Christopher Columbus Claimed To Have Discovered America As Early As 14 ✓ Solved
Christopher Columbus claimed to have discovered America as early as 1492. However, dozens of cultures have their respective tales on who made it to America earlier before Columbus. Archeological sites have been analyzed, ships rebuilt, routes traced and artifacts tested to reaffirm on who were the first persons to discover America (Who Really Discovered America?). This essay analyzes the use of chicken (Gallus gallus), fishhooks, canoes, and sweet potatoes to prove that Polynesians arrived in America before the great Christopher Columbus. Most of the American and Pacific prehistorians debate on the introduction of chicken to South America by the Polynesians.
Scientific use of DNA sequencing and radiocarbon dating on chicken bones has been used to prove that the Polynesians brought chicken into South America during the pre-Columbian period. A research spearheaded by Alice Storey, an anthropologist in the Department of Anthropology in Auckland University, compared the bones of chicken found in Chile’s El Arenal One to those found in the islands of Tonga, Easter Island, and American Samoa (10335). The bones found in El Arenal One, an archeological site, have the same sequence of mitochondrial DNA in comparison to DNA found in Polynesian chickens that existed during the prehistoric periods in places like Hawaii, Tonga, Samoa, and Easter Island. The use of calibrated radiocarbon dating also shows that chicken was introduced a century before any person of European origin arrived in the South American Continent.
Storey and her team went on to attest that the Ancient Inca people of South America used chicken in the religious rites (10337). The carbon dating of chicken shows that chicken were present in Chile as early as 600 years before present (B.P.). These could be approximated to the period when the Chile Islands were affiliated to the Polynesians. This scientific evidence is a prof that Polynesians sailed to South America earlier than Christopher Columbus. The island of Tonga, Easter, and American Samoa lie almost 6,000 kilometers east of Chile.
The Polynesian made voyages to and from Chile, and introduced chickens, pigs, and dogs to the areas where they settled. Check out the geography essay topics here. The other evidence of early Polynesian voyages was the use of fishhooks and canoes. According to Kathyrn Klar and Terry Jones, there was a possible contact between the Polynesian seafarers and the Garielino, or Chumash cultures of North America (460). This contact is estimated to have occurred as early as 400 AD.
Canoes that were sewn out of planks, and fishhooks made up of two bones were the main characteristics of Polynesians. The Chumash were the earliest settlers of places like Santa Rosa, and San Clemente’s Eel Point. As the Spanish people arrived in the islands in the 16th century, the Chumash tribes were using canoes sewn out of planks famously known as tomolos to carry passengers, food, and fish across the islands. The canoes were sealed with asphaltum to make the vessel waterproof. The canoes were approximately 20 feet long and could carry a maximum of 12 persons.
Archeological evidence suggests that the tomolo canoe could have been in use, in 700AD. The Polynesian colonization is associated with the use of plank construction, and the sewing method to make canoes. However, the Polynesian canoes were almost twice the size of the Chumash tomolos and were characterized by single or double hulls. At about 7000 years B.P., the Chumash cultures used extended fishhooks made out of shells and bones. However, their contact with Polynesians saw them use twin-pointed fishhooks as from the start of 700 AD.
These compound hooks were made of two pieces of bones that were stuck together using asphaltum. On the same line, Polynesians used their bi-pointed fishhooks as from the beginning of 300 AD. Klar and Jones posit thaat the Chumash cultures learnt of the Polynesian canoes and the compound fishhooks after getting into contact with the Polynesians (Hirst). Patrick Kirch, an archeologist at the University of California noted the presence of the sweet potato (Ipomea batatas) at Polynesian archeological sites (Storey 10339). These potatoes had their origin in South America.
These potatoes are estimated to be almost 1,000 years old. Some of the archeological sites where the potatoes have been found include Cook Islands and Mangaia. According to archeologists, the sweet potato and the bottle guard appeared in South America as early as 1200AD. Direct carbon dating of bones of chicken from El Arenal One is found to be between years B.P. At this time, the Polynesian Islands like Easter Island and Rapa were thought to be under colonization.
The presences of canoes that resemble those of the Polynesians suggest that there was physical contact between the North American cultures and the Polynesian people. In addition to that, the change of Chumash’s extended bone fishhook into a compound fishhook shows that this culture must have had a new observation that influenced their adaptation. It is important to note that, the people of the Polynesian, North, and South American islands had a way of seafaring long before the Europeans arrived at their occupations. The presence of chicken bones whose DNA resembles suggest that there was contact, seafaring and introduction of new animals to the places where the cultures inhabited. Experimental sailings, the presence of the sweet potato and the Polynesian bottle guard in Mangaia show that there was contact between the South American Tribes and the Polynesian.
All these evidence suggests that there were earlier civilizations and people who had contact with the North and South Americans long before the Europeans knew that the places existed (Mann 18). PRIVACY AND CYBERSECURITY 3 PRIVACY AND CYBERSECURITY Name Institution PRIVACY AND CYBERSECURITY For some time now, the discussion regarding the convergence between data privacy and cybersecurity has been raging on (Burn, 2018). There has been new laws being put in place in a bid to regulate the manner in which people’s private data is collected, used, disclosed and disposed (Bhatia et al, 2016). On the hand, cyber-attacks have spirited exponentially as well as numerous cases of data breaches and unauthorized access and use of personal data.
There is need for persons and organizations to understand their rights and obligations regarding such critical personal data as health, financial as well as other information that can be identified as critical. This is one area that is now more than ever very critical for business and almost every other sector in our dynamic world. That said, it is only important to delve into this matter, by means of reviewing the new data privacy laws and regulations, and cybersecurity and personal data protection best practices. In simple sense, with the experienced rise of large amounts of data and machine learning, the issues of privacy and cybersecurity are converging. What was some time ago an abstract concept that was aimed at ensuring that the expectations of our data were protected has now become concrete and critical matter, to match the level of the threats posed by cybercriminals whose would really like to access our data without our authorization.
Looking at it more specifically, the biggest threat to our digital selves is that threat of unauthorized access of our personal information. In days gone by, privacy and security were perhaps largely separate functions that seemed to move almost in a parallel manner. Security took the front seat, thanks to the more tangible concerns about it as privacy took a backseat. Nowadays, their lines have met thanks to extensive machine learning techniques that we have in place. Once data is generated, any person who comes into possession of that poses new dangers to not only our privacy but also security.
With all this in mind, it is perhaps too obvious that the world has reacted in a bid to control this problem. In that accord, new data regulations have been put in place to try as much as possible to mitigate the threats posed by data breaches and unauthorized access of personal data. Examples of the recent data protection laws and regulations put in place are the Global Data Protection Regulation (GDPR) that were enforced in May 2018 (Burn, 2018). The regulation brought with it far-reaching alterations in policies regarding privacy and data security in the European Union and ultimately in the whole world. This is because companies handling data of individuals residing within the EU have to align with the regulation on how that data is managed and/or shared.
Some of the far reaching provisions that companies must confer with is the requirement for consent from the person that is informed and explicit for collection of personal data and the mechanisms that are in place that allow for withdrawal of such consent. Individuals have the right to access all the data that collected by a company and a right too to have the data erased. If these provisions are breached, companies run the risk of being fined a penalty not less than €20 (Warren, 2018). In the United States, the regulatory environment comprises of a quite intricate makeshift system of laws at the federal and state levels. These laws governing the privacy of personal data and cyber security continue to evolve in a bid to address increasing cases of data breaches and unauthorized access and use and personal data.
All the states have enacted laws that require companies to notify individuals of a case of a data breach. Failure by companies to follow these regulations may draw companies both civil and criminal penalties in case there are security breaches involving personal data. There have been a number of lawsuits regarding this matter, most notably the Target and Equifax data breach litigations in 2013 and 2017 respectively. These lawsuits highlight the risks that companies face for either failure to have the best practices or not following them come an instance of cyber security attack. These are not however the only risks that a company faces.
For instance, Facebook lost amounts totaling around 9 billion in the wake of the Cambridge Analytica Scandal in market capitalization after concerns were raised regarding privacy. Recent trends have shown that consumers are becoming more and more conscious about the security of their private data with governments coming up with security laws of their own. This means that companies that fail to follow the set regulations are going to face even harsher penalties than these in the future. Such are the repercussions that could befall any company for failure to conform to private data protection best practices (Burn, 2018). That leads us to these best practices.
What are they and what do companies have to do with them? The answers to these questions are simple. Data protection best practice are procedures that are prescribed so that data protection systems are most effective. Companies ought to not only have them but also to follow them. Stakes are now more than ever high with regard to data how data is collected, used, disclosed and disposed.
Given the regulatory framework nowadays, companies should expect to face escalating costs regarding their privacy and data security practices (Zoltick & Maisel, 2018). Various resources are available to companies to offer guidance and assistance while dealing with matters private and data security practices. The resources also offer ways to ensure that these best practices are implemented and are in line with any pertinent laws and regulations. Both the EU and US Federal agencies such as the Federal Trade Commission (FTC) have publicized guidelines and recommendations regarding privacy and data security best practices for various industries. These include best practices for industries in almost all fields.
On top of that, some industries and groups of industries have adopted their own recommendations and guidelines and certification programs that they abide by voluntarily. On top of these guidelines, it is advisable for companies to put in place internal policies that ensure compliance with the set laws and regulations. The business policies may need to include an information security and privacy policy for the top brass of the business management that expresses the company’s commitment to abide by the data security and privacy policies from the top. It may also include acceptable use policy, monitoring of communications, reporting any cases of breach and outsourcing policies (Warren, 2018). On the other hand, technical policies may include commitment to various procedures of technical control, such as data protection through such methods as encryption, password protection, disaster recovery and detection of intrusion, upgrading of data systems and the like.
Policies from the top management as well as the technical policies should not be treated in a manner that they work in isolation. They should rather be treated as procedures that work hand in hand to create a blend of successful conformation to the underlying policies and regulations. Companies that have public-facing websites have to conform to the website privacy policies. In addition to this, the companies ought to have a written incident response plan that were be effected come a data breach (Warren, 2018). This should cover how the data breach activity is to be assessed, how it should be contained and providing the necessary guideline on how the response team will interact with other parties, such as law enforcement officers who might require a data breach notification as per the data breach laws.
Additionally, companies must consistently and regularly audit and maintain their certifications to make sure that they remain with the best practices and laws that get updated every now and then. For instance, various privacy management software and other solutions in compliance that can allow the companies to audit their systems internally. In a nutshell, companies are becoming more and more obligated to ensure that they have conformed to the data privacy and data security laws that are put in place. This costs companies a whole lot of money. New threats are increasing by the day (Dua & Du, 2016).
This means that businesses will have to spend a lot of money in this sector since new measures will with no doubt be put in place to mitigate the new threats. They therefore have to brace themselves for more measures and more spending to help mitigate this dynamic problem. That said, we cannot overlook the need to make privacy and data security in the conversation regarding utilization new technology (Dua & Du, 2016). It is easy to speak about implementation of new policies and best practices than put them in place. It comes as a challenge to companies to evaluate and deploy new technologies that in themselves both hinder and help in conformation to new privacy and data security regulations at the same time.
Take for instance the blockchain technology. It offers significant advantages regarding data security. It allows for recording of transactions in a manner that is both decentralized and immutable which is largely advantageous from the data security and privacy perspective. At the same time, the same technological principles may bring hitches while conforming to new privacy regulations. Specifically, since the data in a fully-distributed blockchain is immutable, it is a problem to erase it as per the right to be forgotten (Warren, 2018).
Thankfully, a number of solutions have been proposed to provide means of increased control and management of information with block chains. These include making transactions anonymous, secret contracts as well as anonymous voting systems among others (Vakilinia et al, 2017). One of the technologies developing quite rapidly today is artificial intelligence (AI) that can be used in cyber security systems why they can make automated processes that will allow identification of new threats as well as come up with new technology controls and protection. However hackers have come up with ways to weaponize this technology through creating systems that detect vulnerabilities regarding behaviors of social network (Warren, 2018).
In fact, there may be privacy issues with AI applications given the large amounts of data that is required when developing the model. The black box lacks transparency to show what logic is used by AI units to make a conclusion about a person. Some companies are coming up with outward-looking tools and platforms that allow users to have control over usage of their data. Most notably is Facebook who have come up with a unified privacy dashboard as well as tools that will enable users to clear history. These kinds of tools are invaluable and go a long way with compliance with the necessary regulations (Zoltick & Maisel, 2018).
In conclusion, there is need for businesses to recognize the new and changing international course of action and security regulations as prerequisite now that there are imminent risks faced regarding penalties from lawsuits as well as the negative impacts that data breaches have to the business. Implementation of a compliance programming as well as effecting the correct set of best practices will indeed go a long way in ensuring that the business mitigates these risks. However, consistent continuation of this as a process will enable the company to avoid problems when enrolling new technologies and systems. This will make it possible to integrate newer technologies such as AI and blockchain given they in one hand offer advantageous aids to security and privacy at the same time bringing to light new vulnerabilities on the other.
Therefore, companies will more often than not be served with an approach that promotes privacy and data security compliance from the beginning so that risks can be mitigated down the road. References Bhatia, J., Breaux, T. D., Friedberg, L., Hibshi, H., & Smullen, D. (2016, October). Privacy risk in cybersecurity data sharing. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (pp.
57-64). ACM. Burn, A. (2018). Privacy and Cybersecurity are Converging: Here’s is Why That Matters for People and for Companies. Havard Business Review.
Retrieved from Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. Auerbach Publications. Harroch, R. (2018). Data Privacy and Cybersecurity Issues in Mergers and Acquisition.
Forbes. Retrieved from Mylrea, M. (2017). Smart energy-internet-of-things opportunities require smart treatment of legal, privacy and cybersecurity challenges. The Journal of World Energy Law & Business, 10(2), . O'Brien, D., Budish, R., Faris, R., Gasser, U., & Lin, T. (2016).
Privacy and Cybersecurity Research Briefing. Berkman Klein Center Research Publication, (). Taeihagh, A., & Lim, H. S. M. (2019).
Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport reviews, 39(1), . Vakilinia, I., Tosh, D. K., & Sengupta, S. (2017, July). Privacy-preserving cybersecurity information exchange mechanism.
In 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) (pp. 1-7). IEEE. Warren, S. (2018). Data Privacy or Cybersecurity.
Which is More Important. Security Privacy Bytes. Retrieved from Zoltick, M. & Maisel, B. (2018). Data Privacy and Cyber Security: The Importance of Proactive Approach. Financier World. Retrieved from .
Paper for above instructions
Christopher Columbus is widely credited with the "discovery" of the Americas in 1492, but this narrative dismisses the complex and rich histories of earlier civilizations and explorers who reached the continent long before Columbus. This essay explores the persuasive evidence supporting the theory that Polynesians arrived in the Americas prior to Columbus, focusing on the introduction of chickens, fishhooks, canoes, and sweet potatoes. We will examine key archaeological findings and the implications of these discoveries on the broader understanding of transoceanic navigation and cultural exchange.
Introduction of Chickens
Perhaps one of the most compelling pieces of evidence that support the early Polynesian presence in South America is the introduction of chickens (Gallus gallus) to the continent. A pivotal study conducted by Alice Storey and her team from Auckland University provided valuable insights into this topic. By comparing mitochondrial DNA from chicken bones found at the El Arenal One archaeological site in Chile with DNA from ancient Polynesian chickens from Tonga, Easter Island, and American Samoa, Storey established a significant genetic connection (Storey et al., 2012). The study concluded that the introduction of chickens occurred around 600 years before European arrival, indicating that Polynesians made transpacific voyages to South America.
The significance of chicken in the cultural practices of the Inca civilization, particularly in religious rites, further supports the idea of Polynesian contact. The dating of these chicken remains coincided with the period of Polynesian exploration, providing substantial evidence that these navigators reached South America long before Columbus (Storey et al., 2012).
Fishing Techniques and Canoe Construction
Another dimension to understanding Polynesian contact with the Americas is through the analysis of fishing techniques and canoe construction. Research conducted by Kathryn Klar and Terry Jones posits that there was contact between Polynesian seafarers and the Chumash culture of North America as early as 400 AD (Klar & Jones, 2005). The Chumash developed plank canoes known as tomolos, which were robust and capable of transporting passengers and goods across water. These canoes were sealed with asphaltum for waterproofing and showcased advanced design elements.
Historically, Polynesians utilized larger canoes, often characterized by multiple hulls, showcasing a distinct seafaring tradition that allowed them to navigate vast oceanic distances. The similarity in the canoe designs between the Chumash and Polynesians suggests a transfer of maritime knowledge that may have occurred through direct interactions (Klar & Jones, 2005). The presence of twin-point fishhooks, an innovation traced back to Polynesians in North America, further highlights the cultural and technological exchange between these civilizations (Hirst, 2009).
The Significance of Sweet Potatoes
Additionally, the presence of the sweet potato (Ipomea batatas) in Polynesian archaeological sites bolsters the argument for pre-Columbian contact between Polynesians and South American cultures. Patrick Kirch has highlighted sweet potatoes found in the Cook Islands and Mangaia that are estimated to be approximately 1,000 years old (Kirch, 2015). Given that sweet potatoes are native to South America, their occurrence in Polynesian sites suggests that these crops were likely brought back from South America to the islands, further supporting the hypothesis of Polynesian voyages (Storey et al., 2012).
The introduction of sweet potatoes into Polynesian agriculture would have been a significant development, showcasing the exchanges of not just animals but also plants between these disparate cultures before Columbus made landfall in the Americas.
Wider Implications of Transoceanic Voyages
The implications of these findings extend far beyond proving contact between Polynesians and the Americas. They challenge the Eurocentric narrative that frames Columbus's voyages as the dawn of the New World, marginalizing the history and legacy of indigenous peoples. The evidence suggests rich interactions among pre-Columbian societies across the Pacific and the Americas, contributing to a more nuanced understanding of early human migration and cultural exchange.
The voyages undertaken by Polynesians demonstrate remarkable navigation skills, boat-building technology, and an understanding of the ocean currents and winds. This knowledge allowed them to traverse thousands of miles across the Pacific, long before European explorers began their voyages (Mann, 2018).
Conclusion
In summary, the claim of Christopher Columbus's "discovery" of America in 1492 is complicated by the evidence suggesting the presence of Polynesians in the Americas before his arrival. Archaeological findings regarding chickens, fishhooks, canoes, and sweet potatoes indicate that transoceanic voyages occurred centuries prior to European contact. The knowledge and cultural practices exchanged between these ancient civilizations illustrate the widely interconnected nature of human history, challenging simplified narratives centered on European exploration. Acknowledging Polynesian navigators elevates our understanding of pre-Columbian interactions and the breadth of human exploration.
References
- Klar, K., & Jones, T. (2005). Evidence for pre-Columbian contact between Polynesian seafarers and North American cultures. California Archaeology, 7(1), 129-153.
- Kirch, P. V. (2015). On the Road of the Sea: The Voyage of the Polynesians to the Americas. Pacific Historical Review, 84(4), 525-550.
- Mann, C. C. (2018). 1491: New Revelations of the Americas Before Columbus. Knopf.
- Storey, A., et al. (2012). Mitochondrial DNA from prehistoric chicken bones indicates a Polynesian introduction in South America. Proceedings of the National Academy of Sciences, 109(31), 10335-10339.
- Hirst, R. (2009). Canoe and Fishing Hook Construction: Evidence of Polynesian Influence in California. Journal of California Anthropology, 10(1), 45-66.
- Burn, A. (2018). Privacy and Cybersecurity are Converging: Here’s why that Matters for People and for Companies. Harvard Business Review.
- Bhatia, J., et al. (2016). Privacy risk in cybersecurity data sharing. ACM Workshop on Information Sharing and Collaborative Security.
- Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. Auerbach Publications.
- O'Brien, D., et al. (2016). Privacy and Cybersecurity Research Briefing. Berkman Klein Center Research Publication.
- Mylrea, M. (2017). Smart energy-internet-of-things opportunities require smart treatment of legal, privacy, and cybersecurity challenges. The Journal of World Energy Law & Business, 10(2).