Sunday, December 29, 2019

Violence and Rivalry in Romeo and Juliet Essay - 913 Words

Romeo and Juliet is about two star crossed lovers who’s families have a big rival vary and this rival vary will stop Romeo and Juliet from being together this play is set in Italy and in the city of Verona i am going to concentrate on the following three acts and scenes act 3 scene 5 , act 5 scene 3 and act 1 scene 1 . In act 3 scene 5 we see a lot of conflict between Lord Capulet and Juliet we can see this from the following line â€Å"Hang thee, young baggage disobedient wretch!† this line shows that there is conflict because Lord Capulet is calling Juliet a â€Å"disobedient wretch† which negative language and that make the audience believe that he is angry so that means there must be some sort of conflict going on i would stage this scene†¦show more content†¦I would stage this scene by making the setting in the graveyard or where Juliet is buried i would have Paris acting with rage and anger and the same with Romeo. We also see some conflict in act 5 scene 3 we can infer this from the following quotation â€Å" O, i am slain!† this line shows there is conflict and fighting going on because this line shows that there is a fight going on between Romeo and Paris and this a type of conflict so we know that there is some sort of fighting going on because Paris has been slain so that means this was a result of all the conflict which was going on . This would appeal to the audience because they would want to know what is going to happen next . I would stage this scene by having Paris slain and on the ground in the graveyard i would have Romeo covered in blood because he has just killed Paris. In act 5 scene 3 we see some conflict and we also see the death of Romeo and Juliet we can see this from the following line â€Å"what Paris too? And stepped in blood† this line shows that there has been a fight and someone has died and this line also shows that there is a lot of conflict going on because of all the fighting this appeals to the audience because all the conflict is creating tension which is going to be released in various ways so they are always kept on the edge of their seats. I would stage this scene by making the setting in the graveyard and Romeo will be on the floor withShow MoreRelatedAnalysis of Act Three Scene 1 of William Shakespeares Romeo and Juliet979 Words   |  4 Pagesof William Shakespeares Romeo and Juliet Romeo and Juliet is a play filled with love, fate, rivalry and tragedy. I am going to be analysing act 3, scene 1, concentrating on how Shakespeare makes this scene dramatic and how it is pivotal in terms of the plays key themes and events. Prior to this scene we have witnessed the rivalry between the two leading families, Capulet and Montague and the hostility they hold towards one another. Romeo, the son of a Montague, turnsRead MoreBaz s Film And William Shakespeare s Romeo And Juliet939 Words   |  4 PagesBaz Lurhmann film or William Shakespeare play Romeo Juliet is one of the most famous plays of all time. All most ever person in the world has heard of this play and the author William Shakespeare. William Shakespeare is one of the first authors to have a play start off as a comedy but ends up as a tragedy. A lot people have even tried to turn Romeo Juliet into a movie. The most successful at this has been Baz Luhrmann with his star cast; and his use of the exact lines in the play makes hisRead MoreComparison Between Romeo and Juliet and West Side Story687 Words   |  3 PagesRomeo and Juliet versus West Side Story One of the most beloved and timeless tragedies of William Shakespeare is Romeo and Juliet. Its theme of young, tragic love cruelly and unintentionally destroyed by family hatreds has endured from generation to generation. The American composer Leonard Bernstein used the themes, character types, and plotlines of the Shakespearean play to craft his own musical tragedy entitled West Side Story. (Stephen Sondheim wrote the accompanying lyrics, Alfred LaurentsRead MoreProposal of Director’s Interpretations for Romeo and Juliet671 Words   |  3 PagesRomeo and Juliet is one of the most well loved plays and the mastermind behind it is none other than the great Shakespeare. This story has become one of the most iconic tragic teen love stories of our time. It has been reinterpreted differently by various people, each trying to present their own ideas and take of the play. Therefore, as a director, we have a tricky job. How do we in a way add more to the play? What is it that we can d o to give our audience a fresh experience? Therefore, this interpretationRead MoreWilliam Shakespeare s Romeo And Juliet1186 Words   |  5 PagesWhen discussing classic love stories, William Shakespeare’s Romeo and Juliet is often included in the conversation. The tragic story of the â€Å"star-crossed lovers† (Shakespeare 6) is taught in high schools and studied in colleges. Its poetry has graced many stages and silver screens. Romeo and Juliet is also often reimagined for a modern audience. One such interpretation is West Side Story. Written by Stephen Sondheim, it made its Hollywood debut in 1961 under directors Jerome Robbins and RobertRead MoreAnalyzing Romeo and Juliet by William Shakespeare Essay1567 Words   |  7 PagesAnalyzing Romeo and Juliet by William Shakespeare Romeo and Juliet is a tragic love story between two teenagers who fall head over heels for each other in their forbidden love. The story is riddled with violence, hatred and revenge, these powerful themes along with others keep the audience on the edge of their seat. Shakespeare wants to create an impact with his play he wantedRead MoreThe Death Of Romeo And Juliet By William Shakespeare1530 Words   |  7 PagesWho is to Blame? Good Morning, members of the Jury. While it may be a popular belief that there has ‘never been a tale of more woe than that of Romeo and Juliet’, the facts are less subjective. Many say that love brings peace and affection, but when taken to the extreme, it can lead to tragedy and despair. This is shown evidently in the play Romeo and Juliet written by William Shakespeare. Arguably the most famous love story of all time, the play tells the tale of a boy and a girl from opposing familiesRead MoreDirecting Act 3 Scene 1 of William Shakespeares Romeo and Juliet838 Words   |  4 PagesAct 3 Scene 1 of William Shakespeares Romeo and Juliet In this essay I will be directing act 3 scene 1 in the illustrious Romeo and Juliet written by Shakespeare. This segment of Romeo and Juliet will be intended for a contemporary audienceRead MorePetrol Station Scene Analysis844 Words   |  4 PagesIn the Petrol Station scene, William Shakespeare’s important theme of violence is amplified and discussed through Baz Luhrmann’s filmic interpretation. The theme of conflict between the Montagues and the Capulets is a constant and crucial idea throughout the play. Baz Luhrmann has highlighted the traditional Shakespearean language by modifying the setting to a modern context, therefore the audience is able to relate to the text. Furthermore, the setting choice of a petrol station provides the filmRead MoreViolence in Romeo and Juliet by William Shakespeare Essay1704 Words   |  7 PagesViolence in Romeo and Juliet by William Shakespeare Violence is the main theme in Romeo and Juliet, even more than love, hate, rivalry, passion and broken friendships. The play is set in ‘Fair Verona’ which is in the North of Italy, which has a population conformed of a Prince, two main households, the ‘Capulets’ and the ‘Montagues’, their servicemen, friends, the town’s noble man ‘Paris’, the priest ‘friar Lawrence’ and the rest of the town’s workmen. Shakespeare’s

Saturday, December 21, 2019

Minimum Wage Should Be Legal - 1239 Words

Lisa Valk Kristoffer Martin English Composition Raise Minimum Wage There is not one state in the US where a minimum wage worker can afford a two-bedroom unit at fair market rent, working a standard 40-hour work week(There are a few states where this is not true. Also, the fair market rent is the average cost. It doesn t reflect the super expensive and bottom rent places). The federal minimum wage would be $10.86 [per hour] if it had kept up with inflation over the past 40 years. Instead, it is $7.25 [per hour]. Every state in the US should have the minimum wage raised to $10.86 per hour(passive, rewrite). The cost of living has increased(s) dramatically every year(,) so why shouldn’t we raise the minimum wage.(?) The value of the minimum wage has fallen by almost 50 cents since it was last increased in 1991(Fact check; the Federal minimum wage was raised in 2007 to 6.35 an hour, up from it s 1991 rate of $5.15 per hour, and again in 2009 to $7.25 per hour). Living expenses are increasing so fast that more people are falling into the category of â€Å"lower class†. Author Tom Dickinson writes, â€Å"A family of four trying to live on the earning of a minimum-wage worker-- $15,080 a year—falls more than $8,000 below the poverty line† (Dickinson 33). (Transitional sentence?) Why not increase the minimum wage in every state?(I d make this an assertion, rather than a question) Author Dante DeAntonio (Who is he? Why should we trust him. Where s the intro?) writes that theShow MoreRelatedMinimum Wage Should Be Legal1427 Words   |  6 PagesThere has been a growing desire for minimum wage to be set at $15 an hour. While many of our lowest pay employees will be getting paychecks, workers who have been at businesses longer feel like they’re being undermined. Employees say that it is not fair for a new worker to be earning as much as someone who has been apart of the company for three years. Also, raising minimum wage poses a financial and management challenge for employers. Numerou s cities have passed wage increases in the past year, andRead MoreMinimum Wage Should Be Legal1307 Words   |  6 Pagesconcept of minimum wage has been a huge issue among Americans and has really become a large discussion point among a lot of the political debates as well as the Internet recently. According to the United States Department of Labor, â€Å"The federal minimum wage is $7.25 per hour effective July 24, 2009. Many states also have minimum wage laws. Some state laws provide greater employee protections; employers must comply with both†. Regardless of the constant debates that occur on whether or not minimum wageRead MoreMinimum Wage Should Be Legal940 Words   |  4 PagesMinimum wage is now at a steady $7.25 per hour and shows no sign of increasing anytime soon. There are states right now at the time that are trying to raise the minimum wage, and see how this will effect the economy of the area. As prices continue to increase in every day expenses, it becomes hard for us to keep up and be able to provide for our family or get even the basic necessities that we may need. People are saying that with more money, they will spend more back to the economy, thus helpingRead MoreThe Minimum Wage Should Be Legal905 Words   |  4 PagesRise in minimum wage has several impacts apart from unemployment. The minimum-wage workers would have to pay more taxes and receive fewer benefits if they are subjected to rise of minimum wage. The federal marginal rate for tax is 32 percent on an average for low earning members. This would amount to almost one third of the income of a worker. The tax rate is quite high for low paid workers. The rise of minimum wage would also reduce some of the advantages and leverages that the low-wage workersRead MoreMinimum Wage Should Be Legal1435 Words   |  6 PagesMinimum wage is currently a very heavily debated topic. Many are in favor of raising the curre nt national minimum wage of $7.25 to a more livable wage; suggestions for this increase are anywhere between $9-15 per hour. While the minimum wage has been raised several times throughout the years, it has not been kept proportional to raises in inflation which has led to a decrease in the amount of goods that people are able to buy with those wages, in turn making their economic lives more difficult. ThoseRead MoreMinimum Wage Should Be Legal1156 Words   |  5 PagesIn United States, we hear the government, businesses argued about minimum wage. Whether it should be raised or leave it the way it is. But, what exactly is minimum wages? Minimum wage is the least amount of money per hour that must be paid to a worker after surrounding a service according to the law. Many working class families’ lives depend on this minimum wages. There are few families who make less than $15000 a year who feed their families on this salary and still pay bills from it. Over the pastRead MoreMi nimum Wage Laws Should Be Legal900 Words   |  4 PagesMinimum wage bill majorly refers to a price control that is imposed by the government. The price control concept set a floor indicating what the minimum price must be paid or be imposed on certain services or goods (Murphy). The main aim of a government setting up price controls is always to ensure individuals or employers of a certain job group receive fair wages. Also, the minimum wage laws are mostly used by the federal government to ensure a basic quality of life among all the countries citizensRead MoreThe Federal Minimum Wage Should Be Legal2004 Words   |  9 Pagesinvolved in an impassioned debate over the federal minimum wage. As of October 5, 2016, the federal minimum wage is set at seven dollars and twenty-five cents an hour. There are numerous amounts of stakeholders when it comes to minimum wage. The three stakeholders mentioned in this essay will be Companies, Employees, and the Economy. In addition to the stake holders, this essay will also dig into the history of the United States Federal Minimum Wage and see how it has progressed over the years and ifRead MoreRaising The Federal Minimum Wage799 Words   |  4 Pages In the US, President Barack Obama urges Congress to raise the federal minimum wage to $10.10 an hour from $7.25. Although some Republicans oppose to this action, overwhelming majority of Americans see that is a good idea (The Guardian, 2014). Regarding to the issue of minimum wage, there have been lots of debates for a long time. Some economists such as Milton Friedman deeply believe that minimum wage kills jobs, but some like Alan Krueger and David Card think, to some extend, it actually increasedRead MoreThe Challenges of Implement a Minimum Wages Policy1077 Words   |  5 PagesCreating a so called â€Å"culture of compliance† among employers (Skidmore 1999: 435) is a low-cost strategy for facilitating the self-enforcement of minimum wage. This strategy implie s the construction of persuasive arguments in favor of the minimum wage and the appeal to common values and beliefs such as, for instance, the principle of â€Å"fair pay – fair play†. Here, two main strategies for building commitment among employers can be identified. First, persuasive processes at the interpersonal level

Friday, December 13, 2019

Class Perceptions on Personal Choice Free Essays

Have we ever thought of what governs us when we make a choice? Are we ruled by certain cultural or ethnic perspectives, or do we value our feelings toward the person, who is expected to accompany us through joys and sorrows for the rest of our lives? Very often, cultural and class perceptions play the predominant role, when we make a romantic choice. In his novel A Room with a View, E.M. We will write a custom essay sample on Class Perceptions on Personal Choice or any similar topic only for you Order Now Forster ironically depicts the increasing conflict between the real and the pretended and the impact, which class and social prejudice may have on what we call â€Å"true passion†. A Room with a View is an ironic depiction of the social narrow-sightedness and the lack of sincere spontaneous response to the feelings, which may change under the pressure of artificial class and cultural views of the conservative society. Literature critics of the post-war period emphasize the growing level of British cultural self-consciousness that has gradually turned into a misrepresented set of class and cultural perceptions. â€Å"With the post-1945 decline of Britain as an economic, political, and military power, its international standing as well as its own sense of national identity have been increasingly determined on the level of cultural production† (Freedman 79). Forster’s novel suggests that with time, this cultural consciousness has transformed into cultural and class prejudices that falsely positioned England as the predominant source of cultural trends in Europe. In this context, Forster’s Lucy reveals the hidden facets of English cultural perceptions. Lucy’s character reflects the growing gap between her inner promptings to love and the external social pressures that tell her what she is expected to tell or to do. Lucy â€Å"was accustomed to having her thoughts confirmed by others†¦ it was too dreadful not to know whether the was thinking right or wrong† (Forster), and even when she is prepared to take the single and the most appropriate decision, the distorted English visions of culture and class raise her doubts as for what she has to do. Forster uses Italy as the mirror and the prism for evaluating the negative potential of cultural and class perceptions in the then England. The battle for a room with a view is actually the battle for nothing, because a room with a view will never offer any benefits to a person, who is too blind to see anything behind the window. Lucy’s battle over her happiness is very close to the situation, where the blind is persuaded that the room with a view is much better than the room without the one. â€Å"How do you like this view of ours, Mr. Emerson? – I never notice much difference in views. – What do you mean? – Because they’re all alike. Because all that matters in them is distance and air† (Forster). In the same manner, Lucy is coming to the realization that her relations with Cecil are nothing but an empty combination of the social prejudice and the decision that was imposed on her by the norms and traditions of her surrounding. â€Å"As Forster’s narrative unfolds, it becomes clear that there must be something wrong with ‘development’ in a code of behavior which can mistake delicacy for beauty, while treating frank talk about baths and stomachs as indecent, and kisses as insults† (Taque 94). This cultural and class blindness and the fight for a better view are the central themes that accompany Lucy in her long journey to personal revelation. She is stifled by the air of indifference toward her feelings and desires; she is confronted by the need to follow the imposed behavioral code that evidently does not satisfy her inner strivings to be happy. Italy and the Italians open her eyes on the realities of her drastic existence within the narrow space of the social and class prejudice. When she hears Mr. Beebe’s remark that â€Å"Italians are a most unpleasant people. They pry everywhere, they see everything, and they know what we want before we know it ourselves. We are at their mercy† (Forster), she has nothing but to conclude, that her life and her future are at the mercy of the socially blind norms, which govern her choice. For once, Lucy has to pause and rethink everything that was going through her mind and her soul. George leads her to re-considering her values. She is overfilled with emotion: â€Å"some emotion – pity, terror, love, but the emotion was strong – seized her, and she was aware of autumn. Summer was ending, and the evening brought her odours of decay, the more pathetic because they were reminiscent of spring. That something or other mattered intellectually?† (Forster). A bright literary parallel between the English cultural norms and the odours of decay suggests that if Lucy fails to defend her right to choose, she will be doomed to spend the rest of her life in the pressuring atmosphere without any hope for moral and spiritual resurrection. Mr. Emerson is correct stating that â€Å"we need a little directness to liberate the soul† (Forster); Lucy is searching some free space where she will be protected from the strong winds of English cultural and class perceptions. She wants to be free to express her feelings without a fear of being condemned. Ultimately, she has the right for spontaneous feeling without any tint of reason, which conservative England is so actively imposing on her. How to cite Class Perceptions on Personal Choice, Papers

Thursday, December 5, 2019

Privacy and Security in Digital Networks-Free-Samples for Students

Question: Discuss about the Privacy and Security in Digital Network. Answer: Case study The Singapore Government has deployed a network of smart sensors and cameras at various points like traffic lights and rubbish bins. There are also a series of sensor boxes to act as Wi-Fi hotspots throughout the city coupled with a heterogeneous network where smart phones and other devices seamlessly switch between mobile data and Wi-Fi. All these measures are taken to ensure that they curb cybercrime and mitigate the risks with information security in the digital world. Privacy issues touching residents and visitors Sensors are hardware devices that construct a measurable reaction to a change in a physical form like temperature or pressure (Lakhtaria, 2015, p. 328). Smart sensors are devices that take input from the surroundings and uses inbuilt computer resources to perform the specific functions it was designed for. Smart sensors are used for monitoring and control purposes in a myriad of ways: traffic control and management, garbage collection and waste disposal, aided parking and notifying the authorities in case an incident that may need their intervention occurs. A network of smart sensors consists of cameras, network sensors, wireless devices, control centers and people monitoring the systems. According to Yang (2014) the network of smart sensors captures data from various sources and relays the data to a central control centre where it is analyzed and used to make real time decisions to curb possible adversaries and help mitigate their impact on the day to day lives of the citizens. A network of smart sensors help the government to operate as an enterprise eliminating silos where information is isolated and there is no sharing of the information gathered with other divisions. Silos make it difficult to share information across various departments in the government since the information and operations are independent to the specific departments (Abraham, Falcon Koeppen, 2017). Where there are silos, information is not shared freely among various divisions in the government. Other divisions of the government may also intentionally fail to share and exchange information with their counterparts in the government making it difficult to cooperate thereby limiting the activities across various departments which directly interferes with the efficiency of the government. It is necessary to do away with silos to enable free flow of information across various divisions in government to enable effective and efficient control and service delivery to the citizens. The reason behind deploying a network of smart sensors in a city or town is noble as it helps the government improve on security for its citizens. This is possible since smart sensors capture data and transmits it in real time (Hu Hao, 2013). The information captured by the network of sensors is analyzed and used by various government agencies to make the appropriate decision according to the situation at hand. The data captured from the various sensors deployed provides an incessant flow of information that is used to make decisions in real time and report emergencies if they occur. Sensor networks are able to measure and track all the activities happening within their sphere making it possible to provide spot on security services for example, when the network of smart sensors transmit information about an incident in the city like a peaceful protest that escalates to become violent, security personnel can be deployed to contain the protesters. Smart sensors can also improve on the efficiency and sustainability of infrastructure. Having smart sensors on water and gas lines makes it possible to detect if there are any leaks. Smart sensor on power lines, traffic lights, street lights makes it easy for surveillance of these systems making it easy to make decisions based on the information received (Khan, Pathan Alrajeh, 2016). Smart sensors when used in waste collection and disposal makes it easy to manage the waste. Smart sensors make it easy to manage the systems and save on costs. Smart sensors can also be used in assisted parking to make the lives of the citizens easy. Where there are smart sensors there is a lot of surveillance involved. Smart sensors capture and track anything and everything in the places where they are deployed (Ammari, 2014). Because the network of smart sensors captures anything and everything, it raises concerns about privacy. Though the government downplays matters privacy, it is a major concern for citizens. Citizens want to operate freely without fear of the big brother. Citizens want social privacy and data privacy. Citizens want privacy to their data, behaviour and actions, communication, location and personal space, association, image and their thoughts and feelings. Availability of smart sensors in public places enables government agencies to collect an immeasurable amount of data about their citizens and visitors (Sun Hong, 2014). The data collected about citizens and visitors can be transmitted to other interest groups without necessarily seeking the opinion of the individuals. This is a breach of the Personal Data Protection Act 2012 (PDPA) which grants the citizens the right to access and correct data about them since they have the right to know what information is contained about them and how this information is used. The Personal Data Protection Act also governs how organizations collect, use and disclose personal data. With the availability of a network of smart sensors, it is possible to collect large amounts of personal data about residents and visitors. Disclosure and use of this data raises concerns of privacy which need to be addressed to maintain peoples trust in organizations collecting this data. People have the right of privacy to their location and personal space. With the use of smart network sensors, it is possible to accurately locate a person (Kooijman, 2015). It is even possible to construct their activities throughout the day. It is possible to track a person from the time they leave their house till the time they go back to the house. This is possible since as they leave the house, they come across IP cameras installed strategically in various places. As they move towards town, the traffic lights with facial recognition are able to identify them and transmit their movements. The CCTv cameras found in various joints like restaurants, supermarkets and shops can be used to construct the movements of people (Sebastiano, Breems Makinwa, 2013. This shows that movements of people are under watch and someone with access to the network of smart sensors is able to watch every step they make. There are a series of sensor boxes at Wi-Fi hotspots, introduction of a heterogeneous network where smartphones can seamlessly switch between mobile data and Wi-Fi. This improves communication considerably since residents and visitors are able to keep their devices connected at all times. However, this raises concerns on the privacy of communication. Sensor boxes found in Wi-Fi hotspots are able to sift information that people are sending over these networks. This means that whatever information sent by residents and visitors over these networks are subject for scrutiny so as to distinguish the good and bad communication. Surveillance of these networks may be justified by the fact that cybercrime is on the rise today therefore making it necessary for all digital content to be evaluated (Benhaddou Al-Fuqaha, 2015). This however infringes into the rights of innocent persons who have no business with cyber criminals and terrorists. People have the right of association. People are allowed to join organizations of their liking. TheFreedom of Association and Protection allows workers and employers join organizations of their own choice without external influence (Havel, 2016). People are also allowed to take part in the activities of their individual groups as long as they do not interfere with other folks. With the availability of smart sensors, it is possible to track the activities of various groups. Some groups of questionable activities may be targets of government agencies. These groups of interest to the government may be closely monitored by the government with or without their consent though it is their right to assemble and carry out their activities without external intervention according to The Freedom of Association Act (1948). This profiling is a breach of their right to associate and carry out their activities. People have the right of privacy to their thoughts and feelings. They are allowed to express themselves as long as it is not in a way that is demeaning to another person. It is good of people to watch what they post online knowing too well that they should ensure safety as well as recognize and deal with online bullying be it as targets or witnesses. Technology today has made it possible to pass information quickly and efficiently to other people using various platforms like electronic mail, social media and the Internet. There is however concerns since the activities carried out by people over these digital networks can easily be monitored by government agencies. Smart sensors networks are able to collect the data we post online and construct it to possibly identify the individual of interest (Selmic, Phoha Serwadda, 2016). With the existence of wireless sensor networks it is possible to collect and construct information that can be used to identify the digital identity of a person. The things we post online, the websites we visit, the online surveys we take part in and other online related activities are all monitored and this information stored somewhere. The information can be stored by government agencies or even advertisement companies who may use this data as they so please without necessarily making the persons profiled aware. This information can include sensitive information like location, credit card numbers, medical records or even national security number. Heterogeneous network Heterogeneous networks are designed to take care of the varied needs of users since network environments are never the same (Wang, Cui Guo, 2014). The availability of heterogeneous networks provides seamless switching between mobile data and Wi-Fi. The heterogeneous network is part of the Singapore Governments plan to ensure that both visitors and residents get connection to their devices at all times. Heterogeneous network makes it possible for users using wireless connectivity to access different technologies like Wi-Fi and mobile data. The series of sensors found in the Wi-Fi hotspots would affect the privacy of both residents and visitors (Langendoen, Ferrari, Zimmerling and Mottola, 2014) since the government agencies are able to access and dissect through the communications of these people using the series of sensors deployed. This would make those people aware of this fact reluctant to share their sensitive information using their digital devices (Langendeoen et al., 2014). Heterogeneous networks provide flexibility so that users of various existing networks can access the network more efficiently and in a cost-effective manner (Marabissi Fantacci, 2015). Heterogeneous networks provide uniform coverage and provide high quality and spot-free network provision Hu and Qian (2013) thereby improving the system throughput and boosting its capacity making it desirable for densely populated areas and business districts. Heterogeneous networks also boost availability and uniformity in access for users. There is also high data rates made possible by the existence of coordinated small cells that guarantee grander and seamless user experience. Digital identity Digital identity is the system or Internet identity comparable to the genuine identity of a man or even an entity like an enterprise or government. Digital identity is used as proof where one has to input their credentials in their personal computers, mobile phones or other personal gadgets like tabs, personal digital assistants before they are able to access and use these systems and devices (Cover, 2015). One needs to authenticate and value their identities before they can be able to use their digital identity. Digital identity consists of various attributes like a username and password, online search activities, purchasing history and characteristics. Digital identities can be used to improve the security and privacy of individuals. Mukhopadhyay and Jiang (2013) mention that individuals are able to maintain their digital identities by implementing the right security measures. The use of two-factor authentication can improve the security of the accounts containing our digital identities. Two-factor authentication provides an extra layer of security since it requires the use of a unique identifier sent to the users as a one-time-pin to their cell phones. The one-time-pin is then used to verify the system together with the user name and password. Steps to enhance security and privacy Cryptography is a good way for residents and visitors to implement so as to protect themselves from unauthorized access that may breach their security, privacy or both. Encryption stores the information in a scrambled form that is not readable unless someone has the decryption key (Stallings, 2013). Encryption uses an algorithm that makes use of an encryption key and a decryption key. According to Stallings (2013), a hash function can also be applied to encrypt data or the mobile device. When residents and visitors make use of encryption, the government agencies and criminals will have to go an extra mile in order to decrypt and possibly access their data. Using applications that make use of encryption like WhatsApp which uses end-to-end encryption therefore making communication between its users secure. The advantages of using cryptography are; maintenance of confidentiality, integrity, authentication and non-repudiation. However, there are some downsides of using cryptography with the main one being access for even limited users in the scenario where they forget their credentials. Westcott Coleman (2015) also identify that cryptography does not take care of other vulnerabilities like poor design of systems and social engineering methods that exploit human weaknesses therefore it is not fool-proof. It is also important for people to check their privacy settings. This traverses many areas of phone use like browser settings, accounts settings and third party applications. It is important that one read the privacy policy before installing third party applications. They should also check through the settings of the browsers they use in their phones so as to determine whatever they allow others to view. By doing all these; checking privacy settings, viewing and disabling any sensitive permission they grant third party applications and properly configuring their browsers, the users ensure that they are in control of what they directly share with the world and other people (Olga, 2015). This can however interfere with the functionality of their devices since some applications may need specific permissions to work better. Where there is a wrong configuration of their devices, the devices will not perform to optimality therefore interfering with the quality of service they receive. The third party applications we install are also a way that can be used to collect information about us. The types of applications we install in our phones speak a lot about our likes and preferences. These applications also come with special permissions that they need you to grant them upon installation. A good example is an application that acts as a flashlight and requires permission to access network connection and precise location using GPS and the network. This leaves you wondering what a flashlight will need GPS location for to work. It is also important to install these third party applications from trusted sources to avoid installing applications that may perform malicious activities in our digital devices. To protect themselves, one can also make use of a virtual private network. Virtual private networks do not communicate the websites we visit but route the traffic through different servers of selection (Inamdar, 2016). Virtual private networks create a further layer of security and privacy by masking the IP address of our devices and spoofing our location. Virtual private networks also make use of encryption and encryption protocols like IP security, secure socket layers, layer 2 tunneling protocol and point-to point tunneling protocol to offer differing levels of security. Virtual private networks are a good tool in keeping our information and communications secure. However, the companies that provide virtual private networks services can work with the government and government agencies to disclose data upon request. This is a major breach in the privacy of users who might be directly or indirectly affected by these actions. Cookies are a way that can be used to identify someone by using them to trace the online habits of a person. Cookies are managed and stored by our web browsers. Cookies can be used by advertising companies to send target adverts. They can also be used by tracking networks to sell browsing data to interested entities. Cookies store bits of information like login details, personalized content like our shopping habits or travel habits, the websites we like visiting the most (Kizza, 2017). This information is available and is collected every time we use the Internet. It is therefore necessary to configure and set our web browsers to ensure that we check the permission we have granted the cookies. The advantage of managing cookies is that we control whatever we share with the outside world through the online environment. Disabling of cookies may however interfere with the working of some websites and in them providing a more personalized experience as we go about our online business of br owsing and surfing. As much as I am convinced of the benefits brought about by the deployment of smart sensors, they leave several unanswered questions. The existence of smart network sensors makes it possible for our governments and the relevant authorities to act promptly on any possible threats perceived thereby better protecting their citizens. However, constant and consistent surveillance of its citizens and visitors begs the question whether our actions and thoughts are free from scrutiny by government agencies. Are people allowed to operate freely without the watch of the big brother? It is therefore important to note that in as much as we would like to keep our affairs private and secure when it comes to matters digital, there is always a very thin line between these two. References Abraham, A., Falcon, R. and Koeppen, M. (2017).Computational intelligence in wireless sensor networks : recent advances and future challenges / Ajith Abraham, Rafael Falcon, Mario Koeppen, Editors. Cham, Switzerland: Springer International Publishing AG. Ammari, H. M. (2014).The Art of Wireless Sensor Networks: Volume 1: Fundamentals. Berlin, Heidelberg: Imprint: Springer. Behera, H., Mohapatra, D. (2016).Computational Intelligence in Data Mining. New Delhi: Springer India. Benhaddou, D., Al-Fuqaha, A. (2015).Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications. Cover, R. (2015).Digital identities: Creating and communicating the online self. Havel, Harvey. (2016).Freedom of Association. America Star Books. Hu, F. and Hao, Q. (2013).Intelligent sensor networks. Boca Raton, FL: CRC Press. Hu, R. Q., In Qian, Y. (2013).Heterogeneous cellular networks. Inamdar, G. (2016).IKEv2 IPsec Virtual Private Networks. [S.l.]: Cisco Press. Lakhtaria, K. I. (2015).Next generation wireless network security and privacy. Khan, S., Pathan, A. and Alrajeh, N. (2016).Wireless Sensor Networks. Boca Raton: CRC Press. Kizza, J. M. (2017).Guide to Computer Network Security. Cham: Springer. Kooijman, M. (2015).Building wireless sensor networks using Arduino. Birmingham: Packt. Langendoen, K., Hu, W., Ferrari, F., Zimmerling, M., Mottola, L. (2014).Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013. Cham: Imprint: Springer. Marabissi, D., Fantacci, R. (2015).Cognitive interference management in heterogeneous networks. Mukhopadhyay, S. C., Jiang, J.-A. (2013).Wireless sensor networks and ecological monitoring. Berlin: Springer. Olga, L. (2015).Basics of network security: Part 2. Poellabauer, C. and Dargie, W. (2013).Fundamentals of wireless sensor networks. Hoboken, N.J.: Wiley. Sebastiano, F., Breems, L., Makinwa, K. (2013).Mobility-based time references for wireless sensor networks. New York: Springer. Selmic, R., Phoha, V., Serwadda, A. (2016).Wireless Sensor Networks: Security, Coverage, and Localization. Stallings, W. (2013).Cryptography and network security: Principles and practice. Upper Saddle River, N.J: Prentice Hall. Sun, L., Ma, H., Hong, F. (2014).Advances in Wireless Sensor Networks: 7th China Conference, CWSN 2013, Qingdao, China, October 17-19, 2013. Revised Selected Papers. Berlin, Heidelberg: Springer. Wang, X., Cui, L., Guo, Z. (2014).Advanced Technologies in Ad Hoc and Sensor Networks: Proceedings of the 7th China Conference on Wireless Networks. Westcott, D. A., Coleman, D. D. (2015).CWNA certified wireless network administrator. Yang, S.-H. (2014).Wireless sensor networks: Principles, design and applications.