Thursday, September 3, 2020

Cross-cultural Training Essay Example | Topics and Well Written Essays - 3250 words

Culturally diverse Training - Essay Example Re-appropriating represents various points of interest to alleged host nations as this gives openings for work to the neighborhood inhabitants. What's more thereto, the neighborhood governments additionally procure incomes on account of charges and exchange. Thus, re-appropriating is likewise represents various points of interest for the organization being referred to, in view of this procedure, another structure is accommodated these associations which empower them to chop down their efficiency costs. To guarantee greatest advantages related thereto, HR utilized by these worldwide nations must be prepared fittingly so as to adjust to the business needs, Doye (2002) talks about. Usually, when an organization is redistributed, a certified neighborhood occupant or an exile is authorized by the organization to direct the preparation and guarantee that the organization is appropriately set up in the host nations. As indicated by Wittingslow (n.d.), the nearby talent scouts must work connected at the hip with the organization so as to discover appropriate individuals to fill in the opportunities. This is considered of principal significance as the human asset officials are vital so as to guarantee that agreements and propositions for employment are assembled to stay serious in the current occupation advertise (Wittingslow n.d.). It is normally a result of the previously mentioned that redistributed organizations face issues regarding social assorted variety in the work environment. These worldwide organizations, during the time spent redistributing for the most part have a lot of human asset strategies that are set up. All things considered, these laws are generally custom-made so as to conform to the work laws of the host nations wherein they are set. Moreover thereto, the previously mentioned circumstance additionally results to major issues as respects the issue by which human asset the executives must be created so as to take into account this set up. Given this, the paper centers around the job of culturally diverse preparing. In this way, to guarantee a progressively broad conversation of the current point, this writing audit will be separated into the accompanying areas: (1) Introduction, (2) Human Resource Management in the Twenty First Century: HRM and Outsourcing; (3) Cultural Distance: An Overview ; lastly, (4) Barriers to the Workplace and Cross-Cultural Training. Human Resource Management in the Twenty First Century: HRM and Outsourcing Human Resource Management is regularly characterized as the way human ability is successfully and effectively utilized so as to accomplish the objectives of the association (Mathis and Jackson 2007). It is the basic craft of the procedure by which the association centers around the individuals who have a place with the last mentioned. Tayeb (2005) specifies that while the previously mentioned is generally the acknowledged meaning of human asset the board, the way the equivalent is completed varies starting with one nation then onto the next. The customary idea of human asset the executives has in any case, developed. With the redistributing of work Tayeb (2005) accepts that the human asset division assumes an a lot greater job. By and large, there are two cases by which the human resourc

Saturday, August 22, 2020

A Book Review of Philip Dicks Blade Runner free essay sample

This paper breaks down the novel Blade Runner, through the creators purpose and history. This paper looks at the novel, 'Sharp edge Runner,' through two significant inquiries, what is the creators message and what is the verifiable significance of this novel? The paper gives a foundation to the sci-fi plot and the focal topic of the book, human character. It further spotlights on the focal character, Rick Deckard, and his job key to that subject. The work revolves around the subject of being human. San Francisco Police abundance tracker Rick Deckard finds maverick androids who have gotten away from state universes and resigns them. The catch is that these androids are so human-like in appearance that nobody can tell from taking a gander at them whether they are genuine (for example human) or not thus that Deckard needs to figure out what they are before he can know whether to execute them. We will compose a custom exposition test on A Book Review of Philip Dicks Blade Runner or then again any comparative subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page He has, as such, to have the option to investigate their spirits, into their souls.

Friday, August 21, 2020

Function of place in Mad Max 2 by Georgre Miller 1981 (film) Movie Review

Capacity of spot in Mad Max 2 by Georgre Miller 1981 (film) - Movie Review Example The cinematography of Mad Max 2 utilizes insides however rather welcomes the crowd to an all the way open desert space, suggestive of the blue skies, red sand and rough gorge that were normal in conventional westerns. The characters in their dark calfskin or white canvas apparel move around this forsaken space, and the feeling that is given is purposely tense and brutal. The sun pummels on the settlers’ camp, and the bikers circle like raiding Indians, and the entirety of the people seem, by all accounts, to be in a boondocks among progress and a destructive wild. The manner in which the camera moves toward the activity is altogether different from the anticipated and safe western style, nonetheless. Vehicle pursues are recorded with the camera low to the ground, and the vehicles drawing nearer at speed and this draws the crowd directly into the threat. The fundamental character played by Mel Gibson, is a stray, neither one of the looters, nor one of the homesteaders with thei r plain pigs and chickens. This area doesn't represent the pioneers subduing the wild, yet rather the wild has the high ground and the pilgrims are especially at its kindness. This film utilizes area to underline the damaging tendency of industrialization and the instability of human survivors after a prophetically calamitous war.

Saturday, June 6, 2020

One Of The Most Important Elements - Free Essay Example

In Greek Mythology, perhaps one of the most important elements are the Greek Gods and Goddesses. The ancient Greeks created the stories about the lives and journeys of the Greek Gods, known as myths, simply different information which were difficult to explain using modern science. These myths about the Gods were spread around the world by explorers and storytellers, and later merged with Greek culture. To this day, numerous myths survived through many writings. Each of these myths are very unique, and tells much about the Greek Gods. The Greek myths in particular show that Greek Gods and Goddesses looked and acted like humans, that they possessed powers, and that they interacted with humans mainly for personal purposes and sometimes to aid heroes. Firstly, Greek gods and goddesses were viewed as being to a great extent similar to men and women. To start, it is very interesting that the ancient Greeks created their Gods and Goddesses to have features which are exactly the same to a regular mortal. The proper term for this is called anthropomorphism, which means, in the form of a human. Yet the gods were visualized as more gallant in physique, exceptional in beauty and proportion, and much more authoritative than humans. An example of this comes from the fact that Athena, a statue from the Royal Ontario Museum, had a form of a regular mortal, and that she was envisioned as having a body of what most humans would desire. More intriguing however, is the fact that the ancient Greeks believed that the Gods created them. This comes from the myth of how Zeus gave the duty of populating the Earth to Epimetheus. Epimetheus therefore populated the world, but then created a useless creature that was to an image of the Gods, which explicates why Gods appear like humans. Additionally, it is even more fascinating that not only do Greek Gods act like humans but they also behave like humans and are able to love, marry, produce children, and so on. Therefore, whenever they act upon hatred, much of their acts were very bad and cruel. This being because there was such a large society of Gods, this meant that much of the Gods lives were surrounded in chaos and revenge.

Sunday, May 17, 2020

Persuasive Essay About Hunting - 1905 Words

Anybody feel like voluntarily waking up at the crack of dawn just to sit in the middle of the woods in a blind and probably see nothing for hours on end? Wait, what if I add that it’ll be in the middle of winter so the temperature will not only be freezing, but you’ll also have a frost bite approved wind slapping at your face? No takers? I figured that would be the response. You’d be surprised though, because when I was around five or six years old freezing temperatures and being stranded in the woods sounded like paradise, especially with my best friend, my Dad, was right there with me. Hunting is a normal, almost expected hobby of individuals from the South. Fathers will bring their sons, daughters, and wives along to a large plot of†¦show more content†¦The Hunt: Daddy and Daughter Time 5AM was about the time we’d wake up every morning before we went out. Being one of the 40% of Americans that hunted, he usually had plenty of resources and friends whose land we enjoyed and were allowed to use (Service). It was still dark out, and hunting season is usually within the duration of the colder months, so we’d bundle up in various camouflage clothing, mine always having a hint of pink because what young 5-6 year old girl doesn’t want pink in every aspect of her clothing. I would strap on my glitzy cowgirl boots and clumsily followed my Dad with an empty case that he gave me to feel like I was helping load up in some sort of way. We’d hop in the topless rust-ridden Jeep around 5:45 and explore the world now enveloped in enchanting shades of violet and amber light, the engine being the only sound for miles. I’d be in the passenger seat, just barely legally allowed to not need a car seat, and sit and talk to my Pops about everything under the sun. I was young, so as soon as you woke me up I was talking and awake, especially with my Dad who probably had no interest about the latest Blues Clues episode, but allowed me ramble about the present opening song and how I felt about the melodious tune and how the other animals and Steve all harmonized. We’d laugh and talk and drive for many miles until we finally arrived at the hunting land.Show MoreRelatedPersuasive Essay About Hunting1923 Words   |  8 Pagesâ€Å"Hunting as a family is by no means a new tradition. In fact, it used to be one of several traditional American family values(Staff).† Meals from Nature Anybody feel like voluntarily waking up at the crack of dawn just to sit in the middle of the woods in a blind and probably see nothing for hours on end? Wait, what if I add that it’ll be in the middle of winter so the temperature will not only be freezing, but you’ll also have a frost bite approved wind slapping at your face? No takers? I figuredRead More Organization is Crucial When Making a Sound Argument Essay example1114 Words   |  5 PagesOrganization is Crucial When Making a Sound Argument The development of animal rights organizations in the past century has made hunting a heated topic for debate. Modernization has left the primitive form of hunting and gathering behind as an obsolete form of human survival. With this occurrence one would think that hunting would lose its popularity, but this statement couldn’t be farther from the truth. It has developed more as a sport and participation is still widespread throughoutRead MoreThe Lottery Essay870 Words   |  4 PagesBelieving in a passion can be persuasive to others. If one has a passion for something, there is an uncontrollable emotion about it. Everyone in the world is different, if it was not that way, the world would not go around. Someone may have a passion for something that another person can not stand. In â€Å"The Lottery,† there was a negative passion for people getting stoned. The emotions of others that did not get stoned were horrific for the one getting stoned to death. The fathe r in â€Å"Without TitleRead MorePersuasive Essay : Gun Control798 Words   |  4 PagesPersuasive Essay Did you know that in the United States almost 100,000 people are shot or killed with a gun in one year? 10,527 people die a year in handgun related incidents in the United States. This number, by far, outweighs the number of gun related deaths in countries such as Sweden, Great Britain, and Japan, which number 13, 22, and 87, respectively. What is the reason for such drastic differences in numbers? Sweden, Great Britain, and Japan are all countries that have stricter gun controlRead MoreWilliam Golding s Lord Of The Flies937 Words   |  4 Pagesto behave at home. Even after most of the boys, with jack in the lead, decided hunting and having fun was more important than anything, Ralph realized how important it was too sick by the rules he as chief had made. After Jack took a big group hunting and they let the fire go out Ralph tells them â€Å"I was chief, and you were going to do what I said. You talk.† â€Å"But you can’t even build huts then you go off hunting and let the fire out-â€Å", â€Å"There was a ship that passed.† (71) This shows Ralphs moralRead More‘the Absence of a Written Constitution ... Enables Constitutional Change to Be Brought About Within the United Kingdom with the Minimum of Constitutional Formality.’885 Words   |  4 PagesActivity 1 (essay plan re-done) ‘The absence of a written constitution ... enables constitutional change to be brought about within the United Kingdom with the minimum of constitutional formality.’ Consider the sources of the UK constitution and the methods by which it may be changed. Do you agree with Barnett’s views? The UK’s unwritten constitution, formed of Acts of Parliament [AoP], Royal Prerogative [RP], Constitutional Convention [CC] and Case Law [CL], prompts much debate about the easeRead MoreEssay about Shooting an Elephant by George Orwell1527 Words   |  7 Pagessupervisors object these types of actions. The essay Shooting an Elephant relates to this situation. The author of this essay is George Orwell. The author talks about his work and personal experience that emphasizes the impact of imperialism at the sociological and psychological stage. This paper shall discuss the Orwells essay, how the artistic choices shape the facts in the essay, how the relationship between facts and artistry contributed to the essay, technique used, and how the tension betweenRead MoreThe Age Of Globalization Began In The 17Th Century When1295 Words   |  6 Pagesit also gave rise to capitalism. The events leading up to globalization and in turn, capitalism, are interpreted differently by histo rians such as Timothy Brook, in his book Vermeer’s Hat and by Greg Grandin, in his book Empire of Necessity. This essay focuses on the interpretations of globalization and capitalism by these authors and discusses the impacts of capitalism between the 17th and 19th century. Brook argues that rise of global capitalism initiated through the movement and transculturationRead MoreThe Issue Of Gun Control903 Words   |  4 Pagescontroversy surrounding the need for more gun control in the United States is a hot topic. Do we need more gun control? What about the 2nd Amendment? What about crime, protection, the mentally ill? There is a great amount of gun violence in this country and every time something happens, the argument starts up again. Maybe it is time to do more. Adam Gopnik wrote about this subject in his essay â€Å"Shootings†. His view is that there needs to be better gun control laws. Gopnik started his article with ringing cellRead MoreC112 Theorist Critique Assignment1913 Words   |  8 Pages and summaries of the assigned readings, doctrinal references, or outside sources. You may use the C100 online lessons, readings, and references to help you prepare your assignment. Refer to ST 22-2 Leader Communication (June 2012) for guidance about citations and footnotes. You may also refer to A Manual for Writers of Research Papers, Theses, and Dissertations (7th edition). Besides your article, here are some additional resources to help you with your critique. This is not an exhaustive

Wednesday, May 6, 2020

Kant Kant s Ethics - 1293 Words

Khaled AlMarwani Philosophical Ethics PHL270 Dr. Elizabeth F. Cooke Question # 1: Kant’s Ethics According to my humble reading, Kant is considered the hardest to read, grasp and understand among the philosophers that we came across studying ethics. According to Kant, nothing could be called good without qualification except a good will. And the good will is the desire or the tendency to do your duty because it is your duty, not anything else. Thus, nothing can be gained out of an action. And only this motivation that gives moral worth to do an action; and only that shows you are a good moral person because when a person does his act based on doing just his duty, that action would pass the categorical imperative test (doing act is based on doing the duty (period) actually, not because passing the categorical imperative test for itself) (Kant, the Good Will). Also, it shows you are a good person if you have a good will and vice versa. Only the good will virtue is the virtue that had been accepted by Kant and not anything else. Because you might be courageous or intelligent but that does not mean you would be good moral man because you might be criminal or thief unless if you enhance your courage or intelligence with a good will. Even happiness, must have good will. For a broad example about good will, you do not cheat in exam because you do not cheat not because the professor is present at the room, or you don not steal from the grocery store because you doShow MoreRelatedKant And Kant s Philosophy On Ethics970 Words   |  4 PagesEthics, What is it? many a man have asked the same question. A dictionary describes ethics as-moral principles that govern a person s or group s behavior. Is there a universal ethical behavior ? Are all countries ethical ? Theses very same questions many philosophers have tried to figure through time from Socrates to Immanuel kant (and to this very day for the matter!). While comparing two great eathist Plato and Immanuel Kant I, the writer argue that Kant s ideological views on ethic s were farRead MoreKant And Kant s Moral Ethics862 Words   |  4 PagesAccording to Kant, We have these absolute duties to ourselves and these duties to oneself become the supreme principle of all duties. Therefore, these supreme self-duties are the reason why moral ethics exist, and without our duties to oneself there would be no other duties, nor would we, as a species, survive at all. However, these self-regarding duties can be very contradicting, but can help us understand the bigger picture of the categorical imperative. Kant believes that we must â€Å"act only accordingRead MoreThe Basic Point Of Kant s Ethics Essay1316 Words   |  6 PagesFirst of all, Kant s ethics is called formalism since it concentrates on the shape or structure of an ethical judgment (the way that every ethical mandate have the frame you should do X). The basic point of Kant s moral hypothesis is to decide how summon can be an ethical order with an especially committing or obligating character. In addition, as indicated by Kant, the major objective standard of good contention or thinking is the categorical imperative: you ought to act, paying little respectRead MoreKant s Philosophy : Kantian Ethics1290 Words   |  6 PagesPhilosophy 201N April 26, 2015 Kantian Ethics Society, as we know it, is only possible through humans acting in accordance with a universal moral code. Because we as humans are rational beings and have free choice, we can make our own decisions, can hold ourselves to a standard that we ourselves set, and can act in accordance with our standards, as well as set standards for our own society. However, these standards must be held, otherwise they hold no meaning. Kant uses a black and white tactic, in orderRead MoreKant s View On Ethics Essay1362 Words   |  6 Pagespoint in their life, everyone has been lied to. Everyone has experienced the feelings of betrayal and vulnerability brought about by having their trust in someone broken. Lying, any reasonable person would agree, is wrong. Famous philosopher Immanuel Kant argued that, in fact, we as humans have a perfect duty to never lie in any situation. While on its surface a theory that is easy to agree with, many challenged Kant’s firm stance by challenging it with theoret ical situations in which lying might beRead MoreKant s Philosophy On Ethics1213 Words   |  5 PagesKant lived in an era where utilitarianism was becoming a widespread philosophical ideal, in which the group was valued greater than the individual. However, Kant argued that every individual has inherent value stating, â€Å"a human being †¦ exists as an end in itself, not merely as a means for the discretionary use for this or that will, but must in all its actions†¦ always be considered at the same time as an end† (Groundwork 4:428). This claim that every individual possesses inherent value presupposesRead MoreThe Ethics Of Kant s Life845 Words   |  4 Pages I will begin by saying that according to Kant, consequences doesn’t have any connection with our deeds: right or wrong. Morality requires us to do the right things in life: it is a command known as the imperative. This, indeed, forces me to follow what Kant said: doing the good deeds ignoring the thought of what will be the result. This ethics of Kant rather wants me to save the lives in the ship of my other nine cruise worker. This dilemma forced me to think about my morals in life of beingRead MoreKant s Impact On Ethics1389 Words   |  6 PagesImmanuel Kant was an intelligent, well-known German philosopher during the Enlightenment era of the late 18th century. During this enthusiastic time period, there emerged a strong belief in the ability of human reason to help understand the world and solve its numerous problems- including ethical one s. Kant’s contribution to ethics has been very substantial, and although ethics is the field he’s had the most profound impact on, Kant also spent his time working in other areas, such as metaphysicsRead MoreThe Role Of Happiness On Kant s And Mill s Ethics1712 Words   |  7 PagesThe Role of Happiness in Kant s and Mill s Ethics Corey Guitard (0241740) Introduction to Ethics November 18th, 2015 Philosophy 2701 Dr. Rupen Majithia Words: Immanuel Kant refers to happiness as contentment (Kant, ) whereas John Stuart Mill refers to it as the pursuit of pleasure and the absence of pain (Mill, p.7). Kant does not base his ethics on happiness. Instead, he argues that morality is based on our duty as a human (Kant, ). To do what is right for Kant is to do what is instinctuallyRead MoreKant s Deontology Theory And Ethics961 Words   |  4 Pages Kant’s Deontology If a philosopher who follows Kant’s Deontology theory had to be one of the Jury member for a case in a court house that involves someone who the judge is considering to give the death penalty. The philosopher would agree that the individual should be put to death. For the reason that the individual broke the law and committed a crime that shouldn’t have been done be anyone who are govern under the law. Also the Philosopher would believe that the rules should be follow no matter

Asedfds Essay Example For Students

Asedfds Essay Josh Grodin410-37-8822Second Take Home Essay #1Early last year, shortly after the 2000 elections, the Distinguished Gentlemen, Lloyd Doggett announced that he would not seek reelection for his House seat in 2002. This revelation came as quite a shock to Doggett supporters, but it was a pleasant surprise to a well-known Texas Senator such as myself. Being a Democrat who is well liked and respected within the Texas Senate, it was a clear calling for me to throw in the towel and run for his position within the House of Representatives. Two months ago Texas held its primary for seats in the House, and after a long and hard fought battle, I procured the nomination of my party. The 2002 elections are sneaking up on us, and in order to be successful in them, my staff and I have devised a game plan, describing my strategy for the upcoming general election. In order to devise this plan, my staff and I had to answer four specific questions dealing with my campaign. These questions will be disc ussed throughout my essay. My wish is that other political hopefuls will be able to take this essay and learn from my successes as well as my mistakes. The first question I came upon before making my strategy was when and how do I want to spend my money. When would be the best time strategically to spend my money, and on what should I spend it on? Fortunately for our campaign we had done a great deal of fundraising prior to the primaries, and had to spend very little of it during the primaries because of our weak opposition. We therefore are anything but short of money, and can spend our money freely. But when would be the best time to spend it? History has proven to us that by spending your money early on in the race you increase your chance of success. The logistics of this are obvious for several reasons. First of all, it is essential to get your name out and known towards the beginning of the race. If people barely know you four or five months before the election, then you are t oo late. This kind of thinking is especially important in House races because of the little attention they are given. For example, Lloyd Doggett has served three terms in the House of Representatives and has built up a name for himself. An incumbent would be able to focus his money to different areas because of his already popular name recognition. However, a challenger or an open-seat candidate such as Josh Grodin needs to direct his money towards building a name for himself. Furthermore, this has to be done early on in the campaign. So this brings us to the question of how to spend our money. Besides on building name recognition, it is absolutely necessary to advertise. As much as possible, my staff and I would like to take advantage of the free media, but we all know how difficult this can be. So we need to direct our attention towards paid advertising. I am running for the House of Representatives, so I only need to reach a somewhat small number of people. I believe that the bes t way to do this will be with direct mail bios of my life, what I want to do, my goals, and my advantages over my opponent. I am a firm believer that grass-roots politics is the best way to go in a House race. Towards the homestretch of my campaign, it will be necessary to spend money on TV and radio advertisements. What these advertisements will contain brings us to our next question: positive or negative?Advertising will play a huge role in the success of my campaign for House of Representatives. In fact, it is obvious that advertising plays a major role in all campaigns for elected office. But something that has always been associated with advertising is whether or not it should be positive or negative. With my experience, I believe that this answer depends solely on whether or not you are an incumbent or a challenger. An incumbent such as Lloyd Doggett has no need to run negative campaigns. Why? First of all, he already has the name recognition with his constitutes as well as hi s peers. Second, he has the money to spend on numerous ads that could respond to attacks or emphasize his positives while in office. Finally, an incumbent more than likely has his political party on his side, backing him in any possible way. However, a challenger or open-seat candidate most likely does not have these assets. For example, I do not (or at least did not) have the name recognition, I certainly did not have the money, and I didnt have my partys support until after the primary. Therefore, I felt that I need to go negative when it comes to advertising. By running negative attack ads, I can use the results to my advantage. For example, if I run a negative ad and the media picks up on it, I will, in essence, be getting free advertising spots. This is important because the main goal of my campaign is to get my message out. This proves to be difficult considering I am not an incumbent. As an open-seat candidate, how do I get my message out?Probably the most challenging of the four questions my staff and I had to ask ourselves was how to get my message out to the voters. This question more or less answered itself as we considered where and how to spend our money. As previously stated, we decided that advertising was the best way to spend our money, whether it is TV, radio, or direct contact. At the same time this became clear, it became apparent that this is how we need to get our message out. The only way for voters to know who Josh Grodin is would be to tell them directly. Direct mail is definitely one option, as well as TV and radio advertising, but I believe that direct and personal contact with the voters is the best way to go about spreading my message. As we move into the general election, I want to hold public rallies, town halls, and live debates. I want to go door to door and meet the people who I will be representing in office. I want my name to become attributed to characteristics such as charming, warm, caring, and sincere instead of being ca lled a politician or a fake. The most effective way of achieving these goals is to have direct voter-candidate contact. I can therefore speak my message clearly and effectively, and be able to answer questions the voters may have regarding my issues and my stances on these issues. This brings me to our fourth and final question: what are my issues and my themes?As a Senator in Texas, I have always been a firm believer in accurately representing the general consensus of my constituents. When polled, the people of my region time and time again list education, healthcare, and taxes as their primary concerns. I feel it is my duty to fairly represent their opinions. In regards to education, I am worried at the current state of learning within Texas. TAAS scores are down and the dropout rate is up ever since the new governor took President Bushs place. Teachers salaries are ridiculously low for the kind of job that they have. As a member of the House of Representatives, I plan to focus on education reform within the state of Texas. Moreover, I believe that every single member of the population of Texas has a right to medical attention when needed. There are too many children and elderly that cannot receive medicine because lack of money. I plan to work changing that and guarantee all Texans medical services. Finally, I believe taxes need to be adjusted. I believe that the Republicans in this state have lowered taxes too much for the rich and not enough for the poor. This is just not right in a state such as Texas, and I plan on reforming tax cuts to where it will benefit people of all socio-economical levels. My issues and feelings towards them are strong and clear, and will soon become apparent to the common voter. As I begin down the homestretch of my campaign for the United States House of Representatives, I feel confident that we are ready to take on any challenges that may confront us. My staff and I have devised a simple, yet compact plan that will help direct us in the direction of victory. Our goals have been set, we are prepared for any detours that may encounter us, and we are ready to give to Texans what they strongly deserve. .ue07362cfcde63d7ecbdf3a3b45a28837 , .ue07362cfcde63d7ecbdf3a3b45a28837 .postImageUrl , .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text-area { min-height: 80px; position: relative; } .ue07362cfcde63d7ecbdf3a3b45a28837 , .ue07362cfcde63d7ecbdf3a3b45a28837:hover , .ue07362cfcde63d7ecbdf3a3b45a28837:visited , .ue07362cfcde63d7ecbdf3a3b45a28837:active { border:0!important; } .ue07362cfcde63d7ecbdf3a3b45a28837 .clearfix:after { content: ""; display: table; clear: both; } .ue07362cfcde63d7ecbdf3a3b45a28837 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ue07362cfcde63d7ecbdf3a3b45a28837:active , .ue07362cfcde63d7ecbdf3a3b45a28837:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text-area { width: 100%; position: relative ; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ue07362cfcde63d7ecbdf3a3b45a28837 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ue07362cfcde63d7ecbdf3a3b45a28837:hover .ctaButton { background-color: #34495E!important; } .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ue07362cfcde63d7ecbdf3a3b45a28837-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ue07362cfcde63d7ecbdf3a3b45a28837:after { content: ""; display: block; clear: both; } READ: Financing Elections Essay

Sunday, April 19, 2020

Market report for Dubal

Introduction The US is renowned for its rich democratic space, strong consumer power, and business astuteness. However, its economic downturn and high cost of business may impede success there.Advertising We will write a custom research paper sample on Market report for Dubal specifically for you for only $16.05 $11/page Learn More A company needs to look into the external and internal factors that will affect it when it enters the international market. The purpose of the report is to determine whether Dubal, a UAE aluminium manufacturer, should enter the US market. Macro business environment – political The Unites States of America is a federal state, in which the head of state is the president and the constitution is the supreme protector of citizens’ rights. It has a strong judiciary headed by the Supreme Court and is backed by an equally influential parliamentary system. Therefore, the three centres of power are the executive, the Judic iary and Congress. Two parties dominate the country’s politics; that is, The Democratic Party and the Republican Party. The latter part depends on business donations for campaign funding while Democrats get it from organised labour. Consequently, parties in office may make policies that protect the interests of their funders. Dubal’s ability to safeguard its needs will depend on the ruling party and their affiliations. Nonetheless, the country is a strong democracy and has a stable political environment. It is unlikely that Dubal will experience cases of war or civil conflict in this nation. Trade restrictions and protectionism exist, albeit at low levels. Constraints exist regarding the legality of a business; Dubal will have to go through a long process before being recognised as a legal entity. Additionally, zoning restrictions exist on firms that can bring goods into the country. Copyright and patent laws are quite severe in this country. Dubal may find difficultie s in competing with older aluminium companies as they may possess patents over certain business processes.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Additionally, the country has several requirements on training workers, and licensing is a lengthy process for foreign businesses. Employers are obligated to pay for medical insurance as well other policies, so this may increase Dubal’s labour costs. The UAE and US do not have special trade agreements; however, substantial business still occurs between these two countries. As of 2011, the US had exported $15.8 billion worth of merchandise while the UAE imports about 2.4 billion worth of goods. Since the UAE is not in NAFTA or other trading groups with the US, then trade restrictions on products need to be expected. Minerals are not protected goods, so Dubal will need to pay a huge amount for its raw material-bauxite- if it chooses to produce in the US (US Department of Energy 13). Macro business environment-economic The US has the second largest economy in the world. As of 2011, its GDP stands at $ 14.82 trillion. This implies that Dubal will have a large consumer market to sell its products to. Additionally, the country recorded a 1.5% increase in the economy. Statistics also indicate that the US is the biggest importer of goods in the world. It allows approximately $2.314 trillion worth of merchandise into its borders. If Dubal opts to enter the market as an importer, then it will have a conducive environment for doing so. The most significant contributor to the economy is the managerial sector while manufacturing accounts for only 0.7%. Dubal will not be entering into a manufacturing zone, and this could prove to be quite useful to the organisation. The US economy is still underperforming thus implying that key product markets, such as the automobile industry, have diminished demand for aluminium products. The US has several resources such as oil deposits. However, it does not have bauxite, which is the primary raw material for production of Aluminium. Dubal may, however, save on costs by sourcing its supplies from the South American market. Some bauxite-rich nations in this region include Venezuela and Brazil (CRU International 54).Advertising We will write a custom research paper sample on Market report for Dubal specifically for you for only $16.05 $11/page Learn More Unemployment rates are at an alarmingly high rate for a country of such a level. It now stands at 9.1%, and is ranked 105th. This is still an all-time low for the nation. Consumers may be hesitant to buy new commodities like cars and houses, yet these items are made from aluminium. The US’ budget deficit is also at an all-time high; it now stands at $599.9 billion while its external debt to the world is $14.71 trillion. This makes it the second most indebted nation in the world. If Dubal plans on entering such a nation, it needs to prepare for constrained buying habits and rigid monetary restrictions as the government is trying to do as much as possible to cut down on expenditure. Even loan negotiations from banks might be challenging as financial institutions are dealing with the backlash for encouraging this over expenditure. Financial institutions have created high financial obligations and losses that must be paid by consumers. Failure to honour these responsibilities could cause the entire financial sector to go bankrupt. Transport, communication and other infrastructural facilities are already set up in the country. The level of development in the US implies that most of these needs will be easily catered for. Dubal, which depends on a steady supply of electricity, will not suffer from intermittent supplies. It will also not be necessary to invest in back-up generators as the nation’s electricity suppliers are dependable. Additionally, it is relatively easy to get credit in the nation as the country is ranked 4th in the world. Enforcement of contracts is taken seriously in the US, so Dubal will be protected from contract defaults by its business partners. Furthermore, the country does not have complex business networks such as the Chinese system of family ties. Therefore, Dubal can do business with organisations from the business directory. Minimal restrictions exist among the population concerning trade. Macro business environment-social The US is a culturally diverse country, and since the UAE also possesses this trait, then it will be easy to do business there. English is the US official language, and most residents of the UAE are now familiar with it. While individuals are religious, they tend to separate religion from business life. Additionally, most individuals do not pay attention to family ties when doing business, so this will favour Dubal.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Micro environment-competition Several aluminium producers already exist in the US, such as Alcoa, Century Aluminium, RUSAL, Alcan, and Chalco. Alcoa accounts for 54% of market share in the target market, and has a presence in other parts of the world. In fact, these dominant players will minimise Dubal’s capability to operate successfully in the market. RUSAL is one of the most formidable aluminium producers in the international aluminium industry, it controls 16% of the world market and has integrated various aluminium-based firms. Some of them are producers of bauxite while others manufacture aluminium (Aluminium Industry Association 15). Furthermore, some of them even produce packaging material and electricity products. Alcan is a Canadian firm, and has an advantage over other players owing to its high product volumes. Chalco on the other hand is a Chinese-owned firm that dominates is domestic market as well as a substantial portion of the US market. Foreign competitors fr om China are a force to reckon with. The entrance of Chinese players in the US market leads to market surplus hence price declines. The market for aluminium products is highly accessible. Companies need to choose the best strategies for entry, and they have a chance at succeeding. Most equipment and resources needed to manufacture the product are found in the country, but Dubal would be better of it imported these products from its cheapest markets. Nonetheless, it is likely that, in the long run, the growth potential for this company will be quite low since the US is saturated with aluminium smelters. Approximately 12 companies are responsible for performance in this industry. However, in the next five years, it is likely that domestic demand will grow if the economy improves. Projections indicate that the US aluminium industry will increase by 12% in 2013. Such changes will stem from better energy supply, government support, and cost efficient technologies. Furthermore, consumersà ¢â‚¬â„¢ need for sustainable construction practices is likely to increase the demand for Dubal’s product (Green 46). Profitability in the aluminium industry has not been very promising. In 2009, some 6 aluminium smelters closed their businesses. The biggest problem for most organisations is high production expenditure. These organisations need to pay a lot of money to use electricity. Additionally, the US lacks bauxite resources, so many firms need to import their own resources and this costs them considerably. If Dubal opts to take production into the US, then its profitability could be substantially diminished. However, if it only treats the US as a market, then chances are that it will have a greater competitive edge. Consolidation is now a reality in the industry and could be used as a source of competitive advantage for Dubal. The most powerful player in the world-RUSAL – is using this strategy to remain a market leader (Bloomberg 40). Likewise, Dubal ought to bor row and customise that approach. The firm can merge with large aluminium purchases in order to foster cost management. Vertically integrated firms in the global aluminium industry are generating their own electricity. Access and prices of power can substantially reduce if Dubal has control over them. In fact, this explains why many aluminium firms are choosing developing nations as new target locations. They can produce electricity cheaply and efficiently in those areas. If Dubal chooses to generate its own electricity, then it ought to do this in the UAE rather than in an expensive country like the US. The organisation can also instate strong governance structures that emphasise strong environmental performance, human rights, and community relations. Additionally, the firm may focus on low cost energy sources since these would cut costs and secure better prices for the product. It should also have a green innovation strategy. Dubal should consider importation as a strategy for entr ance into the US market. This will protect the organisation from the high production costs that stem from operating in the US. All processing should occur in the UAE, so that it can have a ready-product to bring into the US. The US has fewer import restrictions on aluminium than it does on bauxite. Microenvironment-customers The principal type of consumer in the US aluminium market is the manufacturer. Therefore, Dubal Aluminium should consider using B2B partnership models to do business. Some of the frequent buyers of aluminium include automobile manufactures, bicycle, motorcycle, railways and aircraft firms. Beverage manufacturers such as Pepsi and Coca Cola need to the product to make cans and foils. US consumers are generally known for their impulsiveness. However, because Dubal sells intermediary products, then the same psychology cannot be applied to their products. Many B2B approaches work by initiating a strong relationship with the targeted enterprise. Dubal needs to demons trate that its products are superior or that they come at a lower price with no compromise on quality. These factors will set them apart from other retailers. American firms focus on product quality more than affordability so Dubal would be better of if it focused on the first approach. In addition to these differences, it may be imperative for the company to sharpen its negotiation skills as American buyers are astute bargainers. Culture has a positive impact on business in this nation because most people are individualistic. They are highly competitive and always do due diligence before getting into a business arrangement. Furthermore, it is the most qualified person that wins a contract rather than the most affable one. As such, Dubal needs to focus on its tangible advantages and business numbers if it wants to get a market there. Conclusion The purpose of the report was to establish whether the US is a feasible target market for Dubal. It was found that the cost of production is too high, owing to absence of the main mineral ore and high electricity costs. Additionally, there is stiff competition from local players. However, the US ranks well in terms of ease of doing business. Dubal should produce in the UAE and consider exporting its finished products to the USA. Works Cited Aluminium Industry Association. The versatile metal. London: McMillan, 2005. Print. Bloomberg, Jerry. â€Å"Short run demand and supply elasticities in the West European market for secondary aluminium.† Resources Policy 26(2005): 39-50. Print. CRU International. Report in the aluminium and alumina industry. London: CRU International, 2008. Print. Green, Samuel. Aluminium recycling and processing for energy conservation and sustainability. NY: ASM International, 2007. Print. US Department of Energy. US energy requirements for aluminium production. Washington DC: DOE Press. Print This research paper on Market report for Dubal was written and submitted by user Marcus D. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, March 15, 2020

Physician-Assisted Suicide Essays - Euthanasia, Medical Ethics

Physician-Assisted Suicide Essays - Euthanasia, Medical Ethics Physician-Assisted Suicide Kathleen M. Foley, author of Competent Care for the Dying Instead of Physician-Assisted Suicide, believes doctors should develop treatments for the physical and psychological problems of dying patients rather than helping them commit suicide. Available data suggests most physicians do not receive training in the care of dying patients. Dying patients experience physical symptoms such as pain, psychological problems such as anxiety and depression and existential distress (described as the experience of life without meaning.)(1) many of the physical and psychological problems can be treated. Furthermore, legalization of physician-assisted suicide may deter physicians from developing treatments that could enhance the dying patient's quality of life. Euthanasia by definition means "a gentle and easy death", "the good death of another" or "mercy killing."(2) There are two types of euthanasia currently recognized, active and passive euthanasia. Active euthanasia is the taking of one's own life, or being killed, for example, by lethal injection. Passive euthanasia is taking one's life with the assistance of another or just being allowed to die. In passive euthanasia we simply refrain from doing anything to keep the patient alive, for example, refusing to perform surgery, administer medication, give heart massage or use a respirator and let the patient die from whatever illness is already present. It is important to understand the difference, because many people believe that active euthanasia is immoral and passive euthanasia is morally all right. They believe that we should actually never kill patients, but sometimes it is all right to let them die. The main issue then is it morally permissible to kill or let someone die who is going to die soon anyway, at the person's own request, as an act of kindness? Throughout history, many people have thought that the distinction between active and passive euthanasia is morally important: and many of those who condemned active euthanasia raised no objection against passive euthanasia. Even by people who believed killing to be wrong, allowing people to die by not treating them was thought in some circumstances to be all right. Even before Christ, Socrates was quoted as saying, " ...bodies which disease had penetrated through and through he would not have attempted to cure...he did not want to lengthen out good-for-nothing lives."(3) In the centuries that followed, both the Christians and the Jews viewed allowing to die in circumstances of hopeless suffering, morally permissible. It was killing that they adamantly opposed. The Pope, stating the position of the Catholic Church, said "it is acceptable to allow the patient who is virtually already dead to pass away in peace."(4) In a statement published in 1982, the American Medical Association echoes the feeling of the Catholic Church saying, " we remain firm on our stand against mercy killing, but allowing patients to die (in some circumstances) is all right."(5) So it seems, there is widespread agreement that passive euthanasia is morally all right (in at least some cases), but active euthanasia is much more controversial. In essence what we seek is whether euthanasia active or passive is moral, or whether it is immoral. To discover the truth we must examine the arguments or reasons that are given for or against it. If the arguments in favor of euthanasia are persuasive and the arguments against it can be rejected, then it is morally acceptable. And likewise, if after careful analysis we find a strong case against euthanasia, we would have to conclude it to be immoral. I think this is true not only of euthanasia, but of any moral issue. The single most powerful argument in support of euthanasia is the argument of mercy. The main idea of this argument is simple. Terminal patients sometimes suffer pain far beyond our comprehension. This suffering can be so terrible that we cringe at the descriptions of such agony. The argument for mercy says: Euthanasia is justified because it puts an end to that. It is not important to give gory details of the suffering of the terminally ill, but it is important to keep these visions vividly imprinted in our minds so we can appreciate the full force of the argument for mercy. If a person prefers and even begs for death as the only alternative to

Thursday, February 27, 2020

Bachelor of Applied Science -Supervision and Management Program - How Essay - 1

Bachelor of Applied Science -Supervision and Management Program - How This Program Will Enhance My Career - Essay Example As a mother of three [boys? Girls? – insert something like â€Å"three beautiful girls† or â€Å"three intelligent boys†Ã¢â‚¬â€you can describe them here], I stay on the go. I juggle a busy schedule and face not only my own challenges, but also the challenge of motivating my children. I have developed routines and schedules to encourage development of good life habits, such as regular cleaning and timely completion of school work. Also, I believe in positive reinforcement, rewording my children for taking initiative to complete tasks on their own. In essence, I have developed a management style with my family that I believe can be applied on a larger scale to my career, making me an effective manager or supervisor. The Bachelor of Applied Science in Supervision and Management will allow me to use the motivational and management skills I have honed in a family environment. The program will allow me to take another step forward, moving my skills as a wife and mother into my career by allowing me to work closely with both respected instructors and my peers in order to become a more effective leader. During my childhood, one teacher comes to mind that motivated me to learn and become the person that I am. I believe that this teacher could reach me because he had learned effective motivational and leadership skills, and I hope to emulate this model and to inspire others to do the same. I have a natural talent for working with people, and it is my goal to interact with instructors and peers in this program to become an effective leader, a valuable skill which will improve my career. As a young woman—and like many young women in today’s workforce—I often felt less secure than my more experienced and seasoned coworkers. One of the most valuable lessons that I have learned as I have grown older is that a person’s worth is not determined my age or intelligence, but by an individual’s desire and motivation to

Tuesday, February 11, 2020

The role of the RN in the Rehabilitation Facility Essay

The role of the RN in the Rehabilitation Facility - Essay Example Rehabilitation is a complex process aimed towards the achievement of a quality life; thus, providers of care in the rehabilitation facilities (such as the nurse) must be knowledgeable, competent, and skillful in rendering rehabilitative care. Registered nurses play an important role in the rehabilitation facilities and are considered as important members of the rehabilitation team. Often, nurses in the rehabilitation team collaborate with the physicians, psychiatrists, physical therapists, occupational therapists, recreational therapists, speech-language therapists, psychologists, spiritual advisors, social workers, vocational councilors, orthotists or prosthetists, and sex councilors. With a number of professionals to which the nurse collaborates, a nurse in the rehabilitation facility must have excellent communication skills and knowledge of each scope of practice. In addition, nurses assume an equal role with other professionals in the rehabilitation process but usually take the m ost critical roles in the provision of rehabilitative care. Jester (2007) stated that the nurses’ roles in the rehabilitation facilities include three main components, among of which are: general maintenance, specialist, and carry-on role (p. 14-15). The nurse’s role in general maintenance includes overall ward management and maintenance of patient’s physical well-being such as nutrition, hygiene, and skin care. The nurse as a specialist in a rehabilitation facility has an inherent degree of expertise in specific areas of rehabilitation such as orthopedic rehabilitation, geriatric rehabilitation, or substance abuse rehabilitation. Lastly, nurses in the rehabilitation facilities also perform the carry-on-role or the role of the nurse to maintain the progress made by other professionals such as the physician (e.g., the nurse is responsible for monitoring the WBC levels of patients being prescribed with Clozapine). In addition to the performance of carry-on-role is the 24-hour-a-day/7-days-a-week role of the nurse in supervision and continuing practice of what the patients learned from other professionals (Squires & Hastings, 2002, 219). The main goal of rehabilitation is to return the individual to the highest level of independence by maximizing function and minimizing disabilities (Flanagan, Zaretsky & Moroz, 2011, 354). To achieve this goal, nurse rehabilitation professionals are commonly asked to evaluate and participate in the treatment of the patients. Thus, a nurse’s role in the rehabilitation facilities does not only centers on the provision of care but also on engaging to the planning and implementation of rehabilitation programs. The role of the nurse in the nurse in the rehabilitation settings is still underdeveloped and too general to identify by other professional groups, patients, and families. Nurses in the rehabilitation facilities are still struggling to make their roles specific and be recognized. Among the reasons de rived from literatures why nurses’ roles in rehabilitation facilities is underdeveloped include lack of specific educational programs for post-registration nurses, organizational difficulties and funding, professional tribalism and turf wars between nurses and therapists, and role confusion (Jester, 2007,16). Nurses have to be competent in order to render an effective rehabilitative care; likewise, the federal government and the organization to which nurses belong also have the responsibility of equipping the nurses with adequate knowledge and skills preparation in the form of

Friday, January 31, 2020

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA

Thursday, January 23, 2020

WalMart :: essays research papers

Wal-Mart’s philosophy has always been to provide everyday low prices and superior customer service. But this philosophy might have stared potential customers away from Wal-Mart. Many people, including myself, have the misconception that Wal-Mart only sells necessities that the average working class family can afford. An extreme eye opener for me was a recent television commercial by Wal-Mart. I saw that they also sold flat panel televisions, which is considered a luxury item for any social class. After going to their website to see what other luxury items Wal-Mart sold I was amazed at the number of items I found that were not the necessities which I stereotyped them selling. Wal-Mart has to change the public’s opinion of the items that they sell and the types of people that it has in mind of serving. Sam Walton was the shrewd businessman behind the world's largest retailer. After working his way through the University of Missouri as a newspaper delivery boy, he got a job in Des Moines, Iowa as a management trainee for J.C. Penny at a salary of $75 a month. Walton borrowed some money from his father-in-law and opened a variety store after serving as an Army captain in World War II. A chain of drugstores followed. He went into business with his brother Bud, and by 1960, the Waltons' 15 stores were taking in $1.4 million a year. But Walton soon saw a challenging new competitor arise in the discount store. The Walton brothers opened their first Wal-Mart in 1962 in Rogers, Arkansas. Specializing in name brands at low prices, the chain of Wal-Mart stores sprang up across rural America. Wal-Mart’s sales grew to $26 billion by 1989, compared to $1 billion in 1980. By 1990, Wal-Mart was the largest U.S.

Wednesday, January 15, 2020

Postmodernism

First of all, it is important to be aware of the differences between postmodernism and modernism. While modernism always tries to find a new way to express something, postmodernism has no such concern. Modernism itself is representational, normative, original and Universalism. It has a linear progress. Postmodernism has no concern about being original. Moreover postmodernism claims that there is not possible way to create something brand new anymore. So, contrary to modernism's originality, postmodernism is quotation based. It is simulation and relativistic.While it is common to encounter alienated self in postmodernism, there is a decanter self in postmodernism. It will be useful to adopt the major characteristics of postmodernism into the postmodern movies. In postmodern films, we usually do see barcaroles. Those barcaroles are inspired mostly from the past. It is possible to say that the postmodern films have a mission of recycling the past. Moreover, since the high and low cultur e got stuck in the modern times, it is not possible to come across a separated culture in postmodern films. Postmodern films bring them together and melt them in a pot.They do not have one specific genre. Genre-cross over is commonly recognized in postmodern movies. A postmodern movie can be attached to several genres at the same time. One of the major characteristics of postmodernism, quotation shows itself as intellectuality. It can also be engaged to non-linearity in some examples. Postmodern movies mostly contain references to other movies. That's a major element of intellectuality. While it is common to recognize reference to other movies it is also possible for a postmodern movie to reflect upon its own process.Parodies and pastiches have also a major part in postmodern movies. We usually do see the parodies of horror movies. A postmodern film also bends the time and creates confusions over the time and space. By the time it also blurs the lines between dream and reality. Espe cially the hyper reality blurs the lines by creating a simulation of reality. Also the element, metrification is used in postmodern films. For instance if a character speaks directly to the audience, it can be said that one of the elements of metrification is used. Metrification breaks the spell of the movie.

Monday, January 6, 2020

Comparison and Contrast Essay Between Two Poems of Emily...

Comparison and Contrast Essay between two Poems of Emily Dickinson and Mary Oliver Emily Elizabeth Dickinson, or called Emily Dickinson for short (1830 – 1886) and Mary Oliver (1935), are the two poets who contributed great works of art to American society during the late nineteenth and early twentieth century. In spite of several characteristics that can be found in both Emily Dickinson and Mary Oliver poems, there are undeniably things that distinguish them from one another, although outside both are very famous poets of the poems that they wrote at that time, but actually inside, every poem that they bring the reader has a different meaning and quite deep in reader hearts. For example, as we read the poem â€Å"Alligator Poem† by Mary†¦show more content†¦(Write something about Famous Works of Emily Dickinson). In the poem â€Å"Aligator Poem† in â€Å"New and Selected Poems – Volumne One† of Mary Oliver, personification method is a main method that she used the most to write this poem. As you read the whole poem, you can clearly see the bird that she wants to talk about is standing in the tops of the trees, whistling any warning, crashing toward to her, its tail failing, slashing the grass, its cradle - shaped mouth gaping, then rimming with teeth,... these actions are not the actions of a bird, these are human actions, she used personification to pretend the bird is a person, or a friend, she pretended that she was walking on the street and saw the bird, but she thought that bird is not a normal bird because she could see its eye was trying to tell her something. And of course she couldnt understand bird language, or the bird couldnt tell her what is going on with her in human language. So the only way that the bird could do is action, I do agree that human cannot un derstand the birds language, but I do surely agree that human can understand the bird action. Then finally she did understand what the bird was trying to tell her, she understood that something is really bad will happen to her in the future. And yes, she fell, but thanks to