Sunday, May 24, 2020

Identity The House on Mango Street by Sandra Cisneros

Race, Class, and Culture: How it affects your Identity Identity is defined as â€Å"the fact of being who or what a person or thing is† (Oxford University Press). Personal identity deals with questions that arise about ourselves by virtue of our being people. Some of these questions are familiar that happen to all of us every once in a while: What am I? When did I begin? What will happen to me when I die? There are many different categories that define us as people (Olson). Our Race, Class, and Culture define who we are so much that it affects how we should live our life. Race Race is a classification system used to categorize humans into large and distinct populations or groups by anatomical, cultural, ethnic, genetic, geographical,†¦show more content†¦She feels ashamed of her surroundings. People that experience this often feel the same way. However, some people strive to make a better place for the people that still live there, so they don’t have to live the same way. I feel as you get older, you have a greater appreciation for your family, no matter where you are brought up. I find myself thinking about people I grew up with, what has come of them, and most have done better for themselves. Culture Culture is a set of ideals and values about life that are widely shared among people and that guide specific behaviors. Differences, as well as similarities, can be seen when comparing world cultures. We communicate with each other, we feed ourselves with food, and when we sleep we often dream. However, we speak different languages, eat different types of foods, and dream different ways. We call these cultural differences. What causes them is not always obvious to the ordinary person (Nancy). I feel culture is what really sets us apart from each other and what makes us unique as individuals and families. In â€Å"The House on Mango Street†, the young daughter desires to leave her neighborhood as a way to escape her Mexican-American culture. One of the cultures which are most powerful in this story is the Hispanic culture that Esperanza and all of her neighbors emerge from. Her Hispanic culture has such a powerful influence on herShow MoreRelatedEssay on The House on Mango Street and the Style of Sandra Cisneros1669 Words   |  7 PagesThe House on Mango Street and the Style of Sandra Cisneros Clearly, Sandra Cisneros writing style is one representative of a minority voice. Her amazing style allows her readers to take an active part in the minority experience. For this reason, I believe Cisneros has had a lot of influence and success in the status of minority writers, especially in the canon of what is read and taught in schools today. But, more than anything, Cisneros has shown that liberation can come through creativityRead More Comparing Women in House on Mango Street and Woman Hollering Creek1645 Words   |  7 PagesEthnic Identity of Women in House on Mango Street and Woman Hollering Creek  Ã‚      The novels The House on Mango Street (Cisneros 1984) and Woman Hollering Creek (Cisneros 1992) relate the new American through the eyes of Cisneros. The women in both novels are caught in the middle of their ethnic identity and their American identity, thus creating the New American. Cisneros moved between Mexico and the United States often while growing up, thus making her feel homeless and displaced (JonesRead MoreThe House On Mango Street Essay746 Words   |  3 PagesChicago where everyone knows everyone and people are afraid to go near this neighborhood because, people thought they would get jumped or hurt. This neighborhood is known as Mango Street, and there is a young girl named Esperanza(Sandra Cisneros) that lives in a old broken down home. This is her story in The House on Mango Street, Esperanza is a young Latina writer, inventing for herself who and what she will become . Esperanza did not have many friends, was shy, and very sensitive but her love to writeRead Mor eAnalysis Of The Movie The House On Mango Street Essay868 Words   |  4 PagesPadilla Adv L.A. 18 August 2016 The House On Mango Street In the novel â€Å"The House On Mango Street,† Sandra Cisneros shows the themes identity, family, and the house, through Esmeralda’s experiences. She demonstrates the theme of identity by telling the story of Esperanza, the main character, and how she finds out what identifies her from others. Cisneros reveals that Esperanza’s family helps her feel like she belongs to the house on Mango Street and not left out. The house is an important theme of theRead More What a Home Really is in The House on Mango Street Essays1239 Words   |  5 PagesWhat a Home Really is in The House on Mango Street â€Å"Home is where the heart is.† In The House on Mango Street, Sandra Cisneros develops this famous statement to depict what a â€Å"home† really represents. What is a home? Is it a house with four walls and a roof, the neighborhood of kids while growing up, or a unique Cleaver household where everything is perfect and no problems arise? According to Cisneros, we all have our own home with which we identify; however, we cannot always go back toRead More The House On Mango Street: Seeking Independence Essay1016 Words   |  5 Pages In the book The House on Mango Street, author Sandra Cisneros presents a series of vignettes that involve a young girl, named Esperanza, growing up in the Latino section of Chicago. Esperanza Cordero is searching for a release from the low expectations and restrictions that Latino society often imposes on its young women. Cisneros draws on her own background to supply the reader with accurate views of Latino society today. In particula r, Cisneros provides the chapters â€Å"Boys and Girls† and â€Å"BeautifulRead MoreAnalysis Of The House On Mango Street1051 Words   |  5 Pages Analysis of The House on Mango Street By: Sandra Cisneros Carley Deklotz GWSS:1001:0A02 Professor Sue Stanfield The environment people grow up in can have a huge impact on their identity and who they become. In the novel, The House on Mango Street, the author tells a series of short stories through the eyes of Esperanza Cordero. Esperanza is a young Latina growing up in Chicago, and through her stories shows the reader her environment and how in affects her. Things like gender roles, sexualRead MoreThe House On Mango Street Analysis1008 Words   |  5 PagesIn the novella, The House on Mango Street by Sandra Cisnero, Esperanza learns the importance of not forgetting her roots. Esperanza, a young Latina girl and the novel’s main character wants to change her name and move far away from Mango Street. The reason being is so that she can play a bigger role in society, but she knows that she cannot deny her heritage and where she came from. Cisnero shows that a person’s past and experiences can help shape and form who they are. She displays this by makingRead MoreThe House on Mango Street600 Words   |  3 PagesThe short story by Sandra Cisneros revolves truly around the tittle â€Å"The House on Mango Street† and how her family moved from places to places to get there. The recollection of the street names her family lived on and how every time they moved â€Å"there’d be one more of us† added to the authors focus of emphasizing how important the word â€Å"home† meant to her throughout the story. The family of six included Mama, Papa, brothers Carlos and Kiki, and sister Nenny. According to the author’s memory, sheRead MorePowerlessness In Sandra Cisneross The House On Mango Street846 Words   |  4 Pagesperson, far away from her dreary life. Sandra Cisneros establishes that many young girls within the Hispanic culture represented in The House on Mango Street are forced into roles they do not wish to take, resulting in a loss of identity and ultimately, a sense of powerlessness in the girl without anyone to show her how to be powerful. When Esperanza experiences awful situations somewhere she has happy childhood memories, it begins the loss of her childhood identity. Esperanza first sees Sally experiencing

Wednesday, May 13, 2020

Alexander the Second and the Title Tsar Liberator Essay

Alexander the Second and the Title Tsar Liberator In the 19th Century, Russia had no zemstva, very little education, industry and railway building, a biased judicial system and very few freed peasants. Czar Alexander II, who succeeded Nicolas I in 1855, went some ways to remedying these deficiencies through a series of reforms. Alexander II became the great modernizer of Russia, walking a delicate line between preserving Russias Slavic identity and enabling its people to benefit from Western advancements. For this reason he was known to some as the ‘ Czar Liberator’. However, indeed he was a liberator in name only. Alexander II initiated substantial reforms in education, the government, the†¦show more content†¦For the educational reform, the Czar adopted a more liberal education. Censorship was relaxed, the universities were given freedom and independence, and more Western ideas were introduced to scholars and students. People were more open-minded and became to demand more under these ‘liberal’ reforms. Though Czar Alexander II returned to reactionary rule when an attempt was made to assassinate him in the 1860s, he did turn once more to reform in 1880. He made plans to set up a General Commission which would include representatives from the Zemstva. This would not be a parliament but would be a ‘consultative voice’ when the Czar required it. But this was an attempt towards a parliamentary government. Superficially, Czar Alexander II seemed to be so liberate from his series of reform. Yet, notwithstanding these measures, it would be wrong, as is sometimes done, to describe Alexander II as a liberal. He was in fact a firm upholder of autocratic principles, sincerely convinced both of his duty to maintain the God-given autocratic power he had inherited and of Russias unreadiness for constitutional or representative government. For the emancipation of serfs, it was actually essential more than out of the Czar’s willingness. The bulk of the Russian population, about 80%, were the peasants and serfs. Alexander II recognised that emancipation was vital. FreedShow MoreRelatedOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesfollowed the Great War, the victorious European powers appeared to have restored, even expanded, their global political and economic preeminence only to see it eclipsed by the emergence of the Soviet and U.S. superpowers on their periphery and a second round of even more devastating global conflict. The bifurcated international system that resulted from the cold war standoff extended the retreat of globalization, but nurtured the liberation of most of humanity from colonial rule. The collapse

Wednesday, May 6, 2020

Definition of crime Free Essays

Many scholars attempted to distinguish between criminology and criminal justice (Regoli, Poole, and Miracle 1982;Williams, McShane, and Wagoner 1995) and after several attempts and debates, Greene, Bynum and Webb   1984 became successful in evaluating criminology and criminal justice through conduct of researches and surveys which lead to reveal of following facts. Criminology carries a larger concept of theoretical frame which includes sociology of law.   Theories in this subject are called as criminalization and not theories of crime. We will write a custom essay sample on Definition of crime or any similar topic only for you Order Now It is a study of scientific theory for uncovering truth.   Much of these theories enable the understanding of criminal mindset through the application of theories of criminology which disclose human nature in a closet where all kind of people are part of and live in society. â€Å"Theory is the foundation of criminology and of criminal justice, and we study theory to know whey are doing what we do† (Bohm 1985) [1] Theory carries a great significance as researched theory is conclusive evidence of tested science. All researches are based on theory and verification is processing of testing theories each bit, once piece at a time in studying criminology. In classical criminology, an independent variable which is motivation to commit crime is taken leniently and classical criminologists use variables such as changes in law which affects crime rates. Positivist criminology is more concerned with prediction than explanation. Causes that have lead to commit crime is more important in the study of etiology for positive theorists. Criminology is much older and larger than criminal justice. Criminology carries natural science whereas criminal justice practices social science model in disciplines such as business, arts and humanities.   Criminology is heavily dependent on philosophy, psychology and sociology whereas criminal justice seeks help from police science or investigative science.   Criminology has many theories which are in conflict with one another, whereas criminal justice has only few theories. A general definition   of crime would be, it is an act in violation of legally framed rules for which courts impose punishment such as death, fine or removal from office or imprisonment. Measuring crime as in practice is in three measurements. (1) Uniform Crime Reports (UCR) wherein police records up to date statistics of crimes. In 1994 13.9 million UCR index crimes were recorded with police. These are further segregated into cities, states and county and accordingly law enforcement agencies are activated. (2) National Crime Victimization Survey (NCBS). In 1994 there were 42 million victimizations recorded with NCBS   (3) Self Report Studies are designed in a particular manner that individuals would participate and reveal violations of law and illegal activities. Conclusion Present day environment unfortunately carries variety of crimes viz., social, moral, unethical and even forbidden acts under all legal frames of Acts and promulgations. Current situation requires the application of both criminology and criminal justice theories to the core as a responsibility for courts in order to deter crimes and to save the code of justice at all levels. References Criminology as a field of study Accessed 23 October 2007 http://faculty.ncwc.edu/TOCONNOR/301/301lect01.htm Definition of crime Accessed 24 October, 2007 http://www.totse.com/en/politics/political_spew/crime.html Books Authors: Ellen G.Cohn, David P.Farrington, Richard A.Wright Title : Evaluating criminology and criminal justice Page No.113 accessed on 23 October 2007 Measuring crime Accessed 24 October, 2007 http://www.csudh.edu/dearhabermas/crimlect07.htm How to cite Definition of crime, Papers Definition of Crime Free Essays Definition of Crime According to the dictionary, crime is â€Å"an action or an instance of negligence that is deemed injurious to the public welfare or morals or to the interests of the state and that is legally prohibited† (Lexico publishing, 2012). It is considered to be a crime when an unlawful act as being committed that society agreed upon punishment for this act that has been committed. Society agreed upon crimes could range from littering, jaywalking, motor vehicle violations, white-collar crimes, or even the more violent crimes. We will write a custom essay sample on Definition of Crime or any similar topic only for you Order Now The crime control model is one of the most common models to show how society determines which acts are considered criminal. The crime control model basically stresses the efficiency of arrest and conviction of criminal offenders. In the late 1960s a law professor by the name Herbert Packer introduced the crime control model to the academic community at Stanford University within his state of criminal justice presentation. The control model is often referred to as the Packer’s crime control model. The due process model is another common use model to show how society determines which acts are considered criminal. The due process model basically shows the individual rights at all stages of the justice system processing. The due process model helps to ensure that innocent people are not convicted of crimes that they did not commit. In America this is one of the essential parts of the justice system. Government Structure of the Criminal Justice System There are many different agencies that the criminal justice system works with such as: federal, state, and local governments. With the criminal justice system working with so many agencies many times creates problems determining whose jurisdiction the crime was committed in. All the agencies that are involved in the criminal justice system are by law required to work together to ensure that the criminal justice system is working properly. Choice Theories Choice theories are also known as rational theories. The choice theories are a type of theory to where an individual feels that there is no other choice but to commit a crime. With choice theories the individual cannot see any other way around their predicament without committing a crime. The individual is completely unable to find a solution to the problem at hand on their own. An example of choice theories might be an individual that has lost their job and can no longer provide food for their family sees no other way to provide food for their family except for committing a crime by stealing the food to feed their family. Components of the Criminal Justice System There are many different components that make up the criminal justice system which are the police, the courts, and corrections. All the agencies that make up the criminal justice system must work together to ensure that the criminal justice system is fire, impartial, professional, and have integrity. The Police Departments are the individuals that are responsible for enforcing laws, investigating crimes, making arrest, maintaining public order, and at times providing emergency services. The court systems are responsible for ensuring that individual receive fair and impartial trials, determine if the individual is innocent or guilty, upload the written all, determine the type of sentence the guilty will receive, ensuring fairness, and protecting the rights and freedom of the individual. Corrections are responsible for carrying out the sentences that the court system placed on the individual and provide safety and humane condition for all offenders. Goals of the Criminal Justice System There are five goals of the criminal justice system which are deterrence, incapacitation, retribution, rehabilitation, and restoration. Basically the criminal justice system is trying to put the fear of punishment and people in hopes of persuading the individuals from committing any more crimes. The second goal of the criminal justice system is incapacitation which is basically the idea that if an individual is incarcerated for their crime then they will not be able to commit another crime. The third goal is retribution which replies that when retribution for a crime is provided justice will prevail. The fourth goal of the criminal justice system is rehabilitation which believes that by correcting the behavior by incarcerating an individual and providing the individual with new skills will help with returning back to society. The fifth and last goal of the criminal justice system is restoration, which tries to repair the damage that the individual had done and return them back to society. Thoughts on the Criminal Justice System I believe that today’s criminal justice system has way too many flaws in it, but overall is a good system to have. Taking a look back in history to the first criminal justice system that was put into place there has been a great deal of advancements made to improve the criminal justice system to what we have today. So the flaws in the system we are using now can only improve over time. I do not believe that there is a flawless system might very anywhere, so the system we are using now is better than having no system at all. References Demand media, I. (2012). ehow. Retrieved April 5, 2013 from http://www. ehow. com/about_6292484 _choice-related-criminal-justice-system-. html Lexico Publishing, L. (2012). Dictionary. com. Retrieved April 5, 2013 from http://dictionary. reference. com/browse/crime Schmallager, F. (2011). Criminal justice today: an introductory text for the 21st century (11th ed. ). Upper Saddle River, NJ. Pearson/Prentice Hall How to cite Definition of Crime, Papers

Tuesday, May 5, 2020

Mobile Technology Pro and Con of California Smartphone Bill

Question: Discuss about the Pro and Con of California Smartphone Bill? Answer: Introduction In the modern era of information and communication technology individual are habituated to using computer and its application. But the mobile development and its application are used rapidly in the new growing sectors (Griffey 2012). There is an international positive influence of mobile technology. Thus implementing an effective mobile technology developed as well as developing countries are providing an effective service. Mobile technologies as well as applications are running on a small hand device which is easy to use, movable and accessible from any place and anywhere. It is observed that many people are using this technology to use the internet to contact family and friends, create and edit documents, for file content management, for entertainment and document handling (Cragg and Chapman 2013). On the other manner, it has been seen that to function in a better ways, Information technology uses a broad spectrum of software and hardware solutions that help an organization to anal yze, evaluate and gather data and information in well-organized manner. Thus, present report has discussed the government assesses and encryption of data and information on electronic devices such as mobile. This sector also argued about the pro and cons of California Smartphone Bill. Mobile and encryption technology:- The demand for assessing to organization data and information through mobile technologies include the Apple iPad and iPhone, device running Window 7 mobile and Google android or using RIM Blackberry is raising customer behaviors and preferences spill over the organization workforce. In addition, with the help of mobile technology people use company resources and data without being fixed to a single area. On the other hand, an effective mobile technology helps an organization to set up new clients and also check stock and price availability. Mobile technology contains the mobile infrastructure, GPS tracking solution, mobile hardware and software, etc. (Cragg 2011). Protection of data and information is the highest property of an organization, because with help of businesss data and information other organizations or competitor build better market and gain better profit. Thus to protect client data and information, Most of IT technology organization such as Apple, Google and Samsung implement better security policies in their devices. Moreover, to implement better security and protect individuals data in more convenient manner organization use encryption software or encryption algorithm to scramble the information and make it complex or unreadable. The data and information transmitted or stored and when someone wants to view information or data they use the password or pass key to decrypt or unlock it (The Huffington Post 2016). Apple, Google and other mobile technology strategies in data protection Android by Google and IOS of Apple hold approximately more than 96 percentage of Smartphone in an international market and they implement most effective security policies in their devices. As per the Apples website, the devices running new version and IOS8.0, the personal information and data including messages, photos, contacts, iTunes, call history, remainder, and notes is placed under an effective protection of individuals password (macobserver.com 2016). On the other hand according to Apple and Google, they implement an effective data protection acts in its devices. As per their view, they make their devices in such a manner that no one can access their devices without a pass code. In addition, if an individual can forgot their password then manufacturer cannot retrieve their password. California smart phone Bill California implements new smart phones bills, as per the bill Existing rule and regulations requires that a Smartphone or mobile devices that is built on after 1st July 2015 and put up for sale in California after that date, contains an effective technology solutions at the time of sale (digitaltrends.com 2016). It contains the hardware, software and both hardware and software that once started and communicated to the mobile phone devices can make inoperable the effective features as explained of the Smartphone of the unlawful clients. As per this new smart phones bill, a mobile device or Smartphone that is built on or after 1 January 2017 and put on the market in California to be able of being unlocked and decrypted by its operating system and manufacturer. The bill would, apart from the terms as provided, subject a lessor or seller that knowingly not fulfill to follow with this requirements will lead to a civil punishment of $2500 for each mobile phone device or smart phone leased or sold (leginfo.legislature.ca.gov 2016). The bill would proscribe a lessor or seller who has paid on to buyers of phone. In addition,, this act would authorize only a district attorney and Attorney General to bring a civil suit to implement these provisions. Should such a bill pass, it would, similar to the New York bill, influence both Google, and Apple. Android and iOS have default encryption settings that don't permit the organizations to get to secured client telephones. Beginning with iOS 8, Apple stopped putting away encryption keys for iOS gadgets, making it unthinkable for the organization to open substance on password ensured gadgets under police demand (rt.com 2016). In a discussion with Ars Technica, Cooper contended that giving neighborhood law authorization authorities the techniques to get to decoded or unencrypted cell phones utilizing warrants to battle unlawful activity like human trafficking was not the same as giving the CIA or NSA free get to. "In case, a terrible gentleman country can get a quest record for your home, bank, and get a court order for pretty much anything, As of late, a father of six was killed in Evanston, Illinois. City of Evanston, Police trust that before his murder, the subject was robbed of a huge total of cash. There were no observers to or observation footage of the murdering. The deceased used iPhone 6 and Samsung Galaxy S6 Edge running Google Android. Cook County prosecutors provided Google and Apple with legal warrants to open the Smartphone, trusting that pertinent proof may be put away on them. Google and Apple answered, in substance, that they proved unable, in light of the fact that they didn't know the client's password. Data that may be vital to unraveling the murder, accordingly, had successfully kicked the bucket with the casualty. His crime stays unsolved. His executioner stays on the loose (cnet.com 2016). It is not hyperbole to speak that starting in September 2014; Americans yielded a measure of their insurance against ordinary violations to Google's and Apple new encryption arrangements, before the progressions, neither organization, as far as anyone is concerned, ever proposed that their encryption keys, held by the organizations, were defenseless against hacking or robbery. California Smartphone Bill includes; a) As per the Federal Communications Commission, cell phone theft now represents approximate thirty to forty percent of thefts in numerous significant urban areas the nation over. A large portion of these thefts regularly turns vicious with some subsequent in the loss of life. (b) Consumer Reports extends that approximately 1.6 million Americans were exploited for their cell phones in the year 2012. (c) As per the time New York Times, one hundred thirteen cell phones are stolen or lost each moment in the US (FBI 2016). (d) As per the County of San Francisco and the Office of the District Attorney for the City in the year of 2012, more than fifty percent of all thefts in San Francisco included the theft of semaphores and mobile devices. (e) Thefts of cell phones in Los Angeles expanded twelve percent in 2012, as indicated by the Los Angeles Police Department. (f) As per the press report, the global trafficking of stolen cell phones by composed criminal associations has become exponentially as of late as a result of how gainful the exchange has gotten to be. (g) With a specific end goal to be compelling, antitheft innovative arrangements should be universal as thieves can't recognize those cell phones that have the arrangements empowered and those that don't. Accordingly, the technical arrangement ought to have the capacity to withstand a hard reset or working framework minimize, come reequipped, and the evasion setting of the arrangement should be to motivate the buyer to empower the arrangement amid the introductory gadget setup. Buyers ought to have the choice to certifiably choose to cripple this insurance. However, it must be clear to the purchaser that the capacity the customer is choosing to impair is planned to keep the unapproved utilization of the gadget. Pro and cons of California mobile Bill A California administrator has presented the US' second state bill went for forcing indirect accesses that would permit law requirement powers to get to scrambled gadgets, for example, cell phones. The bill, AB 1681, presented by California state get together part Jim Cooper, is like a bill re-presented in New York State. The fundamental contrast is that the New York bill is gone for battling terrorism, the California bill was exhibited as a way to battle human trafficking. The main pro of implementation of California Mobile Bill is a security risk. Security advocates have criticized such legitimate endeavors as in fact unworkable, and Apple CEO Tim Cook has contended that secondary passages went for permitting law authorization access would definitely be misused by malignant performers. "In the event that you stop or debilitate encryption, the general populations that you hurt are not the people that need to do awful things," he said in a meeting last November (Thetelecomblog.com 20 16). "It's the great individuals. The other individuals know where to go." He said the organization stays resolved to "end to end encryption and no secondary passages" (Apple 2016). Google has likewise advanced secure interchanges, for example saying in 2014 it would rank destinations with HTTPS encryption higher in list items. The state endeavors mirror a more extensive strain between governments, a significant number of which are pushing for restrictions on encrypted communication, and cell phone producers, for example, Google and Apple, which say such impediments hazard making security vulnerabilities. In March of a year ago Google official executive Eric Schmidt anticipated at a gathering that administration endeavors to breaking point encryption would come up short, including, "we don't know how to fabricate a trap entryway in these frameworks which are just accessible to the great folks." Industry eyewitnesses have estimated that the California and New York state laws would be unlawful under US government procurements that prohibit states from forcing exorbitant hindrances on interstate trade. If this bill is implemented then data confidently and privacy act not be followed in an effective manner. On the other hand, it has been seen that implementation of this will is not easy because of an organizati on (fpf.org 2016). Also, as per the data protection act it has been seen that without permission of an individuals organization as well as the government has no authority to access data and information (Jay and Hamilton 2003). Also, Google and Apple argued that it is not easy to make such type of hardware or encryption technology to access data and information. Therefore, as per my opinion regarding California Smart phone bill, it has been said that implementation of this will not secure individuals data and information. In addition, Government said that they use this law to track individuals location, but it may also hamper individuals rights and ethics. On the other manner, most of an individuals do not want their information to any one thus in such a manner if government implements this bill in their countries then they do not obey individuals act. Conclusion Thus taking into the above consideration, giving special access to California law authorization and insight offices will be unsafe, as opposed to support to national security. Regardless of worries of going dark the consistent increment of smart phones overall furnishes these organizations with a continually developing measure of important information furthermore, meta-information to use in distinguishing and seeking after focuses of investigations. References Apple,. 2016. "Apple". https://www.apple.com//?afid=p238%7CsJeCN3FhD-dc_mtid_1870765e38482_pcrid_107649348127_cid=aos-us-kwg-brand-slid-. Cragg, P.; Chapman. 2011. Mobile Technology. IGI Global. Cragg, Paul, and Prue Chapman. 2013. Mobile Technology. Hershey, PA: Idea Group Pub. FBI,. 2016. "Going Dark: Encryption, Technology, And The Balances Between Public Safety And Privacy". https://www.fbi.gov/news/testimony/going-dark-encryption-technology-and-the-balances-between-public-safety-and-privacy. fpf.org,. 2016. "Fpf.Org". https://fpf.org/wp-content/uploads/SwireCrypto070715.pdf. Griffey, Jason. 2012. Mobile Technology And Libraries. Jay, Rosemary, and Angus Hamilton. 2003. Data Protection. London: Sweet Maxwell. leginfo.legislature.ca.gov,. 2016. "Leginfo.Legislature.Ca.Gov". https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201320140SB962. The Huffington Post,. 2016. "California's 'Kill Switch' Bill Fails". https://www.huffingtonpost.com/entry/california-kill-switch-bill_n_5209335/. cnet.com,. 2016. "Cnet.Com". https://www.cnet.com/news/california-wants-to-ban-encrypted-smartphones/. digitaltrends.com,. 2016. "Digitaltrends.Com". https://www.digitaltrends.com/mobile/california-encryption-bill-law/. macobserver.com,. 2016. "Macobserver.Com". https://www.macobserver.com/tmo/article/california-bill-would-ban-encrypted-smartphones. rt.com,. 2016. "Rt.Com". https://www.rt.com/usa/264801-california-senate-smartphone-warrants/. Thetelecomblog.com,. 2016. "California Follows Suit, Proposes Anti-Encryption Smartphone Bill Thetelecomblog.Com". https://www.thetelecomblog.com/2016/01/22/california-follows-suit-proposes-anti-encryption-smartphone-bill/.