Wednesday, July 31, 2019

Habits Essay

HABIT 1: BE PROACTIVE In my own personal life I can apply this particular habit by seeing see the good side of things such as my family and how we are in society.   I should not base my happiness on what surrounds me; rather, I should seek my own happiness from within myself.   I should not let my family get in the way of my own happiness.   As a teacher I have to know that there are things that I can do on my own to make the learning experience more enjoyable.   I have to seek things I can do for my students on my own. HABIT 2: BEGIN WITH THE END IN MIND I have to focus and seek what I want for myself; however, I have to consider that what I want should be based on my individual personality.   I always wanted to be a teacher and I can say that I am now where I envisioned myself to be.   I have to set realistic goals.   In my professional life, I have to act and work according to the goals I have set and when and if I do reach these goals, I have to set brand new goals to pursue. HABIT 3: PUT FIRST THINGS FIRST I am sure that at this point I will have set what is important for me.  Ã‚   I believe that I should always have to come first, followed by my family, then my friends, and all the others coming after.   I prioritize myself to be able to give to others – I have to love myself first to be able to give love.   Being a teacher, my first priority are my students and what I can teach them, all the rest are secondary to this important priority. HABIT 4: THINK WIN-WIN I want my family to enjoy the same things that I enjoy.   What I have, I also want those who are important to me to have, so I have to be decisive and courageous in seeking these things.   In the same manner, I want my students to be as empowered as I am as a teacher, so to enjoy this mutual benefit, I have to remain vigilant in defending their rights and their capacities. HABIT 5: SEEK FIRST TO UNDERSTAND, THEN TO BE UNDERSTOOD I should not act like I know everything.   I should try to consider others as a means of enriching myself.   If I want other people to appreciate me and consider me for what I am I should be sensitive and responsive to others.   I consider my students sources of learning in as much as they consider me a source of their knowledge.   This way, the chain of understanding remains open in both ways. HABIT 6: SYNERGIZE Since I value my family and friends I should consider them in everything especially in things I want to achieve.   I have to allow them to work with me and allow myself to work with them for a more holistic approach in everything I do.   Problems are solved easier with many contributing to the solution and so I must not shut out my students from problems that we normally come across with in education.   I have to accept the fact that as a teacher there are problems that are better solved with my students contributing to the solution. HABIT 7: SHARPEN THE SAW I personally know that I am athletic, emotionally open, socially considerate, and spiritually decided.   I have to focus on these four strengths of mine so that I do not remain static and continue and consistently improve in general.   Teaching requires that I focus on what I am good at and build on this.   I am very good with children and can simplify complicated information quite effectively.   I believe that I should hone my skills in these areas to become a more effective teacher.

Globalization and Its Effects on Mexico Essay

Mexico has the size and assets which could contribute to wealth and prosperity within their borders. The nation has the second longest border with the United States, significant oil resources, and the 11th largest population in the world. Mexico underwent all the necessary free market changes to help support globalization despite initial resistance, but they are yet to complete the interior microeconomic makeover they drastically need. Mexico has many things working for them but continue to underperform when it comes to global power and economy, China out performs Mexico for low-cost manufactured goods and India is often the target for outsourcing jobs and services over Mexico (Biggs, Shiess). After sustained pressure from the United States and the International Monetary Fund, Mexico decided to change their global economic stance to one that supports the free market. They changed their economy to one based upon exports, they eliminated most tariffs while lowering others, attracted foreign direct investment and private state assets, and finally reduced government spending. These steps were taken at an effort for Mexico to join in on the economic benefits of globalization, but Mexico only finished half of the necessary adjustments necessary for economic prosperity. (Biggs, Shiess) Many residents of Mexico may blame their problems on issues such as the drug cartels, the lack of quality jobs, or lack of foreign investment. Although these ideas may contribute to the problems that control Mexico, they are not the true reason. After Mexico completed their globalization efforts by using the ideas of macroeconomics, they had only completed half the necessary adjustments to truly co mpete as an economic superpower in the world today.(BBC News) Mexico has failed in great part due to their stubbornness and interior corruption to evolve their nation from that of an above average Latin American Economic power, to that of one on par with most European nations, China, India, and the United States. The second half of the puzzle that Mexico is missing relies heavily on the ideas of microeconomics. Mexico never created the level playing field for companies within their country and is greatly powered by monopolies which ruins an economy due to lack of competition and innovation. For Mexico to begin to succeed in the free market needs to put resources into banks, education(specifically on technology), mechanisms which will support collaboration between competing companies, and most importantly new laws to disallow the monopolies which control Mexico’s economy. (Biggs, Shiess) Until these steps are taken Mexico remains a country which can be overwhelmingly difficult to do business in, which turns away the majority of investors, and people looking to expand companies into different countries. It is not a good sign when according to the International Finance Corporation Mexico ranks 75 out of 183 countries in the world for â€Å"ease of starting a business†. (IFC) Around the year 2000 when the globalization movement was fully set in motion, Mexico was going through an extreme change in their political stance as well. This was a major problem for Mexico, even though the economic changes which were drastically needed were happening outside Mexico’s borders it is a very difficult task of changing their political institutions at the same time of changing economic institutions. Mexico continues to stand where they are rather than take a step back to allow for future gains, for example Mexico continues to rely on their state owned oil giant Pemex instead of bringing in new companies and investors for an attempt at innovation and competition in their oil industry. (Biggs, Shiess) Until Mexico decides to take a small hit and clean house in regards to their current internal economic stance companies will continue to avoid Mexico at all costs. Startup companies need stability in a political and economic system, and until Mexico is willing to offe r that and put in place fair trade laws, better tax laws, and economic regulations they will continue down the same road. Mexico is greatly reliant on their petroleum exports; this has been called the Resource Curse by many experts. The problem lies in that when they started to nationalize their oil resources, they needed foreign investment to refine petroleum into oil as they lacked the local funds to do so themselves. This results in some economic benefits due to other countries purchasing crude oil for themselves, but the process remains to be quite draining on what could be the road to economic prosperity. Mexico needs to mine the crude oil, export it to outside nations where they can refine it and then re-import it as gasoline. (Biggs, Shiess) The biggest problem that their fossil fuel dependence will bring upon Mexico is that the country is relying on the industry, and because demand and prices are high Mexico has no reason to start new industries. Oil is a fossil fuel and resources are diminishing, and when they are gone Mexico will not be in even rougher shape than they are currently. Mexico is at the crossroads when it comes to their economy and what direction those in power want to take the country in. As of right now the globalization efforts have helped the Mexican economy but due to lack of funds and a change in political scenery at the same time Mexico was unable to fully capitalize on the free market. They may have helped their trading relationships with outside countries, but not enough was done within their own borders to disallow corruption and monopolies. Mexico is stuck in place until they take the necessary short term economic downfall to get the full rewards from globalization. With the constant changing of political motives, problems with drug cartels, and corruption the chances of new businesses starting up is slim. Without new businesses to inspire competition the economy will continue to rely upon oil to sustain the country’s economy, but eventually the oil resources they have will run out and lead to ultimate turmoil within Mexico. Works Cited Biggs, Cate, Ami Shiess, Kelly Korenak, Linda Chang, and Laura Neumeister. â€Å"World Savvy Monitor.† World Savvy Monitor. Ed. Anita Trachte. The World Savvy Board, Aug. 2009. Web. 17 Oct. 2012. . â€Å"Mexico Country Profile.† BBC News. BBC, 09 Apr. 2012. Web. 17 Oct. 2012. . â€Å"Doing Business in Mexico – World Bank Group.† Doing Business in Mexico – World Bank Group. International Finance Corporation, 2012. Web. 17 Oct. 2012. .

Tuesday, July 30, 2019

Abraham Lincoln Bio Essay

Since his death in 1865, Abraham Lincoln has been immortalized as one of, if not the greatest hero in American history due to his role in ending the Civil War and abolishing slavery. He led our country through its’ darkest days and was able to prevent the south from successfully seceding and preserving the United States. Throughout history many have been called heroes, some deservedly and others not. Lincoln’s recognition as a hero is valid because of his many achievements and his leadership style. Lincoln was born in February 1809, in Kentucky. His early life was difficult, losing his mother to illness at 9 years old. The family was poor and Lincoln needed to work to help support them. As a result, he had very little formal education, but it was this hard work and humble beginnings that ignited the spark in Lincoln to learn. When he was a young man the family moved to Illinois and it was there that Lincoln learned the law and became interested in local politics. In 183 4 he was elected to the Illinois State Legislature. He taught himself the law, was admitted to the Bar in 1836 and also began a career as a successful lawyer. Between 1847 and 1849 he served one term in the U.S. House of Representatives. As a result of the increased opposition to slavery, the Republican Party was born and Lincoln joined the party in 1856. It was his anti-slavery views and the continuing passing of laws to protect slavery that further sparked his interest in politics. He ran unsuccessfully for the U.S. Senate but obtain national exposure from the race due to his unique communication and debating techniques. It was this exposure that found him as a candidate for President in 1860. He was elected the 16th President of the United States and the first President from the Republican Party. Because of his well-known views on slavery, the  secessionists began their plans to split from the Union prior to his taking office. The Civil Was began in April of 1861 with the attack on Fort Sumter in South Carolina. Almost immediately in his role as President, Lincoln was faced with the most challenging situation of any President prior to him. His decision-making and communication skills, though unpopular at times, would be a vital part of his success over the next several years. Lincoln possessed strong social intelligence skills. He was sensitive to other people’s feelings and moods, and he was particularly adept at reading people. Lincoln had a great ability in understanding the motivations of others, and was skillful at getting others to cooperate with him. He knew to be pleasant and approachable while also being fierce when fighting for causes he believed in. One tool that Lincoln would use was storytelling. He would use stories from his past which would put people at ease while at the same time relaying his point in a clear way. Another method he would use was to ask questions to get his rivals to see things his way. His communication style and speeches were simple and logical. Abraham Lincoln’s most famous speech was the Gettysburg Address given in 1863 at the dedication of the National Cemetery after the battle at Gettysburg. The speech last just over two minutes and was an example of how Lincoln understood his audience. There had been much â€Å"Pomp and Circumstance† throughout the ceremony and many long speeches prior to his. The words he chose were short and to the point, but were full of inspiration and emotion. The speech focused on the principles of the founding fathers of our nation and the words from the Declaration of Independence that â€Å"all men are created equal† and that all men have the unalienable rights to the pursuit of life, liberty and happiness. One of the main things Lincoln wanted to accomplish with this speech, was to rally support for the 13th Amendment, which would abolish slavery and was in jeopardy of failing to pass in Congress. Lincoln again used his influence as a communicator to get the 13th Amendment passed. He would spend hours with his political rivals building relationships. It was important that he understood their perspectives on the issues and would give them the opportunity to express their views and needs. His approach was thoughtful and personal. This bill was met with much opposition and it took great skill and tenacity on Lincoln’s part to insure its passage. Many Presidents since Lincoln have also faced challenges when trying to pass  legislature, among them our current President Barack Obama. Whether or not you are a supporter of our current President aside, some similarities can be seen between the two. As was the case with Lincoln, Obama is known for his listening skills, and taking in ideas from all sides. He is a skilled orator and there is a strong sense of morality in his tone when speaking. There are many references to President Lincoln in Obama’s speeches which show the influence the former President has on him. Abraham Lincoln led our nation through one of its most turbulent times. He used his communication skills and understanding of people to obtain success. His ability to talk to people and understand what they stood for while moving them to see things his way led him to be regarded as one of our greatest Presidents. References A-E Networks. Abraham lincoln – biography [Web log message]. Retrieved from http://www.biography.com/people/abraham-lincoln-9382540 Abraham and Mary Lincoln: A House Divided PBS. (n.d.). Retrieved from http://www.pbs.org/wgbh/americanexperience/films/lincolns/player/ Hubbard, C. (n.d.). Retrieved from http://www.historynet.com/abraham-lincoln Communicate like Abraham Lincoln. Retrieved from:http://www.communitelligence.com/blps/article.cfm?weblog The Connections Between President Barack Obama and President Abraham Lincoln (n.d.)Retrieved from: http://www.reobama.com/ObamaLincoln.htm House passes the 13th Amendment. (n.d.). Retrieved from http://www.history.com/this-day-in-history/house-passes-the-13th-amendment

Monday, July 29, 2019

Aafia Siddiqui - Terrorist - Future Recommendations Research Paper

Aafia Siddiqui - Terrorist - Future Recommendations - Research Paper Example In this case, the best rehabilitation method for Aafia Siddiqui is a rehabilitation program that is aimed at reducing the Jihadist or anti-Western rhetoric. From research, it is evident that there is one such successful program that has been implemented in Saudi Arabia, just outside the capital, Riyadh. In this program, it is evident that that the inmates are treated as civilians, counseled, and given the chance to reform and become better citizens. From research, the program in Saudi Arabia has proven to be a huge success in terms of rehabilitating terrorists. An analysis of the terrorist rehabilitation program developed in Saudi Arabia indicates that it is the perfect location and place to rehabilitate Aafia Siddiqui from her terrorist tendencies. For example, Gunaratna, Jerard and Rubin (2011) mention that it is important to involve the Muslim community in any terrorist rehabilitation that involves Jihadists. From the facts surrounding Aafia Siddiqui’s life, it is evident that she is a Jihadist who has some sort of grudge against the West. One of the first steps mentioned by Gunaratna, Jerard and Rubin (2011) in the fight against terrorism is counter-radicalization. Counter-radicalization is a process in which a terrorist or people with Jihadist ideologies are taught and convinced that they are radicalized for the wrong reasons. This is best achieved if the terrorist is already in a rehabilitation center that specializes in this kind of treatment. The best way to win Jihadist anti-terror wars is by countering extreme ideology in the Muslim community, and if the same terrorists who propagate the ideology are the ones spreading the information, then the war against terrorism is reduced. Aafia Siddiqui is thought to have connections with high-ranking members of the Al Qaeda, and if she is convinced that she is radicalized for the wrong reasons, then it is possible for her to

Sunday, July 28, 2019

Successful Develoment and Innovation Essay Example | Topics and Well Written Essays - 1750 words

Successful Develoment and Innovation - Essay Example The teams should learn how to learn to build up effective mechanisms of functioning together, and this should be provided by a whole community, rather than individuals. The processes that influence economies of various countries demand new strategies, for instance, cooperation, that should be correctly prepared and implemented by the leaders of organization. The last decade of the XXth century created a favourable background for housing business. With economical conditions that provided for stable progress in economy, and low mortgage rates, increasing demand for buying houses in this period created a favourable condition for housing business and mortgage companies. The other important issue was that the financing those who buy homes was changed by commercial banks and loans and savings from individual mortgaging to new level of mortgage originations that become usual at the market of housing business by the end of the XXth century. According to the data provided by the experts, "At year-end 1996, mortgage banking companies held a 56 percent market share of total industry originations, compared with only a 35 percent market share in 1990. And of the estimated $809 billion in total originations in 1996, $458 billion were secondary market transactions, compared with $276 billion of secondary market transactions in 1990." (Lereah, p. 3) The housing business and ... ngs in technological sphere and narrow margins are the key issues that characterized the atmosphere at the housing market at the end of 90s and determined further development in this industry. (Doggem) While speaking about the future of this industry the specialists usually express positive views on the situation. Current conditions and economical situation are likely to provide mortgage banking firms with efficient business and households with various mortgage alternatives. The experts now speak of housing industry as of a branch of industry that now has the most favourable conditions for successful development. However, various challenges are also to be taken into consideration, and now these obstacles are clear and evident. As the experts state, "as in most mature industries, the surviving companies will be the low-cost producers, and a heavy investment in technology may help companies accomplish this objective". (Doggem) Long-tern perspective of this industry is determined mainly by the following issues: economical decays and booms, that constitute circles in world economy demographic issues advance in technology changing background of the industry regulations that are provided by the government (Doggem) As the historical perspective demonstrates, the most important factor influencing housing industry was changeable nature of interest rates. This branch of industry experiences the same stages of development as other industries: ": downturn, trough, recovery, expansion, and peak". (Doggem) Accordingly, interest rates are also determined by the process and are influenced by the same circular way of development, and all this thus affects background of various branches of industry in general and housing industry in general. It is well-known that availability of

Saturday, July 27, 2019

Advanced auditing Essay Example | Topics and Well Written Essays - 2500 words

Advanced auditing - Essay Example Rob Gray tries to identify the scope of social accounting as "the preparation and publication of an account about an organisation's social,environmental,employee,community, customer and other stakeholders' interactions and activities and where possible the consequences of those interactions and activities" With the increase in the business activities backed by globalization, business enterprises have started locating their production facilities across the world, breaking cross border barriers. Such a rapid development, many a times will result in the firms overlooking their social obligations in the interest of maximizing their profits. Hence there has been a good deal of efforts being taken to devise the techniques that measure the contribution of an enterprise to the society. These developments may be considered as the result of the increasing realization of the Social Responsibilities of the enterprises and it becomes necessary that the performance of these enterprises should be s een in the context of their fulfilling their social obligations.According to George Clark "What is now coming to be called Social Auditing is similar in many ways to Financial Auditing except that it is about everything else that an organisation does apart from handling money."There has been a number of proposals put forth to design an extended accounting system that measures the social performance of an enterprise. Linowes has proposed the preparation of a Socio-Economic Operating Statement (SEOS) to show the various social costs and benefits of actions of enterprises. This statement proposes to indicate monetary values of various actions of an enterprise classified in to following categories: Relations with people - to include items like training programmes for handicapped workers, contribution to schools for employees, extra costs incurred in hiring persons from minority or suppressed communities. These items would constitute the contribution of the enterprise in 'improving' the relations with the people. The 'detriments' that need to be shown may be items like postponement of installing safety devices etc Relations with Environment - monetary values of improvements and detriments are to be listed and the net effect shown separately. Relations with Products - In a similar way, monetary values of improvements and detriments are to be listed. Since there is yet to be a significant development to take place in this area, many of the existing models aim at measuring the performance of an enterprise vis--vis the society tales into account the factors like human resource contribution, public contribution, environmental contribution, product or service contribution and net income of the enterprise. 1.2 Environmental Audit: "An environmental audit is a means by which businesses can assess the environmental impacts of their operations. At its core is the measurement and evaluation of all inputs and outputs from the production process." (Australian Government) In the context of the increasing emphasis on protection of environment, environmental accounting and auditing have assumed special importance in recent years. Environmental Accounting aims at measuring the impact of the activities of an organization on the environment. The resultant product is the environmental statement, containing the following among other things to be asserted by the management: A brief description of the activities of the organization and the effect of such activities on the environment as envisaged by the organization A description of the organisation's environmental policy, programme and management systems to implement the stated policies A summary of the figures of emissions which may cause pollution of air and water, waste generation, consumption of raw material, energy, water and other significant environmental aspects. There should also be presented a comparison of such data with the legal norms if any

Friday, July 26, 2019

Caring for chronic illness in the rural setting Essay

Caring for chronic illness in the rural setting - Essay Example They also lack knowledge and training about the caring regimen needed for the family members suffering from chronic disease (Smith-Campbell, 2009, p.562). Hence, it is extremely important for health care professionals to design the services which are not only easily accessible to people living in rural areas but also help them in being capable of providing proper care to their family members suffering from chronic conditions. The Obstacles A study by ‘The Dartmouth Atlas Project’ (2006) has found that the chronic diseases like diabetes, heart disease and cancer have affected the health of more than 90 million people in the US (Pierce& Lutz, 2009, p.191). Shapiro (2002) has found that the chronic condition is prevalent in more than one third of young adults aged between 18 to 44 years (Pierce& Lutz, 2009, p.191). A study by AHRQ (2002) has revealed that more than 75% of elder population is suffering from either one or more chronic conditions (Pierce& Lutz, 2009, p.192). T hese studies show how serious is the issue of prevalence of chronic conditions in the US population. It is evident that chronic condition is not limited to a particular age group but is affecting people from every age group. Hence, health care by family members is going to play a vital role in controlling the increase of the chronic diseases in people. However, families from rural setting are facing many obstacles in getting the access to health care services. Inadequate Health insurance Inadequate health insurance has proved to be one of the major problems in accessing proper health care services. A study by Lottero et al. (2007) found that even after having a long term relationship with the health care providers, people from farming profession were denied health care as they were not financially capable of paying the bills for their treatment (Smith-Campbell, 2009, p.562). The major problem with the families seeking health care services for chronic conditions in rural areas is tha t they are either uninsured or underinsured (Smith-Campbell, 2009, p.562). Hence, they avoid the treatment for chronic conditions unless it is an emergency (Smith-Campbell, 2009, p.562). The lack of financial resources and sufficient insurance also make them to avoid getting health screening and preventive measures for chronic conditions (Smith-Campbell, 2009, p.562). Hence, instead of getting under control, the lack of proper resources is leading to growth in the prevalence of chronic conditions. Lack Of Facilities There are many obstacles that people living in rural area face in taking advantage of the medical facilities. They cannot utilize the medical facilities due to lack of follow up facilities required for different kind of chronic condition treatments. A qualitative research, conducted to study the obstacles in implementation of lifestyle and pharmacological changes to improve the chronic condition of ischemic heart disease, found that the use of ACE inhibitors was not poss ible in case of rural patients as it required follow-up blood tests (Putnam, Twohig, Burge, Jackson, & Cox, 2004, p. 401) Unfortunately, people living in the rural area, who suffer from hypertension and congestive heart diseases, cannot use ACE inhibitors as they cannot get an easy access to the blood test facility. Similarly, the facilities for physical exercise are also not accessible to the

Choose two case studies and answer the question, is investigative Essay

Choose two case studies and answer the question, is investigative journalism essential to democracy Why - Essay Example In particular, investigative journalism has led to the fall of various unethical leaderships and ousting of corrupt governments in various parts of the world. Chief among the key events that investigative journalism has unearthed include the Watergate scandal and Joseph McCarthy’s propaganda plot. In addition, corrupt governments in Latin America have been exposed through the efforts of investigative journalists. This led to ousting of President Fernando Collor de Mello of Brazil in 1992, President Abdala Bucaram of Ecuador in 1997, President Alberto Fujimori of Peru in 2000, and President Carlos Andres Perez of Venezuela in 1993. These are a few cases where investigative journalism has facilitated the widening of the democratic space while ensuring that the public interest is taken care of. In this essay, an analysis of the case of Joseph McCarthy’s propaganda and that of President Alberto Fujimori of Peru will be put into perspective. Investigative journalism has over the years has promoted the attainment of a democratic society. On one end, it has helped the society embrace governments and institutions. On the other hand, the journalists have investigated incidences where there are excesses of the democratic privilege. In such scenarios, democracy has been used abused and individuals used it for their selfish interests. The media has the responsibility of exposing any matter for the sake of the even though the issue implicates individuals in authority. Through such interventions, investigative journalists ensure that people get the opportunity to express their views based on valid information that has been obtained from credible sources. Media also provides a platform in which performance is monitored for government and institutions. In many cases, scandals revealed through investigative reports trigger judicial investigations while at the same time providing evidence of wrongdoing. In

Thursday, July 25, 2019

Food in the Mediterranean Essay Example | Topics and Well Written Essays - 2000 words

Food in the Mediterranean - Essay Example The Mediterranean cuisine is particularly suited for workers who are looking for an alternative to the cafeteria or vending machines at work. Discussion Mediterranean food is considered, by Martha Rose Shulman, to be the â€Å"World’s healthiest cuisine,† which is why her book, Mediterranean Light is subtitled â€Å"Delicious Recipes from the World’s Healthiest Cuisine† (Shulman, 1989). Shulman states that part of the reason why the region’s food is so healthy is because the food is prepared with fresh ingredients. This is due to the fact that many of the countries in the Mediterranean region are poor countries, so the cuisine reflects the fact that the citizens in those countries take advantage of what nature has to offer, as opposed to eating processed foods. Thus, they are more apt to â€Å"live off the land,† and their recipes reflect this ethos. Moreover, Shulman states that part of the reason why the food is so healthy is because of the ingredients – for instance, olive oil is a staple in many of the dishes in Italy and Spain, and olive oil is thought to reduce bad cholesterol in the people who consume this kind of oil on a regular basis. Vegetables also form a focus in this kind of food, including tomatoes, eggplant, peppers, potatoes, zucchini, cucumbers, artichokes, sweet peas and beans. These are all known to be very healthful ingredients as well. The fruits which are a part of the cuisine are also healthy, and they include figs, melons, peaches and apricots. These dishes are also centered around lean protein, such as rabbit, chicken and fish. Shulman also praises the Mediterranean cuisine because of the flavor that it receives from the fresh, wholesome ingredients and herbs. Because the herbs are so pungent – common herbs include parsley, basil, rosemary, thyme, sage, coriander and mint, along with a lot of garlic – the cuisine is flavorful without adding a lot of sodium and fat. Other in gredients which are used in the Mediterranean, including Parmesan Cheese, are so flavorful that a little goes a long way. Even the desserts in Shulman’s book, such as fruit enhanced with honey and lemon, are healthy and low-sugar (Shulman, 1989). Shulman’s book consists of food from throughout the Mediterranean, so she has recipes from Morocco, Egypt, Tunisia, Libya, Algeria, Greece, Italy, Spain, France, and the Middle East. The website â€Å"AroundSicily.com† zeroes in on Italian food, and the benefits of this kind of cuisine. This website states that Italian food, true Italian food, centers on fresh ingredients, such as fruits, vegetables, whole grains, olive oil, dairy products, fish, poultry, eggs and moderate amounts of wine. This website states that a typical Italian breakfast consists of yogurt, milk or coffee; snacks are fruits and juices; lunch is a pasta and salad; and dinner consists of fish, meat or chicken with a vegetable side dish. Pizza, the Ita lian dish that many non-Italians consider to be a staple, is only consumed sparingly in Italy, with most Italians eating this once a week (AroundSicily.com). Nestle (1995) is particularly concerned with Mediterranean food, and its current status of being somewhat of a lost art. She states that the Mediterranean people show the rate of chronic diseases to be the lowest in the world, with some of the highest life expectancies in the world. For instance, Nestle notes that the Cretes subsist on a diet of olives, cereal grains, wild

Wednesday, July 24, 2019

Poverty Essay Example | Topics and Well Written Essays - 1750 words

Poverty - Essay Example People living in poverty have poor access to health facilities, and, as a result, suffer from poor heath owing to the minimal care to which they are exposed. Some of the reasons as to why they have limited access to health care services are that they lack financial resources to pay for services rendered, as well as information on medical services. In addition, due to lack of medical care, ill health is prevalent among poverty-stricken areas and people. One of the main reasons that poverty stricken people cannot access, or have limited access to healthcare facilities is the geographical locale of the facilities. This is concerning the physical distance between the local area that an individual resides in, as well as the time required to travel to the health facilities. Moreover, people living in poverty do not seem to get the right type of care availed to them in health care facilities. This is concerning the time that Medicare is required, such as desperate times and conditions that require specialized equipment to treat. To add to this, the issue of acceptability crops up in the form social stratification. Medical practitioners tend to be more responsive to the needs of the socially able, while those of the poor are left to fend for their needs and receive minimal care. Furthermore, the quality of health care offered to these impoverished is of important concern, as quality of care usually depends on the monetary wellbeing of the patients. Therefore, poor patients receive poor quality services, as compared to their wealthy counterparts. In addition to this, there are far fewer medical facilities available in poor areas thus making it even more difficult for poor people to have appropriate access. Owing to the poor access to medical facilities, impoverished people are faced with a certain myriad of diseases and conditions that have already exited

Tuesday, July 23, 2019

Can Teaching The Key Ideas Of Object Orientation Be Aided By Using Dissertation

Can Teaching The Key Ideas Of Object Orientation Be Aided By Using Visual Representations - Dissertation Example Object oriented programming, however, remains an outstanding anomaly when it comes to teaching the concepts and the comprehension thereof. Much as it is difficult to introduce object oriented programming to novice, it also remains a nightmare to experienced procedural programmers to grasp the anthropomorphic perspective necessary for object-oriented design. Below are some of the shortcomings encountered when introducing (OOP) to a novice Paradigm shift. According to Schoenfeld et al. (1993) replacing one idea with another is not a simple task. Why then is OOP difficult for learners to comprehend Well to be able to answer this question perhaps we need to turn around, and view this menace from this spectrum; when should object-oriented programming be taught Due to the fact that Object oriented programming was considered as an advanced subject that was taught late in the curriculum, this must have dealt a mega psychological blow upon the minds of the learners. This is slowly changing: more Universities have started to teach object-orientation in their first programming course. The main reason for doing this is the often-cited problem of the paradigm shift. Learning to program in an object-oriented style seems to be very difficult after being used to a procedural style. (Anecdotal evidence, 1999 indicates that it takes the average programmer 6 to 18 months to switch her mind-set from a procedural to an object-oriented view of the world. ) Experience, on the other hand, also shows that students do not seem to have any difficulty-understanding object oriented principles when they encounter them for the first time. Global Regression. It is the switch... Paradigm shift. According to Schoenfeld et al. (1993) replacing one idea with another is not a simple task. Why then is OOP difficult for learners to comprehend Well to be able to answer this question perhaps we need to turn around, and view this menace from this spectrum; when should object-oriented programming be taught Due to the fact that Object oriented programming was considered as an advanced subject that was taught late in the curriculum, this must have dealt a mega psychological blow upon the minds of the learners. This is slowly changing: more Universities have started to teach object-orientation in their first programming course. The main reason for doing this is the often-cited problem of the paradigm shift. Learning to program in an object-oriented style seems to be very difficult after being used to a procedural style. (Anecdotal evidence, 1999 indicates that it takes the average programmer 6 to 18 months to switch her mind-set from a procedural to an object-oriented view of the world. ) Experience, on the other hand, also shows that students do not seem to have any difficulty-understanding object oriented principles when they encounter them for the first time. Global Regression. It is the switch that is difficult, not object-orientation, for instance getting the learner to give up the global knowledge of control that is possible with procedural programs, and rely on the local knowledge of objects to accomplish their tasks. Novice designs are littered with regressions to global thinking:

Monday, July 22, 2019

Participatory Notes - Concept Essay Example for Free

Participatory Notes Concept Essay Participatory notes are issued by FIIs to their unregistered clients who want to invest in the Indian equity market but do not want to meet the disclosure requirements to do so. Thus the modus operandi they opt for is to invest their money with the fund companies (FIIs), who will invest in Indian market on their behalf. The fund company is registered with SEBI in India and issues participatory notes to these investors as a proof of their investment. Participatory notes are instruments used by foreign funds not registered in the country to trade in the domestic market. SEBI’s Concern and rulings regarding these notes: Participatory Notes have always been a bone of contention for SEBI as the identity of the investors is not known. In 2003, there was a boom in the stock market mainly due to a lot of foreign funds. This also led to a lot of volatility in the Indian market because a lot of Investment was done through Participatory Notes. So in 2003, SEBI amended regulations relating to foreign institutional investors to incorporate a new 10 point code of conduct and inserted a clause seeking disclosure of information with regard to participatory notes. The code seeks compliance to good corporate governance standards and SEBI regulations. SEBI has clarified that there is no change in the rules relating to FIIs except for the strengthening of KYC Norms. They have also given a ruling which states that from Now on, The PNs can only be issued to Registered Entities. The actual investing parties must be registered with the regulator of their country of Incorporation. In addition, to facilitate the process of transition, derivative instruments already issued and outstanding against un-regulated entities will not be required to be terminated immediately. It has been decided that the said contracts will be permitted to expire or to be wound down on maturity, or within a period of 5 years, whichever is earlier.

Sunday, July 21, 2019

Transport Layer Network Layer Protocols Attack

Transport Layer Network Layer Protocols Attack Chapter 1: Introduction 1.1: Background Data Communication technologies and the underlying protocols in the twenty-first century is one of the critical elements that acts as the backbone for electronic commerce and use of the world-wide-web (Todd and Johnson, 2001[1]). The increase in the growth of electronic commerce as well as other forms of internet-based secure communication have increased not only the risks associated with networking related attacks that involve in the loss of personal information and possible financial loss to the victims. One of the major components in the Internet communication is the underlying protocol that governs the compilation and communication of the information from the source computer to the target and back (Nash et al, 2001[2]). The role of the protocols in the networking also has a key influence on its ability to securely deliver the information as part of the overall communication architecture. This makes it clear that the robustness of the protocol and the extent to which a given proto col architecture can resist intruder attacks through encryption efficiency etc dictates the security associated with the information transfer as argued by Todd and Johnson, (2001). In this report a critical overview on the transport layer and the network layer protocols of the TCP/IP protocol architecture is presented to the reader. The research aims to throw light on the possible security attacks on these protocols and the possible countermeasures in order to prevent such attacks. The attacks in these cases mainly concern with the infringement of the information through unauthorised access bypassing the security or breaking the encryption surrounding the information being transported. 1.2: Aim and Objectives The aim of this research is to investigate the possible attacks on the Transport layer Network layer protocols and present possible countermeasures on overcoming the threat of these attacks on the day-to-day Internet-based data communication. The above aim of the research is accomplished through embracing the research on the following objectives To conduct a literature review on the Transport and Network layers of the TCP/IP protocol architecture. To conduct a critical overview on the possible types of attacks on the Transport Layer and Network Layer protocols. To present a critical analysis on the possible countermeasures to prevent the attacks on the Transport layer protocols. 1.3: Research Methodology A qualitative approach is used to conduct the research. Since there are five layers to the TCP/IP model of which the research aims to investigate the protocols associated with the Transport and Network layer, a qualitative approach is deemed effective as the infrastructure required to simulate tests for conducting a quantitative research is limited for conducting the research. As it is also apparent that the analysis on the five layers of the TCP/IP model is beyond the scope of the research conducted in this report, the research conducted mainly focuses on the key threats and possible types of attacks on the protocols of the TCP/IP layers discussed. 1.4: Chapter Overview Chapter 1: Introduction This is the current chapter that presents the aim, objectives and brief overview on the research conducted to the reader. Chapter 2: Literature Review This chapter presents an overview on the layers of the TCP/IP model followed by a detailed overview on the key Transport layer and Network layer protocols. The chapter also presents a brief overview on the network attacks and the possible threats associated with the Internet data transfer. Chapter 3: Protocol Attacks This chapter presents a critical overview on the types of attacks on the Transport Layer and Network Layer protocols. The chapter presents a critical analysis on the methods used and the potential losses that may result due to the attacks. Chapter 4: Countermeasures This chapter presents a critical overview on the possible countermeasures that are implemented in order to prevent the attacks discussed in chapter 3. A comparative study on the countermeasures discussed is also presented in this chapter. Chapter 2: Literature Review 2.1: Internet Security in the twenty-first century The increase in the need for internet security from unauthorised access and malicious attacks is not only due to the need protecting personal/sensitive information of the users but also the service providers (Ganesh and Thorsteinson, 2003[3]). This is naturally because of the fact that the service providers can perform effectively only when the requests sent to the server are valid thus making justifiable use of the resources (Rayns et al, 2003[4]). The use of the resources in terms of the number of connections and the allocation of memory to cater for each connection established with the web server of the service provider is deemed to attribute to the extent to which a given website establishment performs effectively. This makes it clear that the need for internet security is not only a matter of protecting personal information but also effective utilisation of the computer resources dedicated for the purpose as argued by Rayns et al (2003). Walden (2007)[5] further argues that the security over the internet is mainly accomplished through implementing security measures on the connection-oriented and connection-less protocol used for transferring information from one end to another. It is interesting to note that the above focuses especially on the resource utilisation and protection of computer from malicious attacks through ensuring that the communication to and from the computer are not only secure but also valid. It is necessary to ensure both the validity and security of a given connection over the internet because of the former corresponds to the availability of the service whilst the later attribute to the reliability of the available service (Walden, 2007). It is also interesting to note that the prevention of unauthorised access to information systems connected to the Internet is deemed effective as opposed to implementing access control on each individual system as argued by Todd and Johnson (2001). This makes i t clear that the implementation of the security over the Internet is mainly through implementing the preventive measures against malicious attacks through strengthening the protocols used in the various layers of the TCP/IP model. As the TCP/IP model forms the basis for communication over the internet, it is apparent that the robustness of the protocols implemented in each layer of the TCP/IP stack dictates the effectiveness of the Internet security implemented (Walden, 2007). In the next section a critical overview of the TCP/IP model is presented to the reader. 2.2: TCP/IP Model ‘TCP/ IP is a set of rules that defines how two computers address each other and send data to each other’ as argued by Blank (2004) (p1)[6]. Naturally the above makes it clear that TCP/IP is merely a framework that governs the methods to be deployed in order to enable communication over the internet between two computing devices. As TCP/IP is platform independent in nature, it provides a communication framework that can be deployed across any given operating system on a computing device connected to the Internet or even a dedicated network as opposed to the World Wide Web. This further opens room for development of new protocols and communication standards/rules that can be implemented using the TCP/IP model on any one of its five layers as argued by Rayns et al (2003). Hence securing the information being transferred from one end to another over a given network or the Internet can be accomplished through implementing a combination of protocols to operate within the laye rs of the TCP/IP framework. The five layers of the TCP/IP model are Application Layer Transport Layer Network Layer Data Link Layer and Physical Layer. From the above it is evident that TCP/IP can be implemented in a given network using any number of protocols in each layer of the TCP/IP model depending upon the level of security required and the speed in data transfer. This is because of the fact that the increase in the number of protocols naturally increases the size of the data packet being transferred as part of the communication thus having a direct impact on the speed of communication as argued by Rayns et al (2003). It must also be noted that the protocols presented in each layer of the TCP/IP model shown in Fig 1 is merely a selection and not the exhaustive list of the protocol suite. From the model represented in Fig 1 one should also appreciate that the layers of the TCP/IP model are arranged in a logical fashion so that the protocols closer to the top at the layer 1 associate themselves with the computing applications that handle data encryption and security. The protocols to the bottom of the TCP/IP stack on layer 5 on the other hand associate themselves with the actual data transfer from one end to another through establishing connection and enabling communication between sender and receiver as argued by Blank (2004). As the research presented in this report focuses on the Transport and Network layers of the TCP/IP model a detailed overview on the five layers is beyond the scope of this report. A brief overview on each TCP/IP layer is presented below. Application Layer – This layer of the TCP/IP model comprises of the protocols that associate with the handling of data and the encryption of the information order to effectively transfer the information from one end to another. The application layer is also deemed as the layer of the TCP/IP model that communicates with the actual application that is handling the information prior to its transfer over the Internet. The protocols of the application layer enable the interaction between the computer and the actual web application that performs the business logic associated with the application prior to preparing the information for transfer over the Internet. This makes it clear that the application layer encryption is mainly associated with the segmentation of the data into packets and allocates the associated headers in order to enable their transfer over the Internet. This also makes it clear that the security associated with the information transfer is not implemented at the A pplication Layer of the TCP/IP model. This makes it clear that the application layer protocols are extensively used in case of client server applications where the data transfer between the client and the server is in the full-duplex mode (Feit, 1998[7]). Transport Layer – This is the actual layer that manages the connection between the two computers and the success or failure of the information being transferred as argued by Blank (2004). The purpose of the Transport layer protocol as the name suggests is to ensure the secure and successful transfer of information over the Internet between the communicating parties as argued by Ganesh and Thorsteinson (2003). The process of enabling end-to-end communication for successful data transfer is the major task that is accomplished using the Transport layer of the TCP/IP model. It is also interesting to not that the transport layer of the TCP/IP model provides the error tracking, flow control and data fragmentation capabilities independent of the underlying network as argued by Feit (1998). The transport layer of the TCP/IP model also performs the task of assigning the header to the data fragment off the overall information being transferred from one end to another. The transport layer of the TCP/IP model implements two forms of communication strategies. These are connection-oriented and connectionless implementation as discussed below. Connection-Oriented Implementation – The TCP (Transmission Control Protocol) protocol of the transport layer accomplishes the connection-oriented strategy of data communication. The connection-oriented approach o data communication corresponds to the process where a connection must be available between the communicating parties in conformance with the authentication and association rules prior to actually performing data transfer. This makes it clear that the data transfer in case of a connection-oriented approach depends on the extent to which the connection being established is live between the communicating computers. This makes it clear that the data transfer in a connection-oriented implementation can be accomplished only with the ability to maintain the connection between the computers thus making the data transfer reliable as argued by Feit (1998). This is naturally because of the fact that termination of the connection of loss of connection established during the cours e of the communication/data transfer would trigger a request to resend the information thus providing room for transferring all the information from one end to another. The session based communication strategies in terms of enabling the communication security is one of the key features of the connection-oriented implementation as prolonged inactivity or termination of the session will naturally terminate the connection established thus protecting the information transferred over the internet. Public Key Infrastructure (PKI) which will be discussed in the next section depends on the establishment of a connection-oriented communication strategy in order to ensure that the communication between the two computers using the connection oriented approach will help protect the information being transferred by the transport layer protocol. As discussed earlier, the transfer of information from one end to another in a communication channel is accomplished through segmenting the information in to equal sized segments of data called packets that are assigned a header containing the details of the packet as well as its sequence in the information being transfer. The connection-oriented implementation of the transport layer has following key features Sequential data transfer – This is method which follows the First-in First-out (FIFO) strategy. Thus the sequence in which the data packets are received is the same in which it is being sent from the source computer. This approach is deemed secure to ensure that the information being transferred is not tampered with and loss of one of the packets will enable the sender to resend the entire information again. However, the major disadvantage is that the increase in the size of the information will result in poor performance in terms of speed of data transfer. Higher level of error control –As the connection oriented approach ensures that the connection established is live between the sender and the receiver throughout the entire communication process, it is clear that the error control is accomplished successfully through enabling the sender to resend the packets that were not received in the initial transfer. The control in the loss of packets using the above resend strategy naturally minimizes the error associated with the data transfer. Duplication Control – The connection-oriented strategy also has the inherent ability to eliminate duplicate data packets transferred thus allowing the connection-oriented architecture to ensure consistency in the information being transferred. Congestion Control – The TCP protocol monitors the network traffic as part of the transport layer activities. This ensures that that the session established between the sender and the receiver can transfer the required information successfully prior to reaching the session time-out situation as argued by Feit (1998). The client-server communication over the internet is a classical example for the implementation of a connection oriented strategy in the Transport layer of the TCP/IP model. The use of the PKI in the communication is one of the key aspects of the connection-oriented implementation that makes the TCP protocol a key element in the secure data transfer strategies of the day. Connectionless Implementation – As the name suggests the connectionless implementation is the case where a dedicated connection is not required to complete the data transfer between the communicating computer as argued by Blank (2004). The User Datagram Protocol (UDP) is used in the case of connectionless implementation where the transfer of the data packets merely comprises the packet order and the source/target details alone. This makes it clear that the transfer of data can be achieved at a higher rate as the authentication and validation of the data transferred is not restricted to a time frame or the session that controls the communication. However, the major issue associated is the lack of security and inaccuracy of the data transferred. Alongside, the key issue with the UDP protocol and the connectionless implementation is the lack of traceability of the information thus resulting in a non-reliable communication channel as argued by Blank (2004). The UDP is thus deemed to be an insecure mode of communication over the internet due to the lack of security measures apart from authentication and identification of the communicative parties. It is further important to appreciate that implementing PKI using the connectionless approach would result the exposure of the information and the lack of effective acknowledgement of the authentication between the communicating computers thus affecting the information security providing room for network attacks that can directly affect the information being transferred through the connection. Network Layer – Blank (2004) argues that the network layer of the TCP/IP model performs the task of delivery of the data within the network one the data packet has reached the appropriate network subnet. This makes it clear that the network layer of the TCP/IP model plays a critical role in identifying the correct network target/destination in order to enable effective communication between the communicating parties as argued by Feit (1998). In case of the World Wide Web, the Network Layer plays the vital role of identifying the destination network and enabling the routing of the packets through the network in order to effectively reach the destination without the data being tampered by unauthorised users. The protocols that are widely used in the Network layer include the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). The Routing Information Protocol (RIP) of the information TCP/IP model which is predominantly used in the Application layer plays a vi tal role in the network layer for enabling routing of the information across the networks in order to effectively reach the target computer in the communication channel established over the Internet. It is further critical to appreciate the fact that the routing of the packets alone is not the task of the network layer protocols but also to enable the transport layer protocol to effectively enable the communication and data transfer between the communicating computers. This makes it clear that network attacks over the internet by hackers to affect the performance of the communicating computers in order to gain unauthorised access is accomplished through manipulating the communication strategies implemented by the protocols in the Transport and Network Layers of the TCP/IP model. The access to information and the actual infringement of the information which is deemed as the consequence of the hacking or network attack is related to the infringement of the information at the applicati on layer protocols that hold the actual information being transferred (Blank, 2004). However, the attacks themselves that facilitate the aforementioned are accomplished through manipulating the procedures associated with the Transport Layer and Network Layer protocols. The attacks typically include spoofing, overloading, flooding etc., which are discussed in detail at chapter 3 of this report. The Data Link Layer and the Physical Layer of the TCP/IP model involve the actual hardware based communication strategies that are beyond the scope of this research. Hence these two layers of the TCP/IP model are not discussed any further. It is important to appreciate the fact that the top three layers of the TCP/IP stack interact frequently in order to enable the secure communication and allocation of computing resources on the computing devices involved in the communication (Blank, 2004). 2.3: Public Key Infrastructure – an overview PKI implements a form of cryptography known as the asymmetric cryptography in order to enable secure communication between two computers over the Internet as argued by Todd and Johnson (2001). This process mainly involves the use of a public key and private key that are used for encrypting and decrypting the information at the client and server ends respectively (Blank, 2004). The process of encryption is beyond the scope of this research although its role in the secure communication and the extent to which a hacker can manipulate the authentication strategies for launching an attack is relevant to the research. Hence the discussion in this section mainly concerns with the handshake and the communication strategies deployed along with an overview of the players in the PKI. This will help in identifying the various attacks plausible and the level manipulation that can be implemented by the hacker over the protocols used in order to infringe the communication between the client and ser ver computers. It is deemed that the PKI is a reliable communication strategy to implement secure communication through the use of Trusted Third Party (TTP) authentication and approval of the overall communication process between the server and the client computers. The key components of the PKI infrastructure that enable successful and reliable communication over the internet are discussed below Certificate Authority (CA) – The CA is the issuer and control of the public key and the digital certificate associated with the authentication and transfer of secure information over the connection established using the TCP protocol. The primary role of the CA is to generate the public and the private keys simultaneously for a given server computer or service provider (Blank, 2004). The public key as the name suggests is made available over the public domain for encryption/decryption of the information at the client-end of the connection. The private key is not shared and stored at the server which is used for encryption/decryption of the information as applicable at the server end of the connection established for communication. From the above description it is evident that the role of the CA in the PKI is pivotal for the effective implementation of the PKI for secure communication free of network attacks. This is because, if the server hosting the CA application is attacked either using cross site scripting or flood attacks, the public keys stored as well as the associated certificates for verification are compromised thus resulting in the hacker gaining control over the communication channel without the knowledge of the server or the client as argued by Blank (2004). This makes it clear that the security at the CA computer is critical to establish a reliable TTP computer for implementing connection-oriented communication using TCP protocol of the TCP/IP model. Registering Authority (RA) – The RA as the name implies is the verifier of the digital certificate before it is issued to a requestor as argued by Todd and Johnson (2001). The role of the RA computer in the PKI implementation is to enable an independent authorisation of the digital certificates issued thus providing a secondary verification of the information prior to communicating to the server. This presence of an independent verifying program or computer as part of the communication makes the PKI a reliable communication strategy to implemented connection-oriented communication over the internet in a secure fashion. It is also deemed to the key weakness of the PKI strategy owing to the fact that the reliability of the RA as a TTP in the communication process dictates the effectiveness of the communication and the protection of the server from intruder attacks as argued by Todd and Johnson (2001). However, the reliability of the CA or RA is not the issue of debate in this re search but the potential attacks that threaten the stability of the computers hosting the CA and RA programs in order to enable secure connection oriented implementation across the Internet. The key area where the attacks can be accomplished by hackers to disable the RA or the CA computer eventually compromising the information held within is the use process of handshake where the RA or the CA computer is expected to receive an acknowledgement (ACK) from the requesting computer for each message successfully communicated. It is through manipulating these handshake communications a CA or RA can be compromised as the communication channel is expected to open for a specific time period to receive the ACK as well as allocate sufficient resources to complete the data transfer. Abuse of this feature is one of the major areas where the connection-oriented communication faces threat of attacks. These are discussed in chapter 3 elaborately. Directories – The directories are the locations on the public domain that host the public keys for enabling the encryption of the information. The keys are normally held in more than one location in order to enable easy/quick access to the information as well as a verification strategy to ensure that the key retrieved is indeed the valid one for data transfer between the client a given server computer. Certificate Management System (CMS) – This is the application that controls or monitors the certificates issued and facilitates the verification process. The CMS forms the core of the PKI infrastructure as the CA and RA computers in the given PKI implementation are expected to host a validated CMS program to enable the connection-oriented communication between the client and the server. The key issue associated with the case described above is the fact that the CMS program itself is an independent application and hence its reliability/robustness to prevent malicious attacks alone dictates the extent to which a given CA or RA is reliable over the Internet. The key security strategy in case of the PKI implementation is the sharing of the public key whilst retaining the private key at the server computer as argued by Burnett and Paine (2001) [8]. This strategy allows the server computer to effectively encrypt or decrypt the information without depending upon the public key and hence leading a two pronged attack as the information encrypted using private key can be deciphered using the public key and vice versa. Although the use of the two independent keys helps overcome the security threats to the information being transferred, the transfer process itself is not governed by the PKI. This is the major weakness of the PKI infrastructure that allows room for malicious attacks that can hamper the performance by the CA, Ra or the host server computers as argued by Burnett and Paine (2001). From the above discussion it is evident that the security established using the PKI is mainly dependant on the following key elements of the PKI infrastructure CA and RA – The validity and reliability of these computers play a vital role in the effective implementation of the PKI. Apart from the fact that the client computer sending the information depends upon these computers security of the information in its entirety, it is also clear that the availability of these computers and their responses in terms of session time control and preventing session time-out cases are critical to enable successful communication in a connection-oriented implementation using the TCP protocol. An attack on the hosting server for the CA or the RA mainly in terms of flooding or denial of Service will result in the failure of the PKI infrastructure in terms of lack of availability. This situation is one of the major elements that must be addressed as part of the security strategies to be implemented on the transport layer protocols. Encryption Algorithm – The encryption algorithm used for issuing the public and private keys is another element that influences the security and reliability of the PKI as argued by Burnett and Paine (2001). The effectiveness of the hashing algorithm used for the purpose is not only essential for ensuring the security of the information through encryption but also dictates the size of the information for transmission after encryption as well as the speed associated with the data transfer for a given encryption strategy. As the complexity of the encryption algorithm naturally increases the size of the data being transferred thus affecting the speed associated with the communication, it is critical to establish a balance between security and speed in order to enable effective communication over an established connection. It is also important to note that the use of encryption algorithm dictates the extent to which a hacker can hack into the information that is being transfer whil st launching a transport/network layer attack as argued by Burnett and Paine (2001). It is deemed that the hackers through launching malicious attacks at the transport layer or the network layer tend to utilise the time gap to decipher the information being transferred in order to use the data for personal benefits. This makes it clear that the code hacking at the protocol level mainly attribute to the speed with which a given payload data transferred over a connection can be decrypted prior to termination of the connection itself as argued by Burnett and Paine (2001). From the above arguments we can deduce that the encryption poses the threat of single point of failure to the PKI in terms either being weak to prevent infringement or highly strong affecting the communication speed as argued by Nash et al (2001). Advantages or benefits of PKI The major benefits of the PKI include the following The TTP presence enables higher level of security through verification by independent entities in the communication process. The CA and RA in the PKI play a vital role in achieving the aforementioned. The dedication of resources for developing stronger algorithms to generate reliable public and private keys is yet another advantage associated with the PKI implementation. This makes it clear that the transport layer protocol (TCP) of the network layer protocol (IP, ICMP) weaknesses in terms of the request for resend and other key elements of connection verification can be overcome through robust algorithms. The growth f the electronic commerce at an exponential rate is one of the key factors that attribute to the availability of resources dedicated to the development of the PKI security strategies (Nash et al, 2001). The security infrastructure behind the storage and retrieval of the public keys is yet another area where the reliability and effectiveness of the PKI is evident. The fact that in case of reliable CA and RA, the security is indeed robust and the information being transferred is secure as well as the communication process as argued by Nash et al (2001). Constraints, Weaknesses and threats TTP reliability and costs – As discussed before the major issue is the TTP reliability. The involvement of the TTP not only questions the

What is meant by internal and external drivers for change

What is meant by internal and external drivers for change With globalisation it is an important to have clear concept about business management. Business environment is the totality of all such factors which influence the working and decision making of a business organisation. Business is a commercial enterprises ventured into secure maximum possible profit and to give best services to the public. These are things, events or situations that occur the way a business operations, either in a positive or negative way. This can be called driving forces or environmental factors. They are; Internal driving forces, which are the things, situations or events that are occurred inside the business and these generally under control of the company. The main internal driving forces are given below; Technological Capacity The new discoveries make the old one obsolete. The business community has to keep itself abreast with the technological changes. And it is also an important aspect as it shapes the business operations in the long run. Today the scientists are working on such technologies which will change the entire production process. The company is not running without most modern technology, they cannot competent to others Organisational Culture Organisational behaviour can be defined as the systematic study of the behaviour and attitude of both individual and group within the organisation. Organisations that have a powerful success spirit, and always embrace change and listen to staff and customers are said to be forward looking. Forward looking organisations, they are risk takers and also they done there business very well. So organisation is the essential part of a company. There is no well organisation culture in a company, which may negatively affect the production of a company, to fight in the competitive business world, business turnover, co-ordination of employees, staff etc Financial Management Finance is the main factor of a business. Without money, no business. There is direct relationship between money and the business. According this view financial management has a powerful stand in the business organisation. In a company the finance management take decision about fund distribution like purchase of raw materials, introduce new assets, proper fund distribution etc In these reasons financial management has a powerful stand in the internal driving force. Employee Morale The level of confidence and strength of a person or group is very important of a company. The employee has no morale or they are not committed their job, the company going in down words. The employees are satisfied with their both company and job, which will make a positive energy For increasing employee morale the Corus Company introduce more programs and also they provide mental confidence to the employees. Poor Delivery Poor customer service or delivery is a universal problem that impacts on the bottom line and profit margins in all types of industries, business and services throughout the world. The time plays an important role in the business. Customers need goods and services at their own time; otherwise they select another comfortable company or services. For example; The Corus Strip products UK (CSP) The Corus Company, there were delays to delivering steel to customers on time. So that leads to loss of business. Competition Globalisation has sharpened the competition. Introduce new ideas, technologies, innovations, techniques etc are the main parts of business competition. To face the competition every organisation suffer more things like expense, organisation problems, external problems etc.. For example Corus steel company cannot competitive to other companies because production of steel in UK could be more expensive than from than other countries. In these reason the Corus Company faced many problems in the business world. High wastage The wastage makes a big trouble to the companies, and also they dont know how to overcome this problem. Every organisation looking for less wastage and more product. For example, the Corus Company falling to make products right first time meant that they had to be reworked or scrapped. II External Driving Forces External driving forces are those kinds of things, situations or events that occurred from outside of the company or organisation. And now we can discuss about, what are the external driving forces of a company. Economy There is an intimate relationship between the business firm and the economic environment. The performance of business depends up on the economic environment. At any type of financial fluctuations like inflation or deflation badly affect the business. Political Influence The political forces are directly bearing on the functioning of the business. Political influences like ideology of parties, Govt. policies, Govt decisions, political stability, tax policy, etc are positively or negatively affected the business environment. New Competitors Competition makes challenge the business world. New competitors make more trebles for other companies, because they introduce new technology, ideas, innovations and customer satisfied goods and services with reasonable price. But old companies cannot competitive with them as well because there machines, technologies and all other things are old, and they cant replace it. For example, low cost producers in Eastern Europe were taking business and its could lead to reduce demand with higher costs. Technology It is also an important aspect as it shapes the business operations in the long run business. Technology includes inventions, discoveries and new and better techniques of converting the resources in to final product. Technology helps in performing the operations in much better and cheaper way. The customer expects higher specifications, so it can maintain only new technologies. Customer Satisfaction Customer satisfaction is a business term, is a measure of how products and services supplied by a company meet or surpass customer expectation. It is seen as a key performance indicator within business and is part of the four perspectives of a Balanced Scorecard. In business, customers are the king. For customer satisfaction every company introduce new products, attractive packing, adopting new technology, attractive schemes, offers etc Day to day every customers looking for a new technology and high quality products, so the company update there thinking, technology, otherwise they cannot competent with others. In these reasons customer satisfaction has a powerful external driving force of a company. Both internal and external factors are driving the running business. But it under controlled by business organisation. A well organised management can be easily controlled these internal and external driving forces. In the case of Corus Company, in 2005 they introduce new cultural programme called the journey The main courses of this programme is to overcome the poor driving behaviour. For overcoming the both external and internal poor behaviour they introduce so many programmes like push up employees skills, self awareness, promotion and development programmes etc After the programme the company get a new face in the business field. There are external and internal driving forces to promote sustainable development of Corus Company. The different driving forces have different strength levels. The external driving forces provide external condition to CPS UK development. The internal driving forces are permanent fountainhead to promote Corus sustainable development. All the driving forces are indispensable to promote Corus Companies sustainable development. 2. What barriers to change existed at Corus? Resistance  to change is the action taken by individuals and groups when they perceive that a change that is occurring as a threat to them. Key words here are perceive and threat. The threat need not be real or large for resistance to occur. In its usual description it refers to change within organizations, although it also is found elsewhere in other forms. Resistance is the equivalent of objections  in sales and disagreement in general discussions. Resistance may take many forms, including active or passive, overt or covert, individual or organized, aggressive or timid. Resistance is an inevitable response to any major change. Individuals naturally rush to defend the status quo if they feel their security or statuses are threatened. Folger Skarlicki (1999) claim that organizational change can generate scepticism and resistance in employees, making it sometimes difficult or impossible to implement organizational improvements. In order to understand the concept of employee resistance, it is critical to define what is meant by the term  resistance. Change is a common occurrence within organisations, and resistance to change is just as common. There are several types of resistance to change. Understanding these different types of resistance, the company can reduce resistance and encourage compliance with change. There are basically two groups associated with a resistance to change of an organisation. (I)Individual level of sources (II)Organisational level of sources (I)Individual level of sources Individual sources of resistance to change reside in basic human characteristics such as perceptions, personalities, and needs. In the case of Corus Company they faced many problems in resistance to change, especially in internal sources. The following summarizes reasons why individuals may resist change in Corus Company. I.1 fear to unknown Some changes require that employees possess a new set of skill and hence without training. So employees will not welcome the changes of a company. In the case of Corus Company, they make some more changes for their improvement of a company, but employee resistance the changes. Because they fear about their job, current position, other benefits etc In the Corus Company, the fear of unknown badly affects the new changes of the company I.2 Lack of skills This is another problem of resistance to change of a company. If company introduce new changes that may directly affect the employees of a company At that time they update them self without any training. The employees of Corus company they had fear about their skills, current teams, and position etc I.3 Habit Resistance due to habit occurs when the employees are comfortable in their daily habits and do not want to alter them due to change, because they are already skilled and experienced person in their own works. Sudden changes or alternatives cannot accept to the employees. So it may another course of resistance to change. Employees of Corus Company, they did not change their habits and attitude, so they resist the changes of the company I.4 Ageing work force Corus Company has a powerful work force. Lot of skilled and experienced employees are the power of a company. When the company introduced new innovations, technologies, ideas that may affect the workforce of employees. Older employees has very big personal skill and experience, that cannot be transferable. So it may another reason for resistance to change of Corus Company. I.5 Economic factors Employee may fear that the change will lead to technological unemployment, because new technology is associated with education of labour intake so they resist the change. When workers resist changing, which will leads to high standards which in turn may reduce the opportunities for bonus or incentive pays. The new changes make disturbance in their work. These all things show the economic factors in resistance to change. II Organisational Sources Organisational changes are activities of transformation or modification of something. The main purpose of these types of activities is improvement of business result. Organisational changes are not simply the journey from one point to another point. Many barriers will need to be passed in this process. One of the biggest barriers is resistance that is sub component on every organisational change. Managers should have known that there are always people that will resist of a change process. Efficiency and effectiveness of a change process are in direct relation with resistance and successfully dealing with that resistance. So these are the main organisational sources for resistance to change; II.1 Threat to job status or security Job reductions had been a major problem in the steel industry since the 1970s. At the same time the Corus companys some previous changes had lead to cut jobs. So this is the course for resistance to change of a company. Other people didnt see a threat to their job because the business had previously survived difficult times. This is difficult to Corus. II.2 Unexplained changes to the time line If the time line o the change process that is spelt out of the beginning of the change process is continually shifted without explanation, employees will lose confidence in the change process and they will not share management vision. II.3 Lack of trust In an environment where there is a lack to believe, that there will be sinister motive for the change. Furthermore managers who do not trust their employees will not allow employees participation in the change process even when it is necessary. So lack of trust is another important factor of resistance to change. So these are the main resistance to change in the Corus Company. From the above reasons employees of the Corus Company did not accept the changes. Directly or indirectly barriers make many problems in the company and also it affects whole companys activity. The company also had a long term service experience with experienced employees, but they had lower productivity. For increasing productivity the company add changes and gaining more rewards rather than newer employee. Corus felt that this was an area that needed major changes, so company were suitably rewarded to the employee for higher output. 3. Analyse the approaches Corus used to overcome these barriers. Changes are an inevitable factor in any organisation. The effective and challenged leaders and management can manage changes, adopting new technology, new innovations etc Yet as inevitable as change may be, it is just as inevitable that there will also be individuals within this organisations who reject any major changes or innovations to their workplace. The barrier shows the efficiency of a company or organisation. Barriers make many problems in the company, but if a company manages theses problems, they can run a business very successfully. Some strategies which can be used to overcome this resistance to change. For example, CSP U.K. The Corus Company faced many problems like cultural issue, social issue, economical factors, habit of employees, fear of unknown, limited forces changes etc But the Corus Company overcome the barriers very well, and we can see how Corus Company overcomes the barriers. There are five tactics have been suggested for use by change agents in dealing with resistance to change in the Corus company U.K Communication There are two branches of communication, which are communication internally, within the organisation between employees and management and externally between the organisation and suppliers and customers. Organisations that fail to communicate with their customers and suppliers, changes that are in effect can face disastrous consequences. For increasing communication skills the Corus Company introduce new programme The Journey. According to this programme the employees increase their direct and indirect communication, for example they provide weekly newsletters and workshops etc Participation Where the initiators do not have all the information they need to design the change and where others have considerable power to resist. When employees are involved in the change effort they are more likely to busy into change rather than resist it. This approach is likely to lower resistance and those who merely acquiesce to change. For example, from the start it was important to the Corus Company to share with employees what might happen to the business if it is did not change. Corus give more important to their employees, also getting everyone to take ownership of the new values by physically signing up to the programme. After that the employee more involved in decision making, works etc and also their experience are recognised. So with the good participation the company can overcome the barriers. Building emotional commitment Today talent management is the key imperative, making employee commitment more important than other. The commitment makes a positive energy inside and outside the business organisation. Research on middle managers has shown that when managers or employees have emotional commitment to change, they favour the status quo and resist it. For building emotional commitment the Corus Company U.K provide many more programs. Corus provide ownership to their employee. It may more involve in decision making and their contributions. With the help of emotional commitment programme the Corus Company overcome the barriers of change. Implementing changes fairly The management seen that the change as positively. But the employees take those changes as negatively. So if a company introduce new changes of their company at the same time they think how to overcome the barriers. For example, in 2005 the Corus Company make a programme for overcome the barriers of change, and also increase employee morale. Around 150 workshops were held to spread the messages. Fortnightly newspaper clarified these values and repeated the key messages through articles on various activities, such as employees taking part in the redesigning of a control room to improve layout and safety. Billboards, intranet, video programmes and most of all, direct one-to-one conversations all reinforced the messages. And also 1500 senior managers were invited to the millennium Stadium in Cardiff. This programme is impressive venue raised expectations. However, they were served cold tea and give a presentation on a ripped projector screen. So these activities show the implementing ch anges of Corus Company. Selecting people Research suggests that to ability to easily accept and adapt is change is related to personality. Some people simply have more positive attitude towards them self, are willing to take risk and are flexible in their behaviour. Another study found that selecting people based on a resistance to change scale worked welling winnowing out those who tended to react emotionally to change or to be rigid. For example, the Corus group arrange many programmes for increasing working mentality of the employees. The journey also raised important questions about how the company managed key issue, such as alcohol or drug misuse. For keep this thing the company makes, all working sites are alcohol free. Understandably, before the change programme, any one offending in this way was likely to face disciplinary action and this is still the case in most working environment. As a result in over fifty employees that previously would have lost their jobs being retained in work. These points said that, how the Corus company overcome the barriers to change. In generally, the first key technique to overcome the resistance the barriers is that to work closely with employees. Employees are the main part of a business, so the management make creative and helpful ideas for their employees otherwise company lost their co-ordination power, employee morale, unity between employees and management. For increasing the self confidence of the employee, the company provide verity programs. In these types of programs Corus company overcome the barriers to change. 4. Evaluate the effectiveness of the change programme so far. The changes can make challenges in the world. In the same way without challenges there is no change. Significant organizational change occurs, for example, when an organization changes its overall strategy for success, adds or removes a major section or practice, and/or wants to change the very nature by which it operates. It also occurs when an organization evolves through various life cycles, just like people must successfully evolve through life cycles. For organizations to develop, they often must undergo significant change at various points in their development. Leaders and managers continually make efforts to accomplish successful and significant change its inherent in their jobs. Some are very good at this effort, while others continually struggle and fail. Thats often the difference between people who thrive in their roles and those that get shuttled around from job to job, ultimately settling into a role where theyre frustrated and ineffective. There are many schools with educational programs about organizations, business, leadership and management. Unfortunately, there still are not enough schools with programs about how to analyze organizations, identify critically important priorities to address and then undertake successful and significant change to address those priorities. Now we are going to evaluate the effectiveness of the change in the Corus Company. Corus Company was formed in 1999 when the former British steel plc merged with the Dutch company. Now the Corus Company is subsidiary of Indian owned Tata Group. In 1999 Corus has three operating divisions and 40,000employees in world wide. Corus aims to be a leader in the steel industry by providing better products, higher quality customer service and better value for money than its rivals. In 2005 CSP UK introduced a cultural plan for change called The Journey. The journey change programme at Corus Strip Products contributes to sustainability for the business. By facing up to its internal weakness, CSP has improved efficiency, increased output, lowered costs and reduced waste in an increasingly competitive steel market. This has enabled the business not just to survive but also to grow even during the economic recession of 2008 and 2009. Thanks to the Journey programme, CSP UK expects to reduce costs for the 2009/10 financial year by around  £250 million. To make sure that actions delivered results, Corus established clear targets and standards. After the journey Corus Company achieve their target. The key performance indicators are given below; -: Increased their production capacity from 4.5% to 5 million tonnes -: They reduce 20% of cost of production -: 5000 employees have signed up to the values and beliefs of the business -: Another outcome is reduction in absenteeism -: The measurable improvements in levels of quality and services for customers -: New outcome changes have increased new safety terms -: Emissions of carbon dioxide has reduced by 10%, so CSP UK exceeds Govt. Standards -: As the results of measurable improvements company make challenges in the local community For achieving company values and targets, all individuals, departments are engaged very well. This journey helps to enable further improvement of Corus Company. Individuals, teams and departments all support the improvement culture and are more engaged and committed to achieving company values and targets. This culture shift is of critical value as it will enable further improvement. Corus has implemented top-level security with controlled access for the 5000+ vehicles which enter the Corus site each day. This provides a new enhanced entry experience for employees, contractors and suppliers and demonstrates that Corus Strip Products is now seen as an organisation that is proud of itself. As a men, institution, organisation or a company as if everybody looking for a change. Because we need changes. If they fail to do so they may be left behind by the competition. change management at CPS (Corus Strip Products) UK involved bringing the issues out into the open, confronting barriers to change, winning the commitment, provide moral support to the employees, provide better and effective plan for change an also keep the internal and external relationship to the customers. The journey has helped CSP UK to get a new face in the business field. After the programme employees get more morale power from the top level management, as the result they more attached with their work. The result of the change management programme shows that, the Corus is a sustainable company and it can continue to make profits in spite of the recession. In these things said that the effectiveness of the change programme in the Corus company UK. When the Corus Company introduced new changes in their company, at that time the employee did not accept the changes in their own individual, group and social reasons. But the company overcome the resistance of change very well. This is show that the change may challenge peoples. It may even be seen as a threat. Which company make it as a challenge; they must be adopting the changes in their organisation. Word count- 3888

Saturday, July 20, 2019

Monopoly :: essays papers

Monopoly The Monopoly a) Using Australian examples describe the characteristics of the two of the following forms: Monopoly Oligopoly The main characteristics of an oligopoly are: Â · The market is dominated by only a few companies, which are relatively large. Â · The production of identical products which are similar. Â · There are significant barriers to entry. Â · The interdependence of production decisions within the market. An Oligopoly market exists in which a small number of firms dominate the supply to an entire market. Each firm producers a very similar product. In Australia the oligopoly is the major market form. It is because Australia is so small market located far from overseas markets and this thus requires producers to be larger, so they are more competitive. There are hundreds of examples of oligopolistic industries, e.g. cars (Holden), breakfast cereals (Kellogs) This market form does not only depend on the larger producers, but the recognition of their interdependence, the action of one producer will affect the actions of others and each oligopoly firm watches their rivals closely. Oligopolies compete fiercely for market share, therefore the competition for existing or new consumes is intense, as each producers products are very similar. As a result oligopolists have little influence over price. For example Shells petrol is very similar to Mobil petrol, therefore these two companies watch each other closely. Oligopoly firms attempt to make their products different in the eyes of consumers. This can be achieved in many different ways. Firstly by providing quality improvements in goods or services such as electrical sound equipment, secondly by different packaging or wrapping, thirdly by bonus offers or prizes on purchase, for example Just Jeans offering free sunglasses. The more product differentiation among oligopoly firms, there is a more chance of each firm has being independent from its rivals when setting price or output. It is hard for new firms with a small market share to enter the oligopoly market and produce enough to make the product cheap for consumers to buy. The small amount of large firms can often produce large amounts of quantity to provide for all consumers to purchase. It is difficult for new firms to win market shares form existing producers, particularly if those firms have large advertising budgets, licenses, design patents or restrict access to raw materials on one way or another.