Tuesday, March 24, 2020

Terrorism, Counter

Elements of the US Standard Intelligence Producers Cycle Intelligence cycle denotes all the activities that are within the intelligent cycle niche. Usually, these undertakings include processes that guarantee useful decision-making for a given information. As the name suggests, Intelligence Cycle is a set of processes that includes planning, data analysis and evaluation, and integration and information dissemination (Central Intelligence Agency 2008). The five elements of the US Standard Intelligence Producers Cycle are discussed below.Advertising We will write a custom essay sample on Terrorism, Counter-Terrorism, and Intelligence specifically for you for only $16.05 $11/page Learn More Planning and direction Planning is the primary sphere of all that takes place within Intelligence Cycle. All the processes begin with planning, and this shapes the overall framework of all that follows. Planning leads the personnel to execute a particular job in a proced ural, programmed way that gives direction to what is needed, and that which must be achieved (Central Intelligence Agency 2008). Collection Intelligence Cycle personnel collect information by any means necessary from all the sources available. The personnel rely on the information found from newspapers, magazines, television, and radio broadcasts. Other pieces of information are usually attained by means of secret recording devices that help to authenticate their sources. Pictures taken by CCTV and satellites are usually part of this process. Processing The personnel rely on the information collected so that it can be processed for interpretation. It is usually upon interpretation that the information can gain access and form part of the Intelligence Report. The personnel usually document or encrypt the information for evaluation and analysis. Analysis and production Here, the personnel consider the information so far achieved and determine its compatibility while considering the ke y policy issues inherent within. The personnel assess any eventuality that could be attached to a particular piece of information or that might affect the US public interest in one way or the other. Dissemination Dissemination is usually the final step where the personnel give their final documented analysis and forward it to a policy maker. Dissemination follows analysis where learning outcomes of the original question are decoded, after which the whole process begins again for finer information synthesis. Classes of spies Sun Tzu forwarded five classes of spies include local spies, inward, converted, doomed, and surviving spies (The Internet Classics Archive 2005). Tzu opines that when these classes of spies are at work, the secret system becomes robust, and is beyond reproach.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Local spies Local spies take the services of local inhabitants of a region into consideration. The intelligence may advance its collaboration with the indigenous people in an enemy country and win the locals by kind treatments with the aim of using them as spies to volunteer fruitful information. Inward spies Inward spies consider the services of officials in the enemy region by luring them to volunteer valuable information within their system. Usually, worthy officials who have fallen out with the system are very formidable individuals to engage because they may feel aggrieved, and would naturally augur well to play a role in the enemy court. Converted spies Intelligence may seek to convert enemy spies to play on their side while volunteering very insightful information since they are within the system. The intelligence, according to Lieberman (2012, p. 22), has a duty to win over these individuals by any means necessary including bribes and liberal promises capable of detaching them from the enemy side. It also involves inducing them to relay f alse information to the system they work for to weaken the enemy (The Internet Classics Archive 2005). Doomed spies This category involves a lot of deception to hoodwink the enemy side by orchestrating stage-managed acts to reveal the strengths and weaknesses of the enemy side. The intelligence, therefore, capitalises on their weaknesses to deal with the enemy a big blow. Surviving spies This category consists of individuals attached to the enemy side to volunteer valuable information, which is usually confined within the system. Such individuals must be of keen intellect, though outwardly presumed as fools but with passion and commitment to deliver their presumed system to the enemy. The difference between ‘Covert Action’ (CA) and ‘Clandestine Operations’ (CO) Each of these actions entails a planned, coordinated, and well-executed operation that seeks to conceal the identity of the sponsors or nature of the operation (Daugherty 2004, p. 25). They have a ne t political effect with a possible ramification in the police force, the military, or the intelligence service. Covert Actions undertake their operations surreptitiously without necessarily revealing their sponsors to that effect while Clandestine Operations strive to conceal the nature of the operation (Daugherty 2004, p. 30). However, Covert Action and Clandestine Operations, according to Stone and Williams (2015, p. 7), are distinct in their own separate ways. While Covert Action (CA) emphasises on the concealment of the identity of the sponsor of the operation, Clandestine Operations (CO) instead has information on its actions or operations concealed. Moreover, while clandestine seeks to mystify its operations, covert seeks to deny its operations.Advertising We will write a custom essay sample on Terrorism, Counter-Terrorism, and Intelligence specifically for you for only $16.05 $11/page Learn More Clandestine operation, therefore, differs from cove rt action due to its emphasis on concealing the details of the operation while covert action seeks to obscure the identity of the sponsor (Stone Williams 2015, p. 10). The killing of Osama Bin Laden falls under clandestine operation since the emphasis was placed on concealing the details of the operation while the sponsors were known to be the US Government. In the operation that eliminated Bin Laden, the operations of the Seal Team Six were not revealed even after the successful killing of Osama. The three main forms of ethics discussed in weeks 10 and 11 Ethical and moral intelligence seeks to nurture principles of just intelligence by creating theories capable of answering many ethical concerns while emphasising on the classical metaphysical laws developed over the years. No clear theory seems to conjoin community intelligence studies to the just war theory as provided for in the military ethics. The three main forms of ethics discussed in weeks 10 and 11 consist of fundamental freedoms, rights, and utilitarianism. Utilitarianism, as Lyons (2011) notes, defines the priorities of principles and explore whether such principles conflict with those of others in practice or not. Under utilitarianism, rights and freedoms ideologies are applicable as a single comprehensive concept of justice that assents to fairness and equal treatment for all without seeking to put individual interest above all others in any way. These ethical principles are applicable in a broad spectrum and significance in ensuring that the law does not apply by default to certain individuals.  These ethics, therefore, present the image of justice and equity concept that aim at political liberalism among individuals and within their societies without necessarily infringing on others’ freedoms or liberties. As Richardson (2011) notes, intelligence’s concept of justice as fairness envisages a society of free citizens with equal rights whose main desire is to work in harmony withi n a democratic and free economic system. Intelligence account of fair and equal treatment for all is a version of political liberalism that concerns the legitimate application of political power in an egalitarian (Taylor 2008, p. 72). As noted herein, intelligence’s pedagogy of fair and equal treatment for all is a demonstration of how enduring unity is achievable even under the multifaceted worldviews that democratic institutions are capable of offering (Stanford Encyclopedia of Philosophy 2007). The security of any person at any given moment is not subject to bargain. When the security of a society is compromised, individuals live in peril and fear of being victimised by circumstances. Security brings forth life, happiness, and abundance that makes man complete.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since everything depends on it, a society will always pursue security for its people to thrive. Intelligence’s seeks to strengthen the laws of principles that embody the foundations of fair and equal treatment for all. The principle, to open-minded foreign policy that it seeks to mould aims at explaining how a peaceful and tolerant societal order could be productive in developing individuals regardless of their religious creeds or political affiliations. Individuals with a utilitarian mind-set naturally agree that all that is good is by virtue of utility, which in turn points to an individual’s welfare and societal wellbeing (Stanford Encyclopedia of Philosophy 2012). The concept of security delves much on basic common good, and holds that the wellbeing of individuals consists of preference while specifying right action when it comes to satisfying and justifying such preferences. Notably, fair and equal treatment for all suffices as the best alternative in building str ong institutions. Usually, individuals’ welfare consists of community, happiness, wealth, self-development, and self-worth (Stanford Encyclopedia of Philosophy 2013). Accordingly, each of these elements is either a means to concomitant or preference, and this linkage with preference make individuals accountable as part of the society. Given the absurd nature of the difficulty in gauging individuals, White (2012) opines that this association with preference makes utilitarian account for fair and equal treatment of all formidable choices in building stronger communities. Intelligence concept in these presumptions presupposes a hypothetical action where all individuals have the capacity to explore their lifelong sought after dreams since by its very nature of equal opportunities individuals are limitless in their lives. The just war theorists hold that resorting to war is not necessarily to counter aggression, but simply as a last resort. While critics of the just war theory hol d that the concept of war as a last resort would not recognise any type of war as just. Ideally, there can never be factual attempts to avoid war, especially in the face of such extreme aggression. Under these schemes of things, Hinnebusch (2007, p. 13) notes that after all reasonable attempts have been made to reach out to the warring forces, it would be reasonable to employ the rival force capable of ending the conflict. The only problem perhaps is to decide who is entrusted with the making of such a decision. However, once this decision is reached, questions abound whether all the possibilities to avoid war might have been met or not will always suffice. The war on terrorism in particular has raised such concerns. It is because of such considerations that Washington attempted to reach out to the Arab world severally (Lieberfeld 2005, p. 16). Given the prospects of a terror network such as Al-Qaeda, it would be a waste of time extending diplomatic ties to resolve the conflict dipl omatically, hence the inclination to apply force in pursuing its perpetrates. Under the just war theory, acts of vengeance cannot be committed to humanity while the rest of the world watch. For example, in the case of Iraq’s aggression in Kuwait, someone had to come and assist. Naturally, the just war theory holds that an ally of a country under attack is justified to intervene and even join forces should conditions file past the morally and ethically inexcusable baseline. Therefore, the basis of US’s joining the war was in the spirit of redeeming the plight of humanity, which readily qualifies the intervening state as just in its action (Office of the Historian 2013). While opponents of the just war theory hold views that are contrary, especially in light of the humanitarian crisis it may pose. However, the final determinant of war depends on who argues his points best under the very theory of the just war. Considerable accusations directed to the US at its hypocrisy in fighting terrorism are purely baseless and impractical. The war against terrorism does not only pass out as a moral victory for the American people, but also for the entire world population. Clearly, it is a proof of America’s decency to the use of power proportionately. Besides, it is a demonstration that with the US as the world’s military power and intelligence might, all nations are protected against aggressors and transgressors such as Osama Bin Laden whose extremism ideologies were increasingly making the world more insecure. References Central Intelligence Agency 2008, The 2008 CIA World Factbook by United States. Web. Daugherty, J 2004, Executive Secrets: Coved the Presidency, University of Kentucky Press, Lexington, Kentucky. Hinnebusch, R 2007, ‘The American invasion of Iraq: Causes and consequences’, Perceptions, vol. 1, no. 1, pp. 9-27. Lieberfeld, D 2005, ‘Theories of conflict, and the Iraq war’, International Journal of Peace Studies, vol. 10, no. 2, pp. 1-21. Lieberman, J 2012, Liberalism undressed, Oxford University Press, New York. Lyons, D 2011, Forms and limits of utilitarianism, Clarendon Press, Oxford. Office of the Historian 2013, Milestones, 1989-1992: The Gulf War, 1991. Web. Richardson, H 2011, Internet Encyclopedia of Philosophy: John Rawls (1921-2002). Web. Taylor, R 2008, Reconstructing Rawls: The Kantian foundations of justice as fairness, Pennsylvania State University Press, University Park, PA. Stanford Encyclopedia of Philosophy 2007, Equality. Web. Stanford Encyclopedia of Philosophy 2012, John Rawls. Web. Stanford Encyclopedia of Philosophy 2013, Distributive Justice. Web. Stone, C Williams, R 2015, All Necessary Means: Employing CIA operatives in a Warfighting Role alongside Special Operations Forces, CreateSpace Independent Publishing Platform, New York. The Internet Classics Archive 2005, The Art of War – Sun Zi XIII. Web. White, J 2012, Political philosophy: A historical i ntroduction, Oxford University Press, New York. This essay on Terrorism, Counter-Terrorism, and Intelligence was written and submitted by user Mar1a to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Friday, March 6, 2020

Free Essays on Afirmative Action

Affirmative Action: Is it the solution? Introduction From the beginning of recorded history, possibly before then, humans have found a necessity for classifying and categorizing every aspect of life. This need for order has been used to efficiently organize and clarify the endless details on Earth. This arrangement of objects in groups has also created a very sinister and volatile mindset that some people live by. This associative manner of classification has lead to the formation of beliefs in race identities, stereotypes, and superiority in the form of racism. Racism is contempt for people who have physical characteristics different from your own (Nanda and Warms 1). This concept is often combined with what is called racialism. Racialism is an ideology based on the following suppositions: There are biologically fixed races; different races have different moral, intellectual, and physical characteristics (Nanda and Warms 1). This is the ideal that many people engage in consciously and the way some people think without even realizing it. The only way to overcome this derogatory belief system is to define the meanings and misunderstandings of racial differences. Race is the term for classifications of people based on opinions about physical characteristics and differences between groups of individuals. The problem with this is that these differences do not really provide distinctions between ancestral lineages. In fact, these subtle differences between so called races, like broadened noses, physical structure, and skin color, are the results of environmental circumstances encountered by early nomadic human groups as they moved and settled in new territories. These traits are the products of many thousands of years of genetic hit or miss. Some of these traits were beneficial to the individuals and some were disadvantageous for survival in the many diverse environments found on Earth. For instance, the most commonly cited differen... Free Essays on Afirmative Action Free Essays on Afirmative Action Affirmative Action: Is it the solution? Introduction From the beginning of recorded history, possibly before then, humans have found a necessity for classifying and categorizing every aspect of life. This need for order has been used to efficiently organize and clarify the endless details on Earth. This arrangement of objects in groups has also created a very sinister and volatile mindset that some people live by. This associative manner of classification has lead to the formation of beliefs in race identities, stereotypes, and superiority in the form of racism. Racism is contempt for people who have physical characteristics different from your own (Nanda and Warms 1). This concept is often combined with what is called racialism. Racialism is an ideology based on the following suppositions: There are biologically fixed races; different races have different moral, intellectual, and physical characteristics (Nanda and Warms 1). This is the ideal that many people engage in consciously and the way some people think without even realizing it. The only way to overcome this derogatory belief system is to define the meanings and misunderstandings of racial differences. Race is the term for classifications of people based on opinions about physical characteristics and differences between groups of individuals. The problem with this is that these differences do not really provide distinctions between ancestral lineages. In fact, these subtle differences between so called races, like broadened noses, physical structure, and skin color, are the results of environmental circumstances encountered by early nomadic human groups as they moved and settled in new territories. These traits are the products of many thousands of years of genetic hit or miss. Some of these traits were beneficial to the individuals and some were disadvantageous for survival in the many diverse environments found on Earth. For instance, the most commonly cited differen...

Tuesday, February 18, 2020

Obtaining a Masters in Real Estate and Urban Analysis from UF Essay

Obtaining a Masters in Real Estate and Urban Analysis from UF - Essay Example I am very interested at this point in my life in pursuing a Master of Science in Real Estate at the University of Florida. My application is extremely competitive as I enjoy a competitive advantage over the majority of applicants due to the fact that I have successfully completed a graduate degree program in the past. When I studied my graduate degree at the University of Virginia I expanded my critical thinking, analytical abilities, and interpersonal skills. These skills have helped me a lot as a professional and they will help me as a future student at the University of Florida improve my chances of success in the Master of Science in Real Estate graduate program. My job experience is a strong aspect of my application as I have hands on experience in the real estate field. I currently own a startup company that specializes in real estate investments conducting valuation analysis, rehabs and lease options for individuals that need a roof, but are not approved for a loan because of their credit ratings among other factors. I have worked as an accountant in a big firm which sharpened my financial analytical skills as well as developing my abilities to deal with clients. In 2009 I switched careers and obtained a job with Tyco International working for ADT Security Services as a Sr. Financial Analyst providing support for the marketing department.

Tuesday, February 4, 2020

Biodiversity Essay Example | Topics and Well Written Essays - 250 words - 1

Biodiversity - Essay Example A more diverse portfolio in making policies helps in reduction of risks the County and its people have to incur in case there is investment only in some few sectors of the economy. According to biological researches, more than 40% of the global economy and 80% of the poor peoples needs comes from biological resources. Thus, the rich biodiversity in Indiana increases opportunities for improvement in life through medical discoveries from nature and response to challenges like climate change (Gamfeldt, Hillebrand, and Jonsson, pp. 1223). The livelihood of the people of Indiana highly depends and has thrived on biodiversity in the area. The presence of a variety of plant and animal species in the area provides an opportunity for consumption of different components of the diet. Consumption of diet that is derived from different plant and animal sources is significant for the prevention of nutrition-related conditions like obesity, thus helps in reduction of the health burden in the area. The industrial sector in Indiana has equally thrived from biodiversity in the country. Industries working in lines like wood industry, fiber industry, oil production dyes and the like have thrived due to existence of readily available resources for their operation in the area thus improving the economic status of the County (Emmett Duffy, pp.

Sunday, January 26, 2020

Accidental And Malicious Association: Wireless Networking

Accidental And Malicious Association: Wireless Networking Wireless network is a wireless communication between two interconnect nodes without the use of wires. Mobility lifts the requirement for a fixed point of connection to the network which allows users to move physically while using their devices. Mobiles computers such as laptops computer and personal digital assistants (PDAs), are the growing sector in computer industry 1. Wireless networks have many uses. A common is the portable office. Wireless networks are the common, both for organisations and individuals. Many notebooks computer have wireless card that allow connecting to a wireless network. However, wireless networking has many security issues, wireless has fewer physical assets to protect but at the same time there is no locked door on the airwaves so it is far easy to hack 2. Therefore, hacker found wireless network much more easily to break into. Wireless Security Wireless technology users security threat has been increased as the service become more popular. There are numbers of security threats with the current wireless protocols and encryption methods has been grown due to the carelessness and ignorance of the users and at corporate IT levels. Cracking has become easier with user-friendly Windows or Linux-based tool due to the easily availability on the web at no charge. Types of unauthorised access 1. Accidental association Violation of the security of a corporate network can come from a number of different methods. One of these referred to as accidental association. When a user turns on a computer and it latches on to a wireless network or wireless access point of a neighbouring firms overlapping network, the user may not even know that this is occurred. However this is the breach in security in that proprietary firm information is exposed and now there could exist a link from one company to the other and there might be a chance when a data is been transferred within a firm it can be at a risk and its integrity might have been compromised. 2. Malicious association Malicious association are when wireless network of a company is accessed by a wireless device such as cracking laptop instead of a company access point (AP). These types of laptops are known as soft APs. When thief gained accessed to the wireless network they can steal password or can plant a Trojans. 3. Ad-hoc networks Ad-hoc networks can pose a security threats, this network are defined as peer to peer networks between wireless computers which do not have an access point between them. Ad-hoc networks provide a bridge into other networks. In a company network environment its provided a bridge into other organisation network through unsecured ad-hoc connection. Ad-hoc network are defaults setting in most version of Microsoft Windows, it is turned on unless explicitly disable. There are basically two types of Bridging in Ad-hoc network. A direct bridge and a indirect bridge, direct bridge is created by a user who configure a bridge between two connections whereas indirect bridge has two security hazards. The first hazards is that important company data is been obtained via the secured network on the users end node computer drive, which exposed to discovery via the unsecured Ad-hoc network. The second hazards is that a virus was placed on the users computer via the unsecured Ad-hoc connection which make way to the company secured network. 4. Identity theft (MAC spoofing) When a hacker is able to listen into network traffic and identify the MAC address of a computer is called MAC spoofing. Some program has the sniffing capability which combines software that permits a computer to pretend it has any address that the hacker wished for. Wireless network system allow MAC filtering to some extend so that only authorised with specific MAC IDs can only access the network. When the wireless device is switch off or is off the air then only MAC filtering is effective. Any wireless devices (802.11) on the air transmit its unencrypted MAC address, which required no specific equipment or software to detect it. With any 802.11 receiver such as laptop and a freeware packet analyser can get the MAC address of any transmitting 802.11 device within range. In a company network where most of the wireless devices are on the air, MAC filtering provides security only to prevent unauthorised connection to the company infrastructure and does nothing to prevent a direct attack. 5. Man-in-the middle attacks. In this type of attack, attacker incites computers to log into a computer which is set up as a soft AP (Access point). After this hacker connects to a real Access point through another wireless device which maintains a steady flow of traffic through the transparent hacking computer to the real network which provide hacker to sniff the traffic. This attack usually disrupt the real connection and reconnecting with the hackers soft AP, these attacks are enhanced by software such as LANjack and AIRjack. Online books http://books.google.com/books?id=Ic6Ai8Y7LoACprintsec=frontcoverdq=wireless+networkshl=enei=UpbQTOfLF4HIswbozazNCAsa=Xoi=book_resultct=resultresnum=1ved=0CDUQ6AEwAA#v=onepageqf=true date 2/11/10 http://books.google.com/books?id=XO5VjslHLasCprintsec=frontcoverdq=wireless+securityhl=enei=fZ3QTOSpAYORswbMurzNCAsa=Xoi=book_resultct=resultresnum=1ved=0CDUQ6AEwAA#v=onepageqf=true date 2/11/10

Saturday, January 18, 2020

Child abuse Essay

Child abuse is one of the biggest injustices of all time because it is a never ending cycle. Child abuse is the physical, sexual, or emotional mistreatment or neglect of a child. Children are young, innocent, and fragile. Their minds are like sponges, absorbing everything they see and feel. Thus, leading the children to being the advocate of child abuse when their older. Abused and neglected children are 11 times more likely to engage in criminal behavior as an adult. Therefore, child abuse leads the victims to not have the opportunity to a bright future. Neglect is the most common form of child abuse. Over 75% of children who experience maltreatment or abuse suffer from neglect. For every incident of neglect that’s reported, an estimated two incidents go unreported. Approximately one in ten young adults (9%) was cruelly neglected by parents or guardians during their childhood. Based on the interviews with 1,761 young adults between the ages of 18 to 24, one in 6 (16%) young adults were neglected at some point during their childhood, with one in 10 young adults (9%) severely neglected during their childhood. Based on the interviews with 2,275 children between the ages of 11 to 17, one in 7 (13.3%) secondary school children have been neglected at some point, with one in 10 children (9.8%) severely neglected. Based on the interviews with 2,160 parents or guardians of children under 11 years old, one in 20 (5%) of children under 11 have been neglected at least once before, with one in 30 (3.7%) severely neglected. On March 31, 201 2 (or in Scotland on July 2012), there were 21,666 children in the United Kingdom on the subject of child protection plans under the category of neglect. On March 31, 2012 (or in Scotland on July 31, 2012), 43% of all children on the subject of child protection plans in the United Kingdom were under the category of neglect. There were 18, 220 children were the subject of a child protection plan under the category of neglect in England on March 31, 2012. In England, 43% of all children subject of a child protection plan were under the category of neglect on March 31, 2012. There were 1,006 children on the child protection register under the category of neglect in Scotland on July 31, 2012. In Scotland, 37% of all children on the child protection register under the category of neglect on July 31, 2012. There were 1,040 children on the child protection register under the category of neglect in Northern Ireland on March 31,  2012. In Northern Ireland, 49% of all children on the child protection register were under the category of neglect on March 31, 2012. There were 1,400 children on the child protection register under the category of neglect in Wales on March 31, 2012. In Wales, 48% of all children on the child protection register were under the category of neglect in March 31, 2012. In England, about one in seven children who became the subject of a plan for neglect in 2011-2012 had been subject to a plan at least once before. There were 6.2 million children referred to Child Protective Services in 2011. About 3.7 million children were investigated for maltreatment by CPS in 2011. There were 676,569 children decided to be victims of abuse or neglect in 2011. The most common victims of abuse and neglect are children age 2 and under. More than 11% of victims had a reported disability. In the U.S., there are about 1,570 child victims per year caused by maltreatment and an average of 30 child fatality victims per week. Most child fatalities were under 4 years old (81.6%) with 42.4% less than one year old. In the U.S., 37% of states limit information on child deaths and accidents. In the U.S., the yearly estimated direct cost of medical care of child abuse and neglect is $33,333,619,510. In the U.S., the yearly estimated direct and indirect cost of child abuse and ne glect is $80,260,411,087. The percentage of states that do not obligate legal representation for victims in abuse and neglect is 39%. There are about 408,425 children in the foster care system. About 27,854 of those children aged out of foster care. The percentage of the general population that has a bachelor’s degree is 30%. The percentage of former foster children that have a bachelor’s degree is 3%. The percentage of the general population in jail or prison is greater than 1%. The percentage of former foster children incarcerated since age 17 that are males is 64%. The percentage of former foster children incarcerated that are females is 32.5%. The percentage of the general population who experience homelessness during a year is greater than 1%. The percentage of former foster children who experience homelessness after aging out of the system is 24%. The percentage of former foster children who are unemployed for 1 year after aging out is 61%. The percentage of former foster children who are unemployed for 5 years after aging out is 53.5%. Ronald T. is a victim of physical abuse, emotional maltreatment, and neglect.

Friday, January 10, 2020

Students who push burgers: effects on education quality

The present thrust of university education is geared towards student’s independence, offering programs with part time study options to suit individual requirements and needs. For the fact that part time student’s performance complements the complexities of their drive and support system, the move to put on websites and electronic library access had so far supported the pressures of the student’s lifestyles and work-study habits. Part timers vary greatly from the needs of their full time counterparts as to age, socio-economic mix, educational background and motivations for continuing studies.It is imperative that a study of their part time rates and family context be inducted to help resolve problems on unaffordable tuition fees. Learning while earning as a part time student, molded me into a more mature person in the aspect of working to sustain education and meeting basic personal and family needs. I raise my hand to disagree Minot’s theory that the quali ty of education suffers when a student works simply by basing from the prerequisites involving good education founded as the case of a dedicated student, a comprehensive curriculum, quality assurance issues of the teacher, and the applied teaching methodology of the university.In the case of the student, we all have to deal with his capability to develop time management and assess priorities. Time management in the sense that the student shall be able to determine the number of hours that he need to work to generate the level of income sufficient for him to survive life. A kind of timetable to determine the number of hours appropriated for his studies, quality time with family and for personal matters of rest and leisure. The student’s sense of responsibility is then developed to exact appropriations regarding budget constraints and active participation in decisions centered on his own and shared family functions.The car was marked to be a necessity rather than a form of luxu ry in the part of the student. Minot’s theory was simply based on his sarcasm of buying what teenage people want, like the designer jeans, as if he hasn’t undergone the age and the stage. The culture of employed students is ultimate freedom to express their rights and their needs as relevant as the issues of quantity or quality of work from students. It is the process of undergoing through the different stages of life cycles and advancing into the domains of maturity which seems to be happening at a different pace in each individual with no exemptions made to full time students.Relatively, the decline of the American education cannot be solely based on the students alone, part time or full time, because bigger consideration shall be taken into the kind of curriculum that was created by the University in partnership with the Department of Education presented to us for the taking. They alone have the authority to know the technicality to prove probable strengths and weak nesses of the course and what it could produce to a student like me. It is simply formation guide to education. They are solely responsible for what molds our minds and spirits to sustain nationwide progress and development.We are just selecting from their list which path or place in their coursework and designs of progress we forecast to place ourselves. I agree that sometimes students could be so tired from work that they have the tendency to take their studies for granted and go to rest instead of studying. But I also insist on the fair ability of the students who have the initiative to learn how to cope up with stress and exhibit flexibility with regards to health, time management, and assessment of priorities which I have already discussed earlier.It is the determination of the individual to succeed and get what he wants in life that our context of preference shall be discussed and not the negative speculation of the present situation. For humans may experience success or failu re at any time in his life but still survive because of that spirit of determination. Now if we continue to look into the discussion of the third factor which is the quality assurance issues of the instructor, we can then specify some problems in the management and evaluation of tutor personalities relating to their maturity and flexibility to handle difficulties in tutoring students.One concept is the type of comments placed on written assignments which reflects tutors integrity and affects the immediate enthusiasm of the students to perform and carry on with the coursework. Another aspect is the applied teaching methodology as implemented by the University directives interfacing with the students as it transform when integrated with the personal reflections and methods of the instructor himself.Methods and the way teachers relay and convey ideas are something that is personal and shall be exact but not boring. Somehow, personal styles in teaching make it either difficult or easy f or the students to comprehend the subject in taking. I sincerely express that motivation and external support plays a vital role in increasing the population of the professionals to sustain national progress and not limited to the inability of the student’s parents to support their education and the student’s option to earn to sustain education.