Monday, December 23, 2019

Kill The Indian Save The Man Essay - 1089 Words

After reading Kill the Indian, Save the Man: The Genocidal Impact of American Indian Residential Schools by Ward Churchill, I have come to realization of some matters. First of all, while your goal might had been to civilize the Indians by teaching them English, manners, and change their whole appearance, the outcome was totally different. Your goal might have been successful to you, in the end you got what you wanted: to kill the Indian and Save the Man. But also, you stole those kid’s identities by taking them away from their families. You traumatized them, and making them go through so many forms of abuse. â€Å"Kill the Indian, save the men† or like U.S. Indian Commissioner William A. Jones said in 1903, the goal was to â€Å"exterminate the†¦show more content†¦How do you deal with a trauma that’s not really yours? It’s heartbreaking to see how these communities get up on the aftermath. How some people that went to these boarding schools st ill tear up every time they talk about it. Most communities, or families are broken. Many people turned to substances to drown the bad memories. How many people today still carry depression, anxiety, substance addiction, suicide thoughts, and mental instability. How many Natives did you turned against their own culture? It is sad to see how the language and the culture is declining. For example, let’s take the Navajo’s, not many people speak it anymore. Why? Because of the people that underwent through these boarding schools, they were forbidden to speak in their dialect and forced to learn how to speak English. Causing younger generations to not speak it since parent generations lost the language, and therefore can’t really teach it to their kids. Culture loss, how many people aren’t as traditional as before. All because they had to change their appearance, weren’t allowed to perform any type of prayers or any traditions they had. The population decreased, traditions weren’t practiced by youngsters, and the adults grew old. It’s not many people that went back to their roots after. For example, there aren’t many Navajos that cure, all because the teachings haven’tShow MoreRelatedIndians in Unexpected Places Essay902 Words   |  4 PagesDeloria, with his analytical survey, Indians in Unexpected Places, recounts the synthesis of western white expectations, and American Indians. The book takes its title from the general thesis, which explores not only the relationship between Indians and their introduction into an alien culture, but also the expectations that we have of Indians and how they â€Å"should† interact with our white western culture. According to Deloria, the common no tion is that, â€Å"Indian people, corralled on isolated and impoverishedRead MoreAnalysis Of George Orwell s The Voice Of A Generation 884 Words   |  4 Pagesstyle of writing. Orwell follows the principles of imagery, tone and ethos, meanwhile creating his own rules. Orwell weaves these principles together to write two famous stories that are packed with ethos and told in great detail. Why give a common man more credibility than an emperor? Orwell’s writing style gives him immense credibility because of the sheer detail, vivid color and description. Orwell achieves this through imagery, tone and syntax. Consider Orwell’s use of imagery in Shooting an ElephantRead MoreSherman Alexie s Flight - Flight1686 Words   |  7 PagesResponse Essay: Sherman Alexie Novel Flight Flight is a novel by Sherman Alexie that tell the story of a distressed Native American teenage boy, who has sadly stretched his breaking point after years of ill-treatment at the hands of adults, named Michael but prefers to be called Zits, â€Å"Call me Zits. Everybody calls me Zits. That is not my real name, of course. My real name is not important.† (Zits, p.1). Zits was left to his own devices at the age of six when his mother died of breast cancer andRead MoreNative Americans History1879 Words   |  7 Pagesuncivilized† . Throughout their history American Indians have had the trademark of savagery which has allowed Europeans to isolate, assimilate and mistreat this culture. In result, there has been a phenomenon, in which this paper will discuss as well as the history of savagery in the United States. Already rooted in the Americans and before the arrival of the English empire, the American Indians lived in harmony and peace with their surrounds. The American Indians were skilled farmers and hunters that usedRead MoreThe Elephant as a Symbol for Imperialism in Shooting an Elephant†1188 Words   |  5 Pageslooking like a fool† in front of the crowd (14). At first glance, one would think that it makes sense for him to kill the elephant to save his face, but that was not the case. He effectively uses this incident to demonstrate the â€Å"real nature of imperialism† (3), whereas the elephant represents the British Empire. Orwell was ambivalent about imperialism. At the beginning of his essay, he recalls how Burmese people treated him when he was still working in Burma as a police officer. He was â€Å"hatedRead MoreEssay on The Finale of Evil in Orwells Shooting an Elephant1238 Words   |  5 Pagesâ€Å"Shooting an Elephant,† Orwell faces a dilemma: whether or not to kill the elephant. With his final decision, the elephant finally lays dead in front of thousands of people. He explains that he was forced to shoot it because the Burmese people were expecting him to do that. In addition, he has to do it â€Å"to avoid looking like a fool† (14) in front of the crowd. At first glance, one would think that it makes sense for him to kill the elephant to save his face, but that was not the case. He effectively usesRead MoreSherman Alexie s The Lone Ranger And Tonto Fistfight1362 Words   |  6 PagesFor centuries, Native Americans have struggled to find their identity. This began with the a rrival of explorers and colonists, then peaked with the creation of Indian boarding schools. Schools such as Carlisle, who sought to â€Å"kill the Indian, [and] save the man† (qtd. in Trennert). In these schools Native American children were stripped of their culture, and forced to abide by the white man’s ways. This resulted in generations of Native American who were forced to live between two worlds, withoutRead MoreShooting an Elephant by George Orwell, Brief Description of Words and Symbols872 Words   |  4 Pages1. From the beginning of this essay Orwell’s purpose was never to shoot the elephant. In paragraph 3, lines eight through nine he explains not wanting to shoot it and speaks about bringing the gun to give the elephant a good fright. Leaving the gun at home or bringing the gun would have made no difference to what happened at the end. The gun was of little use, the main gun was not even his own but the riffle. 2. Orwell shot the elephant not to save the people in the village but for his own benefitsRead MoreReaction Paper On Courage Essay1364 Words   |  6 Pagescourage. Throughout this class we have read many books that have characters that show courage. There are themes of courage in The Absolutely True Diary of a Part-Time Indian, To Kill a Mockingbird, the Holocaust Unit, and The Merchant of Venice. The first book I am going to talk about is The Absolutely True Diary of a Part-Time Indian. In this book Junior decides to leave the Rez school and go to Reardan which is a white school. Doing this took a lot of courage. Not many people supported him whenRead MoreAnalysis Of Arthur Miller s The Crucible 908 Words   |  4 PagesJack Del Giudice Mrs. Schmiedeler English 2F 21 October 2015 Crucible Essay â€Å"It takes many good deeds to build a good reputation, and only one bad one to lose it.† This is a quote by Benjamin Franklin and it explains how the puritan society in The Crucible work. this quote shows how fragile a reputation can be, you can spend your whole life increasing your reputation, but one wrong move and it’s completely wrong. In The Crucible, many of Arthur Miller’s characters are very concerned with their reputation

Sunday, December 15, 2019

What types of memory are typically impaired in amnesia Free Essays

Abstract Amnesia is a condition that impacts many people worldwide. This essay illustrates the basic overview of the condition alongside the primary components that make up the condition. Evidence demonstrates that neurological amnesia can be caused by many separate influences, which can serve to directly impact a person’s life. We will write a custom essay sample on What types of memory are typically impaired in amnesia? or any similar topic only for you Order Now This study will be of use to the further development of data regarding amnesia. Introduction The problem to the process of learning new information or recalling the past is known as Amnesia (Nissan, Abrahams and Sala 2012). This condition is characterized by two variant conditions: functional amnesia and neurological amnesia. Functional amnesia is not as prevalent as neurological amnesia and can be caused by nonphysical elements (Rugg 1997). In some cases extreme emotion can trigger functional amnesia. In cases that present the functional amnesia condition, the pattern of development is significantly distinct from the neurological amnesia. Amnesia Within the field of neuropsychology, or the discipline of addressing the treatment of memory disorder, the area of Declarative memory, or the section of the brain that deals with conscious facts and day to day events is directly impacted by neurological amnesia (Parkin 2013). Conversely, modern studies suggest that many of the non-conscious or non-declarative forms of knowledge remain intact during these cases. The terms implicit and explicit memory are secondary methods of reference for the areas of non-declarative and declarative memory impacted in the cases of neurological amnesia (Ibid).Most often, neurological amnesia is credited to a traumatic event to the brain including disease that targets the medial diencephalon or the medial temporal lobe or amnesia could be caused by blunt force to the head (Rugg 1997). Two areas are identified within the scope of the functional and neurological amnesia condition: Retrograde and Anterograde (Ellis and Young 1996). The area of neurological amnesia that creates an impediment when patients attempt to learn new facts or acquire new knowledge is known as Anterograde amnesia. The form of neurological amnesia that takes the form of difficulty remembering details that occurred before the trauma is known as retrograde amnesia (Ibid). In nearly every case functional amnesia will be identified by the presence of retrograde amnesia alongside the lack of any anterograde amnesia (Parkin 2013). The functional form of amnesia is classified as a psychological disorder with no specific section of the brain credited with healing. Yet, a common factor of functional amnesia is physical damage to the brain. A distinguishing element present in neurological amnesia is the damage to the function of either the temporal lobe or the diencephalic midline (Rugg 1997). When this form of damage is taken it is labelled as material-specific amnesia. When both sections are involved the results can take any form of functional or neurological amnesia (Ibid). Damage to the left side of the brain is credited with impacting memory for verbal material, while any damage on the right side produces issues with memories in the nonverbal material (Parkin 2013). Alzheimer’s, temporal lobe surgery, extreme illness, alcohol or drug abuse, blunt trauma, ischemia, anoxia or the disruption to an artery aneurism can all be credited with the onset of neurological amnesia. In every case there is a trigger. Case studies In some cases surgery to relieve unassociated conditions can be credited with causing amnesia in both human and animal models (Clark and Squire 2010). In the case of H.M. in the year 1953, surgery was deemed the best option for addressing the patient’s epileptic condition (Ellis and Young 1996). To accomplish this objective surgery removed the medial temporal lobe cortices bilaterally; this was made up of the entorhinal cortex and the majority of the perirhinal cortex. The overall results produced a mixed bag with the rate of epileptic seizures diminishing, yet, the appearance and subsequent persistence of amnesia were noted (Ibid). H.M. was noted to suffer impaired recollection of object locations among other spacial, recall and recognition diminishments. This case illustrates that damage in the hippocampal region has the potential to inflict substantial impairment limited only by the scope of the damage. In areas that exhibit larger medial lesions the tendency to more extre me forms of amnesia is likely (Clark and Squire 2010). An evaluation of this study illustrates the impact that surgery can have on this form of neurological amnesia (Ibid). The onset of this condition was dependant on the trauma caused while undergoing a non-related procedure, resulting in the amnesia diagnosis. The patient NA suffered an injury during a ‘mock duel’ when a portion of the fencing foil entered the right nostril and punctured the base of the brain (Ellis and Young 1996). Following this incident NA exhibited a form of registration amnesia, or issues with acquiring new memories in context with previous memories. In this case the patient had good recall of events that transpired prior to the accident, but very little in the twenty year span since (Ibid). In many ways, his life was suspended at the moment of the trauma. Testing NA produced the knowledge that the subject’s amnesia was considerably tilted towards the verbal over the non-verbal material. NA was much better at syllables and figures than with words (Ibid). In NA’s case his amnesia impacted his ability to incorporate his verbal recall more so than his non-verbal recall capacity. An evaluation of this case illustrates that clear correlation between specific hemisphere damage and resultant amnesia diagnosis. In this case, the targeted area of damage leads to the diagnosis of neurological amnesia. In summary Amnesia is the condition of problems with learning new information or recalling old information. Two separate conditions, functional and neurological forms of amnesia exist. Neuropsychology is concerned with treating memory issues with the Declarative memory, or the day to day operations. Anterograde refers to issues acquiring new knowledge while Retrograde refers to the condition of failing to recall memories. Damage to the right side of the brain impacts memories and nonverbal material while damage to the left side influence verbal memories. Blunt trauma, surgery or illness can produce neuropsychological amnesia. The case of H.M. demonstrates how surgery that impacts the temporal lobe of the can adversely impact memory function, creating a form of neurological amnesia. While surgery did diminish the primary condition, the subsequent result was substantial. Secondarily, the trauma of a puncture to the brain for NA was credited for the onset of neurological amnesia. This condition impacted his verbal retention more so than the non-verbal capacity, creating the perception that the patient was frozen during the period of time in which the trauma occurred. References Clark, R. and Squire, L. 2010. An animal model of recognition memory and medial temporal lobe amnesia: History and current issues. Neuropsychologia, 48 (8), pp. 2234–2244. Ellis, A. and Young, A. 1996. Human cognitive neuropsychology. Hove: Psychology Press. Nissan, J., Abrahams, S. and Della Sala, S. 2012. Amnesiacs might get the gist: Reduced false recognition in amnesia may be the result of impaired item-specific memory. Neurocase, (ahead-of-print), pp. 1–11. Parkin, A. 2013. Memory and Amnesia. Taylor Francis. Rugg, M. 1997. Cognitive neuroscience. Cambridge, Mass.: MIT Press. How to cite What types of memory are typically impaired in amnesia?, Essay examples

Saturday, December 7, 2019

Human Security and Cyber Security

Question: Discuss about the Human Security and Cyber Security. Answer: 1. Many governments have taken steps together, over a past few decades, to draw a different range of institutions, functions and objectives under the view of national security. This drift is driven by two simple ideas, firstly, citizens and countries face many types of security threats and there is a need to take such threats seriously and give them priority. Secondly, government has many types of policies formulated that will help in the management of security threats. Hence, Governments should take appropriate steps to curb the national threats under the idea of National Security Strategy (Adger et al. 2014). This conceptual question draws a particular attention to human security as the first and most appropriate referent object among others that comprise security, because human security has basic elements to stop severe and escalation of threats. The thought of human security involves a revised identification of measures, instruments and activities. In recent times, the relevant responses to threat include protection of persons in a way that would lead to their empowerment and increase their strength in such a way that gives them the ability to avoid insecure situations. Retention of security and to reestablish compromised security is one of the greatest strength of human protection. Comprised human security means the incapability of human beings to be able to develop themselves and disability to keep them safe and secure. There is no coincidence that this idea was emergent in the years after the Cold War. For even more than forty years, there was one threat perception that overpowered the security issue. The policy instruments that supported the threat perceptions were intelligence forces and armed forces. Since the passage of this era, the voters, the policy makers and the governments were working on improving the threat exceptions and by this time people realized the need of protecting their security that was constantly at risk especially at the time of wars (Amar 2013). The word security can be understood under the light of two problems; firstly, it is applicable to so many things and secondly by applying it to certain things a lot of difference is created as to how we approach it (Adger et al. 2014). However, the word security can cover many things in its broadest sense, and it may include many threats ranging from individual wellbeing to economic wellbeing, interpersonal relationships and a sense of self realization and threats that are associated as part of a society. Therefore, security from a national point of view shall cover many security issues, which pose threat to the social, economic and cultural well being of the nation (Pietsch 2010). However, this only focuses on the threat in which the state is involved. If this question is seen from an opposite direction then it may be concluded that national security of the state is concerned with the individuals in it. This has become a very important factor in the recent decades especially in the development of the concept of human security. Hence, we may say that the most appropriate referent object of security in 21st century is human security (Kaldor, Martin and Selchow 2016). In the year 1990, the term human security was seen as a concept of social welfare of the people, however, as years passed by the meaning of the term was widened and the term included many other factors, such as the economic welfare, psychological welfare and social welfare of the people. The advocates who support the concept of human security have held that if the government focuses on improving the health, economy and social security of an individual then automatically his human security will improve (Chandler 2013). For example, at the time of the Asian Financial Crisis, 1998, the human security of individuals automatically came increased when the social and economic life of people improved. Hence, the overall human security has a lot to do with the health, social and economic improvement of persons. According to Liotta, the national and state security is interconnected with each other in many ways (Paris 2001). Many countries such as Canada see human rights security as part of hum an security. This is a recent notion that is adopted by the developed countries and is in fact the correct notion that should be adopted as part of human security (Adger et al. 2014). The hysteria of the refugees that took place in the United States brought heavy focus on the security after the attacks that took place in Paris and an increasing anti immigration attitude in Europe. This hibernation drift drew the attention of many refugee campaigns that held the view that there is a need to extend the idea of security from merely restricting it to military power of the nation. Security is no longer a product of military or armed forces that prevail in a country and there is much more associated with it in the recent decades (White 2012). Security should be considered and viewed from the angle of expansion and protection of human rights. Hence, the term human security can be understood to include the ideologies of conflict prevention, crisis management and civil military coordination. However, there may be many ideas associated with the concept of human security and this may include responsibility to protect, effective multilateralism and human development. The poin t to keep in mind is that threats are avoided or neutralized simply by protecting people from wars, genocide, radicalization, and tyrannies. The implication of providing protection is the instant avoidance of refugee crisis, challenge of peace and stability of the region, stop terrorism which is seems to be first step of securing interests. Based on the discussion that is stated above in favor of human security, the question that arises here is what is the advantage of human security paradigm and why is it the best security than any other security? If we highlight the importance of human security as a tool then it may have may have many uses, but one clear advantage of human security is the ability to highlight the complexity of a problem that leads to conflicts. This can be understood if one briefly understands the meaning and notion of culture and how this is associated with human security. Culture means a group of people who share similar values and beliefs. People have the tendency to mobilize and socialize with people having similar culture and beliefs and this in turn will allow creation of human security amongst them. This is where human security is regarded as a very helpful conceptual tool (Chandler 2013). As per UN defines human security and its elements, I can say that when group of people are denied those ba sic elements will be focused to react in ways that challenges the world stability in terms of security, economy and socialization. Example, Syrian crisis has been evident to have challenged the regions security, refugees crisis to Europe. Human security is most appropriate object of security because other objects are affected when it is challenged. Conclusively, it may be stated that human security helps an individual to nurture their social and mental well-being. The success of a countrys national security can be best understood and achieved by valuing the human security more than other objects of security. Nations are comprised of humans and individuals and if each of them is secured at their personal level, the growth and prosperity of the nations interests will automatically increase. This human security objectshould be appreciated as first step to providing security to all other means that the states value as their interests. 2. The use of internet all over the world has solved many issues and now it seems to be the promising thing for everyone and everything. From the perspective of global business, it lowers the cost of production while increasing innovation, effectiveness and invention. For many poor and rich countries, the internet has helped in the expansion of markets by providing a wider range of products and services. For people who are repressed, internet provides an outlet and inlet of expression. For communities that are large and small, the internet helps in enabling control over sewage systems, transportation and critical power (Mach 2014). However, as part of the community, we should not forget that internet give offers to terrorists, criminals and wrongdoers to commit wrong in the community by cheating, stealing and striking. While the ability to use the same medium for a positive use there is an associated risk that hampers the security of the nation and with the use of a high tech internet service, the security of the nation can be under threat. The 9/11 commission is a prime example of the misuse of technology and how internet can help the terrorists in the commission of crime. Thus, based on internet issues our future remains uncertain and unclear (Schirch 2013). One cannot devoid the use of internet, as the nations success in terms of economy, health and welfare depends mostly on the use of internet. However, the question that should be considered is whether the enemies can operate our nations system and make use of the services and information contained in them. Unfortunately, there is no clear answer to this question, and the future of the answer to this question shall remain unknown (Langer 2011). Therefore, it is difficult for the nations stakeholders, leaders and policy makers to ensure the people with the fact that the data of the nation remains completely untouched and unknown by outside resources. No guarantee can be provided regarding the adulteration of information and data. We are aware of the fact that cyber exploitation is increasing at a very high level and shall continue to grow knowing the dependency of the nation on the internet systems. Many professionals and academic researchers have identified the risks that are associate d with cyber security and are working on the risk management (Chang 2014). It is a difficult notion to develop a national plan for the protection of cyber threats. The National Cyber Study Group (NCSG) initiated such plans in the past. This body had taken the responsibility to provide protection to those nations who are at a very high risk of cyber threat. It was observed that there are end number of plans and actions that were developed for the protection of cyber threats however, at every level the security measures is seen to be failing and falling. A model was developed by the NCSG for the breakdown of the cyber security strategies comprised of three components Computer Network Operations, Computer Network Defense and Computer Network Exploitation. However, this model brown down very quickly and easily and the NCSG realized it soon that there is a need for the implementation of the policies that are made for cyber security. One might think that it is important to identify the threat to break it down and this can be regarded as a correct approach that c an be divided into three categories: terrorists, criminals and nation states (Tor 2015). If nations have proper defined branches for the functioning of the cyber policies then terrorist and criminal activity may be curbed. In cyberspace, the threat agents are the hackers, terrorist and criminals. The victims that are the threat vectors of such actions are also diversified. The threat actors may be involved in stealing the identity of the persons to commit fraud. In many cases, the victims are institutions and states who suffer due to stealing of identity of the crime perpetrators (Kuehn 2014). The unclear nature of national security in cyberspace has contributed to the debate about the extent of national security within the area of studies related to studies. On one side the studies related to security study focus on the ideologies of neo realists. Stephen Walt developed the ideology of neo realist. According to Walt (1991), the focus of studies related to security is related to the phenomenon of war. The supporters of the theory of neo realists state, that the security measures related to cyber crime should pertain to the impact that cyber attacks have on nations and the military capability of the nat ion to deter such criminal actions (Anand 2012). There has been an opposition to this theory by many researchers, and according to them the study of cyber security has something to do more than the just the military power of the nation. For example, they recognize security not only from the perspective of having appropriate military powers but also include actors such as states, communities and people (Singer, Peter and Friedman 2014). A weak social political cohesion shall be regarded as one of the most vulnerable threats to the security of the nation at all levels and from all sectors. When nations contain resources that are valuable in the eyes of others then that shall be regarded as one of the most vulnerable nation for a cyber threat crime (Anand 2012). This essay contained a brief discussion on the threats that are associated in cyberspace and how it can influence the nations security. Regarding the issues that are related to the national security, many perspectives shall be studied. This essay has discussed in brief about the ways in which cyber crimes should be deterred and prohibited and what appropriate steps are required to take for the restriction of such an application of threats. However, the concern related to the security of the nation from the perspective of cyber crime remains unclear and unsolved mystery. It is therefore advisable for the nations to create a more stringent set of laws for the protection of the nation from cyber threats. References: Adger, W. Neil, Juan M. Pulhin, Jon Barnett, Geoffrey D. Dabelko, Grete K. Hovelsrud, Marc Levy, . Oswald Spring, and Coleen H. Vogel. "Human security." (2014). Amar, Paul.The Security Archipelago: human-security States, sexuality politics, and the end of neoliberalism. Duke University Press, 2013. Amundson, Ronald, Asmeret Asefaw Berhe, Jan W. Hopmans, Carolyn Olson, A. Ester Sztein, and Donald L. Sparks. "Soil and human security in the 21st century."Science348, no. 6235 (2015): 1261071. Anand, Sudhir. "Human security and universal health insurance."The Lancet379, no. 9810 (2012): 9-10. Benedek, Wolfgang, Christopher Daase, Vojin Dimitrijevic, Petrus van Duyne, and Petrus van Duyne, eds.Transnational terrorism, organized crime and peace-building: human security in the Western Balkans. Springer, 2016. Chandler, David C.Freedom vs necessity in international relations: human-centred approaches to security and development. Zed Books, 2013. Chandler, David. "Resilience and human security: The post-interventionist paradigm."Security Dialogue43, no. 3 (2012): 213-229. Johns, Luke, Huong Le Thu, Roland Benedikter, Stefanie Kam, Claire Duncanson, David Morgan, Daniel Golebiewski et al. "A Critical Evaluation of the Concept of Human Security."Canterbury: University of Kent(2014). Kaldor, Mary, Mary Martin, and Sabine Selchow. 2016. "Human Security: A New Strategic Narrative For Europe". International Affairs 83 (2): 273-288. Mach, K., and M. Mastrandrea.Climate change 2014: impacts, adaptation, and vulnerability. Vol. 1. Cambridge, New York, NY: Cambridge University Press, 2014. Martin, Mary, and Taylor Owen.Routledge handbook of human security. Routledge, 2013. Paris, Roland. 2001. "Human Security: Human Paradigm Of Hot Air?". International Security Volume 26 (Issue 2): 87 - 102. Pietsch, Juliet. 2010. "Human Security In Australia: Public Interest And Political Consequences". Australian Journal Of International Affairs 64 (2): 225- 244. doi:10.1080/10357710903544361. Reardon, Betty A. "Women and human security: A feminist framework and critique of the prevailing patriarchal security system." InBetty A. Reardon: Key Texts in Gender and Peace, pp. 109-128. Springer International Publishing, 2015. Schirch, Lisa.Conflict assessment and peacebuilding planning: toward a participatory approach to human security. Boulder and London: Kumarian Press, 2013. Tripp, Aili Mari, Myra Marx Ferree, and Christina Ewig, eds.Gender, Violence, and Human Security: critical feminist perspectives. NYU Press, 2013. White, Hugh. 2012. "The Idea Of National Security: What Use Is It To Policymakers?". National Security College Occasional Paper, 10 - 20. "Cybersecurity Strategy: A Primer For Policy Makers And Those On The Front Line". 2016. JOURNAL OF NATIONAL SECURITY LAW POLICY 4 (27): 29 - 32. https://heinonline.org/HOL/License. Chang, Amy. 2014. "China's Cybersecurity Strategy". Warring State, 27 - 32. Kuehn, Andreas.Extending cybersecurity, securing private internet infrastructure: The US Einstein Program and its Implications for Internet Governance. Springer Berlin Heidelberg, 2014. Langer, Ralph. 2011. "Stuxnet: Dissecting A Cyberwarfare Weapon". Focus, 49 - 51. Singer, Peter W., and Allan Friedman.Cybersecurity: What Everyone Needs to Know. Oxford University Press, 2014. Tor, Uri. 2015. "Cumulative Deterrence As A New Paradigm For Cyber Deterrence". Journal Of Strategic Studies 19 (38): 15 - 19. doi:10.1080/01402390.2015.1115975.