Traveling To America? New ESTA Registration Mandated January 2009

For years, visitors from certain foreign countries have been able to travel to America without first getting a formal Visa sticker placed in their passport. Implemented in 1998, the “Visa Waiver Program” (VWP) has allowed for visitors of several countries to come to America for tourism or business purposes for up to 90 days without getting a Visa put in their passport. During 2007, more than 15 million visitors from VWP countries arrived in the United States.As of January 12, 2009 America’s new ESTA program requires Visa Waiver Program visitors coming to the U.S. for tourist or business purposes via a plane or ship to “register” online before entering the United States to see if they pose a law enforcement or security risk to the U.S. ESTA is not required for land crossings. Officials are asking that the ESTA registration be done at least 72 hours prior to leaving, but theoretically it is possible to register at the last minute. An ESTA Travel Authorization is free, valid for 2 years, and valid for multiple entries.Here are some Frequently Asked Questions (FAQs) for ESTA Travel Authorization:What Countries Are in the Visa Waiver Program?Andorra, Austria, Australia, Belgium, Brunei, Czech Republic, Denmark, Estonia, Finland, France, Germany, Hungary, Iceland, Ireland, Italy, Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, Monaco, The Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore, Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, and the United Kingdom.Where Do I Apply for an ESTA Travel Authorization?A website, operated by the American government, is where you register for ESTA: esta.cbp.dhs.gov. The ESTA information you submit via the computer is compared with certain American law enforcement databases and then either approved or denied. Foreign travelers will not be able to submit ESTA applications at American airports after arriving or at a U.S. Embassy in their country.What if I Don’t Have Plans to Travel to the U.S. Yet?VWP travelers are not required to have specific plans to travel to the United States before they apply for an ESTA Travel Authorization. As soon as VWP travelers begin to plan a trip to visit the U.S., they are encouraged to apply for travel authorization through the ESTA website. Applicants are not required to update their destination addresses or itineraries if they change after their ESTA Travel Authorization has been granted.Does the ESTA Travel Authorization Guarantee Entry to the U.S.?An ESTA Travel Authorization only authorizes a traveler to board an airline or ship for travel to the U.S. under the Visa Waiver Program. After they arrive, travelers who obtained an ESTA Travel Authorization may still be denied entry (also called “admission”) at a U.S. port of entry, such as an American airport. An approved ESTA is not a guarantee of admissibility at an American airport. In all cases, the American airport officers make the final determination whether a foreign traveler can enter the U.S. or not. You still have to establish to the satisfaction of the inspecting officer that you are entitled to be admitted to the U.S. under the Visa Waiver Program.Can I Change My Travel Itinerary?It is possible to change an itinerary on an existing ESTA Travel Authorization; ESTA is designed so that you can update parts of it at any time. Travelers who did not get an ESTA approval may be denied boarding by the airlines, experience delayed processing, or be denied admission to the U.S. at the American airport.What If I Already Have a Valid B1/B2 Visitor Visa?While the ESTA Travel Authorization is completed online with no interview, there are Visas that require a U.S. Embassy interview. The Visa process has separate procedures, which generally require an appointment, travel to a U.S. Embassy, an interview with a Consular Officer, processing time, and the payment of an application fee. If a foreign national already went to the U.S. Embassy and has a valid B1/B2 Visitor Visa pasted in their passport it is not necessary to get an ESTA Travel Authorization because the traveler will be entering with a B1/B2 Visitor Visa and not through the Visa Waiver Program. Keep in mind that an approved ESTA Travel Authorization is not a Visa.Can I Re-Apply for an ESTA Travel Authorization if Denied?Yes, but you must wait at least 10 days to reapply and your circumstances must have changed. Unless there is a change in a substantive fact, re-application will not change the result. Keep in mind that applying for an ESTA Travel Authorization with false information can cause a foreign national to be permanently barred from ever entering America. The ESTA system is designed to try to prevent individuals from changing and manipulating an ESTA entry until they receive an approval.What If I am Denied an ESTA Travel Authorization and Have No Changed Circumstances?There are three types of responses to an ESTA application; approved, pending or travel not authorized (denied). Applicants who receive a “pending” response are advised to check the website 72 hours later. Applicants who are denied will be required to go to a U.S. Embassy to apply for a formal nonimmigrant visa, such as a B1/B2 Visa, which may take months.Can a Traveler Find Out the Reason Why an ESTA Application was Denied?The U.S. Dept. of Homeland Security has stated that travelers may contact the DHS Travel Redress Inquiry Program (DHS TRIP at dhs.gov) but there are no guarantees that information about a denial will be divulged. U.S. Embassies and Consulates are not required to provide details about an ESTA denial nor resolve the issue that caused the ESTA denial.What If I Have a Criminal Record?Only those qualified to travel under the VWP are eligible to pre-register through ESTA. Persons who have been arrested and/or convicted are generally not eligible for VWP and probably require a formal Visa, such as a B1/B2 Visa, to travel to America. If a foreign national has received tickets for speeding (which don’t usually result in an arrest or conviction) they are probably still eligible for the VWP and ESTA. If a foreign traveler has been denied entry into or deported from the U.S., they require a formal Visa.Do Any Other Countries Have a Similar Program?Australia has a program called the Electronic Travel Authority (ETA) that mandates travelers to submit an ETA application electronically through a website requesting permission to travel to Australia. Airlines may refuse to accept passengers who do not have either an approved ETA or Visa to enter Australia.How Long Will the ESTA Application Data be Stored? Who Can Access It?The ESTA Travel Authorization is valid for two years or until the traveler’s passport expires, whichever comes first. The American government will maintain the information for at least 15 years to allow retrieval of the information for law enforcement, national security, or investigatory purposes. Information submitted through ESTA can also be shared with any U.S. government organization.What Information Does the Airlines Get?Airlines will receive confirmation of a passenger’s ESTA status visa the “Advance Passenger Information System” (APIS) which shows whether the ESTA authorization has been granted for a Visa Waiver Program traveler. It is recommended that the traveler print out the ESTA application approval in order to maintain a record of their ESTA application number and to have confirmation of their ESTA status.What About Children?Accompanied and unaccompanied children, regardless of age, are required to obtain an independent ESTA Travel Authorization.What if a Mistake was Made on the ESTA Application?The ESTA website will ask applicants to review their application before submitting it. Also, there is an update function for certain information such as email address, telephone number, or flight information. If an applicant makes a mistake that cannot be “updated,” he will need to submit a new ESTA application.What if I Only Have a Connecting Flight Through the U.S.?Visa Waiver Program visitors who have a connecting flight in the U.S. are required to either have ESTA Travel Authorization or a Visa from a U.S. Embassy in their passport to travel through the U.S. even for a one hour stop. If a traveler is only planning to stop in the U.S. en route to another country, the traveler should enter the words “In Transit” and his final destination in the address lines under the heading “Address While In The United States” on the ESTA application.What Are the Questions on the ESTA Travel Authorization Application?The traveler must provide (in English) biographical data including name, birth date, country of citizenship, country of residence, email address, sex, telephone number, passport information, destination address in the U.S., travel information (round trip airline ticket, flight number and city where you are boarding) as well as questions regarding communicable diseases (chancroid, gonorrhea, granuloma inquinale, HIV, leprosy, lymphogranuloma venereum, syphilis [active], tuberculosis [active], and others), physical or mental disorders, drug addiction problems, arrests, convictions, past history of visa cancellation or denial, and prior deportations from the U.S. The traveler will also be asked whether they are seeking work in the U.S., have ever been deported or tried to get a visa by fraud or misrepresentation. The traveler will be asked if they have ever detained a child of a U.S. Citizen granted custody of the child, and whether they have ever asserted immunity from prosecution.Do I Select “Business” or “Pleasure (Tourist) at the Airport Port of Entry?After the ESTA Travel Authorization is granted, the foreign traveler will be interviewed by government officers at the first American airport they land. The officer will ask what the foreign traveler will be doing in America and the questioning can take up to four hours in a detained setting called “secondary inspection.” The officer may ask the traveler “what else are you doing in America?” repeatedly to try to get “the real” answer. If the traveler is only going to be a tourist, they are not allowed to do any business, including meeting with any attorneys, applying for a bank account, meeting with real estate agents, or other business consulting activities. Even though the traveler is going to conduct just one business meeting while in America, they are required to report it and enter as a business visitor. The business visitor is allowed to participate in tourist activities, but the tourist visitor is not allowed to participate in any business activities. Therefore, if any business might be conducted while in America, it is best to tell the government officers about it at the airport to avoid being accused of lying, put immediately on a plane back to your home country, and barred from America for life.What Else Do Can the Airport Officers Make Me Prove After I Land?The airport officers will ask the traveler proof of a foreign residence (address on foreign driver’s license), whether their intention is to depart at the end of the visit (round trip airline ticket), whether the traveler has a job (letter, paystub, business card) and family in their home country, (marriage certificate, childrens’ birth certificates), and whether the traveler has the money to travel around America (bank statement or credit cards with bank letter showing credit limit). The airport officers are also required to ask where the traveler will stay in America (hotel reservations or friends/relatives’ homes) and have been known to pick up the phone to verify all of the aforementioned information.Can I Be Searched in the American Airport? Am I Entitled to Legal Representation?While being interviewed at the American airport, all luggage (even locked bags) can be searched, as well as the traveler’s body and his/her cell phone (including text messages and phone numbers) and laptop (including hard drive). The officers may “google” a traveler’s name and check out their myspace, Facebook or hyves pages. The traveler is not allowed to be represented by an attorney or even call their attorney while in “secondary inspection.” Bathroom visits, water and food may be limited, so it is best to prepare for such an occasion while still on the plane before landing.Do I Still Have to Go Through the “US-VISIT” Program at the American Airport?Foreign travelers arriving at American airports and seaports must still be photographed and fingerprinted every time they enter the U.S.Who Should I Ask For Help to Fill Out the ESTA Application?The information a traveler provides on the ESTA application can remain in their file with U.S. authorities for a minimum of 15 years – probably longer. If a foreign traveler has some questions about how to answer the questions so as not to be permanently barred from America, it would be prudent to them to pay for a legal consultation with an American Immigration Attorney who is a member of the American Immigration Lawyers Association (AILA). Beware of unauthorized private websites that offer ESTA application assistance for $49.99 – they are usually not authorized to practice immigration law and are asking travelers to pay for a copy of the application questions, which are free on the dhs.gov website.If I Am Denied the ESTA Travel Authorization Will it Effect My Ability to Obtain a Visa at the U.S. Embassy?When the ESTA Travel Authorization is denied, the foreign traveler must make an appointment at a U.S. Embassy in their country to apply for a formal Visa. The U.S. Embassy is operated by the U.S. Department of State and there are no expedited procedures for those who have been denied ESTA Travel Authorization. Because the ESTA program is so new, it is impossible to predict how badly a denial of the ESTA Travel Authorization will impact a traveler’s application for a Visa at a U.S. Embassy or impact their future travel to America in general. American Immigration Attorneys are in close contact with their foreign clients and will share the denial information with each other starting in January 2009. Currently there are no government policies regulating this area of the law, or opportunities to appeal a denial.When Is the a “New” ESTA Travel Authorization Required?A new ESTA Travel Authorization is required during the two years if (1) the traveler is issued a new passport (2) the traveler changes his name (3) the traveler changes his or her gender (4) the traveler’s country of citizenship changes or (5) the circumstances underlying the traveler’s previous responses to any of the ESTA application questions requiring a “yes” or “no” response have changed (such as a new arrest).Can an American Immigration Attorney, Travel Agent or Employer Fill Out the ESTA Application?A third party, such as a relative, travel agent or American Immigration Attorney, is permitted to submit an ESTA application on behalf of a VWP traveler. Be aware that the traveler is still responsible under the law for the answers submitted on his or her behalf by a third party.Over 68,000 travelers have already voluntarily registered by using the ESTA online system in the last few months. Applicants are reminded to obtain a new “e-passport” which has an integrated computer chip capable of storing biographic information from the data page, as well as other biometric information, when registering with ESTA.

Business Loans In Canada: Financing Solutions Via Alternative Finance & Traditional Funding

Business loans and finance for a business just may have gotten good again? The pursuit of credit and funding of cash flow solutions for your business often seems like an eternal challenge, even in the best of times, let alone any industry or economic crisis. Let’s dig in.

Since the 2008 financial crisis there’s been a lot of change in finance options from lenders for corporate loans. Canadian business owners and financial managers have excess from everything from peer-to-peer company loans, varied alternative finance solutions, as well of course as the traditional financing offered by Canadian chartered banks.

Those online business loans referenced above are popular and arose out of the merchant cash advance programs in the United States. Loans are based on a percentage of your annual sales, typically in the 15-20% range. The loans are certainly expensive but are viewed as easy to obtain by many small businesses, including retailers who sell on a cash or credit card basis.

Depending on your firm’s circumstances and your ability to truly understand the different choices available to firms searching for SME COMMERCIAL FINANCE options. Those small to medium sized companies ( the definition of ‘ small business ‘ certainly varies as to what is small – often defined as businesses with less than 500 employees! )

How then do we create our road map for external financing techniques and solutions? A simpler way to look at it is to categorize these different financing options under:

Debt / Loans

Asset Based Financing

Alternative Hybrid type solutions

Many top experts maintain that the alternative financing solutions currently available to your firm, in fact are on par with Canadian chartered bank financing when it comes to a full spectrum of funding. The alternative lender is typically a private commercial finance company with a niche in one of the various asset finance areas

If there is one significant trend that’s ‘ sticking ‘it’s Asset Based Finance. The ability of firms to obtain funding via assets such as accounts receivable, inventory and fixed assets with no major emphasis on balance sheet structure and profits and cash flow ( those three elements drive bank financing approval in no small measure ) is the key to success in ABL ( Asset Based Lending ).

Factoring, aka ‘ Receivable Finance ‘ is the other huge driver in trade finance in Canada. In some cases, it’s the only way for firms to be able to sell and finance clients in other geographies/countries.

The rise of ‘ online finance ‘ also can’t be diminished. Whether it’s accessing ‘ crowdfunding’ or sourcing working capital term loans, the technological pace continues at what seems a feverish pace. One only has to read a business daily such as the Globe & Mail or Financial Post to understand the challenge of small business accessing business capital.

Business owners/financial mgrs often find their company at a ‘ turning point ‘ in their history – that time when financing is needed or opportunities and risks can’t be taken. While putting or getting new equity in the business is often impossible, the reality is that the majority of businesses with SME commercial finance needs aren’t, shall we say, ‘ suited’ to this type of funding and capital raising. Business loan interest rates vary with non-traditional financing but offer more flexibility and ease of access to capital.

We’re also the first to remind clients that they should not forget govt solutions in business capital. Two of the best programs are the GovernmentSmall Business Loan Canada (maximum availability = $ 1,000,000.00) as well as the SR&ED program which allows business owners to recapture R&D capital costs. Sred credits can also be financed once they are filed.

Those latter two finance alternatives are often very well suited to business start up loans. We should not forget that asset finance, often called ‘ ABL ‘ by those Bay Street guys, can even be used as a loan to buy a business.

If you’re looking to get the right balance of liquidity and risk coupled with the flexibility to grow your business seek out and speak to a trusted, credible and experienced Canadian business financing advisor with a track record of business finance success who can assist you with your funding needs.

Social Structure And Network (A Mathematical Model For Social Behaviour)

Analogy and metaphor are often used by social scientists to explain a social phenomenon because certain social concepts are otherwise very difficult to comprehend. For example, a physical structure like ‘building’ or a biological structure like ‘organism’ is compared to define the concept ‘social structure’. Actually, social structure is not a physical structure. An abstract concept which can’t be seen is explained in a simplified way by using an analogy which can be seen easily by everyone. Physical scientists use a model to test the predictions. If the predictions are correct when the model is tested every time then the model constructed is perfect. Otherwise, the model is suitably modified and then the predictions are tested again. This process is continued until the model becomes perfect. Do we have a grand model of social structure that can be used to test social predictions? In this article, an attempt is made to understand how far network theory is useful in explaining social structure and whether social predictions can be made using the network.Radcliffe-Brown was one of the earliest to recognise that the analysis of social structure would ultimately take a mathematical form. Radcliffe-Brown defines social structure as a ‘set of actually existing relations at a given moment of time, which link together certain human beings’. According to Oxford dictionary, ‘relations’ means the way in which two persons, groups, or countries behave towards each other or deal with each other. The phrase, ‘link together certain human beings’ can be compared with a ‘net work’ of connections.Network is defined as a closely connected group of people who exchange information. Each point (person or agent) in the network is called a ‘node’ and the link between two nodes is connected by a line called an ‘edge’. When two nodes have a direct social relation then they are connected with an edge. So when a node is connected with all possible nodes with which the node has social relations, it produces a graph. The resulting graph is a social network. The number of edges in a network is given by a formula nc2, where ‘n’ is the number of nodes. For example, if there are 3 people in a party then the number of handshakes will be 3. If there are 4 people then the number of handshakes will be 6. If there are 5 people then it will be 10. If there are 10 people then the number of handshakes will be 45. If there are 1000 people then the number of handshakes will be 499,500. When the number of people has increased 100 folds from 10 to 1000, the number of handshakes has increased 10,000 folds. So the number of relationships increases significantly as ‘n’ increases. The network theory was developed by the Hungarian mathematicians, Paul Erdos and Alfred Renyi, in the mid twentieth-century. Networks of nodes that can be in a state of 0 or 1 are called Boolean networks. It was invented by the mathematician George Boole. In Boolean networks, the 0 or 1 state of the nodes is determined by a set of rules.If two nodes are connected then the network of the two nodes assumes four states (00, 01, 10, and 11). The number of states of network grows exponentially as the number of nodes increases which is obtained by a formula 2n, where ‘n’ is the number of nodes. When n is greater than 100, it is quite difficult to explore all the possible states of the network even for the world’s fastest computer. In a Boolean network we can fix the number of states as 0 and 1. In a Boolean network, if there are three nodes A, B, and C which are connected directly by edges then the state of C can be determined by fixing the states of A and B. It means the state of C depends upon the states of A and B in some combination. Further it implies that if we know the state of C then we will know the combinational behaviour of A and B. But in a social network of persons, we do not know how a person’s behaviour is deterministic. Further, in a Boolean network, the behaviour of the nodes can be studied in controlled experiments as nodes here are objects. But in a social network, nodes which are individual persons can’t be treated as objects. In a social network how do we define the states of a person? How many states does a person have? What is the nature of a state? If the expected behaviour of a person is reduced to two states like ‘yes’ or ‘no’, then the number of states of a network will be 2n. Out of this, only one state will show up at a given moment of time. How do we predict that one particular state?Family is a micro network within the network. The family members are closely connected with each other. Most of the members are also connected to other networks external to the family. Interactions take place within the family among the members who also have interactions outside the family. So there are several edges proceed from one node of a family towards nodes within the family and nodes outside the family. The edges within a family show intimate relationship, whereas the edges connecting nodes outside the family do not necessarily show intimate relationship. This intimate relationship is a very important assumption that we have to consider so as to reduce the number of states of the social network. For example, the likelihood of a family member to conform to the family norms will be higher. Similarly, the likelihood of a person to side with a close friend will be higher. Also, the likelihood of a member of a particular group to conform to group norms will be higher. These assumptions are necessary to measure the probability of how the whole network behaves in a certain way.Interaction takes place along the nodes. The connection of one node to the other is either direct or indirect. For example, a person’s friend is connected to the person directly; the person’s friend’s friend is connected to the person indirectly, separated by one friend or technically by one degree. Research (Stanley Milgram, 1967) shows that every person in the world is separated only by six degrees to any other person. This implies that every person is connected directly or indirectly with other persons in the network except for an isolated community whose members do not have any contact with outside world. The six degrees of separation is only an approximation. For example, if you know the targeted person then the degrees of separation is zero. If your friend knows the targeted person then the degrees of separation is one and so on. Milgram’s conclusion was if you have selected a person to be targeted at random, then the maximum degrees of separation would have been six. However, the number of degrees of separation depends upon the number of critical nodes in the network in question. We will discuss about critical nodes later. So, connectivity is more or less a social reality. The question is whether this connectivity can be used as a tool to study social phenomena? If the answer is affirmative, then where can we apply this tool?If we analyse social structure in terms of a network system, then it may be useful to understand the nature of ‘dynamism’. The state of a system at the current moment is a function of the state of the system at the previous moment and some change between the two moments. Therefore, ‘a set of actually existing relations at a given moment’ depends upon the actually existed relations at the previous moment. It implies the importance of time interval, whatever the interval may be. That means if we want to know why a particular type of social structure prevails over a society at a given point in time, then we should necessarily bring ‘historical perspective’ to the study. Change is an important ingredient of dynamic system. A change at the micro level sometimes doesn’t affect the system. But, in other occasions the system becomes chaotic. It depends upon the nature of change in time and space. What is to be noted here is, a person’s behaviour is shaped by the person’s past experiences and the present situation.Moreover, a person in a social network is connected to different smaller networks which are dispersed widely. After all, a social network is networks within networks. But we should note that the system behaves differently with respect to a particular behaviour of different persons; it depends upon who the person is and how the person is placed in the hierarchy of the network. The network landscape is not even; it contains persons with different status and position. A person moves vertically and horizontally as well as deletes and adds connections. This brings change frequently at the micro level of the network. A person who is in power can easily influence others to follow an idea which need not be correct and a person who is not in power may not be able to influence others though the idea may be correct and good for the society. An idea doesn’t arise in a vacuum; it comes from the mind of a person. Even if an idea is correct, sometimes our society takes a lot of time to accept it. For example, it took a lot of time for our people to accept the fact that the earth is revolving around the sun and not the other way.In a social network, (1) each node is unique as two individuals can’t be treated as two similar objects; (2) a node may have a large number of edges connected to it directly or indirectly though it may not influence the behaviour of other nodes; (3) a node may not have a large number of edges connected to it directly or indirectly, yet it may influence the behaviour of other nodes in its network; (4) a node may have both larger connectivity and the power of influence over other nodes. So it is necessary that each node is to be studied and graded according to its connectivity and power of influence. Once this is done, we will be able to predict, to some extent, how a particular network would behave. A critical node is a node that has a larger connectivity as well as the power of influence. Why people took a lot of time to accept that the earth is revolving around the sun and not the other way: It was because the critical nodes might not have been immediately ready to accept the fact for certain reasons; secondly, each node is required to be connected with at least one critical node in order to get influenced quickly; finally, a node was in confusion because it might have been connected to two critical nodes which had opposite views.Though network is a good analogy to explain the concept of social structure, it has certain limitations: (1) The states of a network increases exponentially as the number of nodes increases; (2) The number of states of each node and its dependency on other nodes can’t be fixed as it can be done in Boolean network; (3) The number of edges (social relationships) increases as the number of nodes increases by a formula nc2; (4) Edges do not have uniform relationship; (5) Each node is unique and continues to change; (6) Information of opposing values continues to flow in the edges on both directions.Though the number of relationships increases significantly as the number of nodes increases in a social network, it does not increase the complexity of the network. Society has certain norms. People are expected to follow these norms. These norms regulate the behaviour of people. Social regulations tend to reduce the noise in the network.Though the behaviour of a node in the social network is difficult to determine, we can measure it by applying the theory of probability. For example, a family may hold a particular value. As the family is a closely knit group, all the members are expected to hold the same value. If we attribute a colour to this particular value, then the nodes of the family network will have the same colour and will look distinct. When the information pertaining to this value flows out from the family network to other networks through the edges, the information will have this colour. Therefore, the other nodes which receive and value this information will be influenced by this colour. Similarly, the nodes of a family will also be influenced by other colours as different information flow into the family network. The colour of a node depends upon how strong the node holds a particular value. Suppose, a certain node is surrounded by several nodes of a distinct colour, then the probability that this particular node will have a strong influence of that particular colour is higher. This is what happens when a person joins a group; the person will be strongly influenced by the values of that group. And when this person interacts with other nodes, those group values are transmitted. Therefore, if we know (a) the network of a particular node, (b) the colour of other nodes in the network, and (c) the colours of the critical nodes in the network, then we will be able to determine the probable behaviour of the particular node by giving weighted measure to each node of the network according to its location, distance, and colour. Though the nodes in a social network are not objects, the nodes can be studied objectively in this manner with a probabilistic determination.Suppose a node is a drug addict and living in the neighbourhood of other nodes who are drug users and sellers, then we have reasons to believe that the node’s addiction is due to its location and easy availability. But we can’t attribute the same reason to a node’s addiction to drugs if the node doesn’t live in the neighbourhood of drug users and sellers. The circumstances under which the two nodes have got addicted to drugs would be different. There may be many causes for a node to become a drug addict. However, network analysis with probabilistic determination will be useful to find out the significant cause. In the former case, the node should be treated leniently because the probability to become a drug addict is higher due to its location and easy availability. The node is prone to be a victim of circumstances. The circumstances could be due to retreatism, a concept developed by the sociologist Robert Merton (1968).According to Merton, retreatism is a response to inability to succeed; it is the rejection of both cultural goals and means, so that, in effect, one drops out. The sale of illegal drugs itself is another kind of deviant behaviour which Merton defined as innovation. Innovation involves accepting the cultural goals but rejecting conventional means. This excessive deviance results from particular social arrangements. Whereas in the latter case, the node’s probability to get addicted to drugs is lower and the circumstances are not obvious. It could be a personal choice or the drug sellers’ spread to new locations. If it was a personal choice, then in addition to social arrangements, biological and psychological factors would also be considered to find the causes. In this case, the node’s deviant behaviour needs a different treatment.The above example illustrates how a social phenomenon can be studied using a network analysis with probabilistic determination. The probability of a node’s behaviour will guide us to make social predictions such as how a particular neighbourhood will behave in a certain situation at a given moment of time. One problem which would arise in this model is how the nodes are coloured. Suitable research method is to be employed to arrive at the probable nature of a node. The probable nature of a node depends upon the probable nature of other nodes in the network. The researcher should proceed from the established and known nature of certain nodes. For example if a group’s values are overtly known to everyone then the group will be coloured accordingly. However, the researcher should note that if the nodes are wrongly coloured, the measures will be wrong and so our predictions.Another problem is the dynamic nature of the system. The behaviour of a node is constantly changing. However, the change in a particular node does not bring about a change in the system immediately in most of the cases. The change in the system is felt only after reaching a tipping point. Social change does not take place every second. After all, a period of 1,000 years is just a blink of an eye in the biological evolutionary time scale. Hence, social predictions can be made at a given moment of time. A third problem is, there can be individual differences within a family or group. This fact is to be considered in the research method before colouring a node.To sum up, we are living in this information society with lots of complex problems. This is not surprising because it is natural and an outcome of evolutionary process. Many problems do not have a single cause. Taking a decision looking at one cause of a complex problem will lead us to face another problem in different form. We will have to look at all causes simultaneously to see how the riddle unfolds itself. It implies there are many solutions for a complex problem. Probabilistic determination might give us the best possible solution.
jackpotslotsweb.infospinslotwins.infoslotbidwins.infofantasyslots.infobestslotmachine.infocasinoslotonline.infojackpotslotwins.infojasabacklinkpro.infojasabacklinks.infoseosites.infolinkseo.infoslotmachinetips.infoslotmachinestrategies.infoslotmachineodds.infoprogressiveslotwins.infojyufnehnd.inforqqbgnd.infohhxyygznd.infolrhvand.infoylcalnd.infouqlnhnd.inforesrhnd.infopsdrvnd.infopabrsnd.infomtayand.infolirensmnd.infokekepnd.infohgnffnd.infokratombz.infomenody.infoauryadbe.infosongmide.infolandecz.infoeventvde.infoitrolde.infoorgivde.infofestbg.infoyzkstcom.infogdzbzcom.infoneuqncom.infoozmuzcom.infofudggcom.infoqzykwcom.infolyympcom.infodnenycom.infohqaaecom.infogpzslcom.infoaaehlcom.infobxtjzcom.infontpocom.infoeppomcom.infoemaeocom.infofbsvncom.infoezamzcom.infofghoacom.infodzypjcom.infodsfdbcom.infoebifmcom.infoisurinet.infonusuonet.infobceluk.infosnjabcom.infoOlgato.infomsmmycom.infoomdircom.infoVilato.infoegoltcom.inforrdeocom.infoAllyto.infomcsdpcom.infoweigbcom.infobwmovcom.infoqyhlnet.inforedcanet.infoimwapnet.infowbtgwcom.infosoyhocom.infomxjxlcom.infogmlatcom.infoldstxcom.infoxjwxxcom.infogpabocom.inforeofkcom.infozayhdcom.infosxbbdcom.infoszyeqcom.infoycjyccom.infocccfhcom.infoSweeto.infonzeamcom.infomycsdnet.infoTraxto.infovvhento.infopnfzwcom.infoyygjbcom.infosrywjcom.infonxtypcom.infoshrjdnet.infozaylccom.infoxjnspcom.infohznjqcom.infoqpcswnet.infotwtmtcom.infomdouwcom.infoielpzcom.infofjpancom.infoabdezcom.infoMoonug.infozgnavcom.infoplknycom.infoasbtlcom.infokumchnet.infonioomcom.infoigutrcom.infomepncom.infostixto.infobbponcom.infodrupccom.infozujarnet.infootocscom.infohrpubnet.infosabpccom.infontfckcom.infoMinito.infoagpclcom.infoapkpzcom.infoLunarto.infolielnet.infoblunxcom.infouekkocom.infovwgemcom.infosvelto.infosbicbcom.infobdysmcom.infoealelcom.infoqdonynet.infofcsadnet.infochnrxcom.infojomopcom.infozbmhwcom.infoaqdficom.infohfzeucom.inforjjilcom.infoocszzcom.infotauhpcom.infoehbnecom.infoememenet.infootrocom.infongoiccom.infosekuycom.infoceolucom.infocdklkcom.infoehwelcom.infobassjcom.infourlrlcom.infopppwccom.infoydavscom.infouandunet.infoqhtcmcom.inforghdccom.infoptcsdcom.infozgggbnet.infobmkfycom.infoldickcom.infocwkshcom.infoyxjkdcom.infozmgmbcom.infomqegocom.infoszytgnet.infomkoorcom.infoiutahnet.infoditflcom.infocolqrcom.infosjboxnet.infogxcxwcom.infohyhajcom.infoiharzcom.infojcacscom.infomilicnet.infomsmmocom.infoiktvscom.infodixlecom.infoymfabcom.infolfpetnet.infomedphnet.infonabxnet.infocxfzcom.infoazttscom.infosjielcom.infofkxlbcom.infomuzoknet.infogjainnet.infosorkinet.infopugrccom.infoSacAdnet.infoylnzhcom.infolggokcom.infoticeonet.infovvhatto.info