.

Wednesday, August 26, 2020

Response letter for article Video Game Violence by Mark and Keisha Essay

Reaction letter for article Video Game Violence by Mark and Keisha Hoerrner - Essay Example Hence, it is important to consider the abilities the game is attempting to show your youngster. On the off chance that the game underlines on shooting, executing, theft and other standoffish practices, it may not be a smart thought to buy it. Computer games reward their players for different practices. In most savage computer games, practices, for example, shooting and executing are profoundly remunerated with focuses (Anderson& Warburton, 2012). As your kid keeps on playing these games, he is urged to accomplish a greater amount of the killings and shootings so as to win more focuses (Hoerrner and Hoerrner, 2006). These exercises, albeit savage in nature, pull in the greatest prizes. Since your youngster is as yet creating, all things considered, he will grow up valuing savagery. Subsequently, the computer game you buy for your kid will cause him to float towards negative social activity after some time. Since computer games increment the child’s hunger for savagery, he is probably going to need a greater amount of this amusement as he develops; both, all things considered, and in the gaming scene (Gentile and Anderson, 2003). These games train kids to see the world as a risky spot in which they need to contin ually search for foes and different dangers. Lamentably, the main method of managing such dangers, as advanced in these games, is through viciousness (Giumetti and Markey, 2007). In view of the connection between computer games and brutal conduct, it is significant for you as a parent to comprehend the appraisals given to the different games. In the article by Mark and Keisha Hoerrner (2006), it is noticed that it is the duty of guardians and society to comprehend what is being told in these computer games. Prior to making the buy, it is important to check the evaluations of the game you plan to purchase. This will help in buying a computer game that is suitable to the level and age of the youngster. In these games, components, for example,

Saturday, August 22, 2020

Flipped Classroom Essay

A turned homeroom turn over is a customized and collaboration time of the entire class. Instructors and understudies ought to be locked in along the procedure. Changes are consistently a method of improving and making it a superior learning condition for all. Ask Yourself: How to do you get ready to flip your class? Subsequent to understanding settings, watching web communicates and taking a diagram of exercises. Teachers can begin by wiping out long talks of guidelines, inefficient worksheets and diaries. We can supplant them with the utilization of cycle, joining forces and sharing and practice. Let’s investigate cycle: Recall composing the Anticipatory Set on the board and getting understudies to reply. Well recollect time wasn’t one your side to get all criticism from your understudies: To get the consideration of your crowd, well through emphasis, you can content, post short recordings, or FB the Goal and send it to all the understudies in class. After this, you would regularly put The Do Now task on a SmartBoard or on the overhead projector. Well the banding together stage fits in when you permit the criticism from your students’ reaction. They additionally get the opportunity to see other understudy remarks while they are posting. This is a type of blogging. You can likewise propose picture transferring on the task or sharing a short you-tube video that rehashes the point and different recommendations. Hello did I notice during this time they are sharing data and banding together while they are perusing different remarks or recommendations from their friends. Flipped study halls are not simply the utilizing of innovation. We are chopping down the hour of explaining of exhausting instructor addresses, eye to eye connection, perusing exhausting books that the educator handpicked for the study hall. The Pros about flipped homerooms. 1. The understudies are assuming liability for their own learning through joint effort with their own companions. On the off chance that you are permit the general population to see, your class is gaining from other people who either executed the exercise and can get an entire point of view from others around the globe. 2. The instructor gets moment reactions on production of exercises. This permits others to either give helpful analysis or adjusted ways on exercise instructed. Again criticism is a route on improving the exercise and remembering various styles for new stages or applications. 3. Non-attendance, Not an issue for the understudies at home. They can without much of a stretch participate at the time took into account the postings. Keep in mind, it's anything but a brief class to them at home. They have the opportunity to make up for lost time with conversations and furthermore give their criticism without missing the task. Recollect in the students’ mood, NO CHILD LEFT BEHIND! At long last, Dates and postings are consistently there for clearness. The substance is changeless and filed for audit or remediation. Recollect you dispense with the requirement for â€Å"What did you say? † or â€Å"I don’t recall that you said it†. This is the future a spot where every one of your understudies are learning at their pace.

Improving Concentration And Memory Skills

Improving Concentration And Memory Skills In the event that you wish to improve your memory aptitudes, for example your capacity to recall data and remember it when you so want, it is basic that you improve your fixation. Fixation expects you to concentrate eagerly on whatever you are attempting to recall. Fixation empowers you to: learn new realities review data that you have just retained Clearly you have to concentrate on the data to be scholarly in the event that you need to recollect it. So you should improve your fixation to improve your memory. You can't guarantee that your forces of focus are frail and consequently you experience the ill effects of a feeble memory. Focus is a psychological aptitude. It very well may be created by you, much the same as some other ability. There are a few energizing manners by which you can help your focus power. Stage 1: Power Your Brain In the event that you truly wish to improve your focus, attempt the accompanying tips and you will locate a checked improvement in a generally brief timeframe period. There have been a few books that have been composed regarding the matter of how the mind functions and how you can utilize this information to improve its working. In Train Your Mind, Change Your Brain, Sharon Begley clarifies that the structure and capacity of the grown-up cerebrum isn't unchangeable. The associations between the neurons in your mind develop and change constantly. At the point when you figure out how to play the guitar, study the human life structures, read a book, practice the Chinese style of cutting vegetables, or build up another propensity, you are expanding the systems administration in the cerebrum. Similarly as with some other muscle in the body, the more you utilize the cerebrum, the better it becomes. You have to practice a muscle consistently to create it. In a similar way, you should practice your mind consistently to create and keep it fit as a fiddle. Your cerebrum can change and develop constantly. This is a nonstop procedure and doesn't occur incidentally. With constant and steady exertion, you can improve your cerebrums capacity to think. Incorporate with your day by day system the accompanying propensities: Care reflection: Begin by thinking for five minutes toward the beginning of the day and for five minutes again around evening time before heading to sleep. On the off chance that you do this regular, you will see that your capacity of focus is improving. Care intends to know or cognizant. Reflection hones your concentration and memory. Studies at Massachusetts General Hospital in Boston have demonstrated that standard contemplation makes changes in the physical structure of the mind by thickening the cortex. At that point thickening of the cortex happens as a result of expanded blood stream to that region. The cortex is that territory of the mind that manages the higher mental capacities. Along these lines, reflection and memory are inseparably connected to one another. By contemplating normally, you improve your cerebrums capacity to center. It likewise gets clearness your reasoning. I discovered care contemplation is the most ideal approach to reflect. Along these lines you need to do the converse of other contemplation techniques generally utilized. Here you won't attempt to exhaust your brain however you will attempt to fill your psyche with as much as possible. Be that as it may, it ought to be from the present just not from the past and what's to come. For examp le sit serenely and attempt to concentrate on your breathing sound, listen its sound. Feel it, attempt to envision that air going in and out. I mean make your all the faculties/recognition occupied enough in getting data from the current second. It will make occupied your brain in the current passing development and you won't get an opportunity to ponder in past and future. What's more, fixation is tied in with remaining in present. You can do something very similar while eating, washing, strolling by making your faculties occupied in getting the data in the current development. Like what is the temperature of water you are utilizing for shower or what are the elements of the food you are eating additionally attempt to break down their amount. Legitimate rest: Sleep adds to the drawn out solidification of new recollections (Nature diary, November 2006). Passing by this, any new recollections that are framed require enough rest to empower the mind to sort out and hold them. In the event that a night has been stayed in bed hurling and turning (if its because of an old sleeping cushion, toss it out and get another one), the mind isn't new and prepared to confront another day of work. It is foggy and tired, and it won't work with lucidity and sharpness. Its capacity to hold anything will be diminished. Both fixation and memory will endure as a result of poor rest. To improve the nature of your rest have a hot cup of milk before hitting the sack, expel upsetting musings from your brain, obscure the room, have warm shower, put on some light music and read an exhausting book. Every one of these things are planned for guaranteeing that you get a decent evenings rest. It will enable your mind to support its vitality levels. This thusly will prompt improved focus. Eat more advantageous: There is an immediate connection between's your eating routine and your focus and memory. The supplements and vitality required by your mind are provided by the food you eat. The cerebrum utilizes glucose, a sugar, as fuel, so your glucose should be managed. To help improve your memory, cut back on quick nourishments which are high in soaked fats and salt, the two of which hinder your carotid supply routes. Such blockages diminish the gracefully of oxygenated blood to the cerebrum. The centering intensity of the mind is then decreased. Diminish your weight to the ordinary levels, for being overweight makes your physical body and your psychological limits drowsy. Eat nourishments that advance your mind to help in improving its usefulness. Mind nourishments incorporate apples, bananas, dull green vegetables, for example, spinach, eggs, flaxseed, and fish, and some basic unsaturated fats like Omega - 3. Drinking in any event one liter of water a day for each 23 24 kg of body weight will likewise help. To keep your glucose consistent, take five or six little suppers for the duration of the day. Breaking point your calorie admission to what is basic. Nutrients and different enhancements: Mind improvement supplements don't do a lot and can be maintained a strategic distance from. Taking a multi-nutrient tablet ordinarily as an enhancement helps. It might fill in the lacuna made by any sort of nutrient lack in your eating routine. Cod liver oil cases, Vitamin B and nutrient C tablets help in enhancing the nutrients that you get from your normal eating regimen. Nutrients are fundamental for the best possible working of your cerebrum. Cerebrum games: You have to play the games that request more prominent core interest. These ought to be played regularly to improve your focus levels. This is on the grounds that the cerebrum turns out to be better at whatever it practices all the time. By playing those games that require concentrated exertion, the minds capacity to center increments. Stage 2. Enhance your Environment: A legitimate domain, helpful for contemplates, likewise helps in improving your fixation. A Study Area: It is a great idea to have an assigned spot for considering. You will start concentrating there. Ensure its not the bed that you use for examines, for the bed identifies with rest. Have a work area in a calm and detached spot away from commotion to empower you to think. Attempt Different Colored Lights: Ongoing investigations show that the utilization of a green light in the examination light improves focus. You could give this a shot to check whether it works for you. Red light is likewise expected to improve fixation and memory. You may likewise enhance your examination zone with relics and things which are red in shading and see whether this aides in improving your fixation. Evacuate Distractions: Radio, TV, and phone are for the most part interruptions. They ought to be turned off during your examination time. This will enable you to center. Ensure that when you study, you are not upset by companions who call or drop in out of the blue. Your examination time ought to be obvious to you just as others. By separating your investigation hours, you will forestall the interruptions that in any case eat into your time. Use Time Boxes: For a specific part of study, set a sensible time limit. On the off chance that you wish to gain proficiency with another section, set forty minutes for understanding it and an additional twenty minutes for learning it. You ought to have the option to finish the part in 60 minutes. By doing this, you guarantee that there is a cutoff time to be met and this causes you to concentrate on the work. Remain Motivated: To remain propelled you can guarantee yourself a prize toward the finish of a specific time of centered contemplating. For instance, you may reveal to yourself that following a few hours of study, you will have earned the compensation of viewing your most loved T.V. appear around evening time. Enjoy a Regular Reprieve: Consistently, enjoy a brief reprieve, to forestall your vitality levels from slacking. You ought to get up from the seat, walk a piece and stretch your legs. Have a glass of water or a light tidbit. Do some eye activities to loosen up your eyes. Change your Breathing: Change your breathing to initiate your alpha waves. Change your breathing example to more profound and more slow. This causes your cerebrum to change to alpha waves, which intellectually set up your mind to focus on new realities. The alpha waves carry your psyche to availability to learn new realities. This is the cool and loosen up perspective. Any learning requires focus. Without concentrating on the data, the cerebrum won't have the option to learn or recall. In the event that your cerebrum meanders, it won't review an exercise. So fixation is an unquestionable requirement for learning and holding. Improvement in focus will prompt improvement in the memory since getting the hang of, recalling and remembering are all between related. On the off chance that you have not realized, by what method will you recollect? Subsequently, improve your fixation and this will prompt an improved memory.

Friday, August 21, 2020

Unilever Vs Nestle free essay sample

Today we live in a worldwide economy in which the time taken for individuals to move between landmasses has been altogether diminished and in which Internet and different associations make moment associations conceivable. Organizations and associations presently need to perceive that they currently work in a worldwide commercial center and to create suitable techniques. A worldwide system is an authoritative arrangement that considers these new worldwide real factors. Both Nestle and Unilever have created worldwide dispersion and advertising systems, in view of their powerbrands I. . advertise driving brands that are unmistakable in about each nation on the planet. Both Nestle and Unilever have numerous powerbrands. Key parts of worldwide procedure include: 1. Regarding the worldwide market as the residential market, as far as tender loving care, without being self-satisfied or ingnorant. 2. Making a worldwide advertising blend, perceiving provincial and national contrasts, for examp le, contrasts in language and tastes. 3. Making worldwide creation and appropriation frameworks, e. We will compose a custom paper test on Unilever Vs Nestle or on the other hand any comparable subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page g. superfactories covering significant regions of the world. Focusing on powerbrands the best brands and items. Since the worldwide market is so enormous there are significant advantages to be picked up from economies of huge scope creation, showcasing and dispersion. Instead of creating a great many various items it bodes well to limit the range to an a lot more modest number so as to help these brands over the globe. Unilever is one of the world’s driving providers of purchaser merchandise, including family top picks, for example, Persil, Knorr, Hellmann’s, Lipton, and Dove. To stay aware of buyer needs and increment working edges, Unilever needed to merge its 1600 brands to 400. By uniting its brands, Unilever plans to concentrate on more grounded item advancements, fortifying advertising endeavors, assembling a world-class gracefully chain, and disentangling business forms. Named Unilever’s Path to Growth methodology, the organization has just spared â‚ ¬1. 6 billion from worldwide acquirement efficiencies. Keeping up 1,600 brands over the world was extremely hard for Unilever to control. Unilever had a decentralized IT foundation which did not have the joining required for a genuinely productive worldwide organization. To arrive at its Path to Growth objectives, workers at Unilever required quick, simple access to data on both a local and worldwide premise. To get to this point, the IT division propelled the Unilever Information Program (UIP) to build up a foundation to help the Path to Growth system. Probably the best need for the UIP was to locate a speedy information joining answer for permit client access to any number of information hotspots for top to bottom examination. The UIP gave Unilever the accompanying ; †¢Better comprehend shopper needs and plan with its key worldwide clients †¢Monitor the soundness of its best 400 force brands and contenders †¢Identify how to improve and smooth out flexibly chain the executives overall †¢Provide business knowledge (BI) and monetary giving an account of a worldwide premise By utilizing the UIP Unilever are fortifying their associations with retail clients. They will likewise be redistributing value-based activities in IT, fund and HR with the goal that they can concentrate on developing worldwide brands. Unilever has profound roots in neighborhood societies and markets the world over that gives them a solid relationship with clients and is the establishment for their future development methodology. They intend to bring their abundance of information and universal aptitude to the administration of neighborhood customers. They see themselves as a genuinely multi-nearby worldwide. Unilever’s future system is as per the following; â€Å"We plan to manufacture a triumphant portfolio by broadening our administration positions and our essence in high development spaces. We are improving our center abilities. Bringing this ogether as ‘One Unilever’ will guarantee that we benefit from both our nearby roots and worldwide scale. † This infers they are attempting to turn into a completely coordinated organization with the utilization of their UIP framework and afterward apply their universal experience and information in neighborhood markets. Settle With such a huge it em portfolio, Nestle utilizes six umbrella brands: Nestle, which represents 40 percent of the business, Purina pet nourishments, Maggi, Nescafe, Nestea, and Buitoni. Settle utilizes a territorial technique, which is thus the beginning stage for nearby market business procedures. To comprehend Nestles methodology of cost-productive worldwide development, open up a Kit Kat. Settle obtained the chocolate-shrouded wafer bar in 1988 when it purchased Britains Rowntree. Today its a $1 billion business and the organization is pushing Kit Kat as its response to the Mars bar, the universes most well known chocolate. A year ago Nestle began creating Kit Kats in Russia and Bulgaria for Eastern Europe. A Latin American dispatch is arranged for this present year. Pack Kat is as of now selling energetically in Japan, Australia and India, and a re-dispatch is in progress in Thailand. Dissimilar to Coca-Colas, Kit Kats recipe is diverse all over the place. A Russian Kit Kat is a small amount of an ounce littler than a Bulgarian one, and the chocolate is coarser and not as sweet as that in a German Kit Kat. In Japan, strawberry-seasoned Kit Kat is extremely popular. Every one of these item varieties is the consequence of intensive statistical surveying on nearby tastes. There is no worldwide shopper for the food-and-refreshment business. This is a profound conviction we have, says Brabeck. For all Nestles worldwide reach, Brabeck excuses the possibility of worldwide brands. We accept there is nothing of the sort as a worldwide customer, particularly in a division as mentally and socially stacked as food. Accordingly, Nestle holds its image quality by utilizing neighborhood brands, for example, Rolo in the U. K. or on the other hand the Rossyia confectionary extend in Russia. Additionally, item details likewise change from market to market to reflect nearby tastes. Each and every day, billions of clients need to settle on the decision to pick our [products], he says. This implies having a neighborhood character. Thus, he excuses the thought of worldwide promoting. Indeed, we attempted once to make a worldwide Nescafe crusade. On paper it was proficient, yet it was a failure. Possibly they are not significant or they are hostile. Settle utilizes a separated showcasing methodology modifying their items explicitly for nearby tastes. This has demonstrated extremely effective for them and they hope to proceed with this procedure. Determination Unilever is utilizing a marginally adjusted worldwide methodology. They have worldwide powerbrands which are generally unaltered from nation to nation. They are centered around coordinating their organization and getting increasingly productive. Settle anyway is utilizing a full separated procedure with items completely adjusted to every nation neighborhood showcase. In principle this is a far unrivaled methodology yet the primary distinction between the two organizations is their item classes. Settle is intensely engaged with the food classification while Unilever is principally associated with the cleanliness, cleaning and individual consideration classification. Does this imply Unilever’s items can stand to be less adjusted than Nestle’s? I don’t think so. I accept that Nestle has a far predominant system and will increase a noteworthy upper hand from their methodology later on.

Aviation Security Threats

Aviation Security Threats Aviation Security Threats Home›Research Posts›Aviation Security Threats Research PostsUS reaction to aviation security threatsThe tragic events of September 11 are fresh in the minds of virtually every American who lived to tell the ordeal. The Heathrow plot of 2006 is still a nagging feature in the government’s security department. All these eventualities and others prior to these ones point out clearly that the security and economic prosperity of the US depend not only on its capitalistic or4iented market but also upon the secure operation of its aviation system. Terrorists, hostile nation states and criminals have, for a long time, viewed aviation as a target for attack and exploitation to pass their messages or achieve their goals.  This reality has led to the USA taking extra measures to beef up its aviation security apart from the existing policies and regulations as shall be discussed later. In the wake of the looming aviation security threats, the government has react ed in a number of ways although most of the responses are implemented after damage has already being done (Elias, February 2, 2009).Following the London based 2006 plot against U.S commercial jets, the US government, through the Transport Security Authority has come up with newer models of detectors that are devised to counter such particular threats. The use of this technology has two benefits. One, if properly handled, it can effectively detect attempts to bring explosive on board aircraft. In addition, the proper use of these gadgets may deter terrorists from using this method in attacking civil aviation. This is because the method helps detect terrorists who are mere ‘dry runs’ and who are probing the effectiveness of the technology overseas. This was the case with the 9/11 attacks (USA GAO, July 21, 2007).In addition to the above technological advancements, the US government has extended its response to aviation security threats to incorporate other states. In particular, i t has taken action against nations that have lax security standards. Such actions have included banning flights to the countries involved as it was with the case of Nigeria in 1993 when flights between the Murtala Muhammed International Airport in Nigeria and the US were banned until 1997. The government has also imposed mild bans on other states occasionally like in the case of Indonesia and Haiti and Greece in 1996 (Stewart, November 23, 2010)..Another reaction by the US government to curb the growing aviation insecurity is the introduction of secondary screening on US bound planes. This is an extra type of screening in addition to that at the normal airport checkpoints. These screenings have been effected through a modification of bilateral agreements proposed by the Federal Aviation Administration (FAA). This measure was put into place after the destruction of Pan Am 103 in 1988 by pro-Libya terrorists. In this case, the normal screening had been performed by the air carrier per sonnel in collaboration with local authorities with the latter being inefficient. This led top the terrorists tasking advantage of the situation.The US Congress passed the International Security and Development Cooperation Act in 1985 in its continued effort to fight aviation security threats. This Act requires the government to assure the levels desired of security on flights into US. If the foreign governments fail to cooperate, the President is given the mandate of prohibit the air carrier from providing transportation. This Act was enacted following a trail of terrorist attacks in the Middle East that lead to the hijacking of a TWA Flight 847 after it departure from Athens (Elias, February 2, 2009).The above measures are just a few among the many measures that the US government is deploying to reduce levels of aviation security threats on its soil or of its flights. Apart from these measures, the government has a comprehensive policy and regulations to improve security. These ar e contained in an Aviation Operational Threat Response Plan dated 26 March 2007 by the government to support its National Strategy for Aviation Security. The strategy is in the form of seven supporting plans. The first plan is the Aviation Transportation System Security Plan that directs an approach that is risk-based in order to develop and implement measures of reducing vulnerabilities within the Aviation Transport System. Another plan is the Aviation Operational Threat Response Plan. This plan prescribes inclusive and harmonized protocols in assuring an efficient US government response to air threats against the Nation and its wellbeing (USA GAO, July 21, 2007)..The Aviation Transportation System Recovery Plan defines ways of mitigating the operational and economic implications of an attack in the Air Domain alongside enabling the Air Transport System and affected government sectors to recover from aviation attacks the soonest possible. Other plans include the Air Domain Surveill ance and Intelligence Integration Plan which coordinates activities of national air surveillance, the International Aviation Threat Reduction Plan which details the US counter-terrorism activities internationally, the Domestic Outreach Plan which ensures the participation of the relevant stake holders in implementing the support plans and the International Outreach Plan providing detailed framework for soliciting international support in improving global aviation security.All the above plans constitute the framework that is deployed by the US government in combating the war on aviation insecurity. It is prudent to note that while the above policies entrenched in the plans are specific to different aspects of aviation security; they coexist in a mutual way depending and complementing each other. When they are combined, they collectively create an integrated foundation necessary for an effective policy and guidelines of fighting aviation insecurity threats. The plans, however could no t have been effective without efforts from different departments like the Department of Homeland Security, the Department of Justice, that of Transportation, Defense, State, Energy the office of the National Intelligence and that of the Director of the National Counterterrorism Center. Together, they have enhanced the security of the US and its interests in the Air Domain (Mc Neill, March 30, 2011).Evolution of aviation security threatsOne wonders why the US should embark on such a comprehensive and expensive security touching virtually every security department and sector while there are still other areas like the ground security where similar efforts are needed. This is because the Air Domain is the most appropriate target for execution of terrorist attacks leading to mass murders. Since the culprits realized this new field, they have improved with each passing day staying at par with every new technological advancement. This implies that the concept of aviation insecurity is not a new one-at least not in the US (Elias, February 2, 2009).Since the onset of the aviation insecurity threat in the 1906s, the executioners of such acts have diversified their means of achieving the desired objective. The National Strategy for Aviation Security identifies three types of threats targeting the air domain. These are threats involving aircraft, infrastructure or hostile exploitation of air cargo. All these originate fro three main sources; terrorist groups, criminals and hostile-nation states. The culprits met out their terror in various tactics like hijackings, bombings, smuggling of people, weapons, and shootings.Aircraft threats are those directed at an aircraft or involving usage of an aircraft to attack other targets like buildings. A classical example of this type of threats is the 9/11 attacks. This threat is considered by terrorists who target a large number of people. Like in the case of the 2001 attacks that left more than three thousand Americans dead.In the case of threats to aviation structure, the targets are airports and navigation facilities. This was the case with the attempt by terrorists to attack passenger terminal explosives at Glasgow International Airport in June 2007. This type of attacks are uncommon given their small human target and do not always materialize like case of JFK Airport where  terrorists were planning to bomb   jet fuel storage tanks in the airport but were arrested before the exercise began (Elias, February 2, 2009).The last type of aviation security threat is that involving exploitation of air cargo. This is the commonest of the three. It has been exploited for decades by terrorists to convey terrorist operatives, weapons of mass destruction, weapon components, explosives and conventional weapons (Stewart, November 23, 2010). The Heathrow attempt to detonate a liquid bomb in a US bound plane is a classic example of this. In this case, there were no casualties as the plans were detected in time.

Aviation Security Threats

Aviation Security Threats Aviation Security Threats Home›Research Posts›Aviation Security Threats Research PostsUS reaction to aviation security threatsThe tragic events of September 11 are fresh in the minds of virtually every American who lived to tell the ordeal. The Heathrow plot of 2006 is still a nagging feature in the government’s security department. All these eventualities and others prior to these ones point out clearly that the security and economic prosperity of the US depend not only on its capitalistic or4iented market but also upon the secure operation of its aviation system. Terrorists, hostile nation states and criminals have, for a long time, viewed aviation as a target for attack and exploitation to pass their messages or achieve their goals.  This reality has led to the USA taking extra measures to beef up its aviation security apart from the existing policies and regulations as shall be discussed later. In the wake of the looming aviation security threats, the government has react ed in a number of ways although most of the responses are implemented after damage has already being done (Elias, February 2, 2009).Following the London based 2006 plot against U.S commercial jets, the US government, through the Transport Security Authority has come up with newer models of detectors that are devised to counter such particular threats. The use of this technology has two benefits. One, if properly handled, it can effectively detect attempts to bring explosive on board aircraft. In addition, the proper use of these gadgets may deter terrorists from using this method in attacking civil aviation. This is because the method helps detect terrorists who are mere ‘dry runs’ and who are probing the effectiveness of the technology overseas. This was the case with the 9/11 attacks (USA GAO, July 21, 2007).In addition to the above technological advancements, the US government has extended its response to aviation security threats to incorporate other states. In particular, i t has taken action against nations that have lax security standards. Such actions have included banning flights to the countries involved as it was with the case of Nigeria in 1993 when flights between the Murtala Muhammed International Airport in Nigeria and the US were banned until 1997. The government has also imposed mild bans on other states occasionally like in the case of Indonesia and Haiti and Greece in 1996 (Stewart, November 23, 2010)..Another reaction by the US government to curb the growing aviation insecurity is the introduction of secondary screening on US bound planes. This is an extra type of screening in addition to that at the normal airport checkpoints. These screenings have been effected through a modification of bilateral agreements proposed by the Federal Aviation Administration (FAA). This measure was put into place after the destruction of Pan Am 103 in 1988 by pro-Libya terrorists. In this case, the normal screening had been performed by the air carrier per sonnel in collaboration with local authorities with the latter being inefficient. This led top the terrorists tasking advantage of the situation.The US Congress passed the International Security and Development Cooperation Act in 1985 in its continued effort to fight aviation security threats. This Act requires the government to assure the levels desired of security on flights into US. If the foreign governments fail to cooperate, the President is given the mandate of prohibit the air carrier from providing transportation. This Act was enacted following a trail of terrorist attacks in the Middle East that lead to the hijacking of a TWA Flight 847 after it departure from Athens (Elias, February 2, 2009).The above measures are just a few among the many measures that the US government is deploying to reduce levels of aviation security threats on its soil or of its flights. Apart from these measures, the government has a comprehensive policy and regulations to improve security. These ar e contained in an Aviation Operational Threat Response Plan dated 26 March 2007 by the government to support its National Strategy for Aviation Security. The strategy is in the form of seven supporting plans. The first plan is the Aviation Transportation System Security Plan that directs an approach that is risk-based in order to develop and implement measures of reducing vulnerabilities within the Aviation Transport System. Another plan is the Aviation Operational Threat Response Plan. This plan prescribes inclusive and harmonized protocols in assuring an efficient US government response to air threats against the Nation and its wellbeing (USA GAO, July 21, 2007)..The Aviation Transportation System Recovery Plan defines ways of mitigating the operational and economic implications of an attack in the Air Domain alongside enabling the Air Transport System and affected government sectors to recover from aviation attacks the soonest possible. Other plans include the Air Domain Surveill ance and Intelligence Integration Plan which coordinates activities of national air surveillance, the International Aviation Threat Reduction Plan which details the US counter-terrorism activities internationally, the Domestic Outreach Plan which ensures the participation of the relevant stake holders in implementing the support plans and the International Outreach Plan providing detailed framework for soliciting international support in improving global aviation security.All the above plans constitute the framework that is deployed by the US government in combating the war on aviation insecurity. It is prudent to note that while the above policies entrenched in the plans are specific to different aspects of aviation security; they coexist in a mutual way depending and complementing each other. When they are combined, they collectively create an integrated foundation necessary for an effective policy and guidelines of fighting aviation insecurity threats. The plans, however could no t have been effective without efforts from different departments like the Department of Homeland Security, the Department of Justice, that of Transportation, Defense, State, Energy the office of the National Intelligence and that of the Director of the National Counterterrorism Center. Together, they have enhanced the security of the US and its interests in the Air Domain (Mc Neill, March 30, 2011).Evolution of aviation security threatsOne wonders why the US should embark on such a comprehensive and expensive security touching virtually every security department and sector while there are still other areas like the ground security where similar efforts are needed. This is because the Air Domain is the most appropriate target for execution of terrorist attacks leading to mass murders. Since the culprits realized this new field, they have improved with each passing day staying at par with every new technological advancement. This implies that the concept of aviation insecurity is not a new one-at least not in the US (Elias, February 2, 2009).Since the onset of the aviation insecurity threat in the 1906s, the executioners of such acts have diversified their means of achieving the desired objective. The National Strategy for Aviation Security identifies three types of threats targeting the air domain. These are threats involving aircraft, infrastructure or hostile exploitation of air cargo. All these originate fro three main sources; terrorist groups, criminals and hostile-nation states. The culprits met out their terror in various tactics like hijackings, bombings, smuggling of people, weapons, and shootings.Aircraft threats are those directed at an aircraft or involving usage of an aircraft to attack other targets like buildings. A classical example of this type of threats is the 9/11 attacks. This threat is considered by terrorists who target a large number of people. Like in the case of the 2001 attacks that left more than three thousand Americans dead.In the case of threats to aviation structure, the targets are airports and navigation facilities. This was the case with the attempt by terrorists to attack passenger terminal explosives at Glasgow International Airport in June 2007. This type of attacks are uncommon given their small human target and do not always materialize like case of JFK Airport where  terrorists were planning to bomb   jet fuel storage tanks in the airport but were arrested before the exercise began (Elias, February 2, 2009).The last type of aviation security threat is that involving exploitation of air cargo. This is the commonest of the three. It has been exploited for decades by terrorists to convey terrorist operatives, weapons of mass destruction, weapon components, explosives and conventional weapons (Stewart, November 23, 2010). The Heathrow attempt to detonate a liquid bomb in a US bound plane is a classic example of this. In this case, there were no casualties as the plans were detected in time.