Monday, September 30, 2019

How College Students Use Wikipedia for Course-Related Essay

Why then are academics so wary about the use of Wikipedia within universities? There are a number of related reasons. Before outlining them we should acknowledge that there may be differences according to academic discipline in attitudes towards Wikipedia. Speaking to academics from the natural and medical sciences over the last year, it seems that those subjects are less concerned with issues of originality of source than the arts and social sciences. It also may be [pic] and this is genuine speculation [pic] that academics in the English speaking world, where most of the academic controversy over Wikipedia use has been, are more sensitive to the source than in other parts of the world. These qualifications aside, there are definite reasons why Wikipedia use is, at the very least, contentious in universities. First, it is the product of anonymous individuals rather than known authorities, Wales is quite explicit on this: One of the fastest things we’re beginning to lose is the view of the world that there are a handful of thoughtful, intelligent people that should be broadcasting their views to everyone. And then the public is some sort of crazed rabble, easily swayed by rhetoric and so forth. Now we have to have a more nuanced understanding. Wikipedia is not necessarily anti-academic but it is anti-elitist as evidenced by the short shrift given to eminent academics in debates when they expected deference (see Keen 2007, 43[pic]4). Second, the non-proprietary nature of Wikipedia cuts against academic culture which valorises the rights of the author and publisher. Third, the anonymity of Wikipedia articles is alien to the cache of the named writer of the journal article or book. Fourth, the collaborative process challenges the norm of individual creation, prevalent in the arts and social sciences. Fifth, as intimated, Wikipedia departs from the standard mode of vetting by peer review. It is not true that articles are not reviewed. On the contrary, they are scrutinised by far more editors than for any journal. However, as the contributor is generally not an academic expert, so the reviewer is not generally an academic expert. So Wikipedia rejects academic custom in the compilation of knowledge. In addition, there are a number of what might be termed ‘learning and teaching’ issues pertaining to its use within universities. First, there is the issue of the accuracy of Teaching in Higher Education 651 Downloaded by [University of Glasgow] at 05:27 12 December 2012 Wikipedia entries, something that relates to the lack of formal expertise and peer review. Reviews of the accuracy of Wikipedia entries by formal expert(s) have actually been generally positive (for natural sciences see Giles 2005; American history Meier 2008). Despite this, the suspicion still surrounds Wikipedia that it cannot be trusted. O’Sullivan’s (2009, 119) assertion that ‘most people probably have an ambivalent attitude toward Wikipedia, thankful for its existence, using it frequently, but with reservations about its total reliability’ seems valid. Some academics would no doubt sympathise with the sardonic observation of comedian Frankie Boyle that Wikipedia entries should begin with ‘I reckon’. Second, some have questioned whether Wikipedia’s determination for studied neutrality is convincing. O’Sullivan (2010) complains that as Wikipedia only displays one voice, diversity is not incorporated and therefore articles become bland. Wales’s response is unapologetic: ‘Guilty as charged, we’re an encyclopedia’ (in Read 2006). Not that his approach to knowledge is without theory, it derives rather from his admiration for the convoluted ‘objectivist philosophy’ of Aryan Rand, the Russian e?migre? philosopher and novelist (Younkins 2007). A third learning and teaching concern is that, regardless of the reliability of Wikipedia, it is in itself an illegitimate form of research. Here the thinking would be that a student who culls Wikipedia for assignments does not understand scholarship. This consists of the consideration of various sources: a judicious sifting and ordering of knowledge, rather than lifting bite sized chunks of text that purport to capture a subject. On this Wales concurs, telling students: ‘For God sake, you’re in college; don’t cite the encyclopedia’ (in Young 2006). Some universities in the US have banned Wikipedia use, whilst others recommend a more discriminating approach (Jaschik 2007; Murley 2008). The latter is what Wales and others within Wikipedia advise: it should be used only as a starting place in academic research, a references source and a revision aid. What, however, is the evidence on Wikipedia use by students and academics at universities?

Sunday, September 29, 2019

Adult Education Study Simulators

The understanding of educational theory improves the quality of teaching taking place in schools. Indeed, according to Podeschi and Pearson (2003, p. 89), continued exposure to diverse educational theories help instructors to apply best practices in day-to-day teaching activities.Further, instructors are more likely to apply a different teaching method, which helps in understanding what works best with different students and lessons. The resulting system is mutually beneficial among educational stakeholders: teachers improve on respective professionalism, students receive high quality education, and school administration becomes more efficient in executing duties and responsibilities.Instructional processes being used by this researcher will definitely be improved upon reading the chapter. Most importantly, the understanding of factors influencing instruction delivery among adult students would results to change in strategies.This instructor will therefore embark on understanding spe cific factors before developing strategies to be applied. The strategy of involving adult students in the development of individuals’ academic goals will also get incorporated in the new instructional processes. The newly improved procedures will be implemented and consequently get evaluated regularly.In order to understand the participation rate in the local population, a group of ten adults were randomly selected and asked various questions regarding their propensity to participate. Four of the selected adults are active participants in adult education, whereas the rest (six) said they would like to participate but lack time.Those currently undergoing adult education do so through weekend classes as well as summer school. The adults were more inclined to attend group classes instead of studying privately.Participants of organized adult education are better positioned to succeed compared to individuals on self-directed learning, considering professionalism involved in adult educational systems (Knowles, 1999, p. 213). Organized education benefits from various teachers with wider experience and knowledge to guide adults in attaining respective academic goals.Participants in organized classes further get opportunities to share with each other, which enhances the understanding of concepts taught in classes. On the other hand, adults on self-directed learning have the advantage of concentrating on subjects and concepts of interest, which lacks in organized reaching.This instructor’s recruitment of adult education will be influenced by what has been learnt in the chapter. The new understanding on individuals more likely to participate in adult education will especially be of help. The instructor will embark on the process as recruiting adult students from both groups—those who are more likely to enroll and succeed and those with difficulties.Both groups will further get mixed in all the classes and educational activities. Mixed classes are, ac cording to Moos and Tricket (2004, p. 117) better placed to motivate struggling adult students to succeed academically. This will also help in the process of reducing chances of me drop out from the struggling students. Most importantly, the instructor will ensure encouraging students from either group to interact more in class activities.The instructor will further work closely with individual students with the intention of establishing a working rapport. This way, students would feel free to express their hardships to the instructor and therefore increase chances of resolving issues before reaching crisis level.Knowing adult students’ cognitive and learning styles are a must for teachers involved in the sector. Indeed, it is only through such knowledge that teachers can successfully help students achieve respective academic goals. Having such understanding helps teachers to come up with strategies that improve students’ ability to grasp concepts taught in their class es.Fort instance, understanding that some students learn better by just listening to lectures and others through visual aids, teachers are more likely to combine strategies. This would mean running lectures in combination with lecture notes for those who learn better through reading and PowerPoint slides for those in need of visual aids. Such approach leaves all students with better understanding.Though there exists little data relating to motivating general public in taking part in adult education, it is with no doubt that improving awareness would improve enrollment rates.This instructor will therefore embark on improving awareness of adult education courses within the locality, which would be achieved in collaboration with relevant departments. In addition to improving awareness, diversity in student’ body would be enhanced at various levels, which would leave participants stronger in their academic endeavors.There exist some differences between youth and adult students, e specially regarding needs and preferences. Adult students are more likely to prefer the traditional lecture notes instructions delivery, whereas the youth would prefer aggressive usage of information technology (Knowles, 1999, p. 72).To the youths, sitting down and consequently taking lecture notes sounds tedious—significant portion prefer having lectures delivered through IT, especially the Internet, where they can access at afterwards and regularly. On the other hand, adults are less inclined to rely on information technology, because they lack, or have little of the required technical skills.The first step in designing class instructions for adult students is to request them to share goals they would like to achieve. This instructor would arrange for a meeting with individual students and consequently collect views and concerns that would be incorporated in the instructions. Instructor will thus understand each student needs that will be considered in curriculum developmen t process.The traditional lectures, which most adult students are comfortable with, would become the primary teaching method. However, the instructor will embark on incorporating information technology throughout the process. The use of technology will also provide adult students to learn about the modern methods and thus overcome the digital divide barrier separating them from youth students.Wild Wide Web, PowerPoint presentations, and email communication between teachers and students will be used widely. All lecture and learning material will be posted on class website, where students can refer at their own convenience. As discussed above, the instructor will arrange for private meeting time with individual students.These meetings will be used to gage students’ comfort in using information technology—problems in using the system would be dealt with accordingly. In addition, the meetings would be used to understand whether the goals set in advance have been achieved. Students will therefore get a chance to get the much-needed counsel.The same processes can be applied with regard to youth education, given that they are in need of much support. Youth students are more likely to lack self-control and discipline that are required in academics. It is important for teachers in lower and upper academic levels to embark on improving this much-needed discipline in their students.This will serve them well in latter years, especially when they participate in adult education. The long run beneficiaries of improved understanding of education theories would therefore include stakeholders from all walks of life: teachers would become more efficient in their professions, whereas students benefit from high quality teaching methods.References Knowles, M. (1999). Pedagogy versus Andragogy. New York: Routledge.Moos, P. & Trickett, E. (2004). Classroom Environment. Palo Alto: CPP.Pearson, E. & Podeschi, R.   (2003). Humanism & Individualism in Adult Education. Adu lt-Education Quarterly. Vol. 50 (3): 39-55.   

Saturday, September 28, 2019

Cybersecurity Vulnerability Faced by IT Managers Today Essay

Cybersecurity Vulnerability Faced by IT Managers Today - Essay Example Although different forms of weaknesses can result in various vulnerabilities there is one particular threat which can be side lined as the most potent threat, its scope of impact is relatively large and can create havoc and destroy the purpose of I.T firms and managers. The possible vulnerability can be mitigated through safe practices and protective layers of security that ensures authentication. This can be achieved through multi- tier protective layers within the system. This paper looks into the different dimensions of the vulnerabilities and responsibilities on behalf of the respective departments. This paper would help identifying and further creating a mechanism for safe operations and security of the organizations, their clients. Note: the body of this paper should include at a minimum a complete description of the vulnerability, the reasons why it is the most important, the impact of this vulnerability on organizations and how organizations can best address its potential impacts. The single most important cyber security vulnerability faced by IT managers at the present is cyber security governance. There are weaknesses that that exist in cyber security governance to include personnel management, policies, and procedures. The weaknesses of cyber security governance have been noticed at all scales, levels, and sectors such as inadequate procedures, undertrained personnel, and failure of leadership at all levels. These weaknesses of cyber security governance have been identified by the Department of Homeland Security and proposals have been initiated to bring about change. Cyber security consists of three fundamentals such as personnel, operations, and technology. In order for all three fundamentals to be successfully implemented, active involvement is required by personnel who are responsible for the governance of that organization. Vulnerabilities may be created or exist when there is an

Friday, September 27, 2019

The Collapse of the Soviet Union Essay Example | Topics and Well Written Essays - 2000 words

The Collapse of the Soviet Union - Essay Example This essay describes the process of the collapse of the Soviet Union. Firstly, the researcher introducts Mikhail Gorbachev, who was elected as General Secretary of the Communist Party on March 11, 1985. The researcher discusses different slogans and policies that were established by Gorbachev, such as â€Å"Uskoreniye†, â€Å"Perestroika†, â€Å"Glasnost† and â€Å"Demokratizatsiya†. The researcher also concluds that historical period and states that the Soviet Union left a legacy of economic inefficiency and deterioration to the fifteen constituent republics after its breakup in December 1991. Arguably, the shortcomings of the Gorbachev reforms had contributed to the economic decline and eventual destruction of the So-viet Union, leaving Russia and the other successor states to pick up the pieces and to try to mold market economies. At the same time, one should admit, that the Gorbachev programs did start Russia on the precarious road to full-scale econom ic reform. The collapse of the Union of Socialist Soviet Republics radically changed the world's eco-nomic and political environment. The speed with which the Soviet system was transformed and the Soviet state disintegrated took almost everyone by surprise. However, Union of Soviet Socialist Republics's collapse was the result of many unsolved problems. Gorbachev’s appointment and his early reforms allowed the problems of the Union of Soviet Socialist Republics to be uncovered and become public knowledge, which, in turn, be-came the cause of the collapse.

Thursday, September 26, 2019

UNIX Operating System History Essay Example | Topics and Well Written Essays - 2500 words

UNIX Operating System History - Essay Example Moreover, the sixth edition in 1975 was not associated with AT&T and became popular in the academic world because it was bundled with rich features, powerful, free of cost and compatible with common platforms and most importantly possess a complete source code (Fox 1807-1814). Likewise, in the year 1979, Ken was working with his colleague Bill joy and Ozalp Babaoglu at the University of California, Berkeley to improve UNIX that resulted in a new version known as Berkeley Software Distribution (BSD) UNIX (Fox 1807-1814). Moreover, after consolidating all internal research and development versions of UNIX systems to release its own version, AT&T releases its commercial version of UNIX named as UNIX System III. It is possible for an operating system to be matured as well as state of the art simultaneously? If it is UNIX, then the answer would be â€Å"Yes.† UNIX has contributed in the Information technology sector for the last 25 years. Millions of installations conducted on vari ous platforms and UNIX has proved to be organized and scalable. Operating systems are compared by their functionality and performance. UNIX has contributed immensely in recent years. ... By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name â€Å"Regatta†. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to integrate several machines in to one (Popovich 11). The Client-server model of UNIX was the core components for the growth of Internet and reshaping of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real time network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI envir onment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. UNIX Directory Structure UNIX Directory Structure Figure 1.1 UNIX Shells A shell can be defined as an entity that processes user input on the behalf of computer. The bourne shell was the first shell that was programmed by Stephen Bourne deputed at Bell Laboratories (Verma, n.d). Likewise, Bourse shell was an integrated function of the UNIX operating system. Moreover, Kourne shell that was subset of Bourne shell was coded by IBM. However, Kourne shell is not supported by all

Wednesday, September 25, 2019

Education and Communication Essay Example | Topics and Well Written Essays - 3000 words

Education and Communication - Essay Example Everything has got transformed and the very way of how we live and how we understand has got changed. The advent of technology and computers has changed the very way the world moves. Distance is no longer a differentiating factor and a matter of concern. In physical sense this world might appear a big place with things at far off places but the world in virtual form doesn't believe in distance. Everything can be achieved within minutes if not seconds. The whole technology behind this mega change is based on computer and is termed as Information Technology. Details and information are getting transferred within few seconds. People in Shanghai and New York are just seconds away. Transferring data in electronic form is actually the fastest way to transfer things. It's not only the message transfer that has been revolutionized but also the business world. There are virtual shopping malls with website offering you a range of products ranging from computer peripherals to groceries. Companies are now providing details of their product through their website and are accepting customers' requests of information and now even orders for products are being accepted. Everything is available. Money transfer can easily be done through wire transfer techniques. People do not wait. This world is not ruled by armed soldiers or any nuclear weapon. It's the information which rules. The physical world just has to react on the outcome. Its role is just for receiving and sending. This high performing virtual world has made significant change in the performance of the actual world (Tanenbaum, 2003). Things in real world are now easier to comprehend. Outsourcing has helped in accessing low cost labor in far off Asian nations like India and China. Multinational companies like Microsoft, IBM, GM., GE etc. have offices in almost in each part of the world with performance of each of these units can be monitored from any of its offices. Their offices have been networked though LANs i. e., Local Area Network and WANs i.e., Wide Area Network. They have virtually made themselves available to their customers any time anywhere and just a click away (Tanenbaum, 2003). Right to education and need for a government initiatives As, developed nations have always the one to begin any revolutionary change in technology, education and then usage for the former in integrating the education process. The United Kingdom has been the among the most developed nation of the world right from the beginning of 20th century. Technology here is not a gadget but a lifestyle and the nation is going to have a new era when the education processes will very much be undertaken through the use of technology. The implementation phase will ensure integration of technology and education. Beginning with this integration the most important part is the high school reforms. Any such initiation should ensure the entry of meaningful steps and processes that will provide a meaningful and ambitious thrust to the career of all students in form of knowledge and skills that will help them in preparing for a better future and successful life. The 21st century skills has become an urgent issue due to

Tuesday, September 24, 2019

Compare and contrast Essay Example | Topics and Well Written Essays - 250 words - 5

Compare and contrast - Essay Example Programming is a diverse world of symbols and logic where emotions and people stand aside. The addiction of virtual world and the attachment and detachment from the real world, has resonance in it. On the other hand Bill in his book, â€Å"Why the future doesn’t need us†, shares his apprehensions regarding the advancements in nanotechnology, genetics and robotics technology. He significantly talks about the upper hand technology has on human’s capability and the rapid success and progression in nanotechnology which could be used more destructively than constructively. Bill shared his opinion about the ethical issues stirred up due to genetic technology and hence public has condemned about it as well. His apprehensions further lead to NBC era when literacy of GPR technology would be enough to produce mass destructive weapons even with low resources. Thus, it would increase incurable diseases, with lack of work and exercise for humans which in turn would empower technology over human

Monday, September 23, 2019

Consumer Behavior Research Paper Example | Topics and Well Written Essays - 750 words - 1

Consumer Behavior - Research Paper Example It was primarily responsible for introducing smartphones to the public. This product made consumers realise that they could browse the web, communicate and do several other things on their mobile phones. It was after the Apple iPhone that the mobile app market rose to its current status. Apple was not the engineer or pioneer of mobile applications or smart phones; however, they were responsible for introducing it to the mass market. Through their elegant presentation, gracious store atmosphere, and well planned innovations, the company has garnered a loyal following from electronic and mobile enthusiasts alike (Sass 2). Every time Apple launches a new version of the IPhone, hoards of consumers will be waiting in line at any of their stores for the purchase of its products. Sometimes, buyers may camp outside their branches overnight. The organisation may get pre-orders for about 2 million iphones within the first hour of release. For the past five years, the same hype has been created around Apple’s products, and it looks like this trend will continue in the foreseeable future. As explained earlier, clanning is a phenomenon that takes place among consumers who share similar values and interests. Part of the reason why Apple products create a lot of excitement is the fact that they bring together persons with similar interests. When one consumer was asked why they would wait for hours in line in order to buy an iPhone, the person replied that it is an opportunity to meet people who have the same passion. The company has a community of enthusiasts who simply enjoy being part of something new and exciting. They thrive in the anticipation and suspense created around a new product launch. Apple is well aware of this consumer behaviour, thus explaining why it always creates a lot of secrecy around its launches (Vuong 6). The organisation never tells buyers how many phones it has stocked in order to create suspense.

Sunday, September 22, 2019

Work Study In Business Essay Example for Free

Work Study In Business Essay Discuss the reasons why modern organisations engaged in the construction and property industries should use ‘work study’ in their business. The reasons why a modern organisation should use ‘work study’ in their business can be determined because of the potential benefits it can provide to the efficient running of the organisation. Work study is the systematic study of processes or operations to ensure the more efficient use of human and resources that are available. It is also known as the time/motion study and since its introduction; it has developed the course of instituting standard times with the motion study improving work methods by involving different techniques. With the refining and integration of these two techniques it become a generally accepted method for the improvement and advancement in work processes and systems that are used within the construction and property industries as well as many others involved in production. The quantitative analysis of time study leads to establishing a time standard. The qualitative analysis for motion study of a work station leads to the improvement or design of an activity or operation. Work study resulted from amalgamating concepts and practices which were developed by F.W. Taylor and by Frank and Lillian Gilbreth. The aspects that are important in the work study are the evaluation of human work, work measurement techniques are designed to create how long it will take a qualified worker to perform a specific job at a certain level of performance. Construction and property companies can use the work study to establish the necessity for the process of estimating labour, necessary remuneration and incentives for staff. The basic approach to this method will incorporate the procedure of: Select (The work to be studied), Record (The relevant facts), Examine (the facts critically), Develop (the most effective method), Install (the new method) and Maintain (by performing regular checks). Work study is used to show the required effort and time that is required to perform particular tasks and when more efficient ways of doing the task. The task can usually be broken down into different motions and how long an average worker takes to perform these motions is then measured by using a camera and stop watch. It can be seen from the history of work study that the methods of Frank and Lillian Gilbreth sort out to find the best method of doing a specific job, in his experience of bricklaying he noticed his instructor was using three different set of motions when laying bricks, when he started his own business he introduced several procedures which improved the motion pattern and increased productivity from 120 bricks laid per hour up to 350. In my line of work we carry out surveys on behalf of institutions such as the NHS for space and usage, by using a form of the work study over a period of between a week and a month we analyse the occupancy of the rooms and whether they are empty, under, fully or over used. Once this information has been collected, collated and analysed then we can see where savings for the particular trust can be made. This can be based upon economic, technical or human conditions, whether they are planning on downsizing/merging or moving to larger premises, whether the space is fully utilised or if it is up to the minimum requirements for standard working conditions. A rating can then be identified for each aspect and other reviews are compared allowing for decisions to be made and improvements can then be implemented. The results of the study can be integrated into the time and effectiveness of how people use their time and whether or not it is fully utilised and then whether there are better working practice methods that can be identified and implemented. By integrating this approach to improve the work system which is known as methods engineering it can be applied to many other construction or property organisations. The work study uses both the time and motion study together to ensure that the results are both rational and reasonable are achieved, in order for this to be successful it is of significant importance that the study of motion is fully understood so that when applying it to the time study so that the results are as accurate as possible. However with construction projects lacking repetitive operations to monitor and due to numerous variable factors, such as the weather and change of labour, this will affect how work is performed, it is only generally provided as a guide to quantitative figures which should be included in other management tools. The time study measures how long is required in order to perform a specific task by an average work with a specified method, if a new work method is introduced then a time study needs to be changed in line with the new method. By analysing the different work methods and the equipment that is used when a job is performed then a more optimum and standardised method can be introduced. This method will contribute towards the search for better and improved methods, whilst ensuring optimum working procedures and effective use of management utilisation tools to help achieve higher productivity. In relation to my work place it was noticed that time and effort was being wasted due to a lack of a suitable and sufficient filing system; files were regularly misplaced and no backup records were kept. By analysing these ineffective methods it was evident that improvements were needed and therefore following this study and more effective and efficient system was put into place which addressed all the identified problems in the study. The benefits of work study is to have an increase in operational efficiency and productivity, reduce manufacturing costs, improve the work place layout, provide better capacity and manpower planning, provide fair benefits and conditions to employees, improve the work flow, reduce handling cost of materials, provide a performance standard to measure the efficiency of the labour force, improve industrial and employee morale, provide a better basis for any incentive schemes and more job satisfaction for employees.

Saturday, September 21, 2019

World War II Essay Example for Free

World War II Essay II (WWII), 120,000 Japanese Americans, US citizens or not, were forced out of the west coast after the attack of Pearl Harbor. President Franklin D. Roosevelt issued Executive Order 9066 which allowed local military commanders to establish exclusion zones from which any or all persons may be excluded. Americans of Japanese descent were forcibly interned in different camps in the US. The military felt that this was a necessary action to prevent any espionage and pro-Japanese actions in the west coast. Regardless of the mass evacuation, a number of Japanese Americans served in the military forces. In fact, the 442nd Regimental Combat Team (RCT) is the most highly decorated unit in US military history. Asian discrimination The discrimination against the Asians in the United States started even way before the incarceration of Japanese Americans in WWII. In the late 1900s, laws were passed that explicitly prohibited Japanese to become citizens of the US. They could not have a land of their own and were not allowed to marry outside their race. They could only buy homes in certain areas and were prohibited to work in certain industries. The Immigration Act of 1924 stated that aliens who were ineligible for citizenship would not be allowed to immigrate to the United States. When Japan had been establishing its colonial rule in the 20th century, news of brutality of Japan came into the US. In particular, Japans colonization of China was widely condemned by the US government. As a result, prohibitions on oil and supplies were placed on Japan. The Second Sino-Japanese War in 1937 further strengthened the anti-Japanese sentiment of the Americans especially when eyewitness reports of violence reached the country. The anti-Japanese sentiment reached its peak when the appalling attack on Pearl Harbor transpired on December 7, 1941. This impelled the United States to wage war against the Japanese Empire. This anger was further fuelled by how Japanese treated American and other western prisoners of war, the Bataan Death March, and the Kamikaze attacks on American ships. Internment Executive Order 9066 Starting 1939, the Federal Bureau of Investigation (FBI) had been compiling information on prominent members of the Japanese community. These data in the Custodial Detention Index (CDI) were used to classify the persons according to their possible danger to the country. A few hours after the Pearl Harbor attack, the Attorney General, given a presidential blanket authority, announced that the FBI, using the information in the CDI, would be detaining dangerous enemy aliens who may put the security of the nation in jeopardy. Some believed that Japan would launch an attack on the west coast. Many officials doubted the loyalty of the Japanese residing in this area, their judgments mostly based on racial bias. They also feared a possible tampering of water system or arson. The distrust to the ethnic Japanese was more strengthened by the fact that many of them were educated in Japan, where schools emphasized reverence for the Emperor. This planted suspicion of espionage by the Japanese Americans. On December 30, the Attorney General authorized raids even without search and warrant arrests to all houses of Japanese lineage provided that there is at least one Japanese alien. General John L. DeWitt, commanding officer of the Western Defense Command, advocated the removal of enemy aliens from zones in the west coast. He insisted that there were indications of sabotage by the Japanese Americans. Although various agencies, such as the FBI, found no evidence of such a claim, their reports were suppressed by high officials. DeWitts recommendation easily made its way to the War Department who readily approved it. When President Franklin Roosevelt was presented the order, he readily signed the order without consulting the Cabinet. His support of the internment was a great show of support to the Americans that would be rewarding in the coming election. Exclusion, removal, and detention On February 19, 1942, Executive Order 9066 authorized the Army to designate military areas from which any person may be excluded. Although there was no explicit command to evacuate the Japanese Americans, the order was carried out only to people of Japanese ancestry. The Italians Americans and German Americans, whose countries of origin were also at war with the allies of the United States, did not experience the same fate as the Japanese Americans. On March 11, the Office of the Alien Property Custodian was given discretionary authority over alien property interests. Many of the assets were frozen, causing financial difficulty for the people affected and hindering them from moving out of the exclusion zones. On March 24, Public Proclamation No. 3 enforced a curfew from 8:00 pm to 6:00 am for all enemy aliens and people of Japanese ancestry within the military areas. A few days later, another proclamation prohibited them from leaving Military Area No. 1, which is the entire Pacific coast to about 100 miles inland, until an order allows them to leave. On May 3, Japanese Americans were ordered to live in the assembly centers until transferred to relocation centers. The unfounded mass removal of the Japanese Americans took place around 8 months. Japanese Americans lost most of their properties since they were allowed to bring only what they could carry, such as clothing and personal effects. Numbered tags were given to them as a means of their identification and their belongings. Residents of twelve Latin American countries with Japanese ancestry were also interned to US internment camps. After WWII, most of the Japanese Latin Americans were not allowed to return to their countries and instead were deported to Japan, where they suffered hardships as Japan was severely damaged by the war. Of more than a hundred thousand Japanese Americans subjected to the mass removal program of the government, two-thirds of them were US citizens by birth. Farming as a cause of anti-Japanese sentiments Much of the prejudice against the Japanese Americans was intensified due to the competence of the Japanese in the agriculture industry. Being ingenious people, they eventually had their own farms and other businesses. A number of thriving businesses owned by Japanese Americans were strong competitors in the agricultural industry. The Japanese Americans had developed sophisticated means of irrigation that allowed the cultivation of fruits, vegetables, and flowers on lands that could not be used for farming previously. The first-generation Japanese Americans, the Issei, indeed prospered in the 20th century, but their fate turned when they lost their farm during the internment. This, however, pleased the white farmers as they could take over Japanese farms. Because the Japanese Americans were removed from their farms, laborers were needed to take over the lands of the Japanese. Immigrations from the Mexican border started coming to Mexico. However, thousands of Nisei, children of first-generation Japanese that were US-born, were still needed to save the farming industry so thousands of them were released from camps. But for the Japanese Americans who remained in camp, they strived to irrigate and cultivate barren lands in areas near the internment camps. Because of their hard work, they were able to build farm lands that are still productive until the present.