Monday, December 23, 2019

The Controversial Topic Of Stem Cell Research Essay

Stem Cell Research is still the most controversial topic in science today. The idea behind the experiment involves the development, use, and destruction of human embryos. The research method mainly focuses on embryonic stem cells, which involves taking tissue from an aborted embryo to get a better look at the cell and obtain information for the fundamental properties of the cells. Embryonic stem cells play a major role in the research because the cell provides information for cell development to create new drugs for medical disorders. Although stem cell research seems like that this perception could help cure precarious diseases like Alzheimer’s, Parkinson s, and even diabetes, which would help the United States heavily, many consider the procedure unethical and dangerous. Stem cell research could help bring further advancement to the medical field, it can also transfer destruction. Many argue that stem cell procedure is unethical due to the fact that we are using a human embryo as a test subject. Regarding that scientists would be implementing a cell that once belonged to a human being, made people feel that the procedure would lead to the act of â€Å"playing God†. â€Å"Embryonic stem cell research takes away the chance of an embryo to become a human being† (Embryonic Stem Cell Research: an ethical dilemma). Embryos are in a stage that they have the possibility to develop into a human being and using them for inquiry is taking away this probability and therefore, it is examined,Show MoreRelatedThe Controversial Topic of Stem-Cell Research in the United States993 Words   |  4 PagesStem cell research is a fairly controversial topic in the United States. Stem cells are cells that have the potential to become certain types of cells throughout a human body. There are a few types of stem cells, which are embryonic stem cells, adult stem cells, and induced pluripotent stem cells. Embryonic stem cells are the most controversial due to the manner from which they are obtained. Embryonic stem cells are pluripotent cells gathered from the inner cell mass of a blastocyst, which is anRead MoreStem Cell Research : A Controversial Topic Discussing Life Or Death865 Words   |  4 PagesKegley Health Science- 4th period 22 September 2015 Stem Cell Research Stem cell research is a controversial topic discussing life or death. Stem cells have the capability to turn into many different cell types essentially saving lives that may need specific parts that the stem cell can create. The embryo being used dies which makes this topic very controversial because the unborn child is being killed for research. Although stem cell research treats people from chronic diseases which thereforeRead MoreEssay on Stem Cell Research: Should it be Permitted?868 Words   |  4 PagesStem cell related diseases affect over 100 million americans (White). Right now, there are plenty of government funds for stem cell research, and if we continue on the same path as we are now, stem cell research should be successful; however, the ethics used for embryonic stem cell research are incomprehensibly horrific (Stem cell policy). If this continues to be funded, it could have answers to numerous major diseases, including why they are caused, prevention, and cures for t he diseases. MoreRead MoreEssay about Embryonic Stem Cell Research1357 Words   |  6 PagesHuman Embryonic Stem Cell Research Embryonic stem cell research is a highly controversial topic in todays society, this kind of stem cell commits to regenerate any type of tissue. Unfortunately, Embryonic Stem Cell Research has a dark side. To obtain these cells will kill the embryo automatically. In other words, the acquirement of the Human Embryonic Stem Cell includes performing an abortion. To obtain these cells, it would kill the embryo. This has created controversy since abortion is suchRead MoreThe Heated Debate Concerning Stem Cell Research Essay787 Words   |  4 PagesThe Controversy Over Stem Cell Research In a lab at the University of California, a scientist carefully isolates several cells and locates them to a petry dish. A few days later, he returns to find the cells pulsating like a human heart (Gorman 58). This account has actually been occurring at several scientific labs across the nation. These cells, known as stem cells, produce nearly all the other cells and tissues found in the human body (Sobel Sep 4, 22). Intensive research has found that whenRead MoreThe Debate Of Stem Cell Technology Essay1441 Words   |  6 Pagesfocus on the topic of stem cell technology. Stem cells are nonspecialized cells that have the ability to divide for an indefinite length of time and develop into a variety of cell types. This process primarily occurs early in a person’s life while they are still growing. Stem cells are also used regularly in some organs to repair damaged or worn out tissue. Stem cells have been found to have many more clinical uses in recent years, though. Stem cells have been the subject of much research in the scientificRead MoreThe Ethics of Stem Cell Research Essay741 Words   |  3 Pages Embryonic stem cell research can be easily defined. A stem is defined as something that is developed from. A cell is defined as a microscopic living organism. According to Dennis Hollinger, Embryonic stem cell research uses from the embryos inner cell mass that give rise to each of the human bodys many different tissue types(1). In our modern day society, stem cell research has become a controversial topic. Several people strongly oppose the idea of the research, but many are struggling forRead MoreStem Research On Stem Cell Research1530 Words   |  7 PagesHiga Capstone 2 October, 2014 Stem Cell Beats Ethic Issues Stem cell research is the most controversial topic in the health field since abortion. Stem cell research however, has the potential to unlock an infinite amount of possibilities as well be the key to curing patients with terminal illnesses. Many people from around the world have their opinions on this type of research dealing with ethics, politics, and religion. The most efficient way to study stem cells is taking them from donated embryosRead MoreFederal Funding With Stem Cell Research706 Words   |  3 PagesStem cell research is extremely prevalent in today’s society, and on the other hand controversial. When thinking of stem cell research many questions, and challenges arise from it. Some problems that arise from the topic of stem cell research involves, religious beliefs, personal, and ethical beliefs. In the next few paragraphs the facts of stem cell research will be mentioned, and questions will be answered with factual evidence. When the topic of stem cell research, and/ or treatment, peopleRead MoreRights Based Ethics And Stem Cell Research878 Words   |  4 Pages Rights Based Ethics and Stem Cell Research When talking about ethics, we have theoretical ethics and applied ethics. Those these two are different they, are also connected. Theoretical ethics can be defined as the theoretical study of the main concepts and methods of ethics(Ward). This is, basically, studying the ethical language, the concepts, beliefs, and the reasoning of certain ethical theories. Applied ethics are defined as the application and evaluation of the principles that guide

Sunday, December 15, 2019

Strategic Management Ansoff Matrix Free Essays

string(59) " the relative potential for growth within the new segment\." 1. INTRODUCTION Corporate strategic decisions are usually based on the methods through which an organization could leverage its existing competitive advantage in promoting value and ensuring growth (Lynch, 2009), while sustainable competitive advantage depends largely on how well a company performs these actions (Porter, 2008). The need for companies to grow and expand has been known to drive product and marketing innovation, which in turn prompts them into adopting different organisational strategies, based on the products they sell and markets they target (Ansoff, 1984). We will write a custom essay sample on Strategic Management Ansoff Matrix or any similar topic only for you Order Now The Ansoff Matrix, developed by Igor Ansoff in 1957 highlights four major strategic options (Figure 1) through which an organisation could adapt its new or existing products into a new or existing marketplace. The matrix is employed by businesses in decision-making processes surrounding product offerings and market growth strategies. The matrix is also known as the Product/Market growth matrix and it major function is to help organisations in evaluating available options for growth given their product and market mix. Johnson et al (2008) also depict it as a method of ascertaining the benefits or risks associated with each strategic option. The major strategic options available, as depicted in Figure 1, are for an organisation to penetrate its existing market, develop its market, develop its products or diversity completely with a new product into a new market. Ansoff matrix Figure 1: Ansoff Matrix. Source: Ansoff (1957), adapted from Lynch (2009) 2. QUADRANTS 2.1. MARKET PENETRATION As stated earlier, there are four output options for the Ansoff Matrix. The first of which is market penetration. This is a strategic option for an organisation seeking to expand its market share in an existing market, with an existing product. Mercer (1996) states that the growth strategy inherent in the Market Penetration option is for an organisation seeking to maintain or increase share of its existing products within the market place, gain market leadership, change competitive processes within a matured market, or increase awareness amongst existing consumers. According to Hooley et al (2004), the option to penetrate deeper within the marketplace is a low risk option that makes use of existing resources. A typical example of an organisation using this strategy would be Southwest Airlines. Southwest Airlines aggressively offers low cost flights within small distance cities. The company’s existing product is low cost travel, which is an industry dominated by several companies and witnessing high competitive pressures across all major markets. However, through its combination of aggressive marketing and low cost pricing, the company is able to dominate the market within Southwest United States (Shaw, 2007). Another example of market penetration strategy would be that of Pakistan State Oil. The company experiences competition from local and foreign oil companies that sell petroleum through retail petrol stations. However, it has been able to increase its market share from 40% to 65% over a period of 4 years by opening new retail outlets and investing in external advertisement (Economic Review, 2005). The strategy adopted by Pakistan State Oil is similar to that of Southwest Airlines, in that they operate within competitive markets, but by investing competitively, they are able to maintain market share and grow within their respective industries. This strategy also illustrates the low risk advantage of market penetration. The companies utilise existing products in an already known market. They do not have to invest in research and development or excessively advertise within a new market in order to create awareness. Adopting this strategy would cement the organisation’s position within the industry and increase the barriers for entry for new competitors (Porter, 2008). Since market penetration is focused on retaining existing customers, it is a lot cheaper than acquiring new customers in an unknown market. However, a major disadvantage of this strategy is that it does not promote corporate growth into other potentially higher earning sectors (Watts et al, 1998). By focusing simply on retaining existing customers, Watts et al argue that the company loses out on the new investment potential, while Fifield (1998) also depicts that expanding market share within an existing industry poses a significant risk as the industry growth may decline and the organisation has lower growth potential. 2.2. MARKET DEVELOPMENT The option to develop a market is recommended by Ansoff to organisations that aim to offer an existing product into a new market. The various alternatives available would be to leverage an existing product into a new geographical region, using different product dimensions, distributing the products through new channels, or adopting different pricing strategies (Proctor, 2000). The major goal of market development would be to attract a new customer segment, using a slightly different strategy, into consuming an existing product (Ansoff, 1984). The risk associated with this strategy has been depicted by Watts et al (1998) to be moderate, due to the risks associated with entering a new market. According to a case study in Christensen et al (2005, p.51), Arm and Hammer owned a small business selling baking soda product and were able to attract a new segment of customers by identifying new uses for baking soda. They realised that apart from being used solely for baking, the products could be used as a household cleaning and deodorizing product, so they repackaged its contents and marketed them to supermarkets and corner shops as effective cleaning agents. Due to the relative infancy of the market, they had to engage in a series of advertisement that helped to communicate the relevance of their product and methods through which it could be used for other purposes. Through this strategy, they were able to increase revenue and adapt one product to different market segments. This case study confirms previous assumptions that through market development, a company could leverage an existing product into a new market (Collis and Montgomery, 2008). The market development actions they engaged in were essential in building product awareness amongst the new customers. According to Fifield (1998), companies engaging in market development would gain new customers, increase turnover and profits, and ensure corporate growth due to the relative potential for growth within the new segment. You read "Strategic Management Ansoff Matrix" in category "Essay examples" However, Hooley et al (2004) also discuss the risks associated with market development. The option to foray into a new market segment entails the cost of developing this new market, which consists of market costs and a potential change to the company’s marketing mix. If the strategy fails, then the company would have lost the substantial capital utilised in marketing and pushing this product into the new market. 2.3. PRODUCT DEVELOPMENT The product development strategy is directed at organisations seeking to offer a new product into an existing market. This definition entails any new or modified product aimed at an existing market. Lynch (2009) asserts that the decisions to develop the product prior to delivery into the market is based on the company’s intention to exploit new technology, protect market share by introducing innovative products and also to utilise excess production capacity. This strategy entails a moderately high risk due to the level of product development and research required to develop a new product for a market that is already used to an existing product (Watts et al, 1998). The Apple iPod is a real life example of a new product delivery into an existing market. Prior to its introduction, most individuals usually listened to music on cassette players, desktop computers and the Sony Walkman (CNet, 2008). There was no innovative product in the market that allowed individuals to carry their music library on a digital device without the need for cassettes or compact discs. The iPod is a typical example of product development due to its innovative approach to playing music. It consisted of the sleek wheel navigation system that was relatively easy to use and display methods, which made scrolling through vast amounts of music much easier. Due to the product innovation method employed during its development, the Apple iPod quickly gained market share and is now the market leader in music devices (CNet, 2008). In accordance to Johnson et al’s (2008), the product development strategy associated with the delivery of the Apple iPod enabled the organisation to increase its customer base, brand awareness, brand into the music business, and utilise the iPod’s success as a platform in establishing the iTunes Music Store. Also confirming Hooley et al (2004) view that if a product development strategy for entry into a new market is successful, it may lead the company into introducing more innovative products into the same market or parallel markets, such as in the introduction of iPhone into the smart phone market, and most recently the iPad into the slate PC market. However, the benefits associated with such a strategy seem to be limited to strong brands with an already existing brand image in similar markets. Watts et al (1998) depict that smaller firms aiming to introduce a new product into an existing market may face shortfalls in marketing the product and investing in product development. Doyle (1997) also states that the high costs and time related in developing a new product for an existing market may be discouraging. Lynch (2009) thereby concludes that careful research needs to be undertaken before an organisation can implement a product development strategy, due to the lack of guarantee regarding market success. 2.4. DIVERSIFICATION The final quadrant in the Ansoff’s Matrix is a diversification strategy. Such a strategy entails offering a new product in a new market and is often used when a market has become saturated and profits are limited (Lynch, 2009). Doyle (1997) asserts that diversification strategies are usually in three forms: full diversification, backward diversification, or forward diversification. The diversification form adopted by the organisation usually depends on whether they are entering a completely new market, integrating backward and competing with suppliers or integrating forward and competing with buyers. Diversification, whatever form it entails has a generally high risk due the fact that the company would be offering an entirely new product in a new market. The Virgin Group is a typical example of a company that has consistently diversified into new markets. It forayed into the credit card industry with Virgin Money offering competitive credit card rates to customers; it diversified into travel and offers holiday packages to holiday goers, it also diversified into the mobile phone market with Virgin Mobile and most recently into Fitness with its range of Fitness centres. Forward diversification is being utilised in all these business ventures and have proved successful for the company. It is able to consistently leverage its brand image across different market segments. Johnson et al (2008) argues that Virgin’s main product is its brand, which it sells across different markets, and not necessarily the businesses its runs. Holbrook and Schindler (1996) state that companies that consistently practice diversification strategies are usually large with a reputable brand image such as Apple, General Electric and Virgin. They are able to leverage their brands across different markets due to high customer loyalty (Hooley et al, 2004). Therefore it seems that this strategy, just like that of Product Development is practised best by organisations with a reputable brand and resources required to develop and market a product effectively, be it an actual product or a brand. Lynch (2009) highlights that the potential benefits of diversification could be numerous. The company enjoys the benefits of operating within diverse markets, thereby ensuring improving profitability and customer loyalty. The company is also able to attain market leadership if the market is not crowded and if it has a unique product to sell. However Mercer (1996) criticises diversification strategies as a jack of all trade practice of venturing into several markets and not being the master of one, a statement that is typical of Virgin’s position. It is not a market leader in any of its markets. 3. CONCLUSION The Ansoff matrix has proved useful, and with the use of real life evidence, it accurately depicts the most effective strategies that businesses could use depending on their market and customer segment. Though the four strategies apply differently to companies depending on their market and product intentions, it also depends hugely on firm specific capabilities such as brand image and research capabilities. Organisations seeking to adopt its usage when seeking strategic direction should therefore do so in due consideration of their firm specific strengths and benefits and how these could also be applied to the products being offered and markets being targeted. Word Count: 2,063 4. REFERENCES Ansoff, I. H. (1957) Strategies for Diversification, Harvard Business Review, Vol. 35 (5), pp.113-124 Ansoff, H. I. (1984) Implanting Strategic Management, Prentice-Hall: NJ, 455pp Economic Review (2005) ‘Performance of Oil and Gas Sector.’ Economic Review, Vol. 36, pp4- 13 Christensen, C., Cook, S., and Hall, T. (2005) ‘Marketing malpractice: The cause and the cure.’ Harvard Business Review, Vol. 14(3), pp56-73 CNet (2008) The complete history of Apple’s iPod [online], www.crave.cnet.co.uk, [accessed: 30/03/10] Collis, D. and Montgomery, C. A. (2008) Competing on Resources, Harvard Business Review, Jul-Aug p140-150 Doyle, P. (1997) Marketing Management and Strategy, Prentice Hall: NJ, 4334pp Fifield, P. (1998). Marketing Strategy, 2nd Ed, Butterworth Heinemann: NJ, 344pp Hitt, M.A., Ireland, R.D., and Hoskisson, R.E. (2009) Strategic Management: Competitiveness and Globalization (Concepts and Cases). 8th edition. Mason, Ohio: South-Western Cengage Learning. Holbrook M, and Schindler R. (1996) Market Segmentation Based on Age and Attitude Toward the Past: Concepts, Methods, and Findings Concerning Nostalgic Influences on Customer Tastes. Journal of Business Research, 37 (1): p27-39 Hooley, G. J., Saunders, J. A. and Piercy, N. (2004) Marketing Strategy and Competitive Positioning, 3rd Ed, Pearson Education: London, 622pp Johnson, G., Scholes, K. and Whittington, R. (2008) Exploring corporate strategy: text cases. 8th Ed. Pearson Education Limited: Essex, UK. 878pp Lynch, R. L. (2009) Strategic management, 5th ed, Pearson Education Limited: UK, 826 pp Mercer, D. (1996) Marketing. 2nd edition. Oxford: Blackwell Publishing Ltd. Porter, M. E. (2008) The Five Competitive Forces That Shape Strategy. Harvard Business Review, Jan, Vol. 86 (1), p78-93 Proctor, T. (2000) Strategic Marketing: An Introduction, London: Routledge. Shaw, S. (2007) Airline Marketing and Management. 6th edition. Burlington: Ashgate Publishing Company. Watts, G., Cope, J., and Hulme, M. (1998) Ansoff’s Matrix, pain and gain, International Journal of Entrepreneurial Behaviour and Research, Vol. 4 (2), pp101 – 111 How to cite Strategic Management Ansoff Matrix, Essay examples

Saturday, December 7, 2019

European Union Agency for Network and Information Security Security I

Question: Discuss about theEuropean Union Agency for Network and Information Securityfor Security Infrastructure. Answer: ENISA An Overview of Case Study ENISA is a centre for the maintenance and implementation of security policies in the European Union and the associated organizations and agencies. It is referred to as European Union Agency for Network and Information Security and came up with the ENISA Technology Landscape (ETL) in 2014. The case study covers the current threats that exist and also lists the top threats for the year 2014 along with a comparison from the ones that were present in 2013. There were a number of measures that were taken to control the threats and ETL was designed with an aim to put a check on all the security loopholes. However, in spite of so many efforts and attempts, there were a number of occurrences. The case study covers the description of the top threats such as data breaches, insider threats, phishing, ransomware and many others. The case study also covers the threat agents that are involved in the execution of these threats and these agents are the cyber based agents such as cyber criminals, cyb er terrorists and many others. Technology is something that is changing at a rapid rate and the emerging technology trends and landscape has also been covered in the case study. The areas to focus upon in order to improve the security have been concluded in the end (Enisa, 2016). ENISA - Security Infrastructure Diagram The diagram depicts the various security areas that must be present in the security infrastructure so that the overall security of the system and its associated components can be enhanced. There are a huge number of entities that are present under ENISA and the same are required to be safeguarded against all the security loopholes. These levels and the sub-parts to be covered in the security aspect of ENISA has been shown in the security infrastructure diagram below. ENISA Security Infrastructure Diagram ENISA Steps to Deal with Insider Threats Administrative Controls The employees should be communicated about the policies and the list of dos and donts as far as the security mechanisms are concerned so that there may be no instances of mistakes or inadequate due diligence. Also, there must be trainings and administrative checks that must take place in a frequent manner to keep the internal employees aware about the security parameters to be followed (Musthaler, 2016). Physical Controls Physical security is something that is mostly overlooked and is not paid due attentions. However, physical controls must be applied such as display of identity cards, checking of the employee bags and likewise at all the entry and exit points (Cert, 2016). Technical Controls There are a number of technical controls and checks that must be applied and installed to make sure that the insider threats are prevented. Technical and automated identity and access management with the use of multi layer authentication and similar measures should be applied. There should also be maintenance of the technical logs and records so that the activities can be scanned and monitored at a non-stop basis. Risk assessment, network monitoring, network scans and many other technical measures should also be adopted. ENISA Data Breaches as Most Significant Threat There are a number of threats that have been listed in the case study as the top threats that were encountered in the year 2014. Data breaches that took place make up the threat that is most significant since its impact, likelihood and the risk ranking as well (Ko Dorantes, 2016). As per the data that has been recorded and analyzed in the case study, data breaches made up for the major portion of the threats that took place in 2014. Also, there were scenarios wherein the impact was extremely severe in nature. This threat has been judged and evaluated to be the most significant threat since it has the potential to hamper the confidentiality, availability and the privacy of the data. The information types that are associated with ENISA can be private or confidential such as there is a lot of healthcare information that the centre deals with. Any violation of the privacy of this category of data can be fatal for the organization and can result in some serious legal punishments. It is b ecause of this reason that the threat has been evaluated to be the most significant out of all (Amato, 2016). ENISA- Threat Agents and their Impact Cyber Criminals: These are the entities that make use of cyber platforms to introduce the web based attacked or inject the malicious code to the machine of the user. The intent behind these agents is to cause severe damage and also to gain unauthorized access. Online social hackers: Social hacking is the issue that is very commonly seen in the current era and these agents are the primary entities behind the execution of the same. Hacktivists: These are the threat agents that make use of a political motive to give shape to a particular threat or attack. Employees: The employees that are associated with a particular firm also add up to the major number of the threat agents and are involved in giving shape to the insider threats. These employees can be current or the ex-employees of a firm (Casey, Koeberl, Vishik, 2010). Script Kiddies: There is a great interest of technology among the young individuals and in their attempt to play with the technology; they may often result in being the part of a threat as a threat agent. These threat agents have a huge impact on the security architecture as these are the prime entities involved in the execution of a threat. It is therefore necessary to control their impact and the same can be done by improving the security infrastructure. Employees as threat agents can be controlled by implementing the administrative, physical and technical controls as described earlier. The other threat agents can be controlled by making sure that the security loopholes do not exist and there is advanced security mechanism applied across all the entry and exit points. ENISA Issues with Social Hacking Social hacking is a type of security assault that is executed by the social programmers as the operators of the dangers and incorporates the endeavor to change the social conduct of a client through various diverse means and methods. The present period is the time of social media and the nearness on this stage is right around an order for each and every person. The social programmers pick up favorable position through this wonder by performing dumpster making a plunge which the disposed of client profiles and information is gotten to recover imperative data and examples, for example, client name, contact data, email address and in like manner. Pretending is additionally a typical type of the social hacking issue that incorporates the pantomime of a specific client or association on a social stage to pick up data. Social hacking has come up a simple approach to break the web and system security as the nearness of the clients on the stage is enormous and it gets to be less demanding fo r the programmers to recover noteworthy data through various instruments. The effect of these social hacking issues can be moderate to amazingly extreme as these can possibly increase touchy and classified data through the medium. Such unapproved instrument of picking up the data can then be abused by the social programmers (Wood, 2016). ENISA- Common trends in the Threat Probability The table displays the comparison between the threats that occurred in the year 2013 and the threats that took place in the year 2014. The inclination and decline of the threats has also been displayed through the medium of the table. The threats that are seen to be more probable in 2014 and in the upcoming years are as listed below: Malicious Codes Web Based Attacks Injection Attacks Denial of Service Phishing Data Breaches Loss and Theft Information Leakage Identity Theft Cyber Espionage (Nichols, 2016) There are also attacks that have been seen and analyzed as less probable in the current era such as those associated with the botnets, spam, explore kits and scareware. There is a newer form of attacks which has been categorized as the insider attack and the probability that is associated with these threats is very high. It is because of the reason that there are lesser control and prevention measures that have been developed in order to put a check on them. The threat probability can therefore be defined as highly probable for the attacks that are on a rise as listed in the points above along with the insider threats. It would be lesser for the threats that are on a decline. ENISA Required Improvements in the ETL Processes The ENISA Technology Landscape was designed and implemented to make sure that the occurrences of the security threats and incidents could be minimized. However, in spite of so many efforts and measures there were still many threats that were seen with low o very severe impact. It is therefore necessary to bring about certain sets of improvements in the ETL processes which are as listed below (Microsoft, 2016). The design and implementation of the security policies must be done throughout the entities that are involved in ENISA rather than doing the same in a step by step manner. The policies that exist around the employee management and the processes involved with the same need to be improved. As soon as an employee quits an organization, the access and credentials allocated to the same must be dissolved. In case of missing the step, there may be access of information to the employee even after quitting the organization which may be dangerous. Cryptography and encryption techniques are still not very strong in the security infrastructure that is associated with ETL. There must be Advanced Data Encryption Standard (AES) that should be utilized to keep the information secure even if the attacker succeeds in the attempt to get hold of the same. Biometrics identity checks should be installed at all the entry and exit points to improve the identity management and keep the entire system automated to prevent any sort of manual intervention in the same. ENISA List of the Challenging Threats There are many of the top threats that have been listed for ENISA in the case study. The most challenging threats out of all are as listed below (Panetta, 2016). Insider Threats: These are the threats that are executed by the staff internal to the organization and thus are often difficult to predict or prevent in advance. The staff members are always aware of the security policies that are associated with the organization and form measures to curb the same. It therefore becomes challenging to put a check on these attacks. Data Braches: The amount of data that is present with the organizations in the current era is huge. It is because of this reason that the policies that are developed to control and prevent the threats associated with data breaches should be as per the type of information. The task can be troublesome to apply varied degree of policy for different type of data. Web Based Attack: The entire world is now using web for one purpose or the other and it is due to this very reason that the number of attacks is also huge from this medium. It is difficult to control these threats due to the amount and the severity of the same. Social Hacking Threat Agents and Issues: Social networking and the information that can be retrieved from these platforms is also an easy way out for the attackers and challenging for the security teams to put a check on the same. ENISA Current State of IT Security ENISA must not be satisfied at all with its present scenario of IT security. The reasons behind this are many such as the technology and the structure of technology is something that is not at all constant. It is changing with every passing second and therefore it would be necessary for ENISA to keep up with the same. There are also a number of security threats and attacks that are introduced in the agencies and organizations that are monitored by ENISA in spite of a number of countermeasures that have been developed. It is necessary to keep up the effort and come up with stronger parameters and mechanisms so that the attackers do not success in security breaches of any kinds and the number of threats also get reduced by a good margin. The effort that is required towards the support, maintenance and updates regarding the security measures must never be put to rest and it is essential to involve an element of innovation and technical advancement with the same to not allow the attacker s to succeed in their attempts (Aws, 2016). References Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 22 September 2016, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html Aws,. (2016). Overview of Security Processes. Retrieved 22 September 2016, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf Casey, T., Koeberl, P., Vishik, C. (2010). Threat agents. Proceedings Of The Sixth Annual Workshop On Cyber Security And Information Intelligence Research - CSIIRW '10. https://dx.doi.org/10.1145/1852666.1852728 Cert,. (2016). Insider Threat Best Practices. Retrieved 22 September 2016, from https://www.cert.org/insider-threat/best-practices/ Enisa,. (2016). ENISA draws the Cyber Threat Landscape 2014: 15 top cyber threats, cyber threat agents, cyber-attack methods and threat trends for emerging technology areas ENISA. Enisa.europa.eu. Retrieved 22 September 2016, from https://www.enisa.europa.eu/news/enisa-news/enisa-draws-the-cyber-threat-landscape-2014 Ko, M. Dorantes, C. (2016). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Retrieved 22 September 2016, from https://jitm.ubalt.edu/XVII-2/article2.pdf Microsoft,. (2016). Microsoft Core Infrastructure Optimization: IT Security Processes - Best Practices for Business IT. Microsoft.com. Retrieved 22 September 2016, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx Musthaler, L. (2016). 13 best practices for preventing and detecting insider threats. Network World. Retrieved 22 September 2016, from https://www.networkworld.com/article/2280365/lan-wan/13-best-practices-for-preventing-and-detecting-insider-threats.html Nichols, A. (2016). A Perspective on Threats in the Risk Analysis Process. Sans.org. Retrieved 22 September 2016, from https://www.sans.org/reading-room/whitepapers/auditing/perspective-threats-risk-analysis-process-63 Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 22 September 2016, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/ Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 22 September 2016, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security

Saturday, November 30, 2019

The tourism industry in Kenya Essay Example

The tourism industry in Kenya Paper The local people were denied an opportunity to make their contributions towards wildlife conservation and management as they were kept off protected areas. There was initially a lukewarm acceptance of the policy guideline that Kenya had an obligation of protecting the countrys fauna and flora for posterity by the local communities in whose areas the attractions abound. Equally, educational approaches and extension efforts were not very successful as the local communities were not benefitting directly from those resources within their areas.Empirical research however, indicated that direct sharing of benefits accruing from wildlife conservation and tourism were better appreciated by the local communities. These inadequacies which were inherent in the conservation policies of the 1970s thus led to the current concept of sustainable wildlife utilisation whereby economic sense and the utility of the product superseeds other considerations and in the process ensuring that the resource is managed on a rational and sustainable basis.The concept entails optimum resource management, efficiency in productivity as well as equitable sharing of the benefits. The Kenya Government, through its conservation arm, the Kenya Wildlife Service has put in place measures that ensure co-opting the support and participation of land owners in the management of wildlife. This involves sensitization, mobilization as well as education of the stakeholders.The Kenya Wildlife Service has also put in place appropriate measures which are aimed at capacity building by the relevant institutions in order that all the stakeholders become competent wildlife managers with adequate knowledge and skills regarding the contrib ution of wildlife visa-a-vis such alternative land uses as livestock keeping and agriculture. Optimum or sustainable consumptive wildlife utilisation therefore may only be achieved after area specific feasibility studies are carried out to determine its viability and compatibility with non-consumptive uses.Another important consideration is the sensitivity to the disparity in culture, ecology, and topography in the context of changing technology pertaining to game cropping, culling, game ranching, game farming and sale of live animals . The concept also entails accommodation of public interest without necessarily compromising private and community interests. COMMUNITY PARTNERSHIP IN THE STRATEGIC PLANNING FOR SUSTAINABLE TOURISM DEVELOPMENT IN KENYA The rich cultural diversity is an integral part of our tourist attractions since it is one of the main reasons why visitors travel to the outlying rural areas of Kenya.This product is therefore being developed and promoted as this type o f tourism can strengthen a societys culture and create employment at local levels thereby serving as an incentive for young people to stay in rural areas rather than migrate to urban areas in search of employment. It is with the foregoing in mind that made it necessary that sustainable tourism development be based on the ethics of care and respect for the respective communities culture. This approach ensures that the development is both people oriented as well as conservation based.Sustainable tourism in other words, means, using tourism constructively so as to support the conservation of the environment, reinforcing the cultural heritage of indigenous people as well as enabling them to benefit directly from revenue accruing from tourism and related activities. Kenya as a tourist destination has therefore adopted and encouraged sustainable tourism strategies in order to strike a balance between the needs of the industry and those of the local communities.Accordingly it has been foun d necessary to find ways and means of ploughing back the benefits accruing from tourism to the development of the local population. The main consideration here is to improve their living conditions, security, and their access to social services. Hence the important issues being addressed in this context include:- reducing vulnerability of exploitation of local communities by unscrupulous people and How to enhance retention of income accruing from tourism by the local communities so as to plough back into community based development projects.FUNDING OF THE KENYA WILDLIFE SERVICE COMMUNITY BASED CONSERVATION EFFORTS Apart from core financing and moral support from the Central Government; community based conservation effort in Kenya has also benefitted from donor funding and private initiatives. The United States Agency for International Development (USAID). For instance in 1992, contracted with an American (U. S. ) consulting company, namely Development Alternatives, Inc. for the impl ementation of the Kenya Wildlife Serrvices Conservation of Biodiverse Resource Areas Project (COBRA) for a maximum investment by USAID of US$7,000,000.The amount has since been raised to US$8,500,000 and the time frame of the project has also been extended up to December, 1999. The goal of the COBRA project is to promote Socio-economic development through conservation and sustainable management of Kenyas natural resources. The main objective is to increase the flow of socio-economic benefits to local communities living adjacent to Kenyas National Parks and Reserves through the sustainable management of wildlife and other natural resources.This project has assisted in enhancing community awareness in conservation and wildlife management. The Conservation of Biodiverse Resource Areas Project (COBRA) has assisted the Kenya Wildlife Service in institutionalising a community based conservation component namely the Partnership Department, within the Organisation through the provision of s alary support to professional staff, training of lower cadres and procurement of vehicles, computers, and the necessary field equipment.The COBRA project has also assisted in the implementation of pilot community conservation programmes in three focal Districts; namely Laikipia, Samburu and Kajiado since 1993 as well as the coastal areas South of Mombasa. Although the COBRA project has assisted communities in the planning and implementation of community based development projects such as the construction of schools, clinics, water tanks among others, the projects main thrust since 1995 has been focused on the support of enterprises related to eco-tourism, which depend directly on wildlife.ALTERNATIVE FUNDING: PRIVATE ENTREPRENEURSHIP/ PARTNERSHIP APPROACH A CASE STUDY: LEWA DOWNS CONSERVANCY/ IL NGWESI The Lewa Downs Conservancy was formed to manage 55,000 acres of prime wildlife land for the purpose of protecting such endangered species as black Rhino and grevy Zebra, to establish Wildlife as a viable form of land use as well as to encourage the neighbouring land owners maintain wildlife migration routes. The conservancy has emphasized community involvement by the neighbouring land-owners.The projects include:- the development and operation of a health clinic, the establishment of community trust aimed at improving the standards of living of those juxtaposing the conservancy and assisting with the support of two community based wildlife trusts whose prime objectives are to use wildlife as a resource to generate money for people in neighbouring communities. A unique relationship was created between the Lewa Downs Conservancy and the IL NGWESI TOURIST LODGE, an income generating project, with a view to forming an ideal eco-tourism system.The IL Ngwesi Tourist Lodge which is located on Il Ngwesi Group Ranch (in North Eastern Laikipia) was built with Donor funding for the benefit of both visitors to Lewa Downs Conservancy and Borana ranch. The lodge has four ban das of unique architecture which are situated on an ideal site that overlooks the Mukogodo Escarpment and forest to the south and southwest and the picturesque hills of Wamba, Samburu Game Reserve, Mathews range and Sapashe to the North west. Natural materials have been used to construct the Bandas in order to blend with the environment thus making it an attractive eco-lodge.Construction of the lodge started in January 1996 and opened its doors to tourists on 19th December 1996. As of November 1997, it had grossed US$ 42,000 against an investment of US$ 140,000. The initial funding came from the Kenya Wildlife Service; and from Liz Clairborne and Art Ortenbury Foundations of U. S. A. The marketing and promotion of the lodge has been by word of mouth, but nevertheless the lodge has attracted a very enthusiastic clientele of expatriates living in Nairobi who are out to seek quietude and adventure in the in the African bush.To diversify activities, a cultural boma has been opened and i s visited by tourists from the lodge, Borana Ranch and the Lewa conservancy. Proceeds from the lodge are re-invested in community based development projects such as schools, cattle dips, water, bursary schemes and the group ranch members share dividends at the end of each year. The community formed a land management committee that limits the land to be set a side for cattle ranching.The losses incurred as a result of limited land for ranching are offset by revenues generating from the operations of the lodge and annual dividends. The Kenya Wildlife Service sensitizes and mobilizes the community through Participatory Rural Appraisals (PRAs), workshops, study tours and training of committee members on leadership and record keeping, as well as training scouts from the community. A general meeting is held each year to discuss the utilisation of funds realised from the bandas. Nearly all employees of the Il Ngwesi Bandas are members of the community.The Bandas thus have shown that the co mmunity based wildlife conservation projects can raise income and has also demonstrated the utility of the local natural resources. The enterprise has positively changed the attitude of the group ranch members towards wildlife conservation. This is a typical success story of an eco-tourism enterprise that has created direct linkages between conservation of the community land and tourism related wildlife projects by providing a focus for the community to preserve the environment and the rationale to do it.The tripartite co-operation between Lewa Downs conservancy, the community and the Kenya Wildlife Service partnership programme has created a model worth emulating in the development of sustainable tourism and distribution of benefits, especially in communities based in remote areas of Kenya. Il Ngwesi is a model product which is essentially a major departure from the Big Five syndrome that has been a driving force for our Safari visitors. It is important to note from this model the low cost capital out lay as compared to the unique compatibility of the projects and the distribution of the accrued benefits to the local communities.The Eco tourism Society of Kenya endeavours to help promote tourism in Kenya by projecting a positive image and encouraging high standards, green certification, carrying out consumer surveys offering consultancy services, advice and information, public information, public relations, organizing conferences and seminars, publishing appropriate newsletters, brochures and books as well as conducting research. DEVELOPMENT OF TOURISM INDUSTRY WITHIN AFRICA REGIONDestinations in Africa enjoy a privileged position in relation to the major tourist generating markets due mainly to their unique features, history as well as a wide range of products on offer. The strong awareness for conservation of the environment and the demand for exoticism by potential travellers translates into increasing demand by an ever growing number of foreign visitors. Accordingly there is need for destinations in Africa to co-operate more closely in areas of product development, research, manpower development and training as well as exchange of tourism experts and tourism information.It is also necessary to harmonise travel formalities within the region so as to encourage free flow of visitors and maximisation of benefits accruing from tourism interactions within the region. Indeed such close co-operation can be forged and enhanced within the framework of the existing regional economic groupings such as the Common market for Eastern and Southern Africa(Comesa), Preferential Trade Area (PTA), Sadacc, East Africa Co-operation, Indian Ocean rim association for regional co-operation.These economic groupings can play a pivotal role in positioning Africa to be a major force in the envisaged tourism growth. In the development, promotion and marketing of our respective destinations we should always bear in mind the complementary nature of our products wi thin the region. Secondly although by and large the countries within the region are destination countries rather than tourist generating countries, there is a vast market for intra-regional tourism, which has not yet been fully tapped.This observation holds true for example for both the Republic of South Africa and Kenya, which incidentally share a lot in common. However the free flow of visitors from each country has been hampered by among others, travel formalities and failure to capitalise on our complementality. CONCLUSION Most of Africas Eco-system still remain intact and unspoiled thus providing a strong basis for a sustainable tourism development. All that is required proper planning and management of the available resources. It should be born in mind that sustainable tourism cannot thrive if we do not take care of our fragile environment.In this context, therefore, we should always remember the cardinal point that we all have a duty to practice responsible tourism so that at the end of the day we shall be able to conserve our fragile environment and biodiversity for the benefit of mankind. To this end there is therefore, an urgent need to put the necessary legislations and codes of conduct in place so as to ensure balanced development of tourism in African tourist destinations. Exchange of information and experience among African National would also be vital in achieving the requisite results for the development of sustainable tourism in conservation of the environment. We will write a custom essay sample on The tourism industry in Kenya specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The tourism industry in Kenya specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The tourism industry in Kenya specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Monday, November 25, 2019

Understanding Passive Vocabulary

Understanding Passive Vocabulary A passive vocabulary is made up of the words that an individual recognizes but rarely uses when speaking and writing. Also known as recognition vocabulary. Contrast with  active vocabulary.   According to John Reynolds and Patricia Acres, Your passive vocabulary is  likely to contain more words than the active one. One way to improve the range of the vocabulary in your own writing is to try to transfer words from your passive to the active vocabulary (Cambridge Checkpoint English Revision Guide, 2013). Examples and Observations A passive vocabulary . . . includes the words stored in verbal memory that people partially understand, but not well enough for active use. These are words that people meet less often and they may be low frequency words in the language as a whole. In other words, activating them takes longer and it demands greater stimulus than most textual contexts provide. Words stop being passive if people are regularly contracting relations that activate them, since this lowers the amount of stimulus needed to put them to use. A facility in using the words develops. Again constraints of another kind in the extralinguistic context may also restrict the active use of some words. This can happen even when words are available for active use in principle, such as cultural taboo words that most people know but rarely use outside certain settings.(David Corson, Using English Words. Kluwer Academic Publishers, 1995)Media saturation may . . . provide what Dennis Baron called a passive lingua franca. We al l understand what we hear on the radio or see on TV, giving us a passive vocabulary, but that doesnt mean that we use that vocabulary actively in writing or speaking.(Robert MacNeil et al., Do You Speak American? Random House, 2005) How to Estimate the Size of Your VocabularyTake your dictionary and peruse 1 per cent of its pages, i.e. 20 pages of a 2,000-page dictionary, or every hundreth page (you need to take a range of letters of the alphabet). Note down how many words: (a) you are confident that you would regularly use; (b) you would recognize and understand if you read or heard them. Be brutally honest with yourself! Then multiply your totals by 100, to give a first approximation of your likely active and passive vocabularies.(Howard Jackson, Grammar and Vocabulary: A Resource Book for Students. Routledge, 2002)A Passive-Active Continuum[A]  commonly drawn  distinction is between active vocabulary, that which can be produced at will, and passive vocabulary, that which can be recognized.  However, as discussed in Teichroew  (1982), the picture is really more complicated. Lexical knowledge cannot be captured by means of a simple dichotomy. Teichroew proposed that vocabulary knowledge can best be repr esented as a continuum with the initial stage being recognition and the final being production. In her view, production should not be viewed in a monolithic fashion, for productive knowledge includes producing both a range of meanings as well as appropriate collocations (i.e., what words go together). For example, in our discussion of the word break  with regard to the work of Kellerman . . ., we noted the many meanings of that word. Initially, learners may know the meaning of break as in break a leg or break a pencil, and only with time do they learn the full range of meanings and such collocations as His voice broke at age 13.(Susan M. Gass and Larry Selinker,  Second Language Acquisition: An Introductory Course, 2nd ed. Lawrence Erlbaum, 2001)

Friday, November 22, 2019

A Tragic Hero Things Fall Apart English Literature Essay

A Tragic Hero Things Fall Apart English Literature Essay Things Fall Apart is an intriguing story of how an Indian tribe is cultivated and one man’s pride brings him down. Okonkwo is flawed but has a desire to do good for his clan. As the protagonist the clan’s conflict is sought out by Okonkwo and his excessive pride. Building his compound from nothing, Okonkwo demands authority and power amongst his fellow clansmen. By the end of the story Okonkwo is unwilling to compromise due to his pride and is brought down by it even though he has a good clan stature and power. Okonkwo is a tragic hero and fulfils all the qualifications to be considered one. There are four criteria of a tragic hero, which shape the character’s fate. The character must be flawed but have the potential or want to do good, and have a lot of pride. Conflict is attempted to be resolved by the hero because they are often the protagonist. A protagonist is a leading character that is used to influence the direction of the plot. The tragic hero has oppor tunity, wealth, or power. In the end the tragic hero’s quality of excessive pride will bring him down and the opposite of what the reader thinks will happen does indeed occur. Okonkwo is the son of Unoka, who was a very lazy and worthless man who held no tribe titles and did not look after his family. Many people knew Unoka as this and his name was soiled. He borrowed lots of money from friends and deceived them by not so much as attempting to repay them. Having been born at this disadvantage Okonkwo had to work extra hard to have a normal lifestyle or even to rise above that as a leader in the Umuofia clan. â€Å"Okonkwo did not have the start in life which many young men usually had. He did not inherit a barn from his father. There was no barn to inherit†(Achebe, 19). This quote exploits Okonkwo’s father as a failure and defines Okonkwo as a tragic hero not because of his low birth status but because of the internal hatred it creates in him. He becomes cold he arted to anything weak or lazy and can not easily be pleased with anything. Later his son Nwoye leaves him because of his harsh treatment, even though Okonkwo had good intentions. Nwoye attended the Christian church and was brutally beaten when asked where he had been. A neighboring tribe committed a crime against the Umuofia clan and Okonkwo was sent as a messenger to lay out options. â€Å"And such was the deep fear that their enemies had for Umuofia that they treated Okonkwo like a king and brought him a virgin who was given to Udo as wife, and the lad Ikemefuna† (Achebe, 59). Okonkwo is very strong and his chi agrees with him making him more powerful. He is aggressive and respected due to his pride and confidence that he carries about himself. This leads him to be uncompromising and violent, but he uses these qualities for what he thinks is good.

Wednesday, November 20, 2019

The American Experience from 1865 to 1945 Essay

The American Experience from 1865 to 1945 - Essay Example The analysis looks at the Spanish-American war which took place in 1898. This war is said to have been started by Cuba following its urge for independence. The key figures include President Woodrow Wilson and Charles Evans (who was the secretary of state). An event like the Swedish emigration to North America between 1840 and 1920 is well captured by the author. The real cause for this emigration was poverty and Swedish were trying to run away from it. The highest number migrated in 1869 and1887. He approximates the number of Swedish to be about half a million, most of who settled in Canada, Australia and Brazil. They left Sweden by boat from Gothenburg and traveled to Liverpool from where they were ferried to New York and Boston by the emigrant ships. One of the authors Vilhelm Moberg (1898-1973) who even wrote a book titled the emigrants. It is also features Buchanan's (1856) whose art compromise skills led him to be the only president in America to be from Pennsylvanian. He ruled for four years and declined to take another term. He was succeeded by Abraham Lincoln. It was the informal agreements between Buchanan himself and South Carolina that kept was on hold. All these writings by this author acts as an eye opener to the reader giving him/her a chance to clearly examine rationalization and the inner thoughts as portrayed by the author. This can help in documenting the America's history and the changing spheres that can perpetually change America's history and its connection with the today's world1. This paper incorporates analysis from the book titled The Colonial Period of American History that was authored by Andrews and published in 1930. Materials from this book are meant to appear as confirmation to the author's information so as not to come up with conflicting history regarding the America's experience. The book concentrates more on the events that took place between 1865 and 1918, thus covering up to the first world war.America's Experience World War 11 For many years the United States has been largely involved in the world war. During the year 1865 America was involved in the civil war with its principal problems being: - Preservations of Monroe Doctrine integrity - The doctrine were a treaty that pledged signatories to a joint control of any future, unfortified isthmian canal dominion by one of the involved parties. Preventing the southern independence recognition by France and Britain. Holding those powers to proper

Tuesday, November 19, 2019

Rule Developing Experimentation and Its Use in Marketing Research Paper

Rule Developing Experimentation and Its Use in Marketing - Research Paper Example   It means with a very little effort a huge target can be achieved. There need be motivation and interest to adhere to it. RDE helps in yielding high dividends. RDE can be implemented for not only consumer good companies but also B2B companies. RDE is nothing new, but Alex Gofman and Howard R. Moskowitz, have exhibited the essence of it very nicely in their book. Importance is given to the development of items that are not yet well known in the market, but that will be highly acceptable. RDE is a solution-oriented learning experience. The customers help the manufacturer to design and create a new product, which has come to the market after it is produced through rigorous research and development programme. â€Å"It is systemized solution-oriented business process experimentation that designs, tests, modifies alternate ideas, packages, products or services in a disciplined way using the experimental design so that the developer and marketer discover what appeals to the customer, ev en if the customer articulate the need, much less the solution.†(Alex Gofman & Howard Moskowitz, 2007) At the outset, it was made use of for product optimization and then message optimization for advertising, promotions etc. Applications of RDE are there in any field that involves human choices and decisions, for example, social science, public policies, the stock market, crisis communication management etc. 1) Identify the free offer that accompanies the main product. For example, take the case of credit card. The offer may be with respect to Annual Percentage Rate (APR). In the case of others, there may be rewards, monetary benefits or discounts. The structure of RDE grants higher success than any other method. It is accepted that the seven steps are given above clearly make the consumer understand the problem and arrive at the proper solution.

Saturday, November 16, 2019

An analysis of the influence of technology on contemporary interior architecture Essay Example for Free

An analysis of the influence of technology on contemporary interior architecture Essay The analysis of the articles is based on the influence of technology on interior architecture education and of employer’s expectations in the interior design industry. This also addresses the issues faced by interior designers in today’s world and how technology is hindering/fostering their creativity. Talking about the article on â€Å"Technology Changing the Face of the Modern Fit out†, it addresses a strong point of how the interior design industry was never considered as a crucial part of the industry and was dealt with a stereotype attitude that interior designers dealt only withthe part of â€Å"decorating† the space until technology gained importance. Technology has now given a 180-degree turn to the industry because of which the industry has finally started gaining the deserved recognition. The underlying point in the article â€Å" is technology hindering or fostering the creativity in interior design†, although is on similar lines like the above mentioned article about the positive aspects of technology, it also talks about the pitfall side of technology on the industry. Their argument is supported with an example cited of a professor from a state university of how although he accepts that the technology has given the students, the most innovative platform to communicate their design ideas, somewhere down the lane, the students who are the prospective interior designers are lacking the basic creative skills and hand drafting techniques. â€Å"Interior Designers’ Perceptions of the Influence †¨of Technology on Workplace Performance† article gives us a different perspective of the influence of technology and how it caters to the interior designers. The statement is supported by examples cited by employees from the industry who have been interviewed of how 2D and 3D software have enabled the designers to get their work done in reduced time in comparison to how it was in the past. It also talks about what the expectations of the employers from new hires are, which includes being efficient in 2D and 3D software which will enable them to be proficient in expressing their design ideas. The other side of the coin is that it is hindering the employers in certain ways. This point is well supported by examples they cite of how in case if the computer crashes the students are unable to come up with a hand made drawing ready for a meeting. The over dependence on the computer has led to this state where the new graduates are finding it tough to inculcate sketching and hand drafting although their competent computer skills enable them to complete a design project in no time. The articles that we have looked at firmly state that the influence of technology has its pros and cons. The use of technology has catered to designers in various ways in terms of the time factor, design output etc. But the basic thing we have to understand is every opportunity has both sides. So technology is definitely fostering the designers but having said that it is better that we don’t become over dependent on it that it hinders our creative and innovative skills of designing.

Thursday, November 14, 2019

Welcome, You’ve Got a Brave New World :: Brave New World

Welcome, You’ve Got a Brave New World   Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The task of predicting the future is difficult at best, yet Huxley’s predictions of the future have proven to be eerily accurate in several areas. Many of Huxley’s predictions are being realized today, have already been realized or will be realized in a few short years. These specific predictions, which are closely related to today are our sexual practices, an obsession with youth and beauty, the minimal role of parents and the practice of religion.  Ã‚  Ã‚   In Aldous Huxley’s Brave New World people treat sex as a form of entertainment rather than an expression of love between a couple.   Most forms of entertainment in Brave New World somehow relate to sex.   For example the feelies are pornographic movies with a more advanced plot line and the tremendous bonus of experiencing the same things as the actors on the screen.   The government encourages sex and promiscuity among its citizens, if a person is not promiscuous they are seen as outcasts. Sex in Brave New World is not a private matter and is openly practiced.   To ensure that sex’s purpose is for entertainment the government makes only thirty percent of the female population fertile. This ensures that the population will not view sex as a form of reproduction because the majority are not capable of sexual reproduction. The more partners a person has the more popular the person is.   A person is discouraged from having a long-term relationship with one person.  Ã‚   If they have a long term relationship their loyalty to the government and Ford is in question, as evidenced in the following excerpt: â€Å"And you know how strongly the DHC objects to anything intense or long and drawn out.   Four months of Henry Foster without having another man - why, he’d be furious if he knew†(page #) One night-stands are common and expected. Sex is discussed openly in Brave New World. It is not seen as dirty, shameful or something to be discussed behind closed doors.   From a young age children learn about sex and contraceptives.   Children are forced to use contraceptives every time they have sex. They are encouraged to participate in sex play from a young age.   Those who do not wish to participate are taken to a psychologist for an evaluation. Religion in Brave New World is also linked to sex.

Monday, November 11, 2019

Ebay, A Company Analysis Essay

In August 2 ,1990, after Saddam Hussein’s military forces invaded and occupied Kuwait , there was large Iraqi military build up close the Saudi Arabia’s border. President Sr Bush perceived that Iraqi’s aggression and military build up was a serious threat not only to the security and independence of Saudi Arabia but also vital to US national interest in the Persian Gulf region. The main intention of Saddam Hussein was to control half of the world’s supply of Petroleum from Gulf region .Sr Bush initiated â€Å" Operation Desert Shield â€Å" and dispatched US military to Saudi Arabia to defend that country against a possible Iraqi attack. President Bush took bold decision and dispatched US troops to Saudi Arabia even without obtaining prior approval from US Congress. Later when reporting to Congress and Nation, Bush informed that he has acted in deference to Saudi Arabia’s specific request for American assistance in bolstering Saudi defenses and deterring possible Iraqi attack. To free the Kuwait from Iraqi occupation , President Bush ( Sr) rallied the support of United Nations by getting the U.N Security Council approval on November ,29,1990 to pass U.N. Resolution No 678 which authorized U.N members to use â€Å" all necessary means† to coerce Iraqi invaders from Kuwait , and to take military action if Iraq failed to withdraw from Kuwait by January 15,1991. OPERATION DESERT STORM: On January ,12,1991 , President Bush succeeded in getting Congress approval for the President use of â€Å" all necessary means â€Å" to carry out the UN Resolution 678. Now the President Bush had all the authority and support to persuade Iraq to withdraw from Kuwait. On January16, after the Iraqi Government failed to withdraw its military forces from Kuwait by the deadline ,President ordered â€Å" Operation Desert Storm â€Å" and Iraqi forces were defeated and Kuwait was liberated. After Iraqi Government agreed to observe and comply with all U.N.Resolution , a ceasefire was ordered .Operation Desert Storm helped to destroy greater part of Iraq’s military machinery and Iraq’s claim to Kuwait. During June 1993, President Clinton ordered U.S. air strikes at Iraqi intelligence service headquarters at Iraq which had instigated and fostered a conspiracy to assassinate former U.S.President George Bush during his to Kuwait during April 14-16,1993. After the Persian Gulf War in 1991, the USA continued to engage economic as well as military conflict with Iraq. The main aim of the USA was to put an end to Saddam Hussein’s military regime in Iraq and to prevent Iraq becoming threat to international peace and U.S National interest in Middle East and to deny Saddam Hussein the opportunity to utilize Iraqi military to extinguish his political opponents among the Kurdish inhabitants of northern Iraq and among the Shi’ite Muslim marsh Arabs of Southern Iraq. The other main aim of US is to compel the Iraqi Government to honor its International obligations, including those relating to (1) The ban on the further development, productions and stockpiling of nuclear, biological, chemical and other weapons of mass destructions. (2) To call for the destruction of existing stockpiles of weapons of mass destruction. (3)Recognition of and respect for the sovereignty, territorial integrity, and political independence of Kuwait, (4) Compliance with the terms of the ceasefire agreement ending the Persian Gulf War. The main objective of the continuing military presence and activity of the USA and its allies in the Middle East –the Southwest Asia / Northeast Africa / Persian Gulf region is to prevent the Iraq regime and military forces from jeopardizing international peace and US National interest in the region. The other main aim was to prevent Iraq from threatening the security and independence of neighboring countries such as Kuwait and Saudi Arabia and from endangering US access and that of the other industrialized nations to the oil of the Middle East, the region which has over 70% of the Globe’s known petroleum reserves. During early October , 1994, US decided to drawdown its troops in the middle east in a phased manner , Saddam Hussein ordered the movement of his troops towards southward and headed in the direction of Kuwait. As a result, there was a significant Iraqi military build up along the Kuwait border. Saddam Hussein action clearly demonstrated his capacity to threaten neighboring countries and imperil the industrialized West’s access to Middle Eastern petroleum. Saddam Hussein action also revealed about lack of trustworthiness and his determination to violate the terms of the ceasefire agreement ending the Persian Gulf War. Again, UN Security Council had passed a resolution on October, 15, 1994 condemning the Iraq Government for the deployment of troops along the Kuwait Border. Bill Clinton, who was then the President of USA, deployed US Reinforcements on the Kuwait border to Iraq to counter the Hussein’s troops. Because of the strong and determined US response, Saddam Hussein backed down and withdrew all the troops from Kuwait border. Because of the defused environment, US also ordered the withdrawal of its troops from Kuwait. OPERATION DESERT STRIKE. In early 1996, Saddam Hussein began to initiate military actions which demonstrated that his predisposition toward making mischief in the Middle East had not really abated. The Iraqi despot dispatched his military forces into the Kurdish region of Iraq, seeking to regain political control over Iraqi territory .Saddam Hussein military invaded the region of north of the 36th parallel ,captured Irbil and pursued and attacked Kurdish refugees . Bill Clinton responded to Iraqi aggression by initiating Operation Desert Strike. However Operation Desert Strike was not as vigorous as it might have been because US response was to take action affecting Iraqi military positions and matters far from the battlefield in Northern Iraq. In short , US abandoned the Kurds and failed to live up to the obligation to protect and defend against Iraqi aggression over the region north of the 36th parallel , where thousands of members of groups opposed to Hussein’s rein were operating and functioning under the guidance of the US Central Intelligence Agency. The reason for the not taking stringent action during Iraq’s aggression against Kurds in 1996 by Clinton was mainly due to forth coming Federal elections which due during November, 1996. US ELECTION -1996 President Clinton however managed to keep the Iraq issue out of the 1996 elections to enhance his reelection chances. However, Saddam took it as US weakness and started to continue his endeavor to circumvent, erode the strength of USA. Saddam soon began a series of challenges to the system of UN Sanctions and inspection imposed on his regime to prevent if from developing, producing and stock piling weapons of mass destruction .Saddam’s continuous resistance to the UN WMD Program and its implementation came to a peak in January, 1998 when he expelled the US members of UNSCOM, the UN Weapons Inspection team. OPERATION DESERT FOX: From 1997 onwards, Saddam tried to obstruct the UN weapons inspection program in Iraq. He frequently protracted military confrontation with the USA and its allies. At one stage, he expelled the most of the US members of the weapons inspection team and because of this action, UN Security Council threatened to reinstate economic sanction against Iraq and Saddam never took serious of the warning issued by UN Security Council. In protest, the United Nations recalled the other inspection team members. The non cooperation from Saddam resulted in American –British military build –up in the Persian Gulf. This had effect of attitude of Saddam and it induced him to back down short while and he readmitted the weapons inspectors, including those from the USA. In November, 1997, Iraqi regime gave notice that it would not permit the U.N inspectors to enter and inspect sites at designated â€Å"palaces and designated residences â€Å" ECONOMIC SANCTION: In January, 1998, Saddam Hussein again expelled the U.S. members of the U.N weapons inspection team. The UN again protested by withdrawing the other inspectors and due to this a standoff continued and tensions were heightened. The UN Security Council imposed economic sanctions on Iraq. Again, a US military build up in the Persian Gulf commenced. In February, 1998, U.N Secretary General –General Kofi Annan negotiated an agreement whereby the Iraqi regime allowed readmission of U.N inspectors and resumption of the weapons inspection program. In return for this concession, the Iraqi government was given assurance that the Security Council would consider lifting the economic sanctions. The UN Weapons inspectors team did not receive full support from Iraqi regime during this period as Iraq claimed that the Security Council had shown no signs of taking steps for the removal of sanctions imposed .On October ,1998 Saddam again terminated the work of the UN Inspection team at Iraq. This has resulted again in building up of military presence by American –British in the Persian Gulf. On November 5, 1998, United Nations recalled UN Inspection team assigned to Iraq. Again Saddam yielded and allowed the UN inspection team in Iraq. But this was short lived .Again on December .1998, the UN team once again left Iraq.UN report dated 15th December .1998 charged the Iraqi Government for non cooperation and denial of access to records and inspection sites and through clandestine movement of equipment and records from site to site. OPERATION DESERT FOX : Based on the UN report. President Clinton decided to take military action against Iraq. The operation was named as Operation Desert Fox, a massive campaign of air strikes against key military and security targets in Iraq .Several targets were attacked in this operation including head quarters of Saddam Baath Party, barracks of the sad dam’s elite security guards, republic guard barracks and his daughter’s palace at Tikirt. The main goals of the Operation Desert Fox were (1) to degrade Saddam ability to make and use of weapons of mass destruction .(2) to diminish Saddam ability to wage war against his neighbors and (3) to demonstrate the consequences of flouting International obligations. President Clinton terminated Operation Desert Fox after three days as it had inflicted significant damage on Saddam WMD programs and his military and security infrastructure. and Iraq’s missile programme had been set back by at least 12 months and its military might had been substantially damaged. President Clinton ordered at the end of December ,1998 to draw down the U.S. forces in the Persian Gulf .But it is to be noted Operation Desert Box though successful but could not compel the Iraqi regime to accept and cooperate with the U.N.Weapons inspection program. GAME OF CHICKEN: This encouraged Saddam Hussein to play the dangerous â€Å" game of Chicken â€Å" with USA and its allies. Saddam Hussein continued to play hide and seek game with U.S.A , its Allies and with UN by defying the west and jeopardize its interests in the Middle East. He yielded temporarily when threatened with or subjected to western military attack. He reneged on the International commitments which he made in order to avoid or end a western military assault against his political regime and military / security forces. After the end of the operation Desert Fox , the U.S.A and its allies have engaged in a low level war with Iraq. The main aim of US to give protection to the Kurdish and Shi’ite minorities in Iraq from suppression and genocide from Saddam. The other aim is to replace Saddam region by another leader or group of leaders favorably disposed to US. In waging war with the Iraq , President Clinton has been acting in compliance with the reporting requirements of section 4 of the War powers Act of U.S.A. The President has been periodically reporting to Congress on the Status of U.S hostilities with the Iraqi regime and on other matters relating to the hostilities. Bill Clinton pursued a policy of belligerence towards Iraq , imposing crippling economic sanctions , undertaking the most sustained bombing campaign after Vietnam war and making â€Å" regime change† in Iraq as official US Policy. US POLICIES UNDER BUSH REGIME: A secret blue print for US global domination reveals that President Bush and his cabinet were planning a premeditated attach on Iraq to secure â€Å" regime change â€Å" even before he took power in January 2001. A plan called â€Å"Global Pax Americana â€Å"was drawn mainly to take control of the Persian Gulf region sans Saddam Hussein region while civil government was reestablished. It is to be noted that war was initiated on the main ground that Iraq was non cooperative in allowing inspection of weapons of mass destruction. However, in the aftermath of war, it became apparent that Saddam had no such weapons programme. Many Americans including prominent members of the Congress, claim Bush and his administration lied or misled the country based on doctored intelligence reports. The Bush Administration also linked the invasion of Iraq to the war on Terrorism, claiming that Hussein was giving safe heaven to and supporting terrorist groups. There were also accusation that Saddam was indirectly supported the September 11, 2001 attacks on America. It is to be noted that although the Bush administration strongly suggested ties at some level between Hussein and Al-Qaeda, it did not accuse Saddam of complicity in the specific events of 9/11 events. POST INVASION OF IRAQ: Military occupation was established and run by the Coalition Provisional Authority (CPA) Which later appointed and granted limited powers to an Iraq interim Governing Council. Coalition and allied Iraqi forces have been fighting a stronger –than –expected militant Iraqi insurgency and hence ,the reconstruction of Iraq has been slow . In mid -2004, the end of the occupation was brought about and a new sovereign and independent Interim Government of Iraq assumed the full responsibility and authority of the State. The CPA and the Governing Council were disbanded on June 28, 2004 and a new transitional constitution came into effect. Sovereignty was transferred to a Governing Council Iraqi interim Government led by Iyad Allawi as Iraq’s first post-Saddam Prime Minister. But this Government can make laws only with the approval of CPA. The Iraqi interim Government was replaced as a result of elections which took place in January, 2005. A period of negotiations by the elected Iraqi National Assembly was followed which culminated on April 6,2005 with the selection of the leaders who currently head Iraq among them Prime Minister Ibrahim al –Jaafari and President Jalal Talabani. The multinational forces still exercise considerable power in the Country and with the New Iraqi Army, conduct military operations against the Iraqi insurgency .The role of Iraqi government forces in providing security is increasing. CONTINUING INSURGENCY: Even though, the Ba’ath Party organization was disintegrated, elements of the Secret police and Saddam army began forming guerilla units and focused attacks around Mosul, Tikrit, Fallujah .These elements who called themselves freedom fighters began using ambush tactics, suicide bombings and improvised explosive devices, targeting coalition forces and check points. Suicide bombers believed to be mainly disheartened Iraqi Sunnis, Syrians and Saudis tore through Iraq. Their targets were often Shia gatherings or civilian concentrations mainly of Shias, OPERATION METADOR: During early May, 2005, the U.S launched Operation Matador, an .assault in the ungoverned region of western Iraq. Its goal was the closing of suspected insurgent supply routes of volunteers and material from Syria .The US allies succeeded in recapturing the whole area and even fighting the insurgents all the way to the Syrian border , where they were blocked . PARTICIPATING NATIONS IN THE MULTI NATIONAL ARMY IN IRAQ: As of September, 2005, there were 26 countries with military forces stationed in Iraq. These were Albania, Armenia, Australia , Azerbaijan, Bosnia and Herzegovina, Bulgaria ,Czech Republic , Denmark ,El Salvador , Estonia , Georgia , Italy, Japan, Kazakhstan, South Korea, Latvia, Lithuania , Macedonia ,Mongolia , Netherlands ,Norway, Poland ,Romania, Slovakia, South Korea, United Kingdom , United States, Fiji and Ukraine. Poland, the Netherlands, Norway, Bulgaria and Ukraine have announced plans to withdraw. CONCLUSION: The Kerry campaign in Presidential election against George Bush charged that US is acting as neo-colonial power and claimed that US bungled the war due to incompetence , mismanagement and arrogance .Designed to advance US commercial and corporate interest abroad , military force was often used to break open markets that resisted diplomatic and economic pressures. â€Å" The Carter Doctrine† as it become known , made it clear the United States would use military power in the Gulf to secure and maintain the oil resources needed to turn of the wheels of the Empire. This policy explains the US sale of heavy weaponry to Saddam Hussein in the early 1980’s when war broke out between Iraq and Iran. US took many efforts to normalize relationship with Iraq then .Despite Saddam’s use of Chemical against Iran and Kurdish population in northern Iraq, the United States continued to back Iraq .Emboldened by these signs of support for his regime, Saddam invaded Kuwait in 1990.The first Bush administration however quickly came to view the invasion as a threat to US supremacy in the region and launched the first Gulf War. Sanctions were imposed by the UN at the behest of US in order to secure US control over Iraq’s Oil. The United States did not care about the â€Å"fact† that the sanctions have apparently killed hundreds of thousands of Iraqi’s by withholding necessary food supplies and medical supplies. Madeline Albright ,the US ambassador to UN ,when asked that more than 500,000 children had died because of a lack of adequate nutrition and medical care, replied â€Å" I think this is a very hard choice ,but the price-we think-the price. The American’s gross ignorance of conditions in Iraq was shown by their miscalculation in relation to the Shiites in the South. They thought that the latter would rise up against Saddam Hussein and welcome the invaders with open arms. But none of this happened Napoleon knew a lot about bayonets and found many uses for them, but there is one thing they can not be used for , as he pointed out: You can not sit on bayonets. The Americans and British do not have a real base of support in Iraq. A long term guerrilla war waged with low-tech methods like sniping, ambushes and suicide bombings can have a devastating effect over a long period if it has the backing of the people –and it will . Though the US is a super power, it is to be remembered that it was defeated by barefoot army in Vietnam. The Great Britain was once the land of rising sun has to vacate their colonies in all most all countries due to upsurge of the subjects of that nation. After Iraq , US is now concentrating how to destabilize Syria on the pretext of extending military aid to Baghdad and harboring escaping Ba’athist leaders ,but also of possessing weapons of mass destructions. Again US is also try to destabilize the Iran by accusing that it is under the way to add nuclear arsenals which is going to be great threat to world peace. The number of causalities in the Iraq’s war is alarming .US alone lost 2105 innocent Americans (soldiers) and Allies lost 201 and innocent Iraqis killed was around 30,420 . Who is going to be father or brother or care taker of the innocent family which lost their life in the war . To prove its mightiness, innocent lives have been lost and do the US or its allies are going to answer the cries and hues of foresaid the families who have lost their dear and near for the nation. Let alone history has to tell us what is Iraq’s fate and political independence in the near future. BIBLIOGRAPHY: 1.Public Opinion and American Foreign Policy- by Ole R.Holsti. 2.The Dynamics of Coercion – American Foreign Policy and the limits of the Military Might-by Daniel Byman , Matthew C.Waxman. 3.The Iraq war and its consequences :Thoughts of Nobel Peace Laureates and Eminent scholars.- edited by Irwin Abrams, Wang -Gung –Wu. 4. Wars on Terrorism and Iraq :by Mary Robinson. 5.Today ,Iraq – Tomorrow –The World ? –by Gill Hinshaw

Saturday, November 9, 2019

3. the Future of Religion and Politics in the Developing World

3. The Future of Religion and Politics in the Developing World Religion and Politics are an influential aspect of daily life and continue to affect people today in what they believe in religion and politics. Currently in the news, there is a war regarding religion and beliefs that were made into a movie and portrayed as untrue beliefs from that culture. The politics behind what is brought forth in a story written and then put on a screen has created a religious and political war. Although what was written and produced was viewed as freedom of speech, it has ultimately outraged the believers regarding their religious beliefs.Religion is a belief in someone or something that allows a person to have prayer and beliefs in their culture for the better of their life as they see it. Religion is very much alive as part of politics (Handleman, 2011, p 58). Politics are what affects not only individuals but also countries that should abide by the laws of what are established in order to obtain peace, structure, and control with the people. When religion and politics are put together, they are essentially within the same, beliefs, structure, searching for peace, and allowing a greater being or source to be in control. ReligionsThere are many different types of religions and cultures all over the world. There are many different types of Gods that people have faith in and perform prayer to daily. For centuries, certain religions have stayed within the same beliefs; there are new religions throughout the world that have also not thrived, as well. The church, the laws of the church, and Christianity will continue to be alive and growth on earth every day. People should be allowed to believe in whatever God they choose, but in different countries and with their cultures, people can be brought up to believe only in what they are taught.Catholic Religious Beliefs. There are many religions of the world, and one of the leading religions is Catholicism. The only significant religio n, Catholicism, have penetrated extensively into both industrialized democracies and the developing world, is preeminent in Philippines and Latin America and also is the faith of significant portions of the population in a number of sub-Saharan African countries (Handelman, 2011, p. 60). In Africa, there are more Catholic believers and over half of the populations of all adults are baptized.Inexorably, pastoral and intellectual energy in the church will follow population, and this means that African leaders are destined to play an increasingly prominent role in the global church (Allen, 2006). The world is developing in many areas and having the Catholic belief is becoming stronger than ever. Islamic Religious Beliefs. The Islamic culture is considered not a sacred religion, but one that is of harm and malice. If one would study the Islamic religion, it is not a new religion but one from a path of monotheism.The monotheism too was developed into Judaism and Christianity. The ignoran ce about Islam and perceived targeting of Muslims in general by the U. S. -led â€Å"war on terrorism† have exacerbated a dangerous and growing divide between Muslims and non-Muslims in the contemporary world (Fisher, 2011, p. 381). The Islamic religious beliefs are straightforward to have acceptance, commitment, peace, and purity. They believe in allowing their God for guidance. Politics The balance of politics and what the government has decided for the future is becoming increasingly complex.Politics have become more fundamental in the Third World countries in order to help with the growth and expansion of countries. In order for politics to produce appreciable works, democracy would need to function correctly by the people. Religious beliefs may change over time, but politics are most likely to stay the same. The relationship between politics and religion are to be tolerant and accept changes that occur over time. Politics and Independence. The many cultures in Third Worl d countries seek independence and continue to seek justice from their government and leaders.A threat to the economic well-being is the vast income inequality within developed nations, within many developing nations, and between the developed and developing worlds (Rubin, 2000, p. 421). Each country seeks independence in trade for economic and social changes in order to obtain financial growth. Third World Politics. The principles in other nations seem quite different than what is in the United States. In Third World countries, young children are able to work at an early age in support to be providers in the family.In the United States, there are laws where children cannot work up until a certain age and need to be in a school system. Equal justice to help children with education and development in order to enhance social mobility throughout Third World countries would be beneficial to all. There are many challenges in Third World countries to obtain proper health benefits, and with out assistance, it will often leads to deaths. In conclusion, the world of religion and politics are both needed and desired by many for order and to have something or someone that is of a higher being to respect.Religion and politics will forever be linked throughout the world. Many cultures will continue to either stay within their beliefs of religion or allow changes outside ones control. Politics will continue to be the focus on what the worldviews as structure for each country to abide by their laws set forth by the governments. Although both religion and politics can evolve in war and corruption, there will always be a higher being to seek answers and follow until the end of time.War has evolved from words that are harsh and untrue, but prayer has allowed answers to many questions in which have resolved with effective change. References Allen, John (2006, March 10). African and Catholicism. National Catholic Reporter, (19), 11, Retrieved from http://elibrary. bighchalk. com Fi sher, M. P. (2011). Living Religions (8th ed. ). (2011 Custom Edition) Upper Saddle River, NJ: Pearson Handelman, H. (2011). The Challenge of Third World Development (6th ed. ). (2011 Custom Edition) Upper Saddle River, NJ: Pearson Rubin, E. Robert. â€Å"The global economy. † Vital Speeches of the Day. 01 May. 2000: 421

Thursday, November 7, 2019

Beyond The Chocolate War essays

Beyond The Chocolate War essays Beyond The Chocolate War, a novel written by Robert Cormier is the compelling sequel to The Chocolate War. Robert Cormier is a successful writer who pictures the typical lives of everyday people with extraordinary talent. He is also the author of After The First Death the set novel for year 10 this year. As the names suggest, these books revolve around the same classification: conflict however these are not your common books about pure physical war and battle but it adresses the other side of conflict - the thoughts racing though the characters minds. He very carefully nurtures the plot and story through not only the actions but the thinking of people to build up to a complex climax. The genre of Beyond The Chocolate War is a psychological thriller that deals with the darker side side of human nature. The novel considers real life situations exaggerated for more effect is a very psychological manner. The dilemmas and predicaments experienced by the many characters in the story are expressed via the battle with their own mind, their decisions and the outcomes of their decisions afterwards. There are many themes in Beyond The Chocolate War that all contribute to the composition on the story. Relationships, sexual desires, fighting, revenge, murder, rape, assault, anxiety/distress/trouble (very much so), rebellion, suicide, school values, secret societies and authority. The were numerous examples of relationships and sexual desires with the main character (Obie) having a girlfriend and other people lusting after her. Fighting was not used much - like brain over brawn although there were some fights involving physical violence and injury between students. The strong jocks and students who had built stature's were made to be in a lesser class, easily manipulated and "dopey" despite their physique. The plot of the story was also largely based on revenge with many of the characters devising devious plans as vengeance against one of the ...

Monday, November 4, 2019

The differences between male and female leaders in approaches taken to Dissertation

The differences between male and female leaders in approaches taken to lead organizational change - Dissertation Example The purpose of the paper "The differences between male and female leaders in approaches taken to lead organizational change" is to further investigate and explore the behavioral side of male and female leaders when it comes to implementing organizational change. It helps managers map, evaluate, and overcome barriers that underlie the organizational improvement paradox. It is expected that organizational changes occur with change in leadership style and these lead to performance benefits for a unit as well as for the firm as a whole. Organizational improvement is often hindered by barriers to the change efforts and is more apparent in organizations where the firm has multiple units and levels. Although it is recognized that men and women are more similar than different, the differences that exist along the biological, neurological and psychological dimensions seem to affect both the genders in their performance and leadership in organizations. Thus, this study focuses on researching i f there are gender specific differences in leadership styles and management approaches and how do those differences affect the implementation of organizational change. The importance of this topic has increased due to the growth of female professionals and leaders in the workforce in recent years. The fundamental differences in the ways of thinking and behavior between male and female leaders stem from the nature of genetics, external environment, social and cultural experiences, history and trends, and government regulations.