Saturday, August 31, 2019

Relative and Radiometric Dating

Two general processes used to figure out the age of rocks is relative dating and radiometric dating. We will compare and contrast the strengths and weaknesses of both methods. According to Lutgens and Tarbuck, Relative dating is the process in putting events in their proper sequence. Relative dating is based on assumption, not able to give an accurate date but an estimated time period where the rock originated from. A Danish scientist, Nicolaus Steno is accredited for the Law of Superposition. This law basically tells us that each layer of sedimentary rock is younger than the one below it which is depicted in figure 8. in the text. Steno is also accredited for the Principle of Original Horizontality. The principle is shown in figure 8. 4 in the text showing rocks compounding with sediment escalating in height that have not been disturbed by geological disturbances. Another relative dating process is the Principle of Cross-Cutting Relationships. This takes place when faults force them selves through older rocks. This means that the faults or dikes have penetrated layers of sediment that were deposited long before the intrusion. By implementing these theories and processes, we can assume a time period in the Earth’s history where these rocks originate from. However, this is an assumption and not a specific time as shown in figure 8. 10. Radiometric dating is the process of estimating the age of rocks from the decay of radioactive elements inside the rock specimen. This process utilizes radioactive isotopes to date igneous rocks. These radioactive isotopes have a distinctive number of atoms that present themselves unstable. These atoms will inevitably decay through a series of evolutions. We will take Uranium as example. Uranium will ultimately decay into the stable element lead. The father element being the Uranium and the end result creating the daughter element lead. Radioisotope dating is used to date igneous rocks that have cooled from their molten stage. it is assumed that all daughter elements have escaped through the immense heat. Once cooled, no elements will escape based on assumption. In the event that elements do escape, is through radioactive decay. According to Lutgens and Tarbuck, The decay rate that takes place is measured in Half Life. This is the length of time that one half of the remaining atoms to decay. This can be measured in a laboratory by finding the decay rate and counting time backwards to find the age of the rock specimen. Relative dating and radiometric dating have many strengths but also many weaknesses. Relative dating gives a general time frame where the rock exists whereas Radiometric dating has a scientific formula to give a more accurate account on where the rock originated from. However, it is safe to presume that both processes rely on assumption and not strict scientific fact.

Friday, August 30, 2019

Chemistry Design Prac Essay

Investigate one chemistry related factor on the deflection of the liquid flow in the presence of a charged rod Research question How will the amount of time spent rubbing a glass rod affect the angle of deflection of flowing water in the presence of the charged glass rod? Background Research Static electricity is formed in contact with two objects, where one object gains electrons from another, resulting in one object having a positive charge while the other having a negative charge. Some materials tend to lose or gain electrons during contact with other objects. Materials with electrons bonded to it weakly, tend to lose electrons while materials with fewer electrons on the outer shell tend to gain electrons. Therefore, when an object is imbalanced of a positive or negative charge, it has static electricity. Polarity is the separation of electric charges, caused when electrons are not equally shared in a molecule. This is caused when some atoms in the molecule have a higher electronegativity than others, causing more electrons to be attracted to it, leaving one side of the molecule more negative than the other. An element or molecule with an electro negativity value of 0.5+ is considered to be polar. When a polar liquid such as water is flowing in a presence of a charged rod, the liquid tend to bend towards the rod. This is because the rod will either be positively or negatively charged, and the dipoles of the polar molecule will be attracted to the charged rod. The charge on the rod is determined by the material which is used to rub against it, however, it does not matter whether the rod is positively or negatively charged because either way, the opposite dipoles of the polar molecule will be attracted towards it, causing the flow of the liquid to bend towards the charged rod. Defining Independent and Dependent Variables Independent The amount of time rubbing the glass rod with a piece of silk. – 10 seconds – 20 seconds – 30 seconds – 40 seconds – 50 seconds – 60 seconds Dependent The angle of deflection of the flowing water will be measured with grid paper with a smallest increment of 1mm. A line will be drawn on the grid paper from the point where the glass rod was places to the point where the water was deflected. A protractor with a smallest increment of 0.5 degrees will be used to calculate the angle of deflection of the water. Controlling Variables Table 1 – Variables and Method of control Type Variable Method of Control Controlled The rate of the flow of water Adjust the burette to deliver the smallest stream of water possible but without being discontinuous. The water will be kept flowing at the same rate, throughout the experiment. The glass rod The same glass rod with a diameter of 1cm will be used throughout the experiment. Pressure when rubbing the glass rod Use the same person to rub the glass rod against the silk, applying the same pressure every time. Placement of the glass rod A line will be marked on the grid paper so the glass rod will be placed at the exact point and the exact angle to the flowing water every time. Placement of the grid paper The grid paper will be sticky taped to the burette and placed as close as possible to the flowing water. The same grid paper will be used and left at the same position throughout the experiment. Weather conditions The experiment will be conducted in a room with all windows closed and air conditioning switched off to reduce effects atmospheric effects on the angle of deflection of the water. Stopwatch The one person will be using the same stopwatch every time to reduce systematic errors. Material The same piece of silk cloth (20 cm in length, 15cm in width) will be used throughout the experiment The experimenters The same two people, (person with stopwatch and person controlling the glass rod) will conduct the experiment to keep random errors in measurements and readings consistent. Materials and Equipments List: – 50 mL Burette – 20cm x 15cm silk cloth – 1cm diameter glass rod – Distilled water – 200 mL Beaker – A4 Grid paper with increments of 1mm – Protractor with increments of 0.5 degrees – Retort Stand – clamp – Pen – Ruler – Sticky tape – Stop watch Method 1. Attach the clamp to the retort stand. 2. Fill the burette with distilled water to approx 1cm from the top and attach it to the clamp 3. Draw a straight line on the grid paper with a ruler and sticky tape it to the bottom of the burette, lining up the line on the paper exactly with the flow of the water coming out of the burette. 4. Also Draw a line 90 degrees towards the line if the flowing water but stopping at 0.5 cm from the line. This line will be where the charged glass rod will be placed 5. Also mark the origin (the tip of the burette, where the water comes out) on the grid paper 6. Place the 200 mL beaker under the burette and let the water run down 7. Start the timer on the stopwatch and simultaneously, begin rubbing the glass rod against the piece of silk 8. Stop the stop watch at 10 seconds and immediately place the charged rod as close as possible to the line drawn on the grid paper 9. Mark the angle of deflection of the water on the grid paper 10. Wait 1 minute until the rod is completely uncharged 11. Repeat steps 6 – 9 12. Repeat the experiment from steps 6 – 10, changing the time rubbing the glass rod against the silk cloth by 20, 30, 40, 50 and 60 seconds. 13. Remove the grid paper and line up all the points of the deflected water to the origin 14. Measure the angles with a protractor and record the results into the table below 15. Pack up the experiment Table 2 – Raw data table Time charging the glass rod Angle of deflection of water Trial 1 Trial 2 Trial 3 Trial 4 Trial 5 Trial 6 Average 10 seconds 20 seconds 30 seconds 40 seconds 50 seconds 60 seconds Table 3 – Risks involved in the experiment and safety precautions to reduce the risks Risk Safety Precaution Action to take The burette is very long and is made of glass and can be broken easily Hold the burette with two hands and always watch for obstacles when carrying around the lab. Wear closed in shoes, lab coat and safety glasses in case the burette breaks. Carefully pick up the large pieces of broken glass one by one and throw in the glass bin. Use a brush to sweep all the small bits into the bin. Make sure there is no remaining broken glass in the lab. Bibliography 1. Columbia University Press (1978-1979). New Illustrated Columbia Encyclopaedia 2. Neuss, Geoffrey (2007). Chemistry Course Companion. Oxford: Oxford University Press. 3. http://books.google.com.au/books?id=nkwM28diKF4C&pg=PT109&lpg=PT109&dq=deflection+charged+rod&source=bl&ots=dk2TPy7IOf&sig=g-MDZP6Q5kDsur57EIejpgJ54bg&hl=en&ei=48FrSp2bFIzusQOsy72WBQ&sa=X&oi=book_result&ct=result&resnum=2 4. Department of Physics and Physical Science, University of Nebrasky, Kearney Falling Water http://rip.physics.unk.edu/CyberTextBook/fallingwater/ 5. http://books.google.com.au/books?id=nkwM28diKF4C&pg=PT109&lpg=PT109&dq=charged+rod+deflect+water&source=bl&ots=dk2TQr4PPg&sig=iwM-1qHxsAtaF9XoGZ1Mw9UCn6g&hl=en&ei=OStsSqjFIo6qtgOT16WWBQ&sa=X&oi=book_result&ct=result&resnum=3

Thursday, August 29, 2019

Both Sided of Humanity

Both Sides of Humanity A typical spring morning, crisp, cool air. Three girls in the driveway like ducklings in a row, momma behind them in the doorway waving. Three girls anxiously awaiting the arrival of bus 210, lilacs in hand for the driver. They’re so young and pure, free of corruption and clueless of the dangers of each new day. The bus takes them to school, the place they think they go to learn about numbers and curving cursive Y below the line, but today school is a haven. Imagine a seemingly unsteady world crumbling under the pressures of fate’s unsteady hand. Imagine everything you own taken in an instant. And as their mother weakly told the girls of the disaster that day, the girls wondered, was it fate? Was it always going to happen? No. And they wondered what could have happened differently in the past to prevent this tragedy as they solemnly stared at the smoldering ash that was their home this morning. Three girls in the driveway like ducklings in a row, momma beside them- and beside herself, wondering what will happen next. While the thought of reconstruction brings happiness, they know their house will never be rebuilt. Money is scarce- the miracle ration has been spent on their lives. The family is all okay; no one was home to endure the deadly licks of the fire’s vicious tongue. There are six, and for now they must all live together in one small hotel room. For the three girls, getting along with their step dad would be like a fuzzy white mouse getting along with a starved python. Tension is high for everyone, but they all have their outlets. For the girls it is school. There they thrive in A+ papers, constant praise from teachers, and â€Å"BFF† love, and in the room at night there were three in the bed and the little one said, â€Å"we made it through another day.† Winter of 2004, the house is not complete; it’s not a house at all. There are some walls, but numerous holes and open spaces. The baby can’t crawl around because the floor is missing in some places, in others there is floor board†¦or some kind of board. No carpet. The stairs are slightly safe, enough to get to the top if they go one at the time. The kitchen has an infinite number of open places so the snow comes in sometimes. The floor is too cold to walk on with bare feet, but they have a few pairs of socks. There is no electricity, but they have a generator in the backyard. Gas is expensive though so it is rarely turned on. Their only heat source is a portable kerosene heater and kerosene is expensive too. There’s no running water, but when the generator is on they get about five ice-cold minutes in the shower-sometimes seven or eight depending on how much gas there is to spare. The youngest girl goes outside and sticks her hand deep into the snow. The sn owy yard is their refrigerator. When the sun goes down candles are gathered and lit. The girls gather in a circle, pens and paper in hand to do their math homework and write tomorrow’s essay in the company of dancing shadows on the wall. It is cold but they are grateful to have this skeleton house rather than nothing at all. Friends don’t know about this new way of life, keeping it a secret is no challenge though, because there is no time for friends. School is the only social time available, but that’s okay-it’s easier to keep secrets that way. Days go by, then weeks. Thanksgiving came. Oh were they thankful. Thankful for life, each other, and good health, and thankful that they had sense enough to be thankful. On Christmas Eve the family decorated a small tree cut from the woods out back, knowing nothing would be under it in the morning. Christmas morning arrived and they huddled around the tree. No words came out, but everyone knew what the others were thinking, â€Å"Its great to be alive; its great to have a healthy family; what a beautiful Christmas morning it is.† The girls knew their friends were opening presents, but their friends were unlucky because they were not having thoughts of thanks and gratitude flood their heads like the family with the creaky, dark house d own the road. Four years later life is very different from that in the creaky, dark house and still, there are three girls becoming women with a definite past and a bright future. They have seen two very different sides of life, and despite everything they are thankful for what they didn’t have before. Nothing will ever be the same, they will never look at life through the eyes of those three innocent girls that they once were. They, along with everyone else, are a very small part of an impossibly large world. Without the past the girls would not be thankful for every meal put on the table. They would not be thankful for the clothes on their backs. They are humble, and know that no matter what is going wrong, someone out there is always worse off. Three girls standing together, not in a row but side by side, grown and strong, ready to take on the world. They know what they have, they know that may not have it tomorrow, and that’s okay because nothing can take away their passion for life and their ability to adapt to any situation. When everything is mixed up and life is kept secret from friends and society it’s hard to cope with what others may think or say. The idea of society as a whole is a fallacy. We are all driven to be the same and to conform to the thoughts and ideas of others, but how can we act like a certain person or group of people when they too are acting like someone else? There is no truth in society, yet we all follow the same path to uniformity. To find the truth within yourself is crucial. Staying strong in a faulty situation is to have self awareness and to realize that life- no matter how fancy or dull- is beautiful. No power is so strong that it can ruin someone’s self-image and sens e of self worth. Everyone has the power to reach inside themselves and find their inner beauty, their reason for being on this earth. In the words of Emerson from his essay on self reliance, â€Å"Nothing can bring you peace but yourself. Nothing can bring you peace but the triumph of principles.† In Plato’s Allegory of the Cave the world is a cave full of prisoners who see nothing but what is displayed in front of them. In the words of Plato, â€Å"And if they could talk to one another, don’t you think they’d suppose that the names they used applied to the things they see passing before them?† unless the prisoners are led towards the truth they will never fully understand the real world. Three girls standing in a row, each with her own ideas of life’s truths. Each aware that she is responsible for freeing the world’s prisoners. It is their responsibility to show the world what life really is and what goes on behind closed doors. Reflecting on the past, they realize that their history is no different from anyone else’s. Together they became independent, self-reliant individuals. They have strength and passion, a burning fire within them as one, shedding warm light on each that reveals their individuality and what they have chos en to believe. Like the dancing arithmetic shadows on the wall, adversity vanishes leaving hope and certainty to their lives†¦a warm memory on a cold winter night. Three women who know: They’ve been up the rocky path and down the gentle slope. They’ve seen both sides of humanity and the miracles of hope. The light keeps glowing on them; and the moon keeps shining bright. As long as nature takes her course, they know they’ll be alright. Life cannot be touched; you can’t hold it in your hands. Its being can’t be dissected although it has the most intricate parts. Life thrives in every human being, entwines itself in every heart. Living with love, and having a passion for life are parts of life’s flawless web of catching you in time. Before your time, between your time, and after your time you’ll know†¦your life was perfect all along you just didn’t always know were to go, why you went, or how you got there. Following the brightest star, the path of yesterday and tomorrow, let your senseless worries guide you to your destination, wherever that may be. Be happy on the outside, and happier on the in. donâ€⠄¢t let others tell you how your life should end and begin. Respect yourself for who you are and love the light that guides you. Cherish every heart that has touched your very soul. Believe you can, and know you can, and you will be led home.

Wednesday, August 28, 2019

Distributed Databases Research Paper Example | Topics and Well Written Essays - 1000 words

Distributed Databases - Research Paper Example 1). It is important to acknowledge that this article has outlined a significant set of valuable information about distributed systems. This is specifically on issues based on controlling concurrency of organization data and most importantly, the security of data and transactions handles by distributed database systems. The authors of the article address indicate that concurrency control and security threat is a very crucial subject of concern in distributed database networks. The article goes further to clarify that there has been no guarantee of execution of secure database transactions in most distributed databases. Specifically, the author outlines that, there is no clear platform for ascertaining that database transactions are always maintaining the ACID properties, which are atomicity, Consistency, Isolation and Durability (Vinod et al. 3). This paper describes that there are a number of concerns in the design of most distributed databases, which have negatively affected the performance of their respective distributed networks. Specifically, concurrency issues in the transfer of data along with security of the transactions handled by these systems have been indicated as significant subjects of concern. In a distributed database, the database spread over a wide number of computers, which communicate and share data via a well designed of computer data network. The database applications connected to the distributed database system have to work transparently on the database fragments (Vinod et al. 2). The paper outlines that concurrency control is a database management activity that focuses on coordinating database manipulation processes by a concurrent access to data while potentially interfering with one another. The main subject of concern in concurrency control is to ascertain serialisability of transactions

Tuesday, August 27, 2019

Hand Hygiene of Nurses Essay Example | Topics and Well Written Essays - 1000 words

Hand Hygiene of Nurses - Essay Example Action planning involves active participation in the hand washing process, for example, nurses may list when they are supposed to wash their hands. This was also supported in the study by Nicol, et.al., (2009; Curtis, et.al., 2009) where the authors emphasized the theory of planned behavior. The study revealed that the theory of planned behavior could sufficiently help improve the education and training of nurses in hand hygiene behavior (Nicol, et.al., 2009; Curtis, et.al., 2009). This study was also able to demonstrate that deep-seated habits which are incorporated well into a person’s activities have a significant potential of improving a certain activity or behavior (Nicol, et.al., 2009; Curtis, et.al., 2009). The theory of planned behavior also points out that where individuals unconsciously apply certain activities, they also learn to carry out hand washing activities where necessary (Nicol, et.al., 2009; Curtis, et.al., 2009). This study provides a more in-depth and per sonalized verbalization of how habits and planned activities can lead to better hand washing compliance. The value of planned behavior in the promotion of hand washing was also explored in the study by Curtis, et.al. (2009; Nicol, et.al., 2009). The authors were able to establish that hand washing is a habitual behavior and planning it into a person’s life can help ensure that it would always be carried out. This study explored the value of planned and habitual activities which can eventually be incorporated into a person’s life (Curtis, et.al., 2009; Nicol, et.al., 2009). It also relates the value of building habitual behavior in relation to hand washing. Through this study, a holistic and specific picture of hand washing is obtained, including the impact of planned habits and behavior on its compliance.

Monday, August 26, 2019

Intelligence Collection Essay Example | Topics and Well Written Essays - 250 words - 2

Intelligence Collection - Essay Example The subsequent retrieval operations in an area controlled by Russian-backed separatist rebels was the result of intense diplomatic negotiations to allow access but the importance of this request was to gather additional incriminating evidence as to who really shot down the airplane. An implication of materials and biologic collection techniques was to detect any traces of chemicals used in the shooting down of that plane using a missile (BBC News Europe para. 4). Chemical evidence as to what type of missile it was (a Buk or SA-11 version) can complement eyewitness accounts on the ground (HUMINT) as well as data from the radar systems in the flight path (COMINT). Part 2. Materiel Acquisition – the value of acquiring sensitive materials like that of what happened during a mid-air collision between a Chinese fighter jet and an American spy plane is to gain intelligence about what materials were used on the manufacture of the plane (sensitive or light-weight metals or other materials that deflect radar) or the extremely sophisticated electronic systems and avionics used on the spy plane. It allows China access to all these materials and be able to study them later in their own laboratories. The particular spy plane was made by the firm of defense contractor Lockheed and forced to land in Hainan Island after being damaged. But the plane was eventually returned to the U.S. in its dismantled form already (Eckert, 2002). Its value in intelligence was allow the Chinese to study as they cannot have it due to arms

GLOBAL MARKETING Essay Example | Topics and Well Written Essays - 1000 words

GLOBAL MARKETING - Essay Example A good example of a firm practicing internalization as a result of globalization is KFC Limited (Kentucky fried Chicken) which has opened eateries in Europe, Asia and Africa yet its home country is USA. Key drivers of globalization have been linked to internalization with regards to marketing in that they might have positive and negative effects on marketing. Some of the key drivers of globalization are as presented by Daniel Traca in his article(International Trade) are, lower transport and communication costs, development of international institutions and political decisions towards deregulation and liberation of trade and FDI(Foreign Direct Investment) regulations. Lower transport and communication costs have especially propelled marketing standards by firms. This has led to healthier marketing competition and reduced monopoly by some major firms. It has also widened their market base and resulted into increased revenues. Customer services and goods delivery has also improved due to this. Daniel Traca outlines that the development of international institutions such as the World Trade Organization (WTO) and regional trade agreements between continental blocks and countries has greatly lead to internalization benefits by major firms. Though some regulations and rules that are governed by WTO have added towards marketing internalization, some are restrictive and are not favourable to all participants. Regional trade agreements have also lead to better products and services by firms in these regions. This is as a result of favourable marketing conditions such as reduced taxes, large market sizes and setting up of Export Processing Zones that foster growth of trade and marketing. Political decisions towards deregulation and liberation of trade and FDI regulations have resulted into better marketing standards. This has enabled firms to directly market themselves globally by getting involved in community programs

Sunday, August 25, 2019

Maslow's Hierarchy of Needs Essay Example | Topics and Well Written Essays - 500 words

Maslow's Hierarchy of Needs - Essay Example Maslow’s hierarchy of needs entails five levels. The first level entails the satisfaction of biological and psychological needs like water, air, food, shelter, warmth, and sleep. The second level is the safety needs and these needs include order and law, stability and freedom from fear (McLeod, 2014). The third level entails the sense of love and belonging needs like intimate relationships, friendship, and affection from family, peers, and workmates. The fourth level entails esteem needs that include prestige, dominance, self-respect, and respect from others. The final level of needs is self-actualization needs that include realizing one’s personal potential and personal growth. Later, the five stage model was expanded to include cognitive needs like knowledge and meaning, aesthetic needs like appreciation for beauty and finally transcendence needs which involves helping others to achieve their self-actualization. In each level of Maslow’s hierarchy of needs, their character of being ‘wanting beings’ motivates people. When one need is satisfied, it stops becoming a motivator and another need emerges (NetMBA Business Knowledge Center, 2010). If the things that satisfy the lower needs are gone, people do not care about achieving the higher needs. Indeed, the Maslow’s hierarchy of needs asserts that we must follow a defined order to satisfy our needs. To move a person to a higher level of the hierarchy within the work group, employers and organizations must help people to identify, pursue and reach their own personal potential (McLeod, 2014). Successful organizations are those that understand and encourage their employees towards self-actualization to help them achieve their personal growth. For instance, an employee in sales and marketing department can only achieve the sales targets if a conducive working environment is provided which includes friendship from the

Saturday, August 24, 2019

The Making of Australia Essay Example | Topics and Well Written Essays - 1250 words

The Making of Australia - Essay Example Generally, the voyage from Britain to Australia lasted eight months, two of which were spent in various ports awaiting repairs and supplies (Inglis, p. 6). The voyage took its toll on the convicts, many of whom perished on the way. One of the voyages of the Second Fleet was especially dangerous: from Britain to Australia, 26% of the prisoners had died, and 488 others had dysentery, scurvy, or other infectious diseases (O'Brien, p. 168). It was a regular occurrence for convicts on ships to be seen "lying, some half and others nearly naked, without either a bed or bedding, unable to turn or help themselves" (O'Brien, p. 169). Ironically, many convicts who survived the voyage to Australia often fainted when they arrived and came into contact with the fresh air, only to die in the hospitals for prisoners, which provided slipshod medical treatment at best. In our own time, rehabilitation is often seen as the key to change convict behavior for return to society. In the era of penal colonies in Australia, though, punishment was used as the primary modifier of behavior. The most common method of punishment was flogging. The tradition of "punchgut" grew out of the practice of flogging a prisoner and then leaving him in the harbor to get extremely hungry (Inglis, p. 6). Punishment was not only reserved for prisoners who had committed crimes or offenses; instead, a convict's fate in Australia depended largely upon how "docile he was and on many things over which he had no control" (Inglis, p. 8). In New South Wales, "between 1833 and 1836, one male convict in every four was flogged each year, receiving an average of more than forty lashes" (Inglis, p. 8). More serious crimes could result in hanging; these crimes generally involved the murder of another inmate, or of prison personnel. Murder among the convicts was common, as knives became a popular way to gain revenge for thefts (Lagrange, p. 180). The guillotine was another popular method of execution, and it was common for executed prisoners to have their headless bodies rowed out to sea and dropped into the ocean, where the sharks would eat the corpse; in fact, this became known as the "standard form of burial of a convict" (Lagrange, p. 180). Punishment was how the convicts were kept as docile as possible in the colonies. There are some who argue that the convicts had a life similar to slaves in some of the crueler systems. However, there are others that argue that the convicts were not sent to Australia arbitrarily; rather, the convicts had to have committed a crime to be sent on the long voyage halfway around the world. Clearly, in the last century and a half, sensibilities about the proper treatment of prisoners have changed dramatically, and it is now only those societies that are considered backward or uncivilized that have such cruel prison conditions. Moreton Bay was selected as a site for those convicted of the most heinous crimes, and so the harshest conditions were reserved for these prisoners. The physical discipline went to new

Friday, August 23, 2019

MGMT Essay Example | Topics and Well Written Essays - 500 words

MGMT - Essay Example Also, maintaining business strategies and goals with daily employee task and duties helps the work environment to function in a healthy and effective manner. Clear goals and expectations being communicated effectively to all levels of employees is also an integral PM practice to regulate performance management, and professionalism. Constant feedback is the best mechanism to enhance employee skills and develop their standards according to company goals. Also, with regular communication regarding individuals and teams, an excellent practice is to frequently reward good performances. This helps to instill company values, motivate employees to do even better, and enforce the importance of standards and teamwork. Career success is based on a few valuable key elements. Having goals and objectives helps employees and managers alike to focus on standards and collectively meet the company’s aims and aspirations. Embracing improvement and learning is also important in helping a team to grow and effectively work together. Being supportive, effectively communicating ideas, and having key decision making skills helps to improve performance and develop set career goals. Having leadership qualities and responsibly completing expected duties and tasks helps to maintain positive feedback, receive recognition, and achieve career success.

Thursday, August 22, 2019

Business Ethics and dilemma Essay Example for Free

Business Ethics and dilemma Essay 1. Review the assigned readings from the text and article by Carroll (1991). 2. Prepare a 3- to 5-page paper titled, Corporate Social Responsibility. 3. Reflect upon your text readings from Chapters 1 and 9 with a focus on the following core concepts: Organizational Social Responsibility (Chapters 1 and 9) The Ethical Decision-making Process (Chapter 1) Corporate Reputation (Chapter 9) The Corporate Social Responsibility Pyramid (Chapter 9) The Importance of Trust (Chapter 9) The Pyramid of Corporate Social Responsibility (article by Carroll and Chapter 9) 4. Read The Merck and River Blindness Case at the end of Chapter 9 of your text. 5. Compose your paper in Microsoft Word. Include your name, the assignment name and number, the course and section number, and the date on your title page. Follow APA guidelines for formatting and citations.. NOTE: Your paper must meet the minimum requirements as outlined in the section of Weekly Written Assignments of the Assignment Guidelines and the grading criteria of this assignment. You are to provide a minimum of 2-3 references in your work. For this assignment, use of general google.com or Internet search references is not acceptable. Use the university librarys scholarly databases. 6. Respond to each of the following questions and statements: Stakeholders: Produce a list of all key stakeholders that you perceive to have a bona fide interest in the Merck companys dilemma. Corporate Social Responsibility Pyramid: Frame the Merck companys ethical dilemma within the Corporate Social Responsibility Pyramid. E.g. State briefly the key economic, legal, ethical, and philanthropic responsibilities. As a focal point, compare and contrast the economic implications against the ethical and philanthropic considerations. Organizational Values: State briefly and specifically whether the decision to a) proceed with the drug project or b) not to proceed with the drug development best fits with the companys declared organizational values and its principles of profitability. Stakeholder Impact and Trust: If the drug development failed and cost hundreds of millions of dollars, would that harm to the company and its stakeholders be justifiable? If Merck decided not to pursue development of the new drug, what implications do you see this having for stakeholder relations such as the scientists who desire the development. E.g. Is this a trust and leadership consideration? Final Decision: If you were the CEO of Merck and the final decision on this risky new drug development was yours, what would you do and why? Justify your decision. Using Carrolls theory, are you comfortable stating your opinion to the board of trustees, employees, and media? NOTE: Since this is an actual, real-life case, your focus should be on producing creative and new thinking that applies the ethical concepts to the material. Also, include an introduction and conclusion in your paper. You are encouraged to use the headings above in Action Item 7 in your paper for organizational purposes. 7. Submit your paper to Turnitin.com. NOTE: Turnitin.com is used by Franklin University to assist students in detecting plagiarism. Turnitin generates a report within minutes of submitting your paper. Your results will not be e-mailed to you; you must login to review your results. Submitting a paper ahead of an assignment deadline provides you with the opportunity to take action if you need to rewrite any part of the paper. Your professor will provide you with a class ID and password as an e-mail or a Class Communication object. Submission Instructions By Sunday, upload your paper using the Submit tool. Grading Criteria Content and focus: Response addressed the question(s) posed in a logical, cohesive manner: 0 35 points Analysis and critical thinking: Writing illustrates higher order critical thinking, analysis, synthesis, and/or evaluation: 0 35 points Writing style, grammar, sentence structure: Sentences are consistently clear, concise, well written; grammar and punctuation are correct: 0 15 points APA and research: Correct use of APA style in body of paper and appropriately references the text and/or other research sources: 0 15 points

Wednesday, August 21, 2019

Indias Role in the Climate Change Summit Essay Example for Free

Indias Role in the Climate Change Summit Essay The worlds nation today adopted a package dubbed the cancun Agreements buildings blocks for a future legal treaty to address climate change amid concerns that commitments to avert acceptable level of global warming remain missing. Negotiators from 194 countries agreed on a set of decision that the un climate secretariat said would set all governments â€Å"more firmly on the path towards the low emissions future† and provide support to developing countries on their action on climate change. India played a key role at the climate change summit , proposing a new mechanism to allow international scrutiny of all countries’ including India’ s action to crub emission of greenhouse gases. The invironment minister Jairam Ramesh also signalled that India would eventually consider legally –binding crubs on emission, a shift from its long standing position. Some environmental grouos have criticised these moves by India. But climate change analysts have said India’s proposal for serutiny of the climate climate change exchange actions reflect an acceptance of the principal of transparency. ‘’ And (Rmesh’s) assertions on legaklly binding actions is an indicator that India is willing to shift from the position of doing nothing to joining the global community in fiting climate change ,†an analyst in Cancun said. ‘’This does not mean India will accept legally – bending cuts next year,’’ he said . The Cancun documents of ficially recognise emissions curbs targets set by industrialised and developing countries and once every year by the developing countries. But the target of cutting global emissions by 50 % by the year 2050- part of the draft circulated yesterday – has been replaced by text calling for ‘’ subsantial’’ reductions in blobal emissions by 2050 . The Cancun decision pledge US$30 billion in fast start finance from the industrialised countries to support climate action in developing countries. The goal is to raise this to US$ 100 billion by 2020. Thew agreements also  recognise the need of countries to work towards the keeping the rise in the aversge global temperature below 2 degree c. ‘’ Cancun has done its job ,’’ said chistiana Figueres, head of the UN climate change secretariat after the agreement was adopted today. ‘’ lt is not what is required but it is the essential foundation on which to build greater collective ambition Figueres said. But several environmental group including Indias centre for science and Environment have pointed out thst the emission reduction pledge made by all countries so far are way below the whst is required to keep the rise in the average temperature.

Tuesday, August 20, 2019

Three Major Categories Of Software

Three Major Categories Of Software Software can be divided into three major categories according to popularity: application software, system software, and web applications. Within each category there are dozens, if not hundreds, of specialized software types, but for the purpose of this study, we will concentrate on the most popular software type of each category. Software applications refer to programs on a client machine which are written to perform specific tasks. Nowadays, there is a wide range of software applications being developed including word processing programs, database management tools, photo editing software, etc. But during the last decade the web has become the new deployment environment for software applications. Software applications that were previously built for specific operating systems and devices are now being designed specifically for the web (web-enabled). Because of this new movement, and as the web becomes increasingly a universal interface for software development, the software industry is experiencing a major evolution toward web-related software applications (Festa 2001). For example, the recent release of Googles Chrome web browser which was specifically designed to enable the execution of web applications and services in the web browser confirms this trend. As the web evolves, the surrounding and supporting technologies are becoming more complex. This is especially relevant in web-enabled applications such as web browsers, email/news clients, VoIP and chat clients which allow the interaction with the web from the client side. Web browsers specifically have become the doorway to the Internet and are currently the most widely used applications and the standard tool for consuming Internet services. This evolution toward web-related applications had a direct impact on the security of such applications. For instance, vulnerabilities and attacks against web browsers became more popular as such attacks compromise the security and privacy and have serious implications for web users. Once a web-related software is infected, the users web interaction can be fully exposed to the attacker. For instance, an infected web browser can expose the victims web addresses, data typed into forms, user sessions and cookies. Moreover, vulnerability risks in a web browser can have a serious implication for intranets (Anupam and Mayer 1998). Most users use the same browser to access information on the intranet as well as the Internet. A user who has been attacked through vulnerable web browser has compromised his or her firewall for the duration of the browsing session (c). Examples of such vulnerability risks against web browsers include key loggers. Key loggers are a form of spyware which can be installed through vulnerability in a web browser and then logs all pressed keys whenever a user visits a certain online banking web site. The increase in vulnerability risks in web-related software is related to the exponential growth of the Internet. As we enter through the second decade of the 21st century, the rapid adoption of the Internet market along its ubiquitous presence will continue to make Internet technologies such as web-related applications a prime target for attackers as they constitute the largest mass of victims. Hypothesis 1a: Vulnerability type will be highly positively related to web-related software applications Hypothesis 1b: Frequency of vulnerability will be highly positively related to web-related software applications Hypothesis 1c: Severity of vulnerability will be highly positively related to web-related software applications System Software: System software refers to the set of computer programs which are required to support the execution of application programs and maintain system hardware. Operating systems, utilities, drivers and compilers are among the major components of system software. Such components are the enablers and service providers to software applications. Among these components, the operating system is the most popular and important one. The operating system market for client PCs has evolved along the lines predicted by theories of increasing returns and network externalities (Shapiro and Varian 1999). But with this increase in network externality, there has been a dramatic increase in vulnerabilities (cite xxx). For instance, between 2007 and 2009, the number of operating system vulnerabilities almost doubled from 220 to 420 vulnerabilities (CVE 2010). Such increase in vulnerabilities can be caused by several reasons. First, network externality implies larger user base which makes operating systems an a ttractive target for hackers. In addition to that, viruses and worms can spread more rapidly because of the large installed user base and network effect. Second, the architecture of some operating systems like Windows allows vulnerabilities to gain a direct access to the operating system files through external scripts; meaning that if malicious scripts are sophisticated enough, they can exploit system files through software applications or through system software directly. And last, the fame factor for discovering vulnerabilities in systems with significant installed user base make them potentially significant target for hackers. Lately, new technologies such as web-based cloud computing, virtualization and Just enough Operating System (JeOS) have been gradually diminishing the importance of the traditional operating system (Geer 2009). With cloud computing technologies, users can access web applications through their web browser; meaning that an OS like Google Chrome will only be needed to run the web-browser. Moreover, with virtualization technology a personal computer or a server is capable of running multiple operating systems or multiple sessions of a single OS at anytime without having the user rely on a single OS. Similarly, Just enough Operating System (JeOS) focuses on running applications which require minimal OS. As these technologies are gaining popularity and becoming more adopted by users, the role of an OS is starting to decrease so does its network externality. With this is mind, we hypothesize that attackers interests and vulnerability risks will gradually shift to other technologies as they become more popular. Hypothesis 1d: Vulnerability type will be positively related to system software Hypothesis 1e: Frequency of vulnerability will be positively related to system software Hypothesis 1f: Severity of vulnerability will be positively related to system software Web Applications: The remarkable reach of web applications into all areas of the Internet makes this field among the largest and most important parts of the software industry. As of today, the Internet consists of hundreds of thousands of small and large-scale web applications ranging from e-Commerce applications to social networking sites to online gaming. This popularity has attracted large user base which made web applications lucrative targets for attackers to exploit vulnerabilities. Web applications are currently subject to a plenty of vulnerabilities and attacks, such as cross-site scripting (XSS), session riding (CSRF) and browser hijacking (Mansfield-Devine 2008). Hence, the landscape of vulnerabilities has changed significantly during the first decade of the 21st century. Previously, buffer overflow and format string vulnerabilities accounted for a large fraction of all vulnerabilities during the 1990s, but as web applications became more popular, new vulnerabilities and attacks such as SQL injections and XSS attacks exceeded earlier vulnerabilities. According to CVE surveys, security issues in web applications are the most commonly reported vulnerabilities nowadays. In response, web application vendors dedicated more resources towards securing their products as they tend to receive more attention as potential targets because of their large pool of possible victims (Mercuri 2003). The problem of web application vulnerabilities is becoming more complicated with the recent movement towards Web 2.0 technologies. The landscape of Web 2.0 enables new avenue of vulnerabilities by using sophisticated scripts on the client side. Moreover, Web 2.0 websites are becoming riskier than traditional websites because they use more scripting capabilities to allow users to upload content, share information and gain more control. Despite the growth of web applications and Web 2.0, these technologies are still limited by the available resources such as network bandwidth, latency, memory and processing power. More specifically, its argued that web applications are constrained by the capabilities of the web browser they are running in. With this drawback, web application users will ultimately have to rely on their own resources to accomplish magnitudes of tasks. Compared to system and software applications, we hypothesize that web applications will continue to experience vulnerability risks but at a lower rate than other popular software. Hypothesis 1g: Vulnerability type will be least positively related to web applications Hypothesis 1h: Frequency of vulnerability will be least positively related to web applications Hypothesis 1i: Severity of vulnerability will be least positively related to web applications Targeted Operating System Software producers often create applications to run on a single or a combination of operating systems (OS). From a software viewpoint, maintaining security is the obligation of both the OS and the software program. But since computer hardware such as the CPU, memory and input/output channels are accessible to a software programs only by making calls to the OS, therefore, the OS bears a tremendous burden in achieving system security by allocating, controlling and supervising all system resources. For the most part, each of todays streamlines OSs has a main weakness. For instance, earlier OSs such as Windows NT, UNIX and Macintosh had a weakness in their access control policies (Krsul 1998). Such OSs didnt specify access control policies very clearly which meant that applications that ran by users inherited all the privileges that the access control mechanisms of the OS provided to those users (Wurster 2010). An access control policy requires an OS to give a program or a user the minimum set of access rights necessary to perform a task. In his work, Denning (1983) illustrated the working of an access control policy which typically consists of three entities namely, subjects, objects and access rights matrix. Subjects refer to users or domains whereas objects are files, services, or other resources and access rights matrix specifies different kinds of privileges including read, write and execute which are assigned to subjects over objects. A configuration of the access matrix d escribes what subjects are authorized to do. Vulnerabilities in OSs tend to rely on weaknesses in configuration of access control matrices to gain access to software applications and system software. This creates a serious problem since vulnerabilities can exploit software applications through the OS gain access and ultimately take over the system. An example of an access control policy failure is Java virtual application. The Java virtual machine was among the applications which defined, and enforced its own access control matrix. Its sandbox was compromised of a number of OS components which ensured that a malicious application cannot gain access to system resources. But once the access control mechanism of the virtual machine fails, a malicious applet can be given access beyond the sandbox (McGraw and Felten 1997). Meaning that the OS can allow a malicious applet full access to the users files because to the OS there is no difference between the virtual machine and the applet. Moreover, even with an access control policy in place, consideration must be given to system design. The OSs which are in use today have different architectures and are designed with different kernels without considering security and controlled accessibility as significant design criteria. For instance, a large portion of UNIX and Linux vulnerabilities result from boundary condition errors which are commonly known as buffer overflow (cite xxx). These boundary conditions result from a failure to properly check the bound sizes of buffers, arrays, strings. Attackers tend to exploit this weakness in UNIX and Linux OSs to gain access to system software and software applications. On the other hand, vulnerabilities in Windows OS tend to be evenly divided among exceptional conditions, boundary conditions and access control validations (cite xxx). With these types of vulnerabilities root break-in and execution of arbitrary code are common types of attacks. When it comes to writing software for different platforms, programmers must acknowledge the potential vulnerabilities and threats targeting their software. Since different OSs have different vulnerabilities, the task of designing a secure application tend to become much difficult since they have to consider vulnerability risks of each OS. Therefore we hypothesize that: Hypothesis 5a: Vulnerability type will be positively related to software which target more operating systems Hypothesis 5b: Frequency of vulnerability will be positively related to software which target more operating systems Hypothesis 5c: Severity of vulnerability will be positively related to software which target more operating systems Software Free Trial Free trial strategy is used by many vendors to promote and sell their goods. This strategy is especially popular and found to be effective to promote and sell digital goods such as software and music. Unlike physical goods, the intangibility of digital products prevents consumers from assessing the products before the consumption and adoption (Heiman and Muller 1996). Such uncertainty of product functionality reduces consumers motivation to adopt the product and is considered a source of market failure. Nowadays, offering software free trial at a low marginal production cost has resulted in the prevalence of free trials strategy. For the software market, there are two strategies of free trial, namely a fully functional free version with limited trial period (time locked version) and a limited functional version (demo version). Each of these strategies has its own advantages and disadvantages. For instance a demo version has an advantage of capturing the network effect from both trial users and the buyers. In contrast, some consumers may find it adequate to use only the limited functionalities provided in the demo version rather than purchasing the full version software. Similarly, offering time locked software version can negatively affect the software vendor as consumers with limited usage can utilize this short-term to fully take advantage of the free trial without buying the full software product. Based on these trial strategies, there have been numerous studies regarding the effect of free trial on software learning curve (Heiman and Muller 1996), software piracy (Chellappa and Shivendu 2005) and software performance (Lee and Tan 2007). For this study, we are interested in measuring the effect of free trial strategies on software vulnerabilities. Although software vendors often release demo or time locked versions, such versions can still contain good source of information for the attackers. Attackers typically misuse the trial versions to look for, find and exploit vulnerabilities. Furthermore, attackers can reverse engineer the limited code and find vulnerabilities (Sutherland et al. 2006). This technique has become particularly important as the attacker can apply vulnerabilities found in free trial versions to exploit full version software. Moreover, there are many hacker groups on the internet who specialize in cracking free trial and full versions software and releasing them on the internet under what is known as warez. Such groups usually compete with one another to be the first to crack and release the new software. These cracked versions (warez) can also serve as potential targets for attackers looking for vulnerabilities. Hence, while providing free trial versions of software by software vendors is a marketing strategy, vendors should also expect such free versions can become targets for vulnerabilities and early exploits. Hypothesis 6a: Vulnerability type will be positively related to software which offer trial versions Hypothesis 6b: Frequency of vulnerability will be positively to software which offer trial versions Hypothesis 6c: Severity of vulnerability will be positively to software which offer trial versions Software License The diversity of the software business model drives the need for different types of software licenses. A software license is a legal agreement forming a binding contract (relationship) between the vendor and the user of a software product and its considered an essential part in the evolution of the software to a market product. Software license is regarded as one of the fundamentals of OSS as there are currently close to 73 different licenses (Perens 2009). Most OSS licenses are classified based on the restrictions they impose on any derivative work (Lerner and Tirole, 2005). Examples of OSS licenses include GPL, LGPL and BSD. General Public License (GPL) is currently the most popular OSS license which states that any derived work from other GPL software has to be distributed under the same licensing terms. The Lesser GPL (LGPL) and the Berkeley Software Distribution (BSD) are other popular alternatives to GPL with similar characteristics. OSS projects rely heavily on code reuse as shown by DrDobbs (2009). In their work, 1311 OSS projects were analyzed and 365000 instances were found of code reuse among those projects. In principle, most of the OSS licenses allow programmers to modify and reuse existing code. This degree of code inheritance can have positive and negative effects on the security of the software. In their work, Brown and Booch (2002) discussed how reuse of OSS code can inherent insecurities and talked about the concerns which companies have regarding OSS code and how it was developed and in particular the origins and the reuse of its code. Indeed an analysis study by Pham et al. (2010) suggested that one of the key causes of vulnerabilities is due to software reuse in code, algorithms/standards, or shared libraries/APIs. They proposed the use of new model which uses algorithm to map similar vulnerable code across different systems, and use the model to trace and report vulnerabilities to software vendors . Reuse of OSS software has caused concerns as developers might inherent vulnerabilities from existing code but regardless of the open source community or software vendors positions on this debate, the possibility of security issues by reusing OSS code has been sufficient to the point where some vendors stopped reusing OSS code in their software. From a security perspective and when it comes to reusing OSS, vendors tend to follow one of the following approaches. Abandon OSS software; only reuse code which has been extensively reviewed; or maintain a relationship with the OSS community and get involved with the development process (Brown and Booch 2002). Its our belief that licenses which allow developers to reuse source code will be more susceptible to vulnerabilities than closed source proprietary licenses. Meaning that software licenses which allow code reuse are more likely to inherit or contaminate derivate work. In contrast, commercial licenses which dont share or allow code reuse are less susceptible to inherit or contaminate vulnerabilities. Hypothesis 4a: Vulnerability type will be positively related to open source software licenses Hypothesis 4b: Frequency of vulnerability will be positively related to open source licenses Hypothesis 4c: Severity of vulnerability will be positively related to open source licenses Source Code Availability Security of open source software (OSS) and closed source software has been a hot topic with many arguments repeatedly presented. Advocates of OSS argue that more reviewers strengthen the security of the software as it eases the process of finding bugs and speeds it up given enough eyeballs, all bugs are shallow (Raymond and Young 2000). Opponents of this idea disagree and claim that not all code reviewers and testers have enough skills and experience compared to code reviewers at companies who are more skilled at finding flaws. The argument is that oftentimes code reviewers and testers need to have further skills other than programming such as cryptography, stenography and networking. Moreover, proponents of closed source software claim that security by obscurity is the main strength of closed source software since its harder to find vulnerabilities when the code is not accessible. However, proponents of OSS argue that its possible to gain access to closed source code through publicl y available patches and disassembling software (Tevis 2005). Its important to note that the impact of the availability of source code on security depends on the open source development model. For instance, the open source cathedral model allows everyone to view the source code, detect flaws/bugs/vulnerabilities and open reports; but they are not permitted to release patches unless they are approved by project owners. OSS projects are typically regulated by project administrators who require some time to review and approve patches. Attackers can take advantage of the availability of source code and published vulnerability reports to exploit them (Payne 2002). However, proponents of OSS argue that vulnerabilities in OSS projects can be fixed faster than those in closed source software because the OSS community is not dependent on a companys schedule to release a patch. Despite the continuous debate on OSS security, advocates from both sides agree that having access to the source code makes it easier to find vulnerabilities but they differ about the impact of vulnerabilities on software security. First of all, keeping the source code open provides attackers with easy access to information that may be helpful to successfully launch an attack. Publically available source code gives attackers the ability to search for vulnerabilities and flaws and thus increase the exposure of the system. Second, making the source code publicly available doesnt guarantee that a qualified person will look at the source and evaluate it. In the bazaar style environment, malicious code such as backdoors may be sneaked into the source by attackers posing as trustful contributors. For instance, in 2003 Linux kernel developers discovered an attempt to include a backdoor in the kernel code (Poulsen 2003). Finally, for many OSS projects there is no a priori selection of program mers based on their skills; project owners tend to accept any help without checking for qualifications or coding skills. Given the issues surrounding source code availability in OSS, we hypothesize that making source code publically available will induce attackers and increase vulnerability risks. Hypothesis 1a: Vulnerability type will be positively related to source code availability Hypothesis 1b: Frequency of vulnerability will be positively related to source code availability Hypothesis 1c: Severity of vulnerability will be positively related to source code availability Software Programming Language Selecting a suitable programming language is one of the most important decisions which have to be made during software planning and design. A chosen programming language has direct effect on how software ought to be created and what means must be used to guarantee that the software functions properly and securely. Software programs which are written using an insecure language may cause system dependent errors which are known to be difficult to find and fix (Hoare 1973). For example, buffer overflows vulnerabilities and other low-level errors are well known issues in C and C++ languages (Cowan 1999). As of today, there exist numerous programming languages but the topic of security in programming languages has been widely disregarded as its believed that programming errors and flaws should be eliminated by the programmers themselves. Current approaches to this issue are essentially ad hoc where best programming practices and secure programming techniques are implemented during or after the design stage. Although this approach helps in preventing coding errors and flaws by relying on programmers skills and experience, it is difficult to say with any certainty what vulnerabilities are prevented and to what extent. More importantly, the ad hoc approach doesnt protect against new and evolving vulnerabilities as it only handles known vulnerabilities and specific coding flaws. In his paper, Hoare (1974) stated that a programming language is secure only if the compiler and run time support are capable of detecting flaws and violations of the language rules. The main issue with this statement is that current compilers and debugging tools are not reliable since they parse code differently; therefore, its impossible to guarantee the same results for programs. Additionally, such tools dont help the programmer in finding vulnerabilities or flaws as they only report syntax errors. Typically, compilers and debugging tools dont allow for security checks on debugging runs, therefore no trust can be put in the results. An evolving trend in secure programming has been the use of formal language semantics. Formal language semantics try to reason with and prove security properties of the code. For example, in their paper, Leroy and Rouaix (1998) developed a formal technique to validate a typed functional language to ensure that memory locations always contain appropriate values to avoid buffer overflow vulnerabilities. Although the use of formal language semantics has been advocated (Dean et al. 1996, Meseguer and Talcott 1997, Volpano 1997), it wasnt widely adopted among programmers. When it comes to software languages, security is essentially dependent on numerous factors such as language developers, programmers and debugging tools. With so many factors, we believe that correlating software language with vulnerability risks will be insignificant. Hypothesis 2a: Vulnerability type will be insignificantly correlated with software language Hypothesis 2b: Frequency of vulnerability will be insignificantly correlated with software language Hypothesis 2c: Severity of vulnerability will be insignificantly correlated with software language Targeted Software Users There are many different types of computer users with a wide range of background, skills, and learning habits. Computer users are typically classified into two distinct groups, namely sophisticated and novice (unsophisticated) users. Sophisticated users have an advanced understanding of computer and Internet technologies; they tend to be more security-aware. Novice users refer to non-technical personnel who are not experienced with computers and the Internet; they rely on computers for simple tasks such as word-processing, spreadsheets, and occasional web surfing. Such users are more prone to security issues due to their inexperience. For instance ignoring software updates and security patches, failing to run essential protection utilities such as an anti-virus or firewall applications are typical security issues with novice users. Because of differences in experience level between both groups, some argue that vulnerabilities affect novice users more than sophisticated ones. Although this might be true for viruses and worms and old vulnerabilities, but when it comes to dealing with zero-day vulnerabilities everyone becomes a victim regardless of their sophistication level. Zero day vulnerabilities refer to unreported exploitable vulnerabilities for which a patch is not available from software vendors (cite xxx). Moreover, when it comes to attackers and potential targets, eventually everyone is a target. Despite the type of computer users, the objective of vulnerability attacks is to hack as many computers as possible with the least amount of effort (Spitzer 2002). Attackers tend to focus on a single vulnerability and use automated scanning tools to search for as many systems as possible for that vulnerability. Such automated tools are often called autorooters and can be designed to scan a specific network for vulnerable machines or scan a range of IP addresses until a victim is found. Its important to note that these tools dont distinguish between software user s as they look for any vulnerable target in sight. Hypothesis 8a: Vulnerability type will be insignificantly correlated with to targeted software users Hypothesis 8b: Frequency of vulnerability will be insignificantly correlated with to targeted software users Hypothesis 8c: Severity of vulnerability will be insignificantly correlated with to targeted software users Software Price Software price plays an important role in modifying the individuals attitude toward the software in many ways. For example, research studies which looked at software piracy found that software price to be a significant factor (incentive) which influenced the intention to pirate (Gopal and Sanders 2000). In their work, Peace et al. (2003) conducted a survey of 201 respondents and found that software price was among the major reasons for illegally copying software. Following the same analogy, studies have shown that attackers attitudes and hackers motivations for finding vulnerabilities are associated with several factors such as: peer approval, self esteem, politics, publicity, financial gains, curiosity and sabotage (Shaw et al. 1999). Within the hackers community, hacking achievements typically help individuals gain higher and more respectable status as it refers to the persons skills and mastery level. Reaching a higher status is oftentimes associated with noteworthy achievements such as hacking popular software. For those hackers who seek publicity or peer approval, they tend to target software with large user base due to their significant reach. So despite software price, hackers look for vulnerabilities in open source and proprietary software as long as there is a significant user base. Similarly, infamous social networking sites such as Facebook and Myspace are constant vulnerability targets regardless of their service cost. Outside the hackers community, hackers incentives tend to vary among political reasons (example: Google-China Hacking 2010), financial gains (example: ransom money attacks), self esteem and sabotage. Again, by analyzing each incentive, we find that software price doesnt play any role in v ulnerability risks. We therefore hypothesize that: Hypothesis 7a: Vulnerability type will be insignificantly correlated with to software price Hypothesis 7b: Frequency of vulnerability will be insignificantly correlated with to software price Hypothesis 7c: Severity of vulnerability will be insignificantly correlated with to software price

Monday, August 19, 2019

Australia and Japans Relationship since World War II Essay -- essays

Since the signing of the 1951 peace treaty between Australia and Japan, the two countries have rapidly built a productive relationship. Many factors and events have contributed to the development of this partnership. The ANZUS treaty was the turning point in the Austral-Japanese relationship. It assured Australia protection against Japan and provided security in the Asia-Pacific region. Trade and cultural exchange also played a significant role in shaping Australia’s relationship with Japan. Growth of trade was a contributor to the sense of a mutual interest between the two countries. The cultural exchange often helped to recognise and accept the differences between Australia and Japan. The partnership between Australia and Japan instigated with the signing of ANZUS treaty in 1951. ANZUS joined the nations of Australia, New Zealand and the United States of America in a defence security pact for the Pacific region. It chiefly resulted from the fear of communism by Western nations. However, from Australia’s point of view at the time, ANZUS also offered protection against a potential threat from Japan. Australia was concerned that Japan would try to conquer the Pacific region again after suffering defeat in the Second World War. Hanson.M (2001:28) sates that shortly after the end of World War Two, Australia wanted the Japanese government turned into a democracy. She even wanted a peace treaty that punished those leaders responsible for Japan’s aggression, broke the great industrious complexes of Japan’s economy, and left Japan disarmed. The ANZUS treaty however, created a connection between Australia and Japan on easier terms. With United States ba cking Australia, it was now safe to interact with Japan. Although ANZUS did not guarantee direct military support from United States, it still provided consultation in an event of attack on any of the three countries. Wolferen.K (1989:54) notes that security co-operation has been growing between Australia and Japan throughout the 1990’s. Communist China was the major concern for the two nations. Japan and Australia had the same negative views about communism, which led to them sharing a common purpose in countering the communists within that region. After Sir John McEwen, the former Minister for Trade, signed the Australia-Japan Commerce Agreement in 1957, the trading aspect between the two nations has developed ... ...dying Japanese at tertiary level alone. Research relating to Japan is carried out at about thirty-seven universities in Australia. The range of research has developed to include not only the humanities, but also practical and business-related fields. Also there is a considerable amount of youth exchange between Australia and Japan. Every year Japan accepts about one hundred young Australians as government funded students. All of the above attributes are making a major contribution to the promotion of friendly relations between Australia and Japan. After evaluating the above factors, it is clear that the partnership between Australia and Japan is of significant importance to both countries. With reference to the Centre for Study of Australian-Asian Relations (1997:152) the future prosperity of Australia will to an increasing extent, be dependent on that of her neighbours in the Asia-Pacific area. Currently the Australia-Japan relationship could be described as â€Å"comfortable and relaxed†. However both Australia and Japan need to be alert to the changing environment and must ensure that the right frameworks and policy settings are in place in order for the two countries to prosper.

Market Research :: Business and Management Studies

Market Research Introduction Milo has been around since 1933. It is a chocolate malt flavoured beverage, which is fortified with several vitamins. Young and old love Milo simply for being energy- packed and its rich chocolaty taste. As a health food drink, it is full of vitamins and minerals. In fact, new improved Milo boosts optimum performance. This is what makes it different from its competitors who are; Ovaltine, Haulics, Lucozade, Nesqiuck and other chocolate drinks. Milo is available in 18g single serve sachets, 80g, 200g, 300g, 600g, 1kg refill packs and in ready-to-drink plastic bottles. You can also enjoy the goodness of Milo through the healthy and delicious Milo Balls, Milo Ice Cream, Milo Scoop Shake and Milo Balls. I am going to identify and explain the principles of marketing because it is the foundation at, which I’m going to use to create my marketing strategy. Marketing involves the anticipation, identification, satisfaction and creation of consumer wants for the purpose of generating income or profit. It also involves a variety of activities designed to raise consumer awareness, develop new products, increase market share and profit and to manage the effects of change and competition. In order for a business’s marketing to be successful, it must be based on the principles of marketing, which are: * Understand customer needs * Understand and keep ahead of competition * Communicate effectively with its customers to satisfy customer expectations * Co-ordinate its functions to achieve marketing aims * Be aware of constraints on marketing activities Understanding customer needs This principle is based mainly on marketing research. Market research can be used to gather information about consumers buying habits and spending patterns. Organisations use it to scan the industry for any changes or trends, rather than asking 100 people if they like a product or other questions relating to consumers needs. This is much easier but has a drawback, which are expenses. It is very expensive carrying out market research because market research is a big business, which involves a lot of equipment and the correct professionals. This principle is significant to my marketing strategy because in order for my product to sell I will need to identify the right customers and the best way to achieve this is by understanding customer needs. Being unable to understanding customer needs could lead to no sales, thus no profit. For example, having a good product will benefit your marketing ploys, however, if the price does not meet the customer’s needs it may not sale or even if the place of distribution is not satisfactory the product may not sell; therefore understanding customer needs is essential to my marketing strategy.

Sunday, August 18, 2019

John Steinbecks Of Mice and Men :: Essays Papers

Of Mice and Men Summary This story is about Lennie Small and his friend, George Milton, both of them were forced to leave weed because Lennie was accused of raping a girl. This book was set in Salinas Valley, California. The book begins with the two of them hiding from the mad townspeople. Lennie had a tendency to grab things and not let go, yet he was unaware of his own strength. This problem got them into trouble a lot. Chapter One: Lennie and George are hiding. They were forced to leave Weed because Lennie was accused of rape. They went from ranch to ranch. They sit and talk and disgust their plans are for the next day, then they go to a ranch and George does all the talking. Chapter Two: Lennie and George arrived at the ranch were his new home is. He asks them for both of their names, and where they worked before and what skills they have. George answers every question for Lennie that makes the boss curious. He asks George why he always answers the questions for Lennie, thinking that is trying to get Lennie’s pay. Then he tells him that Lennie is a little slow. After he left, Candy came in and so did Curley. Once he left, George and Candy talked about him. Candy said that Curley hates men who are bigger than him. Candy also said that Curley's wife is a flirt. Soon after, Curley's wife entered looking for her husband. After flirting with George and Lennie, she leaves. Chapter Three: Slim's dog just had puppies and Lennie asked if he could have one. Slim said yes. George told Slim about the incident in Weed. He also told him that Lennie had a problem where he has to touch pretty things, so he grabbed a girl’s dress. The girl started to scream. So he held on tighter because he was confused. The girl accused Lennie of rape and they had to leave town. Carlson tried to convince Candy to shoot his dog because it was so old and in constant pain. Candy finally said yes after arguing and then he shot the dog, and buried it. Several minutes later Curley came into the bunkhouse looking for his wife. He was told that no one had seen her around and was about to leave but he noticed that Slim was not there, either.

Saturday, August 17, 2019

Community Service: Mandatory or Voluntary Essay

Community service is a topic that is highlighted in our society. Many people have different reasons for their participation in the service, having it be done for selfish reasons or unselfish reasons. However, participation is mandatory. This being the case, community service should be voluntary. Community service holds you back from doing certain things. High schools require 40 hours of community service in order to graduate. If you don’t complete these hours, it’ll keep you from moving on. Certain jobs require you to complete community service in certain tasks. Not doing such can earn you a penalty. Another example to support this claim is a quote from an article titled â€Å"The Benefits of Volunteerism, If the Service is Real†, is that â€Å"there is some cynicism among people that some portion of community service is prompted by students interested more in resume-building.† This goes to show that people have lost the initial purpose for community servi ce as a pass off to make themselves look good, rather than doing it for the cause alone. In addition, voluntary community service is more encouraged than mandatory. In the graphic â€Å"Attitude Toward Offering Students a Chance to do Community Service to Earn Money for College, By Age†, students were surveyed on whether or not they were in favor of doing community service for earning money for college. The survey was done from ages that ranged from 15-25 years old. Throughout the age range, the percentage of students who favor for community service to earn money or don’t favor varied. However, those favorable remained high in the 80% while those unfavorable remained low in the 20%. However, community service should be mandatory in certain situations. In the article â€Å"A Better Society? Or a Better Resume?†, mandatory community service is stressed. Model Naomi Campbell had to complete 5 days of community service as a result of hitting her maid in the head with a cellphone. She was set to work in a sanitation depot as a punishment. However, it tended to work out in her favor as it made her seem as she was doing it for the false altruism of her actions.

Friday, August 16, 2019

I Love India Essay

In a land where diversity originates, where success can be found in loss, and where the heart is bigger than the house, one needs no more explanation to hesitate in saying the name. Yes, it is INDIA. A very pleasant morning/afternoon to all the teachers and my dear friends. I Khadija from 1st standard is here to speak a few words about my country. India is the seventh largest country in the world. India became independent in 1947. Mahatma Gandhi is the Father of our Nation. India is the world’s Largest democracy. From Kashmir in the north to Kanyakumari in the south, India has 28 states and 7 Union Territories. It has many beautiful mountains, lakes, rivers and deserts and it is home to the sacred River Ganga. India has many historical places like Taj Mahal, Char Minar, Qutum Minar, Red Fort. Taj Mahal, one of the Seven Wonders of the World is in my country. The diversities of this beautiful country vary from state to state. The diversities are in terms of the languages spoken, religions followed, food habits all of which add to rich Indian culture. Four of the world’s major religions — Hinduism, Buddhism, Jainism and Sikhism originated in this country. Many festivals like Diwali, Holi, Eid, Christmas are all celebrated by sharing sweets with family, neighbours and friends. One of the most outstanding thing is the culture and manners youngsters are taught here, the way they respect their parents and all elders. India is the homeland of various dance forms, both classical and folk. Some of them are Bharatnatyam, Kathakali, Kuchipudi, Odissi and Manipuri. Inspite of all these diversities, we all love and respect each other as Indians. Thus, setting India as a living example of secular harmony and Unity in diversity. Proud to be an Indian and â€Å"I love my Country†.

Thursday, August 15, 2019

Hudson Bay Company

The Bay – You are the Buyer†¦ Assignment Erica Hobb Sarah Walkington As a Buyer for the Bay, I would ensure that these new brands that I was bringing in to my department would be productive by researching every brand and making sure there on the same trend line that we are trying to follow. Knowing your target market is also a key element when introducing new brands.The selection factors that I would look at when choosing what brands to bring into my store would be dependent on the season, fit, colour or pattern, durability of garment or product, price, versatility/multi-use, designer label/prestige factor and quality of construction. When deciding what brands to get rid of and which ones to keep, this would be solved by knowing which products are successful and which ones are not. Also which brands are going to match the new reconstruction of our company the Bay and which brands fits in with the new theme and which ones are outdated.In my opinion, the different factors o f the two retailers are: The Bay is very Canadian based, not just because it started in Canada but because even their window displays are reflective to a Canadian theme, where as Holt Renfrew is known for being a high end retailer selling brands and products that are available and sold in other retail stores. The Bay has added over 250 new brands and 90% of which are exclusive to the Bay in Canada. Another factor that is different between the two retailers is their pricing.Holt Renfrew is designed for people with lavish lifestyles and an eye for expensive designer clothing where as The Bay ranges from all price points. The Bay has style and affordable merchandise. Also the customer service you find at both retailers are very different. When going into Holt Renfrew, your getting the whole shopping experience. Employees almost tend to smother you making sure everything you need is at there service where the Bay is more low key.

Wednesday, August 14, 2019

Aprendiendo Estructura de Datos Como En Primaria

PROGRAMACION EN LENGUAJE PASCAL Subtemas : Estructuras de Control de Programas Profesor : Braulio Barrios – Marzo de 2009 ESTRUCTURAS DE CONTROL DE PROGRAMAS EN PASCAL Como hemos dicho en clase, PASCAL es un lenguaje de programacion ESTRUCTURADO, por tal razon, provee sentencias para cada una de las primitivas de la Programacion Estructurada, y son las siguientes: 1. – ESTRUCTURA CONDICIONAL CONDICIONAL SIMPLE O SENCILLO †¦ IF Expresion THEN Begin Sentencia1; Sentencia2; . . Sentencia N; End; ================== CONDICIONAL DOBLE †¦ IF Expresion THEN Begin Sentencia1; Sentencia2; . Sentencia N; End ELSE Begin (* Observe que NO se escribe ‘ ; ‘ Antes del ELSE *)Sentencia A; Sentencia B; . . Sentencia Z; End; ================== CONDICIONAL ANIDADO †¦ IF Expresion1 THEN Begin IF Expresion2 THEN Begin IF Expresion3 THEN Begin Sentencia1; Sentencia2; . . Sentencia N; End; End; End; 2. – ESTRUCTURAS DE CONTROL REPETITIVAS Permiten que el contr ol del programa itere (repita) un proceso varias veces segun se requiera. Son Tres (3) las estructuras repetitivas que provee PASCAL: Repeat For, While, CICLO FOR †¦ FOR Asignacion TO Valor Final DO Begin Sentencia1; Sentencia2; . Sentencia N; End; CICLO WHILE †¦WHILE Expresion DO Begin Sentencia1; Sentencia2; . . Sentencia N; Modificar expresion End; CICLO REPEAT †¦ REPEAT (* Observe que no require BEGIN †¦ END *) Sentencia1; Sentencia2; . . Sentencia N; Modificar expresion UNTIL (Expresion); Quiero ilustrar el uso de ciclos repetitivos en PASCAL para lo cual resolveremos el siguiente ejercicio: Escriba un programa que permita mostrar en pantalla la tabla de multiplicar del 5, asi: 5 5 5 X 1 = 5 X 2 = 10 X 3 = 15 Algoritmo1: (usando ciclo FOR) TABLA1 1 HASTA 10 Haga PARA I Escriba( â€Å" 5 X â€Å", I , â€Å" =†, 5*I) FIN PARA FIN TABLA1Programa Pascal PROGRAM Tabla1; (* Resuelve el problema utilizando un ciclo repetitivo FOR *) USES Wincrt; VAR I : I nteger; BEGIN Clrscr; gotoxy(20,5); WRITE (‘ TABLA DE MULTIPLICAR DEL 5 ‘); FOR I : = 1 TO 10 DO BEGIN WRITELN(‘ 5 X ‘, I, ‘ = ‘, 5 * i); END; gotoxy(20,20); WRITE (‘Pulse ENTER para terminar); READKEY; END. Algoritmo2: (usando ciclo WHILE) TABLA2 I 1 MQ I 10); (* Si lo desea puede omitir los parentesis *) (* Tenga en cuenta que UNTIL significa ‘HASTA’ y No ‘MIENTRAS’ *) gotoxy(20,20); WRITE (‘Pulse ENTER para terminar); READKEY; END.

Information Technology Infrastructure Library (ITIL) Essay - 2

Information Technology Infrastructure Library (ITIL) - Essay Example This paper studies the ITIL framework and comes to the conclusion that this body of knowledge is extremely useful for all organizations in the above mentioned areas. Introduction: The role of information technology (IT) in today’s world is of extreme importance for the smooth running of businesses and other organizations. It can be said the there is practically no field that is not touched by IT, whether it is in manufacturing, services, defense, and even governance. The main reasons for this heavy dependence on this technology are the complexity of operations and also due to the adaptability of IT systems in fitting into every conceivable area of activity. In such a scenario, it was seen as a necessity to standardize IT management concepts and also to formulate a set of best practices that can serve as a comprehensive guideline to IT based organizations. In the UK, this concept was materialized by the formation of the Information Technology Infrastructure Library (ITIL) during the 1980s. Many governments and organizations around the world have now accepted the guidelines as industry standard over the years. The purpose of this study is to establish wh ether ITIL provides the best practice guidelines for IT service management. The three points that will be used to establish the above is given here. The first is that the ITIL does provide comprehensive guidelines and framework for efficient information technology management. The second point is that the program can be incorporated into an IT management system either in its entirety or in part. The third point is that the program can be customized to suit the requirements of each individual organization. Comprehensive guidelines and ITIL: In order to understand whether the Library does provide comprehensive guidelines it is necessary to have a detailed overview of

Tuesday, August 13, 2019

Ethic Reflection Essay Example | Topics and Well Written Essays - 500 words - 1

Ethic Reflection - Essay Example do not directly contribute to the bottom line, they contribute towards social responsibility and develop relationships with the neighboring communities. Therefore, when organizations are confronted with hard decisions, they need to know that coming up with decisions will not only affect the employees and the corporation, but it has an impact on the stakeholders of the company and the public communities. Moreover, making the wrong or right decisions will affect many individuals, which is why ethics is so significant (Fassin, 2012). Stakeholders are those individuals that have a stake in the company. Stakeholders should be convinced that the resources spent on making the business a success are used well. It also assists the organizations to center on performance as passionate stakeholders still judge organizations primarily on their ability to deliver and the customer experience (Fassin, 2009). Ethics and social responsibility facilitates the organization to realize less wasteful and i nnovative methods to clarify to the stakeholders how good their business is and makes sure corporate citizenship and good business are practiced and understood all over the organization. This ensures that the stakeholders and other individuals involved in the organization to adjust to any changes in the company progressively and this prevents hostility and anger toward the organization (Elms, Brammer, Harris, & Phillips, 2010). My ethical perception has taken a complete new viewpoint throughout this program. I feel that my personal view of ethics is progressing, bearing in mind the information and knowledge I am gaining through this program and the personal experiences. At first, I used to love working on assignments on my own, and not asking for assistance since I feared something would not be done correctly. However, that has changed, and now I tend to work well with co-workers and I am patient. I discovered that I work well in groups, and my communication with co-workers is good.

Monday, August 12, 2019

English teacher training in Sausi Arabia in light of the challenges of Research Proposal

English teacher training in Sausi Arabia in light of the challenges of reality and taking into account the requirements of the labor market - Research Proposal Example This may be caused by some of the reasons such as poor teach training, in-sufficient language learning settings, students’ immoderate attitudes, inappropriate materials or an amalgamation of all of the above mentioned causes (Al-Mohanna, 2008). Additionally, the educational system prevails over the use of the Arabic language, which is widely talked and understood throughout the academic world. Although this do not contribute the problems as much as the other factors, yet the English language finds a very less active response from the teachers involved in teaching English language. English as Foreign Language (EFL) teachers have found the presence of sufficiently unqualified teachers in the Gulf region (Syed, 2003, p.337) and EFL teacher preparation programs in the Kingdom of Saudi Arabia can be understood as inadequate and nonsystematic (Al-Hazmi, 2003, p.341). Within the last four decades, graduates from the faculties of arts and graduates of college and education affiliated with the Saudi universities have been enabled to provide the services for EFL teachers in the country (Al-Hazmi, 2003, p.341). These teachers are trained and are provided with the bachelor’s degrees and associate’s degrees in the literature and in the English language. Additionally, colleges of education serve the students by educating them in the educational aspects; on the other hand, colleges of arts enable students to become English-Arabic translation specialists or English specialist, which may not be necessarily to enthrone them on the required level of English teache rs. Furthermore, both colleges of arts and EFL graduates of colleges of education are required to undergo a 4-year program; in which they are polished by offering courses in English literature, English language skills, applied linguistics, translation and linguistics. In

Sunday, August 11, 2019

Introduction to Economics (Past Paper) Essay Example | Topics and Well Written Essays - 3000 words

Introduction to Economics (Past Paper) - Essay Example TRUE: If a country has the competitive advantage of producing a good, then it should use the same advantage to produce the same and export (Lipsey & Chrystal, 2007). Importing commodities that a country can produce more cheaply will only lead to trade deficits, hence a bad economic policy. TRUE: Demand curve for an inferior good must be upwards-sloping due to the fact that the income and substitution effects work in different directions. Whereas a decrease in price of an inferior good causes more consumption via the substitution effect, the same is likely to cause less consumption given the income effect (Lipsey & Chrystal, 2007). In the below figure, X is a inferior good while Y is a normal good given the reduction and increase in demand respectively due to increases in income (income substitution). TRUE: Marginal cost (MC) is the additional cost incurred in producing one more unit hence; it changes with changes in the quantity produced. In a scenario where the marginal cost is increasing, the average total cost (ATC) curve is likely to be U-shaped (Lipsey & Chrystal, 2007). MC is factored within ATC and as quantity increases; the ATC and MC will decrease and increase respectively. MC will continue to increase thereby pulling up the ATC hence the marginal cost crosses average cost at a point where average cost is increasing as illustrated below. FALSE: Diseconomies of scale occur in an organization when expansion of all available inputs such as labour and capital causes an increase in the long-run average cost (Lipsey & Chrystal, 2007). On the other hand, diminishing marginal return refers to an economic scenario where marginal product continues to diminish despite addition of one input and holding the other inputs constant (Lipsey & Chrystal, 2007). Therefore, diseconomies of scale is not related to diminishing marginal returns since the latter only

Saturday, August 10, 2019

HBS (Harvard Business Studies) IT WILL BE CASE ANALYSIS Essay

HBS (Harvard Business Studies) IT WILL BE CASE ANALYSIS - Essay Example At the present time, over 90 percent of the workforce cannot run official duties in English. The CEO has set some punitive measures for those who will fail to achieve set scores – they will face demotions. As the program is rolled out, employees struggle to learn English. There are many challenges faced including loss of productivity, insufficient time to conduct studies, and internal resistance from managers. It is very clear employees are disgusted with the new policy and are only learning English to avoid being demoted or losing their jobs. Nine months to the deadline, the employees are growing desperate as they are realizing that it is increasingly becoming clear that they are not going to meet the set scores by the deadline. This has created anxiety and generally disrupted the workplace (Tsedal, 2011). In this paper, this case study is critically analyzed by examining the key communication challenges that are evident in the case study, suggesting alternatives to these cha llenges and showing why the alternatives will work. The challenges which are likely to be encountered in implementing the alternatives will also be highlighted. CASE ANALYSIS Key communication issues in the case study Radical changes in any organization require good preparation. In the case of this case study, the radical change was the change in the official language of the organization. The biggest communication challenge which can be identified here is insufficient of it. The manner in which the change in policy was communicated was clearly not the best. It was clearly going to draw resistance. Employees were never given time to internalize the new changes which were going to take effect. Everything around them was changed overnight including the menu language at the cafeteria. Hiroshi Mikitani relegated communication in this sense to a very naive position. According to Griffin (2003), communication should not be viewed naively as just a transmission of information. He argued tha t this notion often breeds â€Å"managerialism, discursive closure, and corporate colonization† (Griffin, 2003, p. 495). It is clear that Hiroshi Mikitani did not have the patience to engage his employees and collect their opinions on what they thought of the new policy. This challenge was similarly seen in the managers – the managers were clearly complaining and not on the side of their boss. The implication is that they had no prior information about the change in policy. This is a complete communication breakdown from the side of the CEO and such breakdowns often lead to very slow and reluctant adoption of new policies especially when such policies are radical. Alternatives to the challenges There are many alternatives that Hiroshi Mikitani could have used to ensure that his communication was welcomed. 1. There was a need to involve the employees – 2. Hiroshi Mikitani did not involve his employees in deciding on the new policy Their opinions did not seem to m atter to him and therefore by assuming this he was indeed communicating other messages such as they really do not matter to him. According to Tsedal (2012), engaging employees in decision making or in change of policies creates a platform to explain the rationale of creating a new policy. 3. The policy should have been implemented at the managerial level first It could set a great precedence if the policy was

Friday, August 9, 2019

MSA 522 Essay Example | Topics and Well Written Essays - 500 words

MSA 522 - Essay Example According to Act Utilitarian of Jeremy Bentham, an action that results in the happiness of one and all is a good act. He said â€Å"when choosing a course of action, one should always pick the one that will maximize happiness and minimize unhappiness for the greatest number of people† (Bentham from Rosenstand p.176). The actions, which result in maximum happiness for maximum number of people, are invariable good and therefore morally and ethically right. In the contemporary times, it becomes highly difficult because of the diverse ideologies and differing value system to satisfy large populace. Indeed, it is one of the crucial compulsions of the globalization that people should strive towards common goals of universal values. Misusing public funds by the vested interests (which may be managers in the public services) not only violate various stakeholders’ trust but they also deprive the general public from the benefits of the various welfare schemes which depend on the efficient use of the funds. Hence, using the said philosophy, the managers would ensure efficient delivery of the goals and objectives of departments and