of barriers. The ultimate benefits are targeted at the over 500 million people and 21 million businesses of the 28 countries of the EU. It is founded on four strategic freedoms which include the free movement of labour (people), capital, goods and services between all the member states (Europe Economics 2013, p. 8). On the other hand, the Bavarian Motor Works (BMW), founded in 1916 and headquartered in Munich, Germany, is one of the largest companies in the EU and also among the leaders in the automotive industry (Kiley 2004, p. 21). The company still builds slightly over 50% of its products in Germany, but is also significantly present in the rest of the EU, which is supported by the fact that the largest export product in Germany is cars. This report on BMW will focus on the analysis of the business opportunities and threats in the context of the enlargement of the EU, which indicates that the company stands to gain significantly. Before presenting the report on BMW, it is imperative to briefly describe the EU business environment and how it is affected by the EU laws, treaties and policies, since the report will be based on the EU’s

Thursday, January 23, 2020

Traveling Women Ministers - Pushing Gender Boundaries :: British History

Traveling Women Ministers - Pushing Gender Boundaries Quaker women led lives that were very different than those of their contemporaries. These women had the opportunity to act as vigorous participants in their faith, not being driven from the supposed domain of men. George Fox, considered to be the founder of the Society of Friends, saw the ministry as a holy calling instead of a trade—making it naturally open to all. (Trueblood 31). Many women, including Barbara Blaugdone, heeded their call to the Ministry. Some of these women pushed the limits even farther than most, following their call to preach, wherever it led. These traveling ministers pushed even the limits of fellow Friends, often experiencing great oppression and ill regard by those outside of the faith. These women also chose to press other gender boundaries of the time. For this devoted group to be fully understood by the modern reader, they must be seen for what they were, radicals of their time. The behaviors exhibited by women like Blaugdone could easily have been, and often were, misconstrued. Acts like sleeping in a hog trough, sneaking onto someone’s property, and barging into the office of the Commander-in-Chief of the Army, all outlined in Blaugdone’s own narrative, were quite out of the ordinary. Often compared with the actions of a vagrant or a prostitute, these dealings were not seen for their religious affiliation but instead for their shocking deviance from the norm. So flustered by great differences between Quakers and others groups of the period, some individuals reacted violently. In one such instance Blaugdone along with Mary Prince were attacked by a knife yielding man, who did, in fact, succeed in sticking Blaugdone in the side (Blaugdone 10). On her mission to Dublin, Blaugdone was blamed for storms affecting their ship and was almost thrown overboard by her shipmates (Blaugdone 21). Katharine Evans and Sarah Chevers, fellow Quaker travelers, were thrown in prison during their mission to Alexandria, and were tortured psychologically by their captors (Davies 262). True, even stationary Quakers felt many assaults, but traveling women received the worst of it. Traveling female Quakers tested gender norms even more so than by preaching alone. Their ability to ignore the role of men as protectors, as well as owners, had no context in the minds of their contemporaries. Evans and Chevers greatly distressed their captors when they refused to give their affiliation to fathers or husbands.

Wednesday, January 15, 2020

Piracy in Somalia and Its International Implications

PIRACY IN SOMALIA AND ITS INTERNATIONAL IMPLICATIONS In the past few years, pirate attacks off the coast of Somalia have received a great deal of public attention. According to the London-based International Maritime Bureau, there has been an â€Å"unprecedented increase† in Somali pirate activity in the first 9 months of 2009. Until September this year 147 incidents were reported off the Somali coast and in the Gulf of Aden (separating Somalia and Yemen), compared with 63 for the same period last year. A total of 533 crew members have been taken hostage in 2009, out of which about 200 hostages are still being held by Somali pirates. I have chosen the topic of piracy for my essay as I think that in the context of the present world economy crisis it is a current problem which might affect all the participants of the global economy and it needs an urgent solution. In the first part of my essay I am going to present some data to demonstrate the importance of the problem, then I will focus on the background of the issue and present the different factors which have led to the appearance of piracy. After a detailed description of the pirates and their way of operation I will move on to presenting of the interests of the international community and the policies, strategies and instruments they have used to deal with the issue. At the end of my paper I will draw some conclusions and make a few suggestions for the future. Piracy has been a problem in Somali waters for at least ten years. However, the number of attempted and successful attacks has risen over the last three years. As the hijackings have increased in number, they have also become more sophisticated. The pirates are now able to capture larger targets as well. On September 25 2008, Somali pirates captured the MV Faina, a Ukrainian ship transporting weapons to Kenya. This was followed one month later by the hijacking of the MV Sirius Star, the largest ship ever captured by pirates. The Saudi-owned supertanker was carrying about 2 billion barrels of crude oil, worth about $100 million. The ship was finally released on January 9 for a $3 million ransom. The series of hijackings has continued in 2009 too. It seems that this year the pirates have shifted from the Gulf of Aden, where dozens of ships were attacked in 2008 but which is now heavily patrolled, to the ocean between the African mainland and the Seychelles islands. In October 2009 Somali pirates captured a Chinese bulk carrier, carrying 25 Chinese crew members. In November they have seized a US tanker carrying $20 million of crude oil, which is considered the second-largest ship ever hijacked by pirates. The tankers 30-member crew was also kidnapped. In the same month, 9 pirates hijacked the Greek-owned tanker Maran Centaurus carrying 275,000 metric tons of Saudi Arabian crude oil and have taken it to a pirate port along the coast, where they typically hold the boats for ransom. The 300,000-tonne ship was hijacked about 1,300 km from the coast of Somalia and there were 28 crew members on board which are all held hostages. According to the IBM, in October and November alone, 38 ships have been attacked and 10 hijacked. There are several factors which have made Somalia the perfect environment for piracy, which I am going to present below. First of all, if we want understand why piracy works in Somalia, we have to know something about the geography and history of the country. Officially called the Republic of Somalia, Somalia is a country situated in the Horn of Africa, bordered by  Djibouti  to the northwest,  Kenya  to the southwest, the  Gulf of Aden  with  Yemen  to the north, the  Indian Ocean  to the east, and Ethiopia  to the west. Due to its strategic location, in the past the country was an important centre of commerce. Even today, about 16,000 ships pass through the Gulf of Aden each year, carrying oil from the Middle East and goods from Asia to Europe and North America, so we can say that one of the most important trade routes of the world can be found in this area. In addition, the long, isolated, sandy beaches of the country are also advantageous for pirates to operate. Another factor which helps piracy to flourish is the political anarchy which still rules in Somalia. For almost 20 years, the country has endured political chaos and bloodshed. The  Somali Civil, which began in 1991 as a revolution against the repressive regime of Siad Barre, has caused instability throughout the country. The northern parts of the country declared their independence, although it was neither recognized by the central government, nor by the United Nations. Subsequent fighting among rival warlords resulted in the killing, dislocation, and starvation of thousands of Somalis. Since 1991, 350,000-1,000,000 Somalis have died because of the conflict. Hatred and lack of trust among the landlords and their clans has prevented the organisation of a functioning central government. From  2006-2009 Ethiopia  was also involved in the conflict. In January 2009, Ethiopian soldiers withdrew from Somalia, leaving behind an  African Union  contingent of peacekeepers to help the fragile coalition government and its troops enforce their authority. Following Ethiopia's withdrawal from Somalia, the southern half of the country fell into the hands of radical Islamist   rebels, who still control a big part of the country. The political situation is still chaotic in Somalia. The present government, led by Sheikh Sharif Sheikh Ahmed is the 16th administration to „govern† the country since the collapse of the Barre regime. Order still hasn’t been restored, Somalia is governed by anarchy. Because of the lack of an effective central government and national economy, Somalia is still one of the world’s poorest countries, where the estimated GDP is around $600 per year. According to the World Bank, in 2008 73% of the country’s population lived on a daily income below $2. The country’s 10 million people are starving, and they would hardly survive without the food aid provided by the developed countries. In a country where survival is at stake, it is no surprise that piracy has become a fast and easy way to make money and it could develop into a frightening business. To sum up, we can say that Somalia’s chaotic political situation, the lack of an effective central government, the poor state of the economy and poverty have all created an environment which was perfect for piracy to appear. But who are these â€Å"heroes† and how do they operate? In most people’s minds, the image of piracy is associated with characters like Jack Sparrow or Captain Cook. Pirates are often seen as rebellious young men who are victims of the society, but have the courage to stand up for themselves and create a different way of working on the seas. Actually, there is some truth in this kind of perception. According to Eric Hobsbawm, a British historian, â€Å"social bandits† are â€Å"outlaws, drawing on community support, using criminal methods to challenge the present hierarchy of power and wealth. † Most of the Somali pirates are 20-35 years old and come from the region of Puntland, a semi-autonomous region in northeastern Somalia. It is estimated that there are at least five pirate gangs and more thousands armed men. A BBC report divided them into three main categories: local Somali fishermen (the â€Å"brains† of the operations because of their skills and knowledge of the sea); ex-militiamen (used as the â€Å"muscle†) and technical experts who are able to use electrical equipment, such as GPS devices at a professional level. It is a fact that since the country’s collapse in 1991, there has been a great amount of illegal fishing practised by a lot of countries along the Somali coast. During the regime of Siad Barre (1986-1992) Somalia received aid from several countries to develop its fishing industry. Local fishermen had fixed prices for their catch and the fish was exported because of low demand for seafood in Somalia. However, after the fall of the Barre regime, due to the Somali Civil War the income from fishing decreased. Traditional coastal fishing became difficult, because foreign trawlers started fishing illegally along the Somali coast and depleted the fish stocks. Local fishermen became desperate. They started to band together and were determined to protect their resources. They started attacking foreign trawlers, the crew of which soon fought back with heavy weapons. As a result, fishermen turned to other types of commercial ships and soon discovered that piracy was an easy way to make money. At the moment, piracy is Somalia’s most â€Å"lucrative business†: ship owners are willing to pay huge amounts of money for the release of their hijacked vessels. In addition to this, starting with the early 1990s, Somalia’s long, remote coastline has been used as a dump site for dangerous toxic waste from a lot of European and Asian companies. The European Green party presented before the press and the European Parliament copies of contracts signed by two European companies – an Italian-Swiss and an Italian firm – and representatives of warlords, to accept 10 million tones of toxic waste in exchange for $80 million. For European companies this is a very cheap way of getting rid of their waste: while waste disposal costs in Europe are about $1,000 a tonne, this way it only costs them $2,50 a tonne. The effects of this dumping are already visible in Somalia. According to a report by the UN Environment Programme, there is an extremely high number of cases of respiratory infections, mouth ulcers and bleeding and unusual skin infections among the inhabitants of the area – diseases related to radiation sickness. It is clear that this situation represents a very serious environmental risk not only to Somalia, but to the whole eastern Africa region. Many of the pirates call themselves the Somali â€Å"coast guard†, claiming that their aim is to defend their communities from overfishing and to protect the coastline from toxic dumping of nuclear waste by foreign ships. In an interview one of the pirate leaders explained: â€Å"We don’t consider ourselves sea bandits. We consider sea bandits those who illegally fish and dump in our seas†. The problem of overfishing is still a very serious problem is Somalia. It is estimated that Europeans and Asians poach around $300 million worth fish from Somali waters. On the other hand, Somali pirates collect about $100 million yearly from ransoms. This, according to Peter Lehr, a Somalia piracy expert, can be seen as a â€Å"resource swap†. Of course, a great number of pirates are only taking part in these operations for the money, and their families which they can feed this way. As one of them, nicknamed Milk Sucker says: â€Å"Sometimes doing a bad thing is the only way to improve the situation for yourself and the people you love†. Some of the pirates can’t even swim, their only task is to shoot straight. A lot of young Somalis take part only in a couple of operations, hoping to make enough money to move to the West or maybe to persuade an ethnic Somali woman with a EU passport to marry them and move to the UK. As for the techniques used by the pirates, we can notice that they are getting more sophisticated and more effective. They are using the latest high-tech equipment, like GPS, MANPADS (Man Portable Air Defence Systems), RPGs and satellite phones and they are well-armed with rocket-propelled grenades and AK-47s. They usually operate using small skiffs with powerful outboard engines, but now they regularly use â€Å"mother ships† to increase their range. These â€Å"mother ships† take them into the shipping lanes, several hundred miles offshore. Then they launch small speedboats to haul themselves up onto the deck of a ship. They can often seize a ship without firing a shot. After capturing it, they sail the hijacked ship to the Somali pirate hub town, Eyl and take the hostages ashore where they are well-looked after until ransom is paid. It is reported that the pirates never harm their prisoners; they behave like â€Å"perfect gentlemen† with them. They even hire caterers on the Somali coast to cook pasta, grilled fish and roasted meat, which western hostages might like. Once ransom is paid, they release ships good humour. According to the Kenyan foreign minister, in 2008 pirates have received about $150 million in ransom, which is used to fund future operations. In a recent startling Reuters report we can read that the pirates have started to make the money to work for them, setting up a stock exchange â€Å"that has drawn financiers from the Somali Diaspora and other nations. † The bandits' bourse is a small building in the once-small fishing village of Haradheere, about 250 miles northeast of Mogadishu, which has developed into a luxury town by now. As a former pirate named Mohammed puts it, â€Å"The shares are open to all and everybody can take part, whether personally at sea or on land by providing cash, weapons or useful materials †¦ we've made piracy a community activity. â€Å" Unfortunately, it has become clear that the activity of pirates is linked to warlords on shore. After seeing the profitability of the business, these leaders started to facilitate pirate activities, sharing the profit with the pirates. These â€Å"Godfathers† and clan leaders are closely related to Somalia’s president in Mogadishu, Abdullahi Yusuf, who also originates from Puntland. Estimates are that at least six ministers in the Puntland government are involved with the pirates. The only group which is publicly against piracy is the militant Al-Shabaab, a Salafist group founded this decade as a militia attached to the Islamic Court. They say that such crimes are forbidden under the Islamic law. However, according some reports, militant Islamist groups also get their share of the profit. The pirates involvement with these organisations is making the situation even more alarming, because all the financial help given by the West to the Somali authorities to put an end to piracy might just help it to flourish. All in all, it is clear that piracy is not a problem that the fragile Somali government can solve alone and international help is needed. How does all this affect the international community? Besides enforcing international law, there are several other reasons to stop pirate activities. The first is Somalia itself. The country needs about 200 tonnes of food aid a year which is mostly delivered by sea. Without the naval escorts and the regular delivery of aid, Somalia’s food stocks are seriously threatened, so ensuring the safe delivery of food aid should be a number one priority for the international community. Stopping piracy may also reduce the money available for weapons, so indirectly it can lead to the end of the internal war. Piracy has a very distressing effect on international trade as well. In addition to the growing ransom, companies whose cargos do not reach their destinations, lose money. As a result, there is a growth of insurance for all ships which need to pass through the Gulf of Aden. The constant danger of pirate attacks has already made some shipping companies to choose a longer, but safer route, around the Cape of Good Hope, as it happened in the case of AP Moller-Maersk, one of Europe’s largest shipping companies after the hijacking of Sirius Star. The extra weeks of travel and fuel can lead to the cost of transporting goods, which is a really serious concern now, at the time of a global economic crisis. Another reason is related to the environment. Pirate attacks can cause major oil spills in a very sensitive ecosystem. As pirates become bolder and use more powerful weapons, tankers could be set on fire or sunk, which can result in an environmental catastrophe, destroying marine and bird life for many years to come. Last, but not least, there is a risk that the pirates themselves can become agents of terrorism. There are assumptions according to which pirates are connected to the Al-Shabaab movement, which is believed to have links to Al-Qa’eda. According to some reports, Al-Qa’eda militants from Iraq have chosen Somalia as a new base from which to launch attacks. Terrorism at sea can take many forms, for example direct attacks on ships, hostage dramas, but also hijacked ships used as potential weapons. Terrorist networks can use the financial funds from piracy to fund their operations worldwide. It is obvious, that even if there is little chance for the worst scenario, it is best to prevent it while we can. The international community has recognized that enhanced international efforts are necessary in order to reduce the number of attacks. The growing cases of piracy have focused the world's attention on Somalia and have shown that the crisis going on in a fragmented state is spilling out of its borders. The military response to piracy has shown that countries which haven’t been able to cooperate with each other can unite their forces for a common cause. A maritime conference was also held in Mombassa, where they discussed the problem of piracy and tried to give regional and world governments recommendations to deal with the danger. In January 2009, an important regional agreement was adopted in Djibouti by States in the region, at a meeting organised by IMO. The Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden recognized the extent of the problem of piracy and armed robbery against ships in the region and the states signing it declared their intention to co-operate, in a way consistent with international law, in the repression of piracy and armed robbery against ships. Most countries have preferred prevention: various navies have sent war-ships into the area to escort commercial vessels. At the beginning, this way of defense was more individual than collective, but the persistence of the attacks has led to the development of a collective security system. NATO got the task of escorting convoys transporting the humanitarian aid of the World Food Programme towards Somalia. Once they were in the Gulf of Aden, they also protected other merchants ships, by their presence. Later NATO handed the job to Operation Atlanta, the first common maritime mission by the European Union. Military counter-piracy operations are performed by vessels from the Combined Task Force 150, a multinational coalition  naval  task force   in charge of monitoring and inspecting a range of security issues, such as drug smuggling and weapons trafficking, as well as piracy. Several countries, including India, Russia, China, Norway, Australia, France, Greece, Turkey, Portugal, Denmark, the Netherlands, South Korea, Malaysia and even Japan chose to join the coalition and send warships to the Gulf of Aden. In January 2009 the US navy established a new multi-national naval force to confront piracy off the Somali coast. The new unit was called Combined Task Force 151and it was a spinoff of the existing Task Force 150 in the region. This section of the coalition forces was aimed at focusing exclusively on pirate groups (leaving Combined Task Force 150 to focus on other destabilizing activities, such as drug smuggling and weapons trafficking). It was hoped that by designating a new unit to combating piracy in Somalia, anti-piracy efforts would be more successful. Unfortunately, this effort is having only a limited impact. Although some pirates are scared off by the sight of military ships and helicopters, coalition warships are often in the wrong place at the wrong time. In addition, pirates are flexible and change their tactics easily: data from the Maritime Bureau shows that at present they are conducting their operations further out in the Indian Ocean. Besides, this is a very costly solution which is difficult to support in the long term. After the hijacking of an Egyptian ship and a huge Saudi supertanker, the Arab League organized a summit for countries overlooking the Red Sea, with the participation of Egypt, Saudi Arabia, Sudan, Somalia, Jordan, Djibouti and Yemen. At the summit the participant states discussed several solutions for the problem of piracy, suggesting different routes and looking for a safer passageway for ships. They might also assist the current NATO anti-piracy efforts together with other nations. However, we shouldn’t forget that the Arab League has long tried to draw Somalia more closely to the Arab world. It has made a financial support for the Transitional Federal Government, conditional on its entering negotiations with Al-Shabaab, intending to spread Islamist influence in the area. In June 2008 the United Nations Security Council passed a declaration authorizing nations that have the agreement of the Transitional Federal Government to enter Somali territorial waters to hunt pirates. In 2008 the Security Council adopted two resolutions, 1846 and 1851 allowing for the first time international land and sea occupations of Somali territories in the pursuit of pirates. These resolutions extended the power of the states and lead to greater coordination of their efforts. After the Council resolution 1851, the Contact Group on Piracy off the Coast of Somalia was established on 14 January 2009 to facilitate and coordinate actions among states and organizations to deal with piracy. At the moment 46 States and seven international organizations take part in the Contact Group. Through its four working groups, the Contact Group addresses specific issues related to military and operational coordination, legal issues, shipping industry awareness and public and diplomatic information. UNODC (the United Nations Office on Drugs and Crime) participates in the Contact Group and its Working Group on Military and Operational Coordination, Information Sharing and Capability-Building. UNODC acts as secretariat to Working Group on Judicial Issues, to which it has provided various forms of support. UNODC has prepared an analysis of the legal and practical challenges involved in prosecuting suspected pirates and is gathering nformation on relevant national legal systems, including those of coastal States. In spite of the fact that laws to combat piracy at sea exist, a lot of states do not seem to use them in practice. Only France has chosen to combat piracy directly. The first case was the seizing of a yacht in April 2008, which started with negotiations for the release of 30 hostages and followed by the capture of six pirates in Somali territory. The second case took place in September 2008 to free a couple taken hostages. This action also led to the arrest of six pirates, who are awaiting trial before a French court. Britain and some other countries have found a superficial and convenient way of treating the pirates: they have negotiated a treaty with Kenya, according to which all those suspected of piracy are handed over to that country. A few months later other countries followed Britain’s example, negotiating similar agreements. These agreements are a useful step, but they do not solve the problem. The Kenyan prison system is in terrible condition, corruption is high, there are strong delays in the call of trials and legal aid is very limited. It is a paradox indeed that states which are entitled to prosecute the arrested pirates delegate this right to a country which is unable to assure a fair trial to these criminals. In spite of the united efforts of different nations, it has become clear that the piracy problem cannot be solved at sea, because it is rooted on the shore, in the ongoing conflict and political instability of the country. As Ban Ki-Moon, the Secretary General of the United Nations expressed at an international donors’ conference: â€Å"Piracy is a symptom of anarchy and insecurity on the ground. (†¦) More security on the ground will make less piracy on the seas† Any lasting solution to the problem has to involve ensuring stability, development and an effective criminal justice system in Somalia. If the states had invested the time and resources they now spend to stop piracy in reconstructing the Somali society and economy, they probably wouldn’t have to cope with these problems. However, there are always new opportunities that shouldn’t be wasted. Martin Murphy in his article â€Å"Somali Piracy: not just a Naval Problem† claims that the highest costs of piracy to Somalia and the international community are not economic, but political. As I mentioned earlier, it seems that almost all layers of political life in Somalia are involved in piracy, including the Islamist groups. Islamism is getting stronger and stronger in Somalia and it can soon get hold of the entire country. The Al-Shabaab movement has a clear intention to use Somalia as a base for spreading Islamist influence in the region. If this tendency continues, a worst possible outcome would be an Islamist government, which is strong enough to control piracy, but also strong enough to make Somalia safe for violent Islamist groups. So, what can be done to stop, or at least to decrease piracy in the Horn of Africa? Somalia is a clan-based society. Therefore, a possible solution would be to deal with the sub-state entities in order to create a unitary state in the future. In these negotiations the coalition should clearly commit itself to repress piracy in return for allied political and economic support. This way it would be possible to cut off all the political players in Somalia from their external sources of weapons and thus pirates would be trapped between more effective land-base policy by the Somalis and maritime policy by coalition member navies and soon they would have no place to hide. Recent efforts have shown that there is a will to act together. We can only hope that the states will find a way to deal effectively with the problem before it is too late. Links, references: Roger Middleton: Piracy in Somalia. Africa Programme, October 2008 http://www. chathamhouse. org. uk/files/12203_1008piracysomalia. df Marina Chiarugi  and  Daniele Archibugi: Piracy challenges global governance. Open Democracy,  9 April 2009 http://www. opendemocracy. net/article/piracy-challenges-global-governance George Grant: Somali pirates can't be beaten at sea. The Guardian, 18 November 2009 http://www. guardian. co. uk/commentisfree/2009/nov/18/somali-pirates-ransom-puntland Galrahn: Somalia Piracy – A Backgrounder April 8, 2009 http://www. informationdissemination. net/2009/04/somalia-piracy-backgrounder. html Rubrick Biegon: Somali Piracy and the International Response. FPIF (Foreign Policy in Focus) January 29, 2009 http://www. pif. org/fpiftxt/5827 Georg-Sebastian Holzer: Somalia: piracy and politics. Open Democracy, 24 November 2008 http://www. opendemocracy. net/article/somalia-piracy-and-politics Johann Hari: You Are Being Lied to About Pirates. The Huffington Post, December 2009 http://www. huffingtonpost. com/johann-hari/you-are-being-lied-to-abo_b_155147. html Can Somali pirates be defeated? BBC News, 20 November 2009 http://news. bbc. co. uk/2/hi/8371139. stm Sam Gustin: Bandit Bourse? Somali pirates hijack oil tanker, organize ‘stock market' Daily Finance, December 1 2009 http://www. dailyfinance. om/2009/12/01/bandit-bourse-somali-pirates-hijack-oil-tanker-organize-stock/ Martin Murphy: Somali Piracy : not just a naval problem . Centre for Str ategic and Bugetary Assessments, April 16, 2009 http://www. csbaonline. org/4Publications/PubLibrary/B. 20090417. Somali_Piracy/B. 20090417. Somali_Piracy. pdf Piracy in Somalia: Wikipedia, the Free Encyclopedia http://en. wikipedia. org/wiki/Piracy_in_Somalia Aiden Hartley: What I learned from the  Somali pirates. The Spectator, 6 December 2008 http://www. spectator. co. uk/essays/all/3061246/what-i-learned-from-the-somali-pirates. thtml

Tuesday, January 7, 2020

The Trials and Tribulations of a Distance Learning MBA 2019

I am looking into beginning a distance learning MBA. The reasons behind this are simple. I want to pursue higher education, obtain a masters degree, and I made the follow your heart mistake during my undergrad years and majored Creative Writing, my first love. Now I am trapped with a degree that I cant use and am longing for a job that I cant find. But I digress. Point being, I am working up the courage to begin a distance learning MBA. The reason I use the words courage and looking into is because I am beginning to realize that it is going to be a very difficult road. I have seen my friends who are pursuing their MBA in night school. One warned me recently that working full time and going to graduate school after the sun goes down is not a task for the faint of heart. It is hard work with very little reassurance. And I am going to attempt to take it one step further by completing mine through distance learning. I know about these distance learning classes. They are tough. .ue8801f1dd816ac002b2b35f407148058 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .ue8801f1dd816ac002b2b35f407148058:active, .ue8801f1dd816ac002b2b35f407148058:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .ue8801f1dd816ac002b2b35f407148058 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .ue8801f1dd816ac002b2b35f407148058 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .ue8801f1dd816ac002b2b35f407148058 .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .ue8801f1dd816ac002b2b35f407148058:hover .postTitle { text-decoration: underline!important; } READ Students of Business Administration It is easy to be sold on them. The idea of taking an exam in your pajamas, or being able to be home during Oprah is certainly appealing, but a lot of people do not realize the work and self discipline that goes into earning an online degree. Americans love easy street. We simplify everything. Fast food, fast cars, fast life. But let me warn you, distance learning is simultaneously a great opportunity and a disaster waiting to happen. If you identify with any of these statements, then chances are it isnt for you. I Am Distracted Easily Learning from the comfort of home sounds great, but remember that is the main thing that may also work against you. Home is not a classroom, it is a place of relaxation and familiarity. And distractions. TV, music, DVDs, your computer, your bed, the phone, visitors and a pet or two can cause the most destructive learning environment ever created. It is hard to learn Statistics when you have one eye on the MTV. It makes things more challenging a million times over. If you are easily distracted, this may not be a good route for you. .u05995ed6ddc93ee7fe9ccbcd1196825b { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u05995ed6ddc93ee7fe9ccbcd1196825b:active, .u05995ed6ddc93ee7fe9ccbcd1196825b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u05995ed6ddc93ee7fe9ccbcd1196825b { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u05995ed6ddc93ee7fe9ccbcd1196825b .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u05995ed6ddc93ee7fe9ccbcd1196825b .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .u05995ed6ddc93ee7fe9ccbcd1196825b:hover .postTitle { text-decoration: underline!important; } READ The Road to a Criminal Justice Career - Earning an A.A. in Criminal JusticeI Am Barely Making Ends Meet Online courses are expensive. And even if you are just taking distance learning courses from a regular college, remember that regular college is expensive too! It is great that you are trying to increase your income by achieving higher educational goals, but please take note that it is going to surely shrink your income before it expands it. I Am Too Busy To Go To Back To School If you are too busy to sit in a real classroom for a few hours a day, chances are, you are too busy to be disciplined enough to finish your learning on your own. Distance learning is perfect for people who work part time, stay at home moms, and people who dont want to have a life outside of work. It is tough. I know because I am none of these things. I am a full time working social butterfly who whines and carries on about how I never have enough time to see the people I love. So I am a little hesitant about this whole process. However I realize, as I am telling you now, that there is a silver lining in every tough challenge and I am determined to being committed to make this work. So good luck to you and good luck to me. And hey, can someone pass the remote? .ua9c3b27df155c9db501275d99bc83d10 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .ua9c3b27df155c9db501275d99bc83d10:active, .ua9c3b27df155c9db501275d99bc83d10:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .ua9c3b27df155c9db501275d99bc83d10 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .ua9c3b27df155c9db501275d99bc83d10 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .ua9c3b27df155c9db501275d99bc83d10 .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .ua9c3b27df155c9db501275d99bc83d10:hover .postTitle { text-decoration: underline!important; } READ Business IT Courses and Accompanied ExpectationsRelated ArticlesAfter the Management MBAGraduate Degrees More Common in Online EducationHow to Maximize your InternshipHow to find the Perfect Part Time JobSuccessfully Earn a Distance Education Master DegreeSuccess and Online Finance Degree