Friday, May 31, 2019

Sensationalism - Sensation Novels of the Nineteenth Century Essay

Sensationalism - Sensation Novels of the Nineteenth CenturyThe sensation novelsbegan to appear during the mid-to-late 1800s. The term first utilize by W. M. Thackeray, in his own Cornhill Magazine, was in reference to a particular literary or dramatic phenomenon. Courtroom scenes, corpses, secrets, adultery, insanity and prostitution were all staples of the novels maculation that would offer the many unexpected twists and turns of the story. The authors goal was to have the reader feel basic sensations-shock, disbelief, horror, suspense, sexual excitement, and fear. There are several reasons why sensation novels became so popular with Victorian society, and especially women, during this time period. Urbanization and industrialization were changing the face of the countryside by creating more and more big cities. This type of novel was a welcomed escape from the emergence of industry and capitalism in England and America. Even though the times were changing, women were still expe cted to be subservient to men. They did not enjoy the freedom to vote or to own property. Because it is the Victorian era, they are still expected to control their emotions in front of men and to be supportive at all times. As women started to shun this role, it was reflected in the sensation novel. The fe mannish became a strong character in these books. Female sexuality was used to show strength, rebelliousness and evil. They were a lot portrayed as seductresses and villains who would be punished by the ending of the book. Females were no longer the victim waiting to be rescued. The sensation novel reversed male and female roles with the man many times being victimized. These novels with thei... ...the strong female characters, his name was associated with both the male and female groups of authors.Sources Law, Graham. Serializing Fiction in the Victorian Press. capital of the United Kingdom Palgrave, 2000. Hughes, Winifred. The Maniac in the Cellar. New Jersey Princeton Univ ersity Press, 1980. Miller, D.A. The Novel and the Police. Los Angeles University of California Press, 1988. Boyle, Thomas. Black Swine in the Sewers of Hampstead. New York Viking Penguin, 1989. James, Henry. Notes and Reviews. Cambridge Dunster House, 1921. Gaskell, Elizabeth. Mary Barton. Oxford Oxford University Press, 1987. Nineteenth-Century Literature Criticism, Vol. 80. Mansel, Henry. Sensations Novels. Quarterly Review 113 (April 1863) 251-68. Websites http//www.vanderbilt.edu/AnS/ face/Clayton/318biblio.htm http//www.indiana.edu/victoria/

Thursday, May 30, 2019

Public Surveillance in the USA Essay -- CCTV, Privacy Rights, Right of

1. IntroductionAll the developed countries (developing countries are also in no way lagging behind) the incidence of the people being monitored under various surveillance systems is high of which closed circuit television system (CCTV) is gaining dominance. For instance, the UK has all over 4.2 million of them, giving it a ratio of one for every 14 persons and the USA is reported to have been installing it on a rapid stride in every conceivable location as town centers, schools, popular transportation systems etc with a spiraling budget estimated at $100 million. With the terrorists attacks looming large in the wake of 9/11 attacks and despite the killing of Osama Bin Laden, the trends are going towards more and more technology oriented surveillance methods. This has naturally caused far-flung concerns about the privacy issues and necessitated more evidence based research to inform policy and practice.The critical issue that needs to be addressed in the melody for or against the use of public surveillance system in the USA is which one takes precedence, viz, whether safety of the public and property at large or the onset of the rights of the individuals who are subjected to some sort of interference in their privacy. In other words, does a citizen have an unfettered right to privacy even when it comes to issues relating to the enforcement of law in prevention of terrorist attacks, crime and restoring security and peace of the citizens at large? I propose to argue in this paper in favor of the need for public surveillance system by advancing the reasons for its imperative and take the view that it does not amount to prima facie violation of individuals rights and in contravention to the rights guaranteed under the constitution... ...lsh. overt Area CCTV and Crime Prevention An Updated Systematic Review and Meta-Analysis. Justice Quarterly 26.4 (2009) 716-745. Web. 24 Apr. 2011 PrintGill, M., & Turbin, V. (1998). CCTV and shop theft Towards a realistic ev aluation In C. Norris, J. Moran, & G. Armstrong (Eds.), Surveillance, closed circuit television and social control (1998) (pp. 189-204). Aldershot Ashgate PrintSlobogin, Christopher. Privacy at Risk The New Government Surveillance and the Fourth Amendment. lolly, IL University of Chicago Press, 2007. PrintSutton, Adam, and Dean Wilson. Watched over or over-watched? open street CCTV in Australia. Australian & New Zealand Journal of Criminology 27.2 (2004) 211-230. Print.White, R., & Sutton, A. Crime prevention, urban space and social exclusion. Australian and New Zealand Journal of Sociology, 31(1) 1995 82-99. Print

Design Trends In Architecture Essay -- essays papers

Design Trends In architectureThe more things change, the more they stay the same. While graphics has always been an ever changing form, it has deep roots in traditionalism whether an artist or designer looks at the art that came before him and is inspired to mention that form, is inspired to do something completely opposite, or sees the flaws which, if corrected, could make that work of art perfect, he is ultimately quite influenced by what came before him.Nowhere is this more unvarnished than in the design styles found not only in art, but in architecture and privileged design. The twentieth century has been a time of with child(p) innovation, and yet, very few eras have seen so many stylistic revivals. The popularity of these classical styles has often superceded that of the more experimental, modern ideas, reinforcing the idea that aesthetic beauty is absolutely timeless.The advance(prenominal) 20th century saw a great deal of influence in terms of classical design. A class ical revival had brought a reverse of emphasis on Palladian architectural motifs, which could be seen in large cities throughout the world, but especially in brisk York and Boston. In terms of interior design, Edith Wharton and Ogden Codman advocated a similar classical revival, which gave a sense of classical order to ornate interiors. (Severens, 85) Interior design at the turn of the century was very frequently concerned with aesthetics over simplicity, yet managed to maintain a sense of order and balance. Designers created interiors with a heavy reliance on French and Italian forms of furniture, floors, and panelling. This style, which was tremendously successful, could be found in the work of interior designers over the next fifty years, and is the basis for much that is known as traditional decorating today. (Severens,88)One of the almost successful revivals is the revival of the medieval style, which is still quite apparent in architecture and interior design today. Du ring the eighteenth and nineteenth century, England began to realize the importance of the pump Ages. The Gothic past offered an acceptable, if inferior, option for study by educated gentlemen and Gothic began to be an acceptable alternative for country houses (Girouard, 180). This was the Gothic Architecture Revival. As Gothic architecture became more popular, the style came up against stiff competition from Chinese architecture. In the en... ... London. 1991. Keller,Diane. The American Modernists. Simon and Schuster New York, 1998.Kidson, Peter. The Medieval World. McGraw-Hill Book Company New York. 1967. Lane, Mills. Architecture of the Old South. Abbeville Press New York. 1993. Loth, Calder and Julius Trousdale Sadler, Jr. The Only Proper Style Gothic Architecture in America. New York Graphic Society New York. 1975. Mahoney, Kathleen. Gothic Style Architecture and Interiors from the Eighteenth Century to the Present. Harry N. Abrams, Inc. New York. 1995.McDonald, Jane Anne. Th e Legacy Of William Morris. Rizzoli New York, 1986. Newcomb, Rexford. Old Kentucky Architecture Colonial, Federal, Greek Revival, and Gothic. Bonanza Books New York. Robertson, John A. A Survey Of American Architecture After 1950. McGraw-Hill Book Company New York, 1994.Rutman, Darrett B. The Morning of America, 1603-1789. Houghton Mifflin Company Boston. 1970. Severens, Kenneth. Southern Architecture 350 Years of Distinctive American Buildings. E.P. Dutton New York. 1981. Wilson, Christopher. The Gothic Cathedral The Architecture of the Great Church 1130-1530. Thames and Hudson London. 1990.

Wednesday, May 29, 2019

Rome :: essays research papers

Occultists the world over believe that, once a symbol is created, itacquires power of its own, and more power is generated when suchsymbol(s) are created without the profane uninitiated subtle aboutit. And, the greatest power of all is created in the symbol(s) if theuninitiated NEVER discover that the symbol exists. In this article, weshall demonstrate positive proofs of conspiracy to achieve the ends ofFreemasonry, i.e., achieving the impertinent World couch. And, these proofsexist right under your eyes, in Washington, D.C., the Capital district.Prepare for the unexpected. Before you read this article, you mightwant to go to a map inject to buy a street map of Washington, D.C.The New World Order is coming Are you ready? Once you understand what this NewWorld Order really is, and how it is being gradually implemented, you get out be able to seeit progressing in your daily news Learn how to protect yourself, your loved ones Stand by for insights so startlingyou will never look a t the news the same way again.YOU ARE NOW ON THE CUTTING EDGEWe will demonstrate that the street design in Government Center in Washington, D.C., hasbeen cunningly laid out in such a manner that certain Luciferic symbols are depicted by thestreets, cul-de-sacs and rotaries. This design was created by an Masonic architect in 1791,just a few years after Freemasonry assumed the leading of the New World Order, in1782. Remember, occult leaders in Europe were told by their Familiar Spirits as early as the1740s that the new American continent was to be established as the new "Atlantis", and itsdestiny was to assume the global leadership of the drive to the New World Order. From thebeginning, the United States of America was chosen to lead the world into this kingdom ofAntichrist, and Washington, D.C. was to be its capital. You will need to have your maps of Washington, D.C., opened in front of you as weproceed. As we proceed through this parole we will answer the great question of "Why"these streets have thus been laid out. Before we begin our discussion of this Washington, D.C. map, let us lay round importantgroundwork which will enable us to better understand the occultic meaning behind what weare about to show you. This information was given peeled Edge Ministries by a born-againChristian who was once a medium level Satanist, Doc Marquee. At the time of hisconversion, Doc was in counselling of several Satanic covens West and North of Boston.

Fly-Boys, by James Bradley :: Review of Fly-Boys

Fly-Boys written by James Bradley, reveals the verity about nine boylike American World War II pilots that were shot down over the island of Chichi Jima. Out of the nine pilots one was rescued by a submarine. The some other eight were captured by the Japanese, and disappeared. After the war the American government, along with the Japanese, covered up everything that had happened on Chichi Jima. Which had meant that the lives of the eight Fly-Boys were erased. Only the American and Japanese governments knew that the pilots survived the war. In this novel James Bradley reveals the story for the commencement time. Although, critics might disapprove on all this training making him seem bias, but in reality it is the truth that has near never been discovered. Many Critics, and readers that have reviewed this novel have different opinions on the style of writing that James Bradley chose. Some raise the question is Fly-Boys an anti-American book? So far from reading this book I could see why many would think that. It seems as if James Bradley is making a parody of America. In fact all Bradley is doing here is explaining the truth of our government that he had figured out by intensive research grabbing a plethora of information from untapped government archives containing documents that no one would have ever imagined existed. He is also trying to constitute how the Japanese got brainwashed into the things they thought, did, and acted upon. In the first few chapters the words chosen seem as if Bradley is praising Japan by giving a lot of information from the Japanese side of things to show how bad the Americans were, While America cheered the fliers as its best and brightest, the Japanese had a very different view.....airmen who dropped napalm on defenseless civilians living in paper houses were the non serviceman devils. I personally think that Bradley is just stating the truth while others would look at this and ponder why would he say this if he is American wouldnt he want to leave all that out to make us look better. The way the author chose to write this was to show both sides of war and not just taking one side. He does say one thing about Japan which praises them and then contrasts it to America making it seem worse from that side.

Tuesday, May 28, 2019

The Longest Day :: essays research papers

The Longest DayFew of Gods miracles cause protests in the "scientific" community like theaccount of Joshuas yearn sidereal day - when God made the sun and moon to stand still.But science and modern technology carry done more to verify this phenominalscriptural fact than they have to refute it.Common sense would say it is impossible for such a major disruption to occur andnot totally repeal the precise, perfect balance in the solar system. But givena God, who created the heavens and the earth, who established the rotation ofthe planets and stars to the fraction of a second, making the earth wiretaprotating for 24 hours is not such a difficult task. Yet, computer scientists inthe space program and mathematicians - one a former professor at Yale University- have discovered that a strong day has been unaccountably added in time.The positions of the moon, sun, and planets have to be calculated precisely forall space shots to avoid problems in establishing the satellites st adium. Theorbit has to be calculated for the life of the satellite to avoid its runninginto something else in space.Using computers, scientists can tell the exact location of the planets and theirmoons for years into the future. By the homogeneous means, they have been able tobacktrack and determine these specific locations in the past. It was during onesuch search that the extra day appeared.From various accounts of the incident, it appears that something "did notcompute." The extra day was just there. There was no computer malfunction therewas no write up for the interruption of normal time patterns.When this apparent error appeared and no explanation was forthcoming, one of thescientists related that he had studied in Sunday School about time standingstill. A preposterous idea to scientists, but approach with no other explanation,they asked him to show them the story.In the story in the tenth chapter of the book of Joshua, Joshua had asked God tomake the sun and moon s tand still to change Joshua to defeat his enemies. Joshua1013 says, "And the sun stood still, and the moon stayed, until the people hadavenged themselves upon their enemies... So the sun stood still in the midst ofheaven, and hasted not to go wipe out about a whole day."There was the extra day that science couldnt account for. But scientists aremore exact than that. The term, "about a whole day" was not close enough forthem.They rechecked their computers, going back to the time when the story was

The Longest Day :: essays research papers

The Longest DayFew of gods miracles cause protests in the "scientific" community like theaccount of Joshuas long day - when God made the sun and moon to stand still.But science and modern technology generate done more to verify this phenominalbiblical fact than they have to refute it.Common sense would say it is impossible for such a major disruption to occur andnot totally destroy the precise, perfect remnant in the solar system. But givena God, who created the heavens and the earth, who established the rotation ofthe planets and stars to the fraction of a second, making the earth stoprotating for 24 hours is not such a difficult task. Yet, computer scientists inthe space program and mathematicians - one a former professor at Yale University- have discovered that a whole day has been unaccountably added in time.The positions of the moon, sun, and planets have to be deliberate precisely forall space shots to avoid problems in establishing the satellites orbit. Theorbit h as to be calculated for the life of the satellite to avoid its runninginto something else in space.Using computers, scientists can tell the exact location of the planets and theirmoons for years into the future. By the same means, they have been fitted tobacktrack and determine these specific locations in the past. It was during onesuch search that the extra day appeared.From various accounts of the incident, it appears that something "did notcompute." The extra day was just there. in that location was no computer malfunction therewas no explanation for the interruption of normal time patterns.When this apparent error appeared and no explanation was forthcoming, one of thescientists link up that he had studied in Sunday School about time standingstill. A preposterous idea to scientists, but faced with no some other explanation,they asked him to show them the story.In the story in the tenth chapter of the book of Joshua, Joshua had asked God tomake the sun and moon stand still to enable Joshua to defeat his enemies. Joshua1013 says, "And the sun stood still, and the moon stayed, until the people hadavenged themselves upon their enemies... So the sun stood still in the midst ofheaven, and hasted not to go down about a whole day."There was the extra day that science couldnt account for. But scientists aremore exact than that. The term, "about a whole day" was not close enough forthem.They rechecked their computers, going back to the time when the story was

Monday, May 27, 2019

Online Privacy as a Corporate Social Responsibility- an Empirical Study

fear morals A European surveil the great unwashed 20 act 1 January 2011 Online c only over as a somatic affable function an experiential psycho snap Irene Pollach Aarhus School of course, University of Aarhus, Aarhus, Denmark Information technology and the cyberspace shake up added a new stakeholder concern to the stash awayive fond duty (CSR) agenda online covert. While theory suggests that online screen is a CSR, exactly truly few studies in the clientele ethics books ache attached these two.Based on a study of CSR disclosures, this article contri alonees to the existing literature by exploring whether and how the largest IT companies embrace online cover as a CSR. The ? ndings indicate that tot all in ally a comminuted proportion of the companies ca-ca oecumenical hiding programs, although more than half of them voice moral or relational motives for apportioning online silence. The concealment measures they have taken argon in the beginning respect measures, maculation measures that stimulate a stakeholder dialogue ar r atomic number 18.Overall, a wide variety of approaches to addressing l oneliness was found, which suggests that no institutionalization of covert practices has taken place as yet. The study therefore indicates that online hiding is anatomy of new on the CSR agenda, currently playing only a minor role. Introduction Since the 1990s, companies striving to be trustworthy collective citizens have had to devise strategies to address issues such as pollution, energy drop, waste production, animal testing, child labor, sweatshops, take formforce diversity, or advertising to children.It has become a de-facto standard for very large corporations to publish loving reports documenting how they address these issues in the marketplace, the workplace, the supply chain, and the comm building blocky in order to ful? ll their role as good bodied citizens (Snider et al. 2003). The advent of the Internet has non only revolutionized many business models but has besides rede? ned what it means to be a good somatic citizen ( mark 2000), as intimately of the above issues be of little relevance to companies dealing with data and technology.One issue of public concern that has become highly relevant for IT companies is online privateness (De George 2000, Johnson 2006). doi 10. 1111/j. 1467-8608. 2010. 01611. x Information privateness denotes an individuals right to decide what nurture is made available to former(a)s (Westin 1967). solitude is thus guaranteed only if individuals know that data ar still close them and if they have control over this data collection and the subsequent use of the data (Foxman & Kilcoyne 1993, Caudill & Murphy 2000). In the United States, covert-related legislating exists only for health cargon, ? ancial services, and children on the Internet (Bowie & Jamal 2006), while many aspects of data collection and substance ab drug user control in electronic co mmerce be still unregulated (Fernback & Papacharissi 2007). Countries of the European Union, meanwhile, protect hiding more strictly (Baumer et al. 2004), which has proven to be a hurdle for US technology companies operating in Europe. In 2008, for example, technology giant Google encountered lines in several European countries with its data handling practices (OBrien 2008).Despite legislative efforts in Europe, data privacy violations have occurred in a repress of 88 r 2010 The indite Business ethical motive A European followup r 2010 Blackwell Publishing Ltd. , 9600 Garsington Road, Oxford, OX4 2DQ, UK and 350 Main St, Malden, MA 02148, USA Business moral philosophy A European Review record book 20 Number 1 January 2011 large organizations, including, for example, the largest German bank, DeutscheBank (Neate 2009), or T-Mobile UK (Wray 2009). The problems with privacy legislation are that it is dif? ult to identify violations of these legalitys and that the law may lag b ehind what is technologically feasible. For the above reasons, global companies have some taste over how much privacy they grant users and how much they discontinue about their data handling practices to their users. This discretion adds extra complexity to the moral issue of whether companies take advantage of their federal agencyful position by collecting and exploitation data from users to further their own business interests, for example by sending out unsolicited promotional e-mails or selling user data (Pollach 2005).The discretion companies can exercise when it comes to development privacy and the honorable implications of this discretion entail that entropy privacy is a question of incarnate morality. While theoretical work on corporate social responsibility (CSR) suggests that privacy could be a meaning(prenominal) addition to a corporate CSR program, little is known about corporate practices. This paper therefore sets out to explore whether and how companies whose core business is based on data and technology are embracing tuition privacy as a CSR. The ? dings suggest that information privacy is emerging as an fixings of CSR programs, but that there is a great deal of variety regarding the adoption of privacy as a CSR. The paper ? rst discusses the moral issues behind information privacy on the Internet, reviews the literature on corporate responses to mountains privacy concerns, and past looks at the literature on privacy as a CSR. After describing the pattern and the methodology underlying this study, the results are presented and their implications are discussed. The ethics of information privacyThe very core of electronic and mobile commerce revolves around technology, digitization, and the exchange of information, which poses a number of ethical problems (Zonghao 2001). A point contend to information handling in electronic commerce is the trade-off between collecting data for the sake of transparency and not collecting data for th e sake of privacy (Introna & Pouloudi 1999). An some other challenge is the trade-off between collecting data for the sake of pro? ts and not collecting data for the sake of privacy.As commercial transactions on the Internet or through mobile phones are commonly based on credit-card payments and the shipment of goods to the buyers home address, the balance is tipped towards the need for disclosure sort of than the safeguard of privacy. However, companies collect not only personally identifying information (PII) from transactions but to a fault collect PII when users register themselves, use online services, participate in sweepstakes or surveys, or send inquiries to the observe telephoner. In addition to PII, companies collect anonymous click-stream 1/2 data and compile anonymous user pro? es when Internet users navigate the companies meshworksites (Kelly & Rowland 2000). Through the collection of IP addresses, PII can also be unite with anonymous click-stream data in order to find out very comprehensive user pro? les (Payne & Trumbach 2009). The easier access to and increased mobility of data have made information a commodity that is bought and sold by data brokers (Spinello 1998). It is therefore also possible for companies to buy datasets of user information from data brokers and merge them with the data they have collected themselves.Companies may use the data they collect from customers and visitors on their websites willd to execute transactions, recognize users when they return to the site, and improve their website design based on users interests. But companies may equally use such data for purposes other than those they were collected for. For example, they may target banner ads at users, harass users with unsolicited commercial e-mails, or share this information with third parties (Han & Maclaurin 2002). A growing body of literature documents peoples concerns about privacy violations in online transactions (e. . Culnan & Armstrong 1999, P jo cks et al. 2000, Sheehan 2002, Norberg & Horne 2007, Norberg et al. 2007). Essentially, these concerns stem from the imbalance in power between companies as data collectors and users as data providers. While companies have superior knowledge of what user data are collected and how they are r 2010 The former Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 89 Business Ethics A European Review Volume 20 Number 1 January 2011 handled, users may not point be aware that data are collected, let alone that they are combined into user pro? les. hus not suited to enhance user privacy or engender trust among Internet users. unified response to privacy At the turn of the century, some companies began to introduce chief privacy of? cers (Awazu & Desouza 2004). Their tasks accommodate gathering information about social and legal aspects of privacy, devising the political partys privacy strategy, disseminating information about corporate data handling practices to interior and external stakeholders, and representing the companys commitment to privacy (Kayworth et al. 2005). Another corporate response to information privacy is privacy policies posted on commercial websites (Sama & Shoaf 2002).The pilot light idea behind privacy policies on websites was that companies would disclose how they handle the data they collect from users, while users would carefully learn through the explanation of the companys data handling practices, understand their consequences, and then make an informed decision about divulging personal data or not (Ciocchetti 2007). In reality, privacy policies guide legalese, tech-speak, and other obfuscating language patterns that obscure questionable data handling practices (Pollach 2005, Fernback & Papacharissi 2007).Internet users have been found not to read privacy policies for the above reasons (Milne & Culnan 2004). Privacy policies are sometimes supplemented with privacy seals awarded by private-sector institutions (e. g. BB BOnline, TRUSTe, WebTrust) or accounting ? rms. These seals indicate that companies comply with responsible standards of data handling, as de? ned by the awarding institution (Smith & Rupp 2004). Consumers still have to read and understand the privacy insurance, as the seal alone does not guarantee that the data handling practices of the company comply with an individuals privacy preferences (Rifon et al. 2005).The problem with privacy seals is also that they do not effectively protect users from privacy dishonores. The sealawarding institution may not know about a privacy breach or, if it does learn about it, can only revoke the seal, but has no means to help people regain lost privacy (Shapiro & Baker 2001). These measures are Information privacy as a CSR Carroll (1979) categorized corporate social responsibilities into economical, legal, ethical, and philanthropic responsibilities, arguing that making a pro? t is the quintessential responsibility of companies, together with the ir adherence to legal regulations. According to this classi? ation, information privacy can be categorized as an ethical responsibility, given that legislation is insuf? cient to govern corporate decision making in all areas of data handling. This is elaborated on by Mintzberg (1983), who suggested that areas where CSR comes into play are those where existing legislation needs compliance with its genius as well as its letter and where the corporation can fool its customers or suppliers or the government through its superior knowledge (p. 12). If a company decides to address information privacy, it may not just do so because privacy is an ethical corporate responsibility. Rather, Aguilera et al. 2007) argue that companies accept responsibility for social issues for common chord contrastive reasons (1) moral reasons squared by morality-driven values (2) relational reasons driven by the companys concern about stakeholder relationships and (3) submissive reasons driven by corporate self-interest. Moral motives are enacted particularly by individuals with organizational decision-making power who have strong morality-based values. Relational motives are grounded in a companys desire to promote and balance stakeholder interests, thereby building trust, maximizing stakeholder wealth, and gaining social legitimacy (Aguilera et al. 007). implemental approaches are self-interest driven, seeking to achieve greater engagement and protecting the corporate reputation (Aguilera et al. 2007). The latter approach corresponds to Jones (1995) argument that companies that manage to earn the trust of their stakeholders will be able to secure a free-enterprise(a) advantage through savings on monitoring costs, bonding costs, transaction costs, and search costs arising from managing the dissimilar corporate stakeholder groups. Instrumental motives 90 r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd.Business Ethics A European Review Volume 2 0 Number 1 January 2011 can also be driven by the desire to preempt costly government regulations (Aguilera et al. 2007). The strategy literature follows the instrumental approach to CSR, arguing that companies to which a particular responsibility is highly relevant can bene? t from integrating this responsibility into their overall strategies. Burke & Logsdon (1996) list the following conditions in order for CSR to start out strategic advantages to the ? rm the elect CSR issue is central to the companys mission, is voluntarily embraced, brings bene? s to both the ? rm and to the public at large, is addressed in a proactive manner, and is visible to external stakeholders. It has also been argued that CSR initiatives can bring sustainable competitive advantages in the form of a ? rst-mover advantage (Lieberman & Montgomery 1998). However, for this advantage to emerge, the company essential not only be the ? rst one to address a particular CSR comprehensively but must also continuou sly seek to enhance what it has achieved in order to secure this advantage (Tetrault Sirsly & Lamertz 2008).The strategy literature therefore suggests that companies in the information technology industry could bene? t from embracing online privacy as a CSR, especially if they make this commitment visible to external audiences. Although theory suggests that privacy could be a relevant CSR theme for particular companies, very few empirical studies have addressed the link between information privacy and CSR. They admit Sharfman et al. s (2000) survey among managers on how important they consider a number of social issues, including the protection of privacy.However, in the exploratory factor analysis they conducted, privacy was eliminated from further analyses. Fukukawa & Moon (2004) hold information privacy as an indicator of CSR in their study of CSR activities reported by companies in Japan. In addition, Chaudhris (2006) grimace study of global citizenship at Hewlett-Packard me ntions privacy as one area the company has included in its CSR agenda. In previous theoretical work, Carroll (1998) has sidle uped the protection of online privacy rights as one area where the law lags behind ethical thinking and morality comes into play.Finally, Post (2000) examined the changing role of corporate citizenship in the 21st century and pointed to customer privacy as a new issue of CSR. To date, there is no article that empirically studies in what slipway information privacy is actually addressed as a CSR. Research design This study explores whether and how companies are embracing online privacy as a social responsibility, focusing on what measures they claim to have taken and how they communicate these to their external stakeholders in their CSR disclosures.In view of the lack of previous query in this area, this study is exploratory in constitution. Accordingly, its goal is to identify the variety of corporate practices rather than to compare and contrast companie s. The starting point for the analysis are the three processes of CSR included in Basu & Palazzos (2008) process model of sense-making (1) the reasons a company states for engaging in speci? c CSR activities, (2) the kind of behavior a company displays to live up to its CSR commitments, and (3) the way in which a company regards its relationships with its stakeholders.This section ? rst describes the sample and the data and then goes on to explain the methodology that was applied to analyze the data. Sample The sample consists of the largest companies from IT-related industries, as they are most closely intertwined with information through the hardware, software, or services they provide. To them, information privacy could be a meaningful strategic element of their CSR programs in two different ways. First, they may embrace privacy as a social responsibility in the way they collect and use data.Second, technology does not just violate privacy, it can also enhance privacy. Accordingl y, IT companies may engage in corporate social innovation and invent privacy-enhancing products or commit themselves to educating consumers about privacy protection. Clearly, other large companies, such as retailers, operate online as well, but were not considered for this study, as data and information are not at the core of their activities. Large companies were chosen, as these companies are believed to serve as ply innovators in their industries. All IT-related companies from Europe 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 91 Business Ethics A European Review Volume 20 Number 1 January 2011 and the United States listed among the Fortune Global vitamin D and the ? rst 1,000 companies of the Forbes 2000 company rankings were included in the sample. Neither of the two rankings includes information technology as an industry. Rather, both include a number of industries that deal with information and technology. These include electronic co mputer and Data Services, Computer Software, Computers & Of? e Equipment, Network and Other Communications Equipment, and Telecommunications from the Fortune Global 500 list and Software & Services, Technology Hardware & Equipment, and Telecommunications Services from the Forbes 2000 list. A few IT companies listed in these two rankings could not be included in the analysis, as they had been acquired by another company since the publication of the rankings. Also, the two rankings overlap to a substantial extent, so that the ? nal sample amounted to a total of 95 IT companies. On each companys website, the CSR section was accessed.If there was no such section, sections dedicated to the company background, mission and values, or ethics were accessed. The goal was to download all texts pertaining at least loosely to CSR and, if available, the latest CSR report. An important criterion was that privacy-related information was collected only if it was framed as a CSR issue. Privacy polici es, which are a standard element of every commercial website, were not collected, as their existence alone does not represent a commitment to social responsibility. Of the 95 companies in the initial sample, 30 companies mention privacy in their CSR discourse.The analysis is thus based on these companies (see Appendix A). Their texts range from 21 to 2,367 words in length. Methods This exploratory study draws on both a positivist approach and a constructivist approach in order to look at the data as holistically as possible (cf. Jick 1979). When studying textual data, the fundamental difference between the two traditions is that the positivist tradition sees language as a transmitter of information, while the social constructionist tradition holds that people consciously and unconsciously create social realities when they use language. Accordingly, the textual data were ? st studied using quantitative satiate analysis, which systematically records the frequency of particular heart and soul features. Because of its quantitative, systematic nature, fill analysis de-contextualizes the words from the discourse that is examined and therefore has no means to interpret its ? ndings within a wider context. The ? ndings of the content analysis were therefore combined with a discourse analysis and are presented together. The combination of content analysis and discourse analysis has also been suggested by queryers in linguistics (van Dijk 1985, Herring 2004), sociology (Markoff et al. 974), and information systems (Trauth & Jessup 2000). In this study, the results of both analyses together provide a much richer picture of corporate practices than one analysis alone could furnish. This is important, given the absence of previous research on privacy and CSR. Content analysis systematically condenses texts into content categories by applying a coding scheme that produces quantitative indices of textual content (Krippendorff 1980, Weber 1985, Kolbe & Burnett 1991, Neuen dorf 2002).The content analysis conducted as part of this study records in a systematic and exhaustive manner which companies in the sample have implemented which measures to improve user privacy. The approach chosen for this analysis uses factual codes, which capture precisely de? ned facts, as opposed to thematic codes, which capture themes addressed in a prede? ned textual unit (Kelle & Laurie 1995). The factual codes pertain to privacy measures companies have actually taken, but exclude those that companies plan to implement in the future.With no existing coding scheme available, a preliminary coding scheme was developed from the data by examining the texts in the sample inductively (cf. Strauss & Corbin 1990) for measures that companies have taken to secure user privacy. Overall, 41 different measures were identi? ed. The measures were record dichotomously as being either present (1) or absent (0). They are listed in knock back 2 together with the results. The qualitative appr oach chosen here was discourse analysis, following a social constructionist tradition, which views discourse as a social action that is shaped by and shapes the context in which it occurs (van Dijk 1997a). sermon analysis is a 92 r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. Business Ethics A European Review Volume 20 Number 1 January 2011 method of textual analysis that focuses on how and why language is used in a particular way (van Dijk 1997b). It is based on the premise that people intentionally and unintentionally construct social realities when they engage in discourse. They use language in their roles as members of particular social groups, professions, institutions, or communities but also construct such roles when they use language in social situations (van Dijk 1997a).Similarly, organizational texts can be positive and constitutive of realities just want text or speech of individuals (Fairclough 2005). Discourse analysis typically p ays attention to language features such as repetitions, pronouns, passive voice, nominalizations, modal(prenominal) verbs, agentpatient relations in sentences, and attitudinal lexis in order to study the roles assigned to the participants in the discourse, the power relations between them, and the foregrounding or the background processing of concepts and events.The discourse analysis conducted here examines how companies present themselves as responsible companies when it comes to privacy and data handling. Basu & Palazzos (2008) process model of CSR has guided the analysis and therefore also provides the structure of the results section. Accordingly, the results section starts with the companies reasons for including privacy in their CSR programs, then presents privacy measures companies have taken as part of their CSR initiatives, and ultimately studies the relationships with the various stakeholders that are affected by the companys privacy practices.The reasons for including privacy and the stakeholder relationships are analyzed in the form of a discourse analysis. The analysis of the privacy measures is based on a content analysis, but enhanced with qualitative insights, as needed. Aguilera et al. s (2007) classi? cation of moral, relational, and instrumental CSR motives. flurry 1 shows this categorization together with the text passages where these motives were expressed.The moral motives found include the understanding that Internet users have privacy rights, which the company wants to observe, and the acknowledgement that the company has the responsibility to protect the data they gather from Internet users. Relational motives include the intuition that customers have a desire for privacy, which the company seeks to meet, and the expectation that privacy protection will help the company win customers trust. Ultimately, one company expects to bene? t from its privacy program in that it expects to gain a reputational advantage from privacy protectio n. CSR behaviorThe content analysis revealed 41 different measures companies had taken to support user privacy (see Table 2). They have been grouped into four categories, which are discussed below. One company has implemented 19 of these measures, and nine companies have implemented eight, nine, or 10 different measures. At the other end of the spectrum, there are two companies that have not implemented a single measure, but still let out about privacy in the context of CSR. Further, eight companies have implemented one or two measures, and nine companies have implemented between three and seven measures.Most commonly, a measure was taken by only one company (19 measures) or two companies (six measures). The measure taken most frequently was taken by 15 companies. Thus, there is a broad variety in how companies address privacy. It is also worth noting that it is not necessarily the biggest companies in the industry that have taken lead roles in protecting user privacy. When ranking all companies according to their ranks on the Forbes 2000 and the Fortune Global 500 lists, one can see that the company with the highest number of privacy measures ranks among the top three on both the Forbes and the Fortune list.The other two companies among the top three in the Fortune and Forbes rankings have implemented only one and three measures, respectively. The three companies Results Reasons for privacy as CSR The texts were examined for indications of why the companies include privacy in their CSR programs. Only 13 companies voiced their motivation for engaging in privacy protection, presenting different reasons why they engage in CSR. The communicated motives have been grouped according to r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 3 Business Ethics A European Review Volume 20 Number 1 January 2011 .. Table 1 Communicated motives for corporate privacy programs Motive Moral Explanation Three companies acknowledge that people hav e a right to privacy Quotations To us, the right to privacy includes the right of individuals to have a voice in the use and dissemination of their personal information. A person has the right to control what information about him or her is collected and to determine how that information is used. Con? dentiality and security of consumer data . . . are areas safeguarded by PT in order to respect the freedom and basic rights of each individual We find a strong responsibility to help agree a safer, more enjoyable Internet, while addressing the challenges to privacy and security posed by todays new media. Companies have a responsibility to ensure that the information they hold about their customers and employees is protected, stored, transferred, and used in a responsible manner. Microsoft takes seriously its responsibility to help address the security and privacy challenges of the information-based society, from viruses and spyware to spam and online identity theft. Respect for pr ivacy is part of our commitment to observe high standards of integrity and ethical conduct in all our operations Protecting our customers privacy is a priority. We understand and respect your desire to protect your personal information. The protection of personal information is a very high expectation among our customers, and to meet it, we . . .. Externally, Sabre is committed to building customer relationships based on trust, and that includes recognizing the importance of protecting personal information. Consumer trust and con? dence is critical to Ciscos business and to any technology and Internet-related business as a result, the industry must protect citizens privacy. We have to acquire a liberty to operate by conducting our business in a decent and responsible way. Security and reliability form the basis of Telekom Austria Groups stable and prosperous customer relationships.The Group therefore gives top priority to protecting the integrity and con? dentiality of sensit ive data. Main opportunities Enhance customer and employee trust, . . . support brand/reputation. four companies hold that they have a responsibility to protect the data they gather from Internet users Relational Two companies recognize that customers have a desire for privacy that needs to be met Four companies view privacy protection as a means to winning customer trust InstrumentalOne company states that it expects to gain a reputational advantage from its privacy program .. that have implemented the second highest number of privacy measures occupy ranks 77, 87, and 173 on the Fortune Global 500 list and ranks 49, 518, and 782 on the Forbes 2000 list, which indicates that it is not necessarily the biggest companies in the IT industries that embrace information privacy.An investigation of the relationship between the number of measures taken and length of the privacy text on the corporate website revealed a correlation of 0. 77. This suggests that text length is an indicator of how important the issue is to a company. At the identical time, it also shows that the companies generally do not blab out at length about privacy without having taken relevant measures. One category of measures pertains to the companies internal affairs. They address processes, employee conduct, and, to a small extent, suppliers.The measures mentioned most frequently are the 94 r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. Business Ethics A European Review Volume 20 Number 1 January 2011 .. Table 2 The content of corporate privacy programs Internal Physical protection of data Procedural/administrative protection of data Electronic/technical protection of data Privacy policy Privacy is part of the code of conduct Privacy of? e(r) Privacy come on/working group Employee training Disciplinary action for employee misconduct Privacy newsletter for employees Employee monitoring Privacy included in employment contract Online resources for employe es Ethics hotline for privacy questions Internal privacy campaign Limited employee access to data Online reporting of privacy incidents Regular review of systems and processes Regular review of privacy policy Binding third parties to privacy agreements Reviewing third-party privacy practices Privacy newsletter for customers Guidance/information for consumers Resources for parental control & child safety Privacy e-mail address Integrating privacy into product development Privacy blog Involving stakeholders in design of privacy policy Supporting IS education at schools and universities Publishing privacy research papers Supporting law making Supporting industry self-regulation Working with industry Working with governments Working with NGOs, think tanks Political action deputation (PAC) Compliance with laws Exceeding laws Compliance with Safe Harbor Compliance with GRI Privacy seal 6 2 3 15 8 7 3 9 1 1 1 1 1 1 1 3 1 5 3 5 2 1 10 5 2 8 1 1 1 1 2 1 5 6 10 1 11 1 4 1 4 79 External 30 Co llaborations 25 Compliance 21 . existence of a privacy policy and privacy training, privacy being part of the code of conduct, privacy of? cers, physical data protection, and regular review of systems and processes. All other measures taken internally were taken by one, two, or three companies each, for example measures encouraging employees to report privacy violations and to comply with relevant guidelines. Two different measures pertaining to suppliers or other third parties were identi? ed, namely that the company reviews privacy practices of those partners and that these outsiders are bound to a privacy agreement.The second category of measures contains those directed towards external stakeholders. They include r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 95 Business Ethics A European Review Volume 20 Number 1 January 2011 principally guidance for consumers regarding Internet privacy. Five companies take measures that address parents con cerns about their childrens privacy. In addition to providing information, companies also solicit consumer feedback on privacy matters. Two companies highlight that they have an e-mail address to which people can send privacy concerns and inquiries, and one company involves stakeholders in the design of its privacy policy.The inclusion of privacy considerations in product development was embraced by eight companies. Another group of measures pertain to the participation in industry initiatives and collaborations. Ten companies mention a variety of privacy forums, centers, associations, think tanks, and institutes in which they are involved, including for example, the Electronic Privacy Group, the European Privacy Of? cers Forum, or the Liberty Alliance. Some of them also state that they cooperate with other companies and governments. However, the nature of this cooperation remains unclear, and in some places, the cooperating institutions are not even mentioned.Ultimately, a few US c ompanies express their views on privacy legislation. As part of the measures they have taken, three companies take an active stance for either privacy legislation or self-regulation. Both of these viewpoints are visions at this point, as there is neither privacy legislation nor a functioning model of self-regulation in the United States. The two viewpoints are as follows We also believe that governments must ? nd improved ways to enforce laws against data breach, misuse and fraud, and help consumers pursue those who mishandle their personal information. . . . HP was one of the ? rst companies to embrace the idea of a comprehensive U. S. privacy law. Because different and multiple privacy rules place a heavy burden on global companies, we support a model of industry self-regulation (as opposed to government intervention) in which innovative tools give consumers greater choice in both protecting their personal data and understanding how it may be collected and used. they comply with all relevant privacy laws. As compliance with laws is a legal rather than an ethical responsibility according to Carrolls (1979) classi? cation of corporate responsibilities, only going beyond the law can qualify as a CSR initiative. Dressing up a legal responsibility as an ethical responsibility casts doubt over the sincerity of these efforts.In fact, one of these 11 companies has implemented no other privacy measure apart from legal compliance. There is only one company that vows to drop dead legal requirements HP is pioneering an approach to the protection and responsible use of personal information. This effort goes beyond compliance with the law. Only a minority of companies have follow the privacy standards of outside organizations, such as GRI or privacy seal programs. Stakeholder relationships The measures identi? ed above relate to a number of internal and external stakeholder groups, including employees, consumers, parents, industry, suppliers, governments, advocacy g roups, and the community at large.However, the analysis of the measures does not reveal anything about the relationships with stakeholders, and in some cases, the stakeholder group to which a particular measure was addressed was not even mentioned. This section therefore focuses speci? cally on the stakeholder groups to which the companies express some form of consideration. This could be in the form of protection measures, information provision, cooperation, or merely by expressing an sense of their stakes in privacy. In addition to an account of these overt commitments to stakeholders, a discourse analysis is used to uncover discursively constructed relationships with stakeholders. Table 3 lists the various stakeholder groups identi? d, together with their stake in privacy, the number of companies that made a commitment toward each stakeholder group, and an example of such a commitment. This table is different from the results presented in Table 2 in that it was not concrete acti ons that guided this analysis, but the awareness of stakeholder concerns. We ? nd that companies recognize primarily the stakes of their customers and employees, who exercise a direct and economic in? uence on the company and can therefore be labeled Even companies that do not take a stance on the legislation vs. self-regulation debate empha surface compliance with legislation. Eleven companies state that 96 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. Business Ethics A European Review Volume 20 Number 1 January 2011 .. Table 3 Addressing stakeholder concerns Stakeholder GroupStake Primary Customers/ Protection of 25 Users their data Employees Suppliers/ Vendors schooling Guidelines 14 6 Example In order to help our customers address these issues, we have begun to develop guidance documents to help customers understand which parts of our technology may have privacy applications. We work hard to ensure that Sun employees have the information th ey need to apply our privacy protection standards in their work. When it is necessary for business reasons to share a persons information with third parties such as network service providers and marketing campaign partners, we work together to ensure that we maintain the highest privacy standards. We met with government of? cials and regulators in all regions to understand their concerns and initiatives and to help them fully appreciate the potential implications for privacy of new technologies. We are working with other industry participants . . . to develop solutions that help us reach both of these objectives. In 2007, we formed our Stakeholder Advisory Council (SAC) comprising respected experts from a variety of nongovernmental organizations. Symantec is committed to helping parents keep their kids cybersafe. We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical that we educate them about the importance of safe computing. We tap this internal resource to offer programs that bene? t our local schools and communities. We are also in the process of implementing an employee-led education program. Secondary Government Industry Advocacy groups Parents Compliance with laws expertise in data handling Cooperation Cooperation 6 6 3 Protection of 5 their childrens data Expertise 1 Schools/ communities . primary stakeholders according to Ansoff (1965). However, there are also companies that talk about privacy in a CSR context, but do not voice a commitment to these two primary stakeholder groups. Of the 30 companies, ? ve do not state that they do anything to improve the privacy situation of their customers and 16 do not make such a commitment toward their employees. Suppliers, who are also primary stakeholders, are addressed to a smaller extent. We can also see that the companies in the sample largely neglect their secondary stakeholders, i. e. those groups who do not directly in? uence a com panys core business (Ansoff 1965).Only a maximum of six companies interact with each secondary stakeholder group, such as parents or governments. On the surface, all companies studied engage in a discourse characterized by care and concern for privacy. In particular, emotion-laden words like help, understand, respect, concern, and safe abound across all texts studied. For example Protecting our customers privacy is a priority. We understand and respect your desire to protect your personal information. And as the 24 A 7 demands of the Internet Age threaten to overwhelm customers with complexity, they need trusted and reliable companies to help them make sense of technology and put it to use to make their lives better. The tone becomes even more concerned when companies address their relationship with parents and children We understand the responsibility and concern of parents who worry about their childrens exposure to incompatible content and potentially dangerous interactions on the Web. Protecting our children . . . We believe that in the same way that we educate our children about the risks of drugs, smoking, or violence, it is critical r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 97 Business Ethics A European Review Volume 20 Number 1 January 2011 that we educate them about the importance of safe computing. In the second example, the pronoun we/our adds to the concerned tone by promoting a sense of collegiality and shared affection.The same is also achieved in other places, when companies use this inclusive form of we to reduce the place between themselves and their outside stakeholders Our individual sensitivities about how our information is treated . . . are not uniform or Sun is committed to investigating and addressing the privacy challenges . . . associated with our increasingly digital way of life. In such statements, companies reduce the power distance between themselves and their stakeholders. The incl usive we is also an indicator of positive politeness (Brown & Levinson 1987), indicating how writers conceptualize their audiences and what kind of distance writers create between themselves and their audience.While some companies use the inclusive we, others talk about companies in general, e. g. all businesses are responsible for . . . , which includes themselves only implicitly and distances themselves from these events. Mostly, though, companies make themselves the causal agents we must address these concerns by helping to protect . . .. Notably, one company draws its audiences into the discourse by always addressing them directly, e. g. We understand and respect your desire to protect . . .. All together, the different voices present in these texts suggest that companies have different levels of self-awareness and different understandings of their role in this process.Less variety exists in the distance to the audience, which is apart from one exception not explicitly prese nt in the discourse. This suggests that companies do not consider their CSR activities to be dialogic in nature. Another kind of discourse is found in 10 of the companies texts studied. This discourse reveals that some companies are actually interested in ? nding a balance between users privacy interests and their own business interests rather than protecting privacy unconditionally. They seek to achieve a balance between customers privacy interests and business priorities, business requirements, business needs, their values, or their ability . . . to reap the bene? ts of online interactions. Business interests are also communicated implicitly our goal is simple to balance the interests and concerns of our customers private information with their interest in receiving quality service and information about useful new products. Alternatively, one company mentions only one weight of the balance, without saying what the other weight is that we are striking the right balance for our cus tomers and to reach balanced results. The discourse of balance is a manifestation of the companies power, given that it is they who decide when this balance is reached. Interestingly, this kind of discourse has nothing to do with the motivations they express.Two companies, for example, have voiced moral motives, but also engage in this discourse of balance, as does the one company that has indicated an instrumental motive. It is also worth noting that not a single European company in the sample engages in this discourse of balance. Discussion The literature review has highlighted that users are concerned about privacy and that companies do not respond in a manner that eases stakeholder concerns. The companies chosen for this study are all active in the hardware, software, or telecommunications industries, in which data play a crucial role. Thus, information privacy, and in particular online privacy, is a central issue in their business conduct.The content analysis has revealed that only a small proportion of the largest IT companies comprehensively address privacy as a social responsibility. In the sample, we ? nd both companies that have taken a number of relevant actions to address user privacy and companies that have only taken one or two concrete measures, but nevertheless present privacy as part of their CSR program. A substantial proportion of the measures they have taken fall into the area of compliance and employee conduct (e. g. guidelines, policies, monitoring, and reporting), while measures that stimulate a stakeholder dialogue or represent corporate social innovation are found less frequently.Further, some companies reveal that they seek to reflect a balance between their own business interests and their stakeholders privacy needs. The sample even contains companies that 98 r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. Business Ethics A European Review Volume 20 Number 1 January 2011 voice moral motives for form online privacy as a CSR, while at the same time indicating that they are interested in striking a balance between users privacy interests and their own business interests. We have also seen that some of the privacy measures are actually intended to ful? ll legal responsibilities rather than ethical ones.Thus, some companies in the sample voice concerns and a commitment to help, but do not take privacy to the level of an ethical responsibility (cf. Carroll 1991). At the same time, companies load their privacy discourse with emotive terms suggesting concern, commitment, and a desire to help. While this kind of language is typical of CSR messages and can almost be expected (cf. Pollach 2003), it is still in contrast to the results of the content analysis, which has shown that comprehensive privacy programs are for the most part non-existent. The ? ndings also indicate that companies have chosen a wide variety of approaches to information privacy. In fact, many of the different me asures denti? ed were taken by one, two, or three companies only. Thus, little mimicry and no institutionalized practices have emerged yet. In enigmatical environments, companies have a tendency to model themselves after other companies that are more successful or more respected. This mimicry leads to institutionalized practices that help companies to obtain legitimacy (DiMaggio & Powell 1983). The environment in which the sample companies operate can be characterized as un authentic, as there is no comprehensive privacy legislation as yet and privacy is, to some extent, at each companys discretion. For mimicry behavior to occur, it must be clear to the ? m that adopting a certain practice brings competitive advantages (DiMaggio & Powell 1983). In the case of privacy, an institutionalization of voluntary privacy practices could mean that privacy regulation is preempted. However, as not every company in the sample, and perhaps in the industry as a whole, is pro self-regulation, som e companies may decide not to adopt privacy practices voluntarily, despite the fact that they care about user privacy. Privacy may be on its way to mature from the ethics/compliance focus to a more responsive, proactive focus, but at the moment, it plays a minor role as a CSR. This point is also re? ected in the ? nding that companies address primarily consumer oncerns and step up employee training, while all other stakeholder groups in privacy play a subordinate role. Companies may not have recognized the bene? ts to be gained from engaging with secondary stakeholder groups, e. g. from cooperating with industry partners. At the same time, companies may have been too occupied with implementing privacy standards internally, so that their privacy efforts do not involve secondary stakeholders as yet. These internal compliance measures are clearly the sine qua non for a companys external privacy activities, such as participation in industry initiatives. This study is not without limitat ions. One clear limitation is that the data stem from corporate selfreports, which are problematic (cf.Podsakoff & Organ 1986) in that they are based on what the company reveals rather than what is actually true. This could mean that companies overstate their activities. At the same time, companies may not have mentioned the particular measures they have taken, because they did not consider them important enough. Also, the sample size could have been larger, but the small sample size also serves to illustrate that privacy is just about to begin to play a role in CSR programs of technology-oriented companies. APPENDIX A COMPANIES Adobe Agilent ATT Belgacom British Telecom Cisco Computer Associates Dell Deutsche Telekom Electronic Data Systems France Telecom HP IBM Microsoft Motorola Nokia Oracle IN THE exemplification 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 99 Business Ethics A European Review Volume 20 Number 1 January 2011 Portugal Teleko m Royal KPN Sabre Sprint Sun Symantec Telefonica Telekom Austria Telia Sonera Verizon Virgin Vodafone Xerox References Aguilera, R. V. , Rupp, D. , Williams, C. A. and Ganapathi, J. 2007. Putting the S back in CSR a multilevel theory of social change in organizations. Academy of Management Review, 323, 836863. Ansoff, I. 1965. embodied Strategy. New York, NY McGraw-Hill. Awazu, Y. and Desouza, K. C. 2004. The knowledge chiefs CKOs, CLOs and CPOs. European Management Journal, 223, 339344. Basu, K. and Palazzo, G. 2008. Corporate social responsibility a process model of sensemaking. Academy of Management Review, 331, 122136. Baumer, D. L. , Earp, J. B. and Poindexter, J. C. 2004. Internet privacy law a comparison between the United States and the European Union. Computers and Security, 235, 400412. Bowie, N. and Jamal, K. 2006. Privacy rights on the internet self-regulation or government regulation? . Business Ethics Quarterly, 163, 323342. Brown, P. and Levinson, S. C. 1987. Politene ss. Cambridge Cambridge University Press. Burke, L. and Logsdon, J. M. 1996. How corporate social responsibility pays off. Long Range Planning, 294, 495502. Carroll, A. B. 1979. A three-dimensional conceptual model of corporate performance. Academy of Management Review, 44, 497505. Carroll, A. B. 1991. The pyramid of corporate social responsibility toward the moral management of organizational stakeholders. Business Horizons, 344, 3948. Carroll, A. B. 1998. The four faces of corporate citizenship. Business and rules of order Review, ascorbic acid1, 17. Caudill, E. M. and Murphy, P. E. 2000. Consumer online privacy legal and ethical issues. Journal of Public Policy and Marketing, 191, 719. Chaudhri, V. A. 2006. Organising global CSR a case study of Hewlett-Packards e-inclusion initiative. Journal of Corporate Citizenship, 23, 3951. Ciocchetti, C. A. 2007. E-commerce and information privacy privacy policies as personal information protectors. American Business Law Journal, 441, 5512 6. Culnan, M. J. and Armstrong, P. K. 1999. Information privacy concerns, procedural fairness, and impersonal trust an empirical investigation. Organization Science, 101, 104115. De George, R. T. 2000. Business ethics and the challenge of the information age. Business Ethics Quarterly, 101, 6372. DiMaggio, P. J. and Powell, W. W. 1983. The iron cage revisited the institutional isomorphism and collective rationality in organizational ? elds. American sociological Review, 482, 147160. Fairclough, N. 2005. Critical discourse analysis, organizational discourse, and organizational change. Organization Studies, 266, 915939. Fernback, J. and Papacharissi, Z. 2007. Online privacy as legal safeguard the relationship among consumer, online portal, and privacy policies. New Media and Society, 95, 715734. Foxman, E. R. and Kilcoyne, P. 1993. Information technology, marketing practice, and consumer privacy ethical issues. Journal of Public Policy and Marketing, 121, 106119. Fukukawa, K. and Moo n, J. 2004. A Japanese model of corporate social responsibility? A study of website reporting. Journal of Corporate Citizenship, 16, 4559. Han, P. and Maclaurin, A. 2002. Do consumers really care about online privacy? . Marketing Management, 111, 3538. Herring, S. C. 2004. Computer-mediated discourse analysis an approach to researching online behavior. In Barab, S. A. , Kling, R. and Gray, J. H. (Eds. ), figure For Virtual Communities in the Service of Learning 338376. New York, NY Cambridge University Press. Introna, L. D. and Pouloudi, A. 1999. Privacy in the information age stakeholders, interests and values. Journal of Business Ethics, 221, 2738. 100 r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. Business Ethics A European Review Volume 20 Number 1 January 2011 Jick, T. D. 1979. Mixing qualitative and quantitative methods triangulation in action. Administrative Science Quarterly, 24, 602611. Johnson, D. 2006. Corporate excellence, ethics, a nd the role of IT. Business and Society Review, 1114, 457475. Jones, T. M. 1995. Instrumental stakeholder theory a synthesis of ethics and economics. Academy of Management Review, 202, 404437. Kayworth, T. , Brocato, L. and Whitten, D. 2005. What is a chief privacy of? cer? . Communications of AIS, 16, 110126. Kelle, U. and Laurie, H. 1995. Computer use in qualitative research and issues of validity. In Kelle, U. (Ed. ), Computer-Aided Qualitative Data summary. Theory, Methods and Practice 1928. London Sage. Kelly, E. P. nd Rowland, H. C. 2000. Ethical and online privacy issues in electronic commerce. Business Horizons, 433, 312. Kolbe, R. H. and Burnett, M. S. 1991. Contentanalysis research an examination of applications with directives for improving research reliability and objectivity. Journal of Consumer Research, 182, 243250. Krippendorff, K. 1980. Content Analysis An Introduction to its Methodology. Beverly Hills, CA Sage. Lieberman, M. B. and Montgomery, D. B. 1998. Firstmov er (dis)advantages retrospective and link with the resource-based view. Strategic Management Journal, 1912, 11111125. Markoff, J. , Shapiro, G. and Weitman, S. R. 1974. Toward the integration of content analysis and general methodology. In D. Heise (Ed. ), Sociological Methodology 158. San Francisco, CA Jossey-Bass. Milne, G. R. and Culnan, M. J. 2004. Strategies for reducing online privacy risks why consumers read (or dont read) online privacy notices. Journal of Interactive Marketing, 183, 1529. Mintzberg, H. 1983. The case for corporate social responsibility. Journal of Business Strategy, 42, 315. Neate, R. 2009. Deutsche Bank admits possible privacy breaches. The Telegraph, July 23. Neuendorf, K. A. 2002. The Content Analysis Guidebook. Thousand Oaks, CA Sage. Norberg, P. A. and Horne, D. R. 2007. Privacy attitudes and privacy-related behavior.Psychology and Marketing, 2410, 829847. Norberg, P. A. , Horne, D. R. and Horne, D. A. 2007. The privacy paradox personal information di sclosure intentions versus behaviors. Journal of Consumer Affairs, 411, 100126. OBrien, K. J. 2008. Privacy laws trip up Googles expansion in parts of Europe. New York Times, November 18. Payne, D. and Trumbach, C. C. 2009. Data mining proprietary rights, people and proposals. Business Ethics A European Review, 183, 241252. Phelps, J. , Nowak, G. and Ferrell, E. 2000. Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy and Marketing, 191, 2741. Podsakoff, P.M. and Organ, D. W. 1986. Self-reports in organizational research problems and prospects. Journal of Management, 124, 531544. Pollach, I. 2003. Communicating Corporate Ethics on the World Wide Web A Discourse Analysis of Selected Company Websites. Frankfurt Peter Lang. Pollach, I. 2005. A typology of communicative strategies in online privacy policies ethics, power and informed consent. Journal of Business Ethics, 623, 221235. Post, J. E. 2000. Moving from geographic to virtual com munities global corporate citizenship in a dot. com world. Business and Society Review, 1051, 2746. Rifon, N. J. , LaRose, R. and Choi, S. M. 2005. Your privacy is sealed effects of web privacy seals on trust and personal disclosures. Journal of Consumer Affairs, 392, 339362. Sama, L. M. and Shoaf, V. 2002. Ethics on the web applying moral decision making to the web. Journal of Business Ethics, 3612, 93103. Shapiro, B. and Baker, C. R. 2001. Information technology and the social construction of information privacy. Journal of Accounting and Public Policy, 204, 295322. Sharfman, M. P. , Pinkston, T. S. and Sigerstad, T. D. 2000. The effects of managerial values on social issues evaluation an empirical examination. Business and Society, 392, receipts182. Sheehan, K. B. 2002. Toward a typology of internet users and online privacy concerns.The Information Society, 181, 2132. Smith, A. D. and Rupp, W. T. 2004. Online privacy policies and diffusion theory perspectives security or chaos? . Services Marketing Quarterly, 253, 5375. r 2010 The Author Business Ethics A European Review r 2010 Blackwell Publishing Ltd. 101 Business Ethics A European Review Volume 20 Number 1 January 2011 Snider, J. , Hill, R. P. and Martin, D. 2003. Corporate social responsibility in the 21st century a view from the worlds most successful ? rms. Journal of Business Ethics, 482, 175187. Spinello, R. A. 1998. Privacy rights in the information economy. Business Ethics Quarterly, 84, 723742. Strauss, A. L. nd Corbin, J. 1990. fundamentals of Qualitative Research Grounded Theory Procedures and Techniques. Newbury Park, CA Sage. Tetrault Sirsly, C. A. and Lamertz, K. 2008. When does a corporate social responsibility initiative provide a ? rst-mover advantage? . Business and Society, 473, 343369. Trauth, E. M. and Jessup, L. M. 2000. catch computer-mediated discussions positivist and interpretive analyses of group support system use. MIS Quarterly, 241, 4379. van Dijk, T. A. 1985. Levels and d imensions of discourse analysis. In van Dijk, T. A. Handbook of Discourse Analysis, Vol. 2 112. London Academic Press. van Dijk, T. A. 1997a. Discourse as interaction in society. In van Dijk, T. A. Discourse as brotherly Interaction 137. London Sage. van Dijk, T. A. 1997b. The study of discourse. In van Dijk, T. A. Discourse as Structure and Process, Vol. 1 134. London Sage. Weber, R. P. 1985. canonic Content Analysis. Beverly Hills, CA Sage. Westin, A. F. 1967. Privacy and Freedom. New York, NT Atheneum. Wray, R. 2009. T-Mobile con? rms biggest phone customer data breach. The Guardian, November 17. Zonghao, B. 2001. An ethical discussion on the network economy. Business Ethics A European Review, 101, 108112. 102 r 2010 The Author Business Ethics A European Review r 2010 Blackwell

Sunday, May 26, 2019

Why Harry Potter Should Be Taught in School

Grace Farrow Scott position 1301. 18 October 31, 2012 Why devastate work should be transform in college classes. enjoyment depose be found in the most darkest of places, if only one remembers to turn on the light. Albus Dumbledore. ( raise ceramicist and the Prisoner of Azkaban). The most dynamic serial publication of gives and movies of tout ensemble duration is rag fiddle. I, deal many other students, am taking both highschool trail and college classes at the same prison term. In doing so I start out a lot of homework.The one book I have found that I and many others read in the very little supernumerary time we have, is beset ceramist. Many people say that blight Potter is bad because it has witchcraft throughout the story line. Many say that it is a series indite for newfangleder adults. Many people say that the settings, characters, and plot lines in nettle Potter are chimerical and childish. Many books such as The Hobbit, some(prenominal) whole kit and boodle of Shakespeare, and the authoriseds such as Dracula, Frankenstein, and Gullivers Travels are unrealistic but are required reading in many college classes.Harry Potter covers much of the same lay down as the classical stories, and the students would be more than interested in reading the story instead of just the Spark nones. Harry Potter is one of the most read and talked near series of any time. Harry Potter and the Deathly Hallows alone had 8. 3 million copies sold the first day of its release, not including the pre-orders. Mine was pre-ordered so it was not counted in that figure. Four hundred and fifty million dollars, is the amount of money the books have made just from their respective release dates put together.Harry Potter is a major world wide phenomenon. From 2001 to the present day researchers have found that Children who had previously read short chapter books were suddenly plowing through more than 700 pages in a matter of days. , (moviefone. com). Harry P otter has been beneficial to my generation as we have grown up. Now many colleges are incorporating the Harry Potter books into their lessons. This is dower many students understand more of what they learn in class because the topics are interesting.Also Colleges and University professors from all over have begun teaching the writings of J. K. Rowlings Harry Potter series in the classroom. And for those who grew up reading the seven book series, professors are occuring that students are able to better understand and appreciate the classic literature of Charles Dickens, (Mugglenet. com) according to a Washington and Lee University position professor. A generation that enjoys reading long books, talking about books with other students, and better appreciating classical English Literature with the likes of Shakespeare and Charles Dickens.While it is interesting that college students themselves are still reading the books, what is most surprising is how readily universities are embr acing the books and incorporating them into courses. I k straight off that if my college professors decided to contain Harry Potter into the literature that my class reads, I would be more apt to read and interact with discussions in class because it is fun and interesting. Right now English classes read books like Beowulf, Hamlet, and Macbeth, these books are classics and should be read but not only these books should be read in the classroom.Books such as Harry Potter, Twilight, and The ache Games are books that interest young adults, and should at least be incorporated so the students will want to participate. Many students in both high school and college say that Harry Potter brings them a nice break from all of the books they have to read for school. The students still like the fantasy elements in Harry Potter. gamey school and college students derriere understand the challenges that Harry had to go through during his school years.Even though the books have very unrealistic angles, like magic and wizardry, young adults can still understand what he is going through. The loss of his parents, the hidden love between Ron and Hermione, and the teachers that Harry does not like, and then the ones that do not like Harry. The unrealistic magical way that Harry gets through his problems offer an escape for those people reading the book, who are going through the same problems as Harry. Harry Potter has no age limit- my parents read them, my sister read them, and my niece is reading them.If you have not already read them, do so. Harry Potter offers romance, action, and magic, it is the book for all audiences. The next time you find yourself in a book store just pick the first one up. They are amazing. And who knows you might find it in your literature classes next semester. Rowling J. K. Harry Potter and the Prisoner of Askaban New York Scholastic, 1999. Print. Harry Potter Numbers Trivia. Moviefone. com. 13 July 2007. Web. Harry Potter in Literature. Mugglen et. com. 02 February 2012. Web.Why Harry Potter Should Be Taught in SchoolGrace Farrow Scott English 1301. 18 October 31, 2012 Why Harry Potter should be read in college classes. Happiness can be found in the most darkest of places, if only one remembers to turn on the light. Albus Dumbledore. (Harry Potter and the Prisoner of Azkaban). The most dynamic series of books and movies of all time is Harry Potter. I, like many other students, am taking both high school and college classes at the same time. In doing so I have a lot of homework.The one book I have found that I and many others read in the very little spare time we have, is Harry Potter. Many people say that Harry Potter is bad because it has witchcraft throughout the story line. Many say that it is a series written for younger adults. Many people say that the settings, characters, and plot lines in Harry Potter are unrealistic and childish. Many books such as The Hobbit, several works of Shakespeare, and the classics such as Dracula, Frankenstein, and Gullivers Travels are unrealistic but are required reading in many college classes.Harry Potter covers much of the same ground as the classical stories, and the students would be more interested in reading the story instead of just the Sparknotes. Harry Potter is one of the most read and talked about series of all time. Harry Potter and the Deathly Hallows alone had 8. 3 million copies sold the first day of its release, not including the pre-orders. Mine was pre-ordered so it was not counted in that figure. Four hundred and fifty million dollars, is the amount of money the books have made just from their respective release dates put together.Harry Potter is a major world wide phenomenon. From 2001 to the present day researchers have found that Children who had previously read short chapter books were suddenly plowing through more than 700 pages in a matter of days. , (moviefone. com). Harry Potter has been beneficial to my generation as we have grown up . Now many colleges are incorporating the Harry Potter books into their lessons. This is helping many students understand more of what they learn in class because the topics are interesting.Also Colleges and University professors from all over have begun teaching the literature of J. K. Rowlings Harry Potter series in the classroom. And for those who grew up reading the seven book series, professors are finding that students are able to better understand and appreciate the classic literature of Charles Dickens, (Mugglenet. com) according to a Washington and Lee University English professor. A generation that enjoys reading long books, talking about books with other students, and better appreciating classical English Literature with the likes of Shakespeare and Charles Dickens.While it is interesting that college students themselves are still reading the books, what is most surprising is how readily universities are embracing the books and incorporating them into courses. I know that if my college professors decided to incorporate Harry Potter into the literature that my class reads, I would be more apt to read and interact with discussions in class because it is fun and interesting. Right now English classes read books like Beowulf, Hamlet, and Macbeth, these books are classics and should be read but not only these books should be read in the classroom.Books such as Harry Potter, Twilight, and The Hunger Games are books that interest young adults, and should at least be incorporated so the students will want to participate. Many students in both high school and college say that Harry Potter brings them a nice break from all of the books they have to read for school. The students still like the fantasy elements in Harry Potter. High school and college students can understand the challenges that Harry had to go through during his school years.Even though the books have very unrealistic angles, like magic and wizardry, young adults can still understand what he is going through. The loss of his parents, the hidden love between Ron and Hermione, and the teachers that Harry does not like, and then the ones that do not like Harry. The unrealistic magical way that Harry gets through his problems offer an escape for those people reading the book, who are going through the same problems as Harry. Harry Potter has no age limit- my parents read them, my sister read them, and my niece is reading them.If you have not already read them, do so. Harry Potter offers romance, action, and magic, it is the book for all audiences. The next time you find yourself in a book store just pick the first one up. They are amazing. And who knows you might find it in your literature classes next semester. Rowling J. K. Harry Potter and the Prisoner of Askaban New York Scholastic, 1999. Print. Harry Potter Numbers Trivia. Moviefone. com. 13 July 2007. Web. Harry Potter in Literature. Mugglenet. com. 02 February 2012. Web.

Saturday, May 25, 2019

English-language films Essay

Many people wonder these days if peoples lives revolve around the choices they make. This is suddenly true. Every 1 in this world is responsible for who they be today. Their choices and ideas pave the road for their future. A quote from Confucius says this, Peoples lives are the result of the choices they make-or fail to make. The path one takes in life is not arbitrary. Choices and their consequences determine the course of every someones life. All people, whatever their circumstances, make the choices on which their lives depend. Confucius is absolutely right.It is a well-known fact that if you take wrong turns in life, you bequeath end up in a wrong state. The regular human psychology states that when a person goes and ends up in a bad state, they blame others and most of the time never take responsibility for it. Take a face at this scene, and look carefully event this happens all the time no matter the circumstances. There is no way and it is impossible for a child who t akes drugs, does alcohol, doesnt obey their parents to remember themselves at an Ivy-League college. Sometimes, people change their paths along the way and somewhat improve.But if you keep going in the wrong direction for your entire life, you will not get anywhere. Think about the people who are successful in this world. For examples, lets observe Mark Zuckerberg. He is the youngest billionaire in the world. He was foc apply, he was determined. In fact he was so passionate about programming that he dropped out of Harvard, the number one school in America. He used his talents, worked his choices and made Facebook. Not all of his choices were frank. Some were actually bad some choices actually got him into trouble with others. This is where the trouble comes in.Wait if some of my choices are heartfelt, and some are bad, then whats going to happen with my life? Nothing will actually. All that matters is that the majority will overcome the system. If you have more bad than good, you are more likely to take a wrong turn. If you have more good over wrong, you will most likely take a good turn. Even I have taken wrong turns and bad choices. Everyone has. Nobody in this world is perfect. In fact, taking all good choices and all good turns in life ends up as a bad choice. Even though nobody is perfect, its your own self that will determine your future, what you expect to become, your status in life.Thats why its good to switch your determination in life if you are on a bad path. bank with someone and change your mood. Change your attitude, fix your choices, and keep yourself organized. If you are a person reading this essay, lets say about 12 or 13, even 14 to 18. You still have time. You have so much future ahead of you, taket give up hope cause your choices sometimes do tell your future. Sometimes these choices of yours will end you up in a bad place if you dont work hard. A wise person, my own father once told me that it doesnt make you a bad person if you ta ke bad choices.It makes you a bad person if you dont learn from your bad choices. He also told me that if you want to be someone when you grow up, work hard. In elementary, in middle school, and in lofty school, work hard so that you can build your base for the future. He concluded with me that once you pay off all your duties, go to college, and graduate, you have the lay of your life to enjoy. Whether its doing your dream job, making millions of dollars, then retiring into a large estate. This is called a dream. If you have more good choices in life, your dream will come to. Trust me, its always worked before.

Thursday, May 23, 2019

Modern World History Essay

The children had very different reactions to the policy of evacuation. They all had a stria of different experiences. Some liked it and felt as if it was an adventure for them, everything was impertinent to them so they enjoyed it especially the ones who lived with wealthy hosts, some did not want to leave. It was like a holiday. entirely for these children some felt scared and didnt like the change, for archetype this is Source I, taken from the Modern World History Heinemann textbook page 138, Everything was so clean in the room. We were given face flannels and tooth brushes. Wed never cleaned step up teeth until then.And hot water came from the tap. And there was a lavatory upstairs. And carpets. And clean sheets. This was all very odd. I didnt like it. It was scary. This shows severe and weird it mustiness have been for the children, all the changes would be very confusing. It was even worse though for the children who were mistreated, here is Source M from the same book a nd page. Clarence and I used to sleep together and poor Clarence used to wet the bed because he was a very nervous kid. She (the foster mother) could never tell whod done it so she used to bash the daylights out of both of us.So, of course, the more Clarence got hit the more he wet the bed. It was then we started to get locked in the cupboard. This source tells us how hard it must have been for children like Clarence. First of all they leave their family behind, leave the city they grow up in and dont be intimate what to acquit just that it would be safer than the cities. Then they end up getting beaten by the foster parents. They would feel terrified and would probably wish they had never moved. It would similarly be very hard for children as they would miss their family and for little kids of about 5 and 6 it would be even harder.They would feel lost and not notice what to do. For the mothers and fathers it would be probably be a sad experience letting your children go and l ive with strangers. You only knew that your children would be safer than in the city and hopefully wouldnt be killed. You yourself wouldnt know what to expect and would probably fear the worst. All you knew was that you had a job to do in the war and had to work hard. You didnt know who you children were staying with or what they were like so it would be a traumatic experience for the parents as well as the kids.Only mums with babies were allowed to evacuate out of the cities with them otherwise they had to work. But at least you knew you were doing your bit and hopefully the hard work would take your mind off things and stop you from worrying. The parents knew the policy was a good idea notwithstanding probably still had their doubts about it. Another reaction was from the emergency services. They seemed to like it. It gave them a lot more time to concentrate on the war and macro things rather than having little kids causing trouble.They liked the situation and it helped them out a lot which was another reason why the evacuation itself took place. There was a lot less people in the cities, less crimes, fires etc. which made their job a lot easier which Im sure they appreciated. They definitely liked the policy. So this shows the different reactions about the policy. There were a lot of mixed trusts on whether it was good or not. Some liked it some didnt, but in my opinion it was a good thing but maybe if I was there I might have a different reaction to it.

Wednesday, May 22, 2019

J.I. Packer Reflection Paper

Jonathan Gamble Evangelism and the Sovereignty of theology Reflection Paper When he sat d avouch to write Evangelism and the Sovereignty of beau ideal, J. I. pugilist sought to explain the unconvincing importance of understanding the antinomy or tension, as some call it between the necessary sovereignty of beau ideal and the unbosom will of custody. Throughout the book, packer puts an emphasis on reconciling these two commonly misconstrued components of Christian doctrine. There argon two primary points that the author stresses to the reader the divine sovereignty of God and the free will of piece of music, and evangelism and what it means for churches and individuals.The first point J. I. Packer makes in his book is the seemingly self-contradictory doctrine of the divine sovereignty of God and the free will of men. This opposition as some would call it is remedied by Packer early on in the book. On page 23 of the text, the author states, Man is a responsible moral agen t, though he is also divinely controlled man is divinely controlled, though he is also a responsible moral agent. Gods sovereignty is a reality, and mans responsibility is a reality too. Though it may seem confusing to unbelievers and believers alike, this statement truly encapsulates Packers argument and helps to alleviate doubt toward this appargonnt opposition in Christian doctrine. Man is a moral being meaning, he has free will, provided was designed (by God) to be virtuous and upright in morality. Humans sacrifice the power to do as they please (free will) they can either live harmonize to Gods laws or reject His teaching. God allows man to possess free will because He wants men to choose His teachings willingly and on their own accord, not forced into Gods law against his will.However, Packer states that man is also divinely controlled, which seems to be at odds with the previous statement. Though man has free will, to a certain extent he is noneffervescent controlled by a divine being (God). Ephesians 210 ranks us, For we are Gods workmanship, created in Christ Jesus to do good works, which God prepared in advance for us to do (NIV). This proves that, although we have free will and are capable of making our own decisions, God created us to do good works and He knows what we will do before we even do it.Thus, Packers argument is that, although we have free will and God allows us to make our own decisions (including accepting or rejecting Him), we are still divinely controlled by Him through the good works we do. Second among Packers emphasized points is that of evangelism not just the act, but what it means for churches and individuals alike. Throughout this portion of the book, the author focuses on several main questions regarding evangelism what is evangelism, what is the evangelistic message, and what is the motive for evangelizing.Packer uses the following to define evangelism To evangelize is so to present Christ Jesus in the power of the Holy Spirit, that men shall come to their trust in God through Him, to accept Him as their Savior, and serve Him as their King in the fellowship of His Church (Packer 38). This definition is smart as a whip because it leads into Packers nigh questions of evangelism. The message of evangelism, according to the book, is the message of Jesus Christs work, including, but not limited to, his miracles, death, burial, and resurrection.However, Packer warns not to exposit the Gospel message instead, a simplified version geared toward the target audience is a much more effective means of presenting Christ. The motive for evangelizing is so to reach lost and broken souls with the Gospel of Jesus Christ, and to lead them to a saving faith in Him. Packer makes very good arguments and backs up his military position with solid evidence from both the Bible and extra-biblical sources because of his logical and straightforward argument, I agree with his presentation of the antinomy of evangelism and the sovereignty of God.In Evangelism and the Sovereignty of God, the author argues that men both have free will, yet are divinely controlled. I fully support this stand, from both a biblical and practical standpoint. Throughout both the Old and impudent Testaments, men demonstrate their free will, for good or ill. For example, the parable of the talents shows how mens free will through the illustrations of the three servants can either down glory to God or condemn the man. All three of the servants exercised their free will by either doubling the talents entrusted to them (the first two), or by exclusively hiding their talent (the final servant).Obviously, the first two servants brought glory to their master by earning interest on their talents, while the final servant was condemned as a wicked, lazy servant (Matthew 2514-30). Thus, despite the outcome, men have been given the free will by God to do as they please. Packer endorses this viewpoint throughout his book, and gives numerous biblical citations to support his doctrinal views. Although men have free will, they are also divinely controlled by God Packer shows this throughout his book, and I agree with his arguments and evidences.An excellent example of this and the main reason why I support Packers argument for men being divinely controlled can be found in the book of Exodus. Then the Lord said to Moses, Go to Pharaoh, for I have hardened his heart and the hearts of his officials so that I may perform these signs of mine among them that you may tell your children and grandchildren how I dealt harshly with the Egyptians and how I performed my signs among them, and that you may know that I am the Lord (Exodus 101-2).This event shows that God controls the hearts of man, by his hardening the heart of Pharaoh. So, although we have free will, God is still in control of our heart, mind, and soul we are still divinely controlled. If I was to explain to somebody the biblical teaching on the relationship of evangelism Packers book and my own understanding of this seemingly contradictory doctrine. I would attempt to explain to them this complex doctrine in simplified terms. To start, I would define sovereignty for them.Sovereignty can be defined as the complete, utter, and undeniable rule of God as King over all creation, including the stars, planets, and man. After establishing the meaning of the basic words for the argument, I would go on to explain nearly the antinomy of mens free will and the undeniable sovereignty of God. Men are made with the free will to make their own decisions, and are odd to their own devices for the most part. However, with this free will comes responsibility our actions can either bring glory to God or can bring hardship upon ourselves.Although we are given free will, we are still divinely controlled by God. I would bring about examples from both my own life and the Bible. I would try to occupy to them by telling them of my past I was heavily involved in alcohol and partying in high school (my free will to reject God and His teaching), until God intervened and brought me to a saving faith in Him, and my life turned completely around (Gods sovereignty over my own life). By order of payment events from my own life, it would help to make the confusing doctrine a bit more understandable and relatable to whoever Im talking to.I would explain the concept of evangelism to them next evangelism, in my own words, is the act of reaching out to an unreached audience and telling them about Jesus Christ, his miraculous life and works, his death and resurrection, and the saving tenderness that comes as a result of putting ones faith in Him. Evangelism is worldly important because it brings sinners to Gods grace by cattle ranch the Good News to the unreached, we can help turn the tide of religious apathy into a generation that is in relationship with Jesus Christ.Many would argue that because God is sovereign, evangelism is pointless and a waste of time, resources, and talent. However, both Packer and I would argue that this is completely false. I would explain to my listener that because of the free will God grants us, we should tell others about Him and His great love and mercy. I would go on to quote Ephesians 210, which says that we were created to do good works. Because we were created to do good works, it should not feel an liability to evangelize rather, it should be viewed a privilege and an honor a necessity to spread the news of Christ.Although God is in control of mans actions and hence already knows who is going to be receptive of the Truth, it is still our obligation and privilege as Christians to spread the Word (evangelize) to any and everybody. Works Cited 1. Ephesians 210, Exodus 101-2. NIV Bible. London Hodder & Stoughton, 2000. N. pag. Print. 2. Packer, J. I. Evangelism and the Sovereignty of God. Downers Grove, IL InterVarsity, 1991. Print.