Friday, May 22, 2020

Argumentative

Daniil Tatsenko

English Composition 201

Pro-AI, Kairos

Pro Artificial Intelligence


Artificial intelligence has made large strides in its applications in the last two decades, as the capabilities of our computers have increased exponentially. One of the applications is in the financial field, where large number-crunching happens daily. According to “A comparative survey of artificial intelligence applications in finance: artificial neural networks, expert system and hybrid intelligent systems” by Arash Bahrammirzaee,  there has been an increase in demand for Artificial intelligence technology that can solve non-linear and time-variant problems. That is because the financial market deals with a plethora of variables that are too time consuming to be predicted using existing computing strategies— AI would be able to operate in three major financial domains. Those would be the portfolio management area, the credit evaluation field, and stock predictions. AI’s application in this field would reduce human-made errors, when calculating the large amounts of financial data. The application of Artificial intelligence has also been of great use currently. Artificial intelligence has helped make models on the new, novel, coronavirus. AI has been used by the Chinese government in the form of facial-recognition, in order to track some early patients confirmed to have it in Wuhan. According to “Investigating a Serious Challenge in the Sustainable Development Process: Analysis of Confirmed cases of COVID-19 (New Type of Coronavirus) Through a Binary Classification Using Artificial Intelligence and Regression Analysis,” the model that was created predicted that the relative humidity and the maximum daily temperature affected the daily cases of the virus, the most. The more humid the air was, the more cases there would be on a given day, and the higher the temperature of the day was—the change in new cases was negative. 

Artificial intelligence has been a hot topic of discussion in recent times, due to popular developments. The late Stephen Hawking has expressed his negative opinion over a possibility in developing AI. The point of concern is the “singularity” which is known as the point in time where Artificial intelligence will intercept and overtake human intelligence. Elon Musk, another popular scientist/entrepreneur has expressed his support of AI, although he warns the world that the developments have to be considered cautiously. The film 2014 Ex Machina has explored this topic of singularity, and illustrated why AI is a powerful tool—however it needs to be closely monitored as for it to not get out of control. The film ends on a pessimistic note, but serves as a reminder that the machine may overtake the man (if we are not vigilant enough).












References

  1. Pirouz, B., Haghshenas, S. S., Haghshenas, S. S., & Piro, P. (2020). Investigating a Serious Challenge in the Sustainable Development Process: Analysis of Confirmed cases of COVID-19 (New Type of Coronavirus) Through a Binary Classification Using Artificial Intelligence and Regression Analysis. Sustainability, 12(6), 2427. doi: 10.3390/su12062427
  2. Bahrammirzaee, A. (2010). A comparative survey of artificial intelligence applications in finance: artificial neural networks, expert system and hybrid intelligent systems. Neural Computing and Applications, 19(8), 1165–1195. doi: 10.1007/s00521-010-0362-z

Thursday, May 21, 2020

About Me

Hello! My name is Daniil Tatsenko, but you can call me Danny. I am majoring in Computer Science and Information Security, other wise known as Cyber-Security. I have many aspirations. My number one is to pursue entrepreneurship after I graduate. My other number one is to pursue music production and have a successful career in the music industry. I originally come from the ex-Soviet republic of Georgia, although I am only just Russian.



  

Final Course Reflection

Daniil Tatsenko Nargiza Matyakubova

May 22nd, 2020         ENG-201


Final Reflection


For the past two semesters I have seen my growth not only as a writer, but as a researcher, and as a presenter of my thoughts. I have seen the difficulty I faced when tasked with finding a topic to research in my first semester of college. I was unable to come up with a topic, but most importantly—I struggled to find the correct way to phrase my question on the topic. A question must be researchable, it should be rhetorical, not black-and-white. Come the second semester, I saw that it was much easier for me to pick up a topic and correspond it with a researchable question. 

In my first semester of college, my writing was very haphazard—there was not much planning going on before I started a paper. I did not organize my ideas, and so it resulted in the drafts or even the finished product to be all over the place. This semester, for my final paper, I organized my final research paper into a clear, cohesive, flowing essay. I liked to put as many ideas and talking points I could on paper before I started considering taking my time building an exoskeleton for an essay. This time around, I took time to think of a structure my essay should follow in order to be a solid piece of rhetoric.

This semester, although a rough one for us all, still taught me a few things. I learned what is a memorandum, and how to write a successful memorandum myself. I learned the 4 Greek devices of rhetoric and how to use each one in order to present a successful argument. I have improved in the traditional areas of writing, and skills like presentation of my ideas and in the aggregation of meaningful research. 

Final Research Paper







To what extent should the government respect privacy when dealing with cyber-crimes?

Daniil Tatsenko

John Jay College of Criminal Justice

ENG 201

Prof Matyakubova

May 18th, 2020






In the past years, the internet has successfully brought people close to one another, virtually creating high levels of interconnectedness and interdependence. Currently, people can accomplish many things comfortably while at home. Cellphones, computers, the internet, and other forms of technology have made almost every aspect of human life better (Brodowski, 2019). People can communicate, shop, bank, get entertained, and obtain information globally. 

These technological advancements have created opportunities for offenders to commit several forms of crime. This essay explains the need for government agencies to act ethically and protect individuals’ right to privacy when dealing with cybercrime persons. This privacy includes the protection of personal data that is preserved in the digital world. Many developments have characterized the evolution of a digital world, but nothing significant has changed about threats to the users’ privacy. Though the government should remain vigilant on the threats to society, both external and internal, the individual's fundamental rights, such as the right to privacy should be of importance in any democratic society. The right should be made available to all and on an equal basis (Benjamin et al., 2019). There is a right to privacy in the United States, and that right needs to be fully respected when dealing with cyber-crime investigations. Government agencies should act ethically and follow due processes without violations of privacy. Privacy and ethics have to come before security when dealing with cybercrimes.

Cybercrime refers to online crimes that are perpetrated using specialized cyberspace knowledge. Often, cybercrime is perceived as an umbrella word that encompasses all those crimes in which computers and technology serve a supporting role, such as using cell phones or computers to send harassing messages (Michael, 2018). Cybercrime also includes computer-targeted crimes that happen as a result of computer technology and which would not exist without such computer technology such as a computer system trespassing. Cybercrime types include cyber-trespass, which involves unauthorized system access, cyber theft, which provides for online fraud and digital piracy, cyber-obscenity such as child sexual exploitation, and cyber-violence, which includes cyber-terrorism.

It is almost impossible to estimate the number of cybercrimes that have occurred in most parts of the world because there are very few valid, reliable, and official statistics, due to a lack of a standard legal definition of cybercrime. However, the rates of traditional crimes continue to decrease as the number of cybercrimes increases. Cybercrimes have attracted the attention of scholars leading to the availability of several research works on cybercrime. However, most of these research works are focused on understanding how cyberspace and cybercrime differ from physical space and traditional crimes (Michael, 2018). A substantial challenge facing cybercrime scholars currently and historically is the unavailability of accurate, reliable, and official statistics on most forms of cybercrime and how to deal with such cybercrime incidents.

  The Federal Bureau of Investigations (FBI) in the United States reports that the most used sources of data on crime have no information on cybercrime and whether the technology was used to perpetrate the crime. Again, The National Incident-Based Reporting System (NIBRS) does not provide a specific type of cybercrime, but it requires agencies reporting crimes to indicate whether a computer was used in the crime (Brodowski, 2019). Below is a diagram illustrating various types of crimes, and the estimated losses suffered by the victims. It is the latest crime report released by the Federal Bureau of Investigations and obtained from their website (FBI, 2018). This chart is used in this paper to admit that cybercrime leads to a significant loss of money by the victims. However, this should not be used as an excuse by the governmental agencies, which investigate cybercrimes, to violate the individuals' right to privacy and fair trial.

  The issues of servers and geographical boundaries are difficult to establish when dealing with cybercrimes. In some cases, the perpetrators are in different countries from where the crime is actually committed. Though laws have been put in place to fight cyber crimes, there are no agreed international conventions meant to fight cybercrime as a collective. An appropriate example of a convention, is found in the European Union context (Bednar et al., 2008). In 2001, the European Council adopted the Convention on cybercrime, otherwise known as the Budapest Convention. This Convention is open to adoption by other countries. Most importantly, the convention advocates for the need to protect and respect fundamental human rights and freedom as enshrined within the United Nations International Covenant on political, civil rights, and other relevant international human rights agreements.  This Convention reinforces the argument of this paper that when government agencies are dealing with cybercrimes, they should not only do so ethically, but should also ensure the protection of the citizens' right to privacy (SEGER, 2011). Similar to other criminal offenses, the cybercrimes should attract due procedures from investigation to judicial hearings. The sentences given to the accused in the court of law should be determined similarly to how other criminal offenses given the same weight as cybercrimes are determined.

Below is a diagram illustrating the Budapest Convention. In this paper, this chart serves to clearly explain the need to protect human rights when investigating cybercrimes. The professional tasked with collecting, compiling, and convicting the accused should act in an ethical manner and be accountable for their actions (SEGER, 2011). 

 

Just like other forms of crimes, cybercrime is equally essential, and its effects cannot be assumed. These crimes cause both financial and psychological harm to the victims. It is necessary to find ways of dealing with cybercrimes. However, when dealing with cybercrimes, the government should respect the rights of its citizens.

An interesting perspective to consider in cybercrime is the violations that occur when the governmental agencies are dealing with cybercrimes. In a move to track down criminals and hunt them down, the government agencies are violating many internet rights. One of these significant rights is the right to privacy (Smith, 2007). To explain this violation, consider the failure to secure search warrants by a government agency when investigating a cybercrime. The government of the United States attempted to enact the Stop Online Piracy Act that aimed at initiating a mass surveillance system. This act attracted a lot of criticism from the citizens because the U.S—in the name of fighting piracy—will be undermining personal information. The interest of privacy should come first when devising ways of dealing with cybercrime. Another unethical practice perpetrated by the American agencies dealing with cybercrime is incitement. In this case, individuals predisposed to committing a particular cybercrime offense are baited by the government agencies actually to commit the crime in the exchange of money. An excellent example to consider in this case is when the government officials dealing with cybercrime deceives a hacker to hack a particular computer system in the exchange of money and arrest the same individual afterward (Benjamin et al., 2019). From these unethical practices, it is observed that had it not been for the state, the offense would not have been committed in the first place. Emmanuel Kant, a philosopher, suggested that moral behavior is measured on the outcomes of the action. Based on Emanuel Kant's arguments, it is undeniable that this practice is unethical because the result is convicting the deceived person in a court of law. 

Referring to California v. Riley, the court maintained that government agencies investigating cybercrimes, including those committed using mobile phones, should first obtain a search warrant before carrying out the searching process (Bednar et al., 2008). Usually, a mobile phone contains vast information concerning the accused compared to the information contained in physical objects about the accused. It is possible that when searching, the police officers could easily access cloud services. In some countries such as China, countries dealing with the provision of online services were instructed by the government to install a government “spyware” to monitor their operations. Failure to comply with the requirements, the licenses of the companies are to be withdrawn. This incidence emphasizes the argument that governments are not primarily concerned about citizens’ right to privacy in a move to attempt ending cybercrime.

The nature of rulings given to the accused in the United States is also of interest. The rights of cybercrime persons have not been given due consideration. Most of the people presented to the court of law in the United States being accused of internet offenses have not been given the procedure of due process. Every citizen in the United States, including those caught in an offense, is legally entitled to the due procedural ruling. Another essential aspect to note is that most of the sentences given to the accused are not directly proportional to the crime committed. For example, Duke Cao has received an eight-year sentence in jail for promoting democracy online (Bednar et al., 2008). This reinforces the idea that the procedures of investigating and convicting cybercrime should take into consideration the right to privacy and should be ethical as well.

Every citizen has a right to privacy for sensitive personal matters, including religious practices, political activities, sexual habits and preferences, and general internet privacy, whether in public or private (Smith, 2007). This information is available on personal computers and cellphones. When carrying out cybercrime investigations, criminal investigations agencies have access to this personal data. Before conducting the cybercrime investigations, the professionals should secure a search warrant to validate the exercise. The information obtained from the search should be used for the primary purpose for which the investigation was meant to achieve, and not for any auxiliary agenda. It is very unethical to use the collected information for other purposes other than the one intended, such as victimizing the accused based on his/her behavior.

Individuals have the right to communicate with various forms of media without frequent monitoring of their communications by the government. When conducting cybercrime investigations, the government should show commitment to respecting this right by acting ethically in making decisions about the collected communications. The obtained information that is not useful to the investigation should not be disclosed either to other people or to the public. This will help in ensuring the right is granted to all people and on an equal basis. 

Some organizations collect and store personal information in their databases. However, these organizations have not kept their promise in ensuring the data is not automatically available to other persons, including government agencies dealing with cybercrime (Katos & Bednar, 2008). To ensure data privacy, the state should ensure instances where data is being processed by another third party, the owner of the information, has significant control over the required data and its use. Failure to have such legislation, the state itself will bring a considerable threat to data privacy much more than cybercrimes themselves.

Data Subjects should have access to data on them held by others

Data subjects should be informed, have access, and be allowed to correct, incorrect or misleading data that is held by other parties. Allowing data subjects to exercise significant control on the kind of data held by other parties will be granting citizens their privacy (Smith, 2007). The state should lead the commitment to respecting the citizens' rights to privacy even when pursuing security affairs for the nation's interests.

Government agencies processing other people's data for use in investigating cyber crimes should be accountable and willing to comply with the state's statutes on the right to privacy and ethics (Katos & Bednar, 2008). The governmental agencies should ensure they seek legal authority or the consent of the accused, when intending to use the collected information for other purposes apart from the one the information was meant to be used.

When investigating cybercrimes, the agencies should ensure they collect the necessary information, while ignoring and still maintaining the confidentiality of the unnecessary information they may have stumbled upon while conducting the investigation. Through this, there will be a substantial move towards respecting individuals’ right to privacy as well as fighting cybercrime incidences. 

Advancement in technology has provided several opportunities that have not only significantly shaped human life but also accelerated nations' economic growth. Malicious people have taken advantage of the increase in technology and have used it to cause harm to other people. However, the biggest challenge is on how to fight cybercrime. The current procedures that are being used by the government agencies are presenting ethical concerns as well as violating rights to privacy. There is a right to privacy in the United States, and that right needs to be fully respected when dealing with cyber-crime investigations. Government agencies should act ethically and follow due process without violations of privacy. Privacy and ethics have to come before security when dealing with cybercrimes.

The United States government should show commitment to safeguarding and respecting human internet rights. The fact that many transactions are conducted virtually should not be used as an excuse to nullify the need to respect human internet rights. There is a need for clarity on the appropriate (and proportional) sentences for internet crimes. Similar to other criminal offenses, the cybercrimes should attract due procedures from investigation to judicial hearings. The sentences given to the accused in a court of law should be determined similarly to how other criminal offenses given the same weight as cybercrimes are determined.
















References

Bednar, P. M., Katos, V., & Hennell, C. (2008). Cyber-Crime Investigations: Complex Collaborative Decision Making. 2008 Third International Annual Workshop on Digital Forensics and Incident Analysis, 3–11. doi: 10.1109/wdfia.2008.7

Benjamin, V., Valacich, J. S., & Chen, H. (2019). DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. MIS Quarterly, 43(1), 1–22. doi: 10.25300/misq/2019/13808

Brodowski, D. (2019). Cybercrime, human rights and digital politics. Research Handbook on Human Rights and Digital Technology, 98–112. doi: 10.4337/9781785367724.00013

FBI (2018) Internet Crime Report Released. (2018, May 7). Retrieved from https://www.fbi.gov/news/stories/2017-internet-crime-report-released-050718

Katos, V., & Bednar, P. M. (2008). A cyber-crime investigation framework. Computer Standards & Interfaces, 30(4), 223–228. doi: 10.1016/j.csi.2007.10.003

Michael, A. (2019, September 19). ENCYCLOPEDIA BRITANNICA. Cybercrime. Retrieved from https://www.britannica.com/topic/cybercrime

Seger, A. (2011). The Budapest Convention 10 Years On Lessons Learnt. In Cyber criminality: Finding a Balance between Freedom and Security (pp. 167-168).

Smith, R. G. (2007). Crime control in the digital age: an exploration of human rights implications. International journal of cyber criminology, 1(2), 167-179.

Journal #2

Daniil Tatsenko

3/24/2020

Professor Matyakubova

ENG 201

Journal #2, Question #16

In the film The Great Debaters, the character Tolson says the quote “Black is always equated with failure. Well, write your own dictionary.” which is an interesting perspective coming from a  black man. This perspective was so deeply integrated into American society at the time, that even a black professor echoed the denigration of his people, to get across to his point. The point is, that the denigration one brings upon themselves is ultimately decided by them. If Black is equated to failure it is because that notion is accepted from within oneself. The characters in the movie had to remove that notion within themselves, and start redefining who they want to be. They had to manifest their true identity through hard work and dedication, the identity of a winner. Their thoughts shaped their ideas, and their ideas had to shape their thoughts. They had to break the wheel and start redefining what it meant to be black, they had to write their own dictionary. 

Tolson is trying to teach his class that even everyday language can impact how they see themselves and the world around them. Tolson is attempting to demonstrate that even language can be disadvantageous to the speaker, that the language can expect failure from African-Africans— in turn manifesting that failure. Tolson is trying to tell the class that it is a self-fulfilling prophecy, and that it needs to be stopped by each and everyone, individually, in order for the collective to rise above. He tells the class that they need to make their dictionary, this is so that their new dictionary’s start with a clean slate, with no negative preconceptions of their own self worth. In order for the students to be successful they need to be educated, and  play by their own rules and definitions. 

Marginalized communities have slang in their respective sub-cultures that reflects their everyday life and struggles. Slang is a form of language that is used to describe life and its objects more comprehensively for the in-group, by avoiding the traditional language barrier of being all too formal in its definition. Slang allows marginalized groups to set themselves apart from others, and create their own shared sense of identity. A sense of identity beyond the physical features, an identity that unites the community through human language. The communities assign words to actions and phenomena that happen most often in their day-to-day lives that do not have a single go-to meaning in the traditional language.

Marginalized communities redefine words fluidly, but not expeditiously. It takes time for a community to shift a word in its meaning although, it is most certainly possible, the process takes time and a level of agreement from the members. Language has to be of use to the users in order to be effective, the slang and its definition therefore have to make sense and have an efficiency to using it. 

I think the newer generations have invented slang and redefined old slang. However I think that traditional words can be taken and redefined in a way that strays from the definition, yet is heavily used with the slang connotation. For example the words gay, and racism. The word gay, for the longest time has been used as slang to describe something that is considered to be  lame. The word racism and its relatives, now include not only the discrimination of a race and the feeling of superiority, but has come to use whenever any microagression is suspected. 

Journal #1

Daniil Tatsenko

Professor Matyakubova

Eng 201-06

March 6th, 2020


                                                                Journal #1

College has become the goal of high schools across the country. The goal of high school is no longer to make you a knowledgeable individual, instead it is to prepare you for college. Once students get to college, their goals are only to graduate in 4 years with a bachelor’s degree. However that one-dimensional view of college, and inadvertently the adult life the students are slowly transitioning into is almost set up for hardships. Students should be aware of their goals, and should be aware of ways colleges can and cannot help them in their quests. 

College students are different than the students they were before. They are now adults, and their expectations and standards should be held high, the students should be learning independence. College students need to face the adversities head-on, with no free helping hands from their parents that they may have got when they were kids. According to Maureen Tillman “...many recent college graduates do not have resiliency skills ‘as a result of being bubble-wrapped in high school and college’ by parents who want to protect them.” This helicopter parenting hurts the young adults in the end. This overprotection will result in incompetent young adults in the job market once they graduate, who won’t be able to adapt quickly enought to the world around them. 

College students also do not take full advantage of their colleges, that they are paying for. With skyrocketing college tuition costs, students need to be aware of the services offered to them— they need to get the most bang for their buck. There is a general naivety among students, that think that the piece of paper, the degree, is all that matters. The students may go an entire four years, only acquiring knowledge but no practice in their field— and then expect to be handed a job based on their merits earned in the classroom for four years. According to Dr. Kefalas, there has been an increase in the amount of students who are having difficulties going from college life into the workforce— saying “many show up in the career office for the first time in their senior year.” Students are not setting themselves up for success, they are sabotaging themselves because of the lack of opportunity-seeking during college.

However, it is wise to thoroughly research the college in consideration before applying and taking courses. This is because college degrees hold different values depending on what college they originate from. This is well covered in the documentary College Inc., in which the documentary makes it a point that for-profit colleges’ degrees do not hold the same weight as a state school. The documentary presents 3 women that are struggling to find a job in nursing, because their degree, acquired from a for-profit, does not satisfy employers. Their degree lacks the training the women needed in order to be competitive in the field, rendering them incompetent along their peers who went to legitimate colleges.

The For-Profit model also follows a close model to other corporations in the country, that are all trying to make a profit. The for-profit colleges spend immense money on advertising, getting the word out about their service to as many people as possible. These for-profit colleges depend on the lowest-common-denominator types of students to take their bait, and enroll. The colleges need to make their money back from what they spent on advertising. To compensate for this budget, their tuition costs are high, and the service they provide is lackluster. In the documentary College Inc., the interviewer poses the right question, “When you are spending more on getting me to come to the school, than you are in the service you are providing once I’m there, is that right?” (18:30)  to which the ex-executive of a for-profit college weasels his way out of. The response was a rhetoric, arguing that the advertising is what sells and makes the product not the actual raw cost of the product/service provided. 

College students should be wary of the ways they may hinder their professional lives and careers. Whether it is through knowing how to take advantage of the resources they are provided, becoming independent, knowing whether a college’s degree is worth something in the industry, to discriminating a college that has your education prioritize from that has its investors prioritized. College students need to be conscious of  scam-colleges, and advancing their opportunities for their future professional lives.

Informative Report

Daniil Tatsenko

Professor Matyakubova 

ENG 201: Composition 2: Disciplinary Investigations Exploring Writing.

21 February 2020


Females Serving Time

Wars have been a staple of human history. They have been ongoing for all of our history and will indefinitely continue in some shape or form, no matter what. Due to the physical and biological dispositions of man-kind, men have been the dominating demographic in wars throughout human history. There are, of course, some anomalies in history that will point to a group of women participating in wars, but they are far in between all the other instances when men were the majority in wars. However, due to the ever changing views of women in our society, and the gradual advancement of women within it—  a topic arises which has more stark implications than other issues. Should women have a more active role in the United States’ military?  The topic can seem to overtake you with ideas on how to address it, and internal-contradictions from trying to conclusively settle the matter. Women serving in the military has been a major focus of debate ever since World War II, during those times women were working factory jobs, fueling the war machine. In contemporary times, women don’t need to fill in factory spots, they don’t need to assist the military’s efforts. In our Western society, women have the freedom of choice, freedom to choose their careers, and make choices for themselves, thus a choice to serve in the military.

 Women make up a small portion of the US military, however that is not to say that it is negligible, far from that. The number of women who were serving active duty in 2010 was 167,000, which was a huge increase from the Vietnam era statistics. Women occupy 14% of the enlisted force within the US, and 16 percent of commissioned officers are women. The number of women who are commissioned officers is greater than that of men, when compared with the respective gender population in the military (Patten & Parker). 

The graph above illustrates the growth of enlisted women from 1973 to 2017. The progress seems very promising, as more women see the military as a viable career option, a way to give back to the country, and a way for them to grow. This graph does offer a particular view on where women seem to concentrate within the US military. It is seen that the Air Force, Army, and Navy, all have higher concentrations of women than that of the Marine Corps.

The Marine Corps is known to be the most break-neck branch all across the board when it comes to the US military. It has a lower population than all the other branches, and so the lowest amount of women as well. The Marine Corps is also known to be the “first to fight” branch, being sent out ahead of all the other branches, usually only supported by itself. The branch sees the most front line combat, and has a lot of infantry jobs up for grabs. Women have a large presence in some professions, such as administrators, medical, supply, and a minimal presence in occupations dealing with war-time— such as infantry, and gun crews (Office of the Under Secretary of Defense, Personnel and Readiness). The next bar graph shows the number of men serving in military occupations compared to women in those occupations. Concluded from the graph is that women serve predominantly in support roles in the military, away from the physically tasking jobs. 

 

Women are not entirely to blame for these gaps however. According to the statement by the Marine Corps Commandant in 2015, the USMC has openly stated for the exclusion of women from competing for certain front-line jobs. The report suggested that the USMC would not have mixed-gender units, as they are not as capable as all-male units (Baldor). This report was very controversial as it went against many of the ongoing policies in the Department of the Navy. Letting women into combat related jobs was pushed for by the Secretary of the Navy. The Secretary went as far as allowing women in some special operations jobs, such as the SEALs. The commandant of the Marine Corps had a point he was reaching for during his report. According to an experiment the USMC conducted, it was determined that women shoot less accurately than men, and in situations where an extraction of a wounded troop was required— “there ‘were notable differences in execution times between all-male and gender-integrated groups.’”  (Lamothe), which conflicts with the position of full integration for the US military. However the experiment was conducted with females and males of different body weights, and different levels of average body fat. So the study can be said to be inconclusive since the subjects in the test varied in weight and body fat.

However due to how modern warfare is conducted, the concepts of frontlines is an outdated one. Take for example, the U.S. 's wars in the Middle East, which have not been fought conventionally. The wars have involved proxies, and  rogue militant groups which gave no clear sense of territory, thus having no definitive frontline. Megan H. MacKenzie defined this as “irregular warfare,” and argues that women that serve as supporting roles still risk their lives in combat. According to MacKenzie “As irregular warfare has become increasingly common in the last few decades, the difference on the ground between the frontline and support roles is no longer clear,” signaling that women have already been serving in positions that can be considered frontline, exposed to hazardous environments. Women in modern times serve alongside men, and participate in activities in foreign lands that subjects them to hostile fire. Women have had more jobs open up to them in the United States Army, because the branch has reconfigured many jobs women served as supporting roles, as combat-related jobs. Thus giving women more freedom in their job selection in the military. These policy changes are seen as more realistic and egalitarian to proponent’s of MacKenzie’s perspective. MacKenzie has summarized a policy the Army employed in recent times, seemed to be contradictory: 

Under this system, forward support companies, which provide logistical support, transportation, and maintenance to battalions, are now grouped together on the same bases as combat units. Since women are permitted to serve in such support units, a major barrier designed to keep them away from combat has almost vanished. (MacKenzie)

MacKenzie acknowledges the fact that women serving along with personnel with combat jobs, should be considered as a combat job itself.

Opponents of an argument such as this are mostly based on women’s biological differences to me, and experiments and studies done that show women to not be as capable as men in physically demanding tasks. Proponents of an integrated military, point at the differences between the needed Physical Fitness scores between men and women. For example, in the report Women in the Military: Should combat roles be fully opened to women? By Marcia Clemmitt, she cites that the qualifying times it takes for a man to run the designated 1.5 miles, is significantly different than a woman’s qualifying time. The disparity is between 13 minutes and 15 seconds, and 15 minutes and 15 seconds, respectively. This gap in physical achievement poses a problem to many of those skeptical of full integration, because soldiers know that the battlefield does not take gender into account— the battlefield takes absolute measurements 

As our society progresses further and further towards more equality of choice, more women are expected to choose the military as their career of choice. Women will have a growing role in the military as their numbers within the service continue to increase. To remove the existing restrictions on women’s freedom of choice, the military would need to lift the bans and exclusions of women in all jobs and aspects of the military. With women filling in more roles within the branches of the military, be it supporting roles or combat jobs, the gender gap will continue to shrink— and our society will come closer and closer to an egalitarian one. Women will have the final discretion when deciding their careers within the military. Equality of opportunity will be offered to women in the future of the US’s military.





















References

Patten, E., & Parker, K. (2011, December 22). Women in the U.S. Military: Growing Share, Distinctive Profile. Retrieved from https://www.issuelab.org/resource/women-in-the-u-s-military-growing-share-distinctive-profile.html

Baldor, L. C. (2017, August 7). Officials: Marine commandant recommends women be banned from some combat jobs. Retrieved from https://www.marinecorpstimes.com/news/your-marine-corps/2015/09/18/officials-marine-commandant-recommends-women-be-banned-from-some-combat-jobs

Lamothe, D. (2015, September 10). Marine experiment finds women get injured more frequently, shoot less accurately than men. Retrieved from https://www.washingtonpost.com/news/checkpoint/wp/2015/09/10/marine-experiment-finds-women-get-injured-more-frequently-shoot-less-accurately-than-men/

MacKenzie, M. H. (2012, November 1). Let Women Fight Ending the U.S. Military's Female Combat Ban. Retrieved from https://www.researchgate.net/publication/297562675_Let_Women_Fight_Ending_the_US_Militarys_Female_Combat_Ban

Clemmitt, M. (2009, November 13). Should combat roles be fully opened to women? Retrieved from http://library.cqpress.com.ez.lib.jjay.cuny.edu/cqresearcher/document.php?id=cqresrre2009111300&abstract=false

Memorandum

Memorandum

To: John Jay College of Criminal Justice  Faculty, Professors

From: Daniil Tatsenko, Student at John Jay College of Criminal Justice (JJCCJ)

Date: February 13, 2020

Subject: Lateness and Attendance Policy


Professors often choose to enact attendance and lateness policies that are unsympathetic and unforgiving to the students in their classes. Negatively affecting the students’ grades when they are late by a few minutes, only missing the trivial starting moments of class, or absent from the class due to a possible multitude of reasons.

Students at higher education institutions know that they are no longer in high school where there are virtually no risks to being absent or late to class. Students have a right to their own discretions from day to day, from class to class, students should know the risk they take by missing covered material during classes. A professor enacting a zero tolerance policy on lateness, does little good to decrease tardiness, especially when that class may be an 8 AM. A lot of students have to commute far to get to the college, any minor bump on their transit will result in them being late to class. Attendance and lateness should not carry an explicit penalty, it should be implicit— students know that missing a lecture will result in incomplete understanding of the material and likely affect their test grade.

The solution to this is for professors to remove all explicit penalties to class absence, or at the very least— loosen qualifications for being “late”. Students who don’t want to go to class won’t burden anyone else attending. College students are responsible for their education, forcing them to attend is unnecessary. 

If this proposal is accepted, then students would feel at ease during class because they are not forced to be there by some stipulation. Thank you for your understanding and consideration of this issue. For any further discussion, you can contact me at: daniil.tatsenko@jjay.cuny.edu or reach me at (555) 555-5555.