Wednesday, October 30, 2019

British Media and Cultural Studies Essay Example | Topics and Well Written Essays - 1000 words

British Media and Cultural Studies - Essay Example It is often called as Pop culture or popular culture since this is followed by people irrespective of their class or religious affinities. Mass media plays a very importanty role in disseminating values or ideas of mass culture. In fact, mass culture is possibly acquired due to modern communications and electronic media. These agencies use their wide networks and mass reach to popularize and transmit ideas and values that are picked by the population. Thus mass culture is different from so called subcultures where there is a certain distinctiveness due to community or religious or regional concepts. This culture or concept actually gains recognition because it is loosely based on ideas of freedom and liberalization. People can choose to be free from their regional and religious disparities and gain common ground for interaction with each other. This could in a form of music, art, films, fashion or the form of language they use to comminicate with each other. Earlier. It was thought t his mass culture or pop culture is only associated with young population. But it is not so , even the adults or the older generation identifies itself with with the value system or the new ideas. Thus mass culture is the value system whose appeal cuts across all barriers of education, sex, age, religion or community. Paul Hodkinson talked about the concept of subcultural substance in h... These four criterias should be used to ascertain the worthiness of something being a subculture. Thus these criteria are used as a tool for description and analysis of different subcultures. A subculture is a distinct subset of a culture, which coexists within a culture and is distinguishable from the majority culture by its values, ideas and a common way of life. Fischer defines a subculture as, "...a large set of people who share a defining trait, associate with one another, are members of institutions associated with their defining trait, adhere to a distinct set of values, share a set of cultural tools and take part in a common way of life" (Fischer, 1995). Identity: The people of a subculture have a distinct feeling of identity which they share with other members.of their group. This feeling is the feeling of oneness amongst them. Commitment: The commitment of the members of a subculture towards a common shared way of life is another important factor. The people follow certain rules or set of practices that they follow in their everyday routine. And they show a particular commitment to guard or protect their unique practices or the values that make them distinct from others. This is passed on from generation to generation within the community. Consistent distinctiveness: The third criteria of consistent distinctiveness is the existence of a set of shared tastes and values which is distinctive from those of other groups and reasonably consistent, from one person to the next and over the years. This is again passed from generation to generation. Autonomy : As per Hodkinson, autonomy is the fourth criterion to be evaluated when defining something as a subculture. Autonomy is nothing but a action of self government. This is not a sort of

Monday, October 28, 2019

Jet Airways Essay Example for Free

Jet Airways Essay Naresh Goyal, who already owned JetAir (Private) Limited (which provided sales and marketing for foreign airlines in India) took advantage of this opportunity by setting up Jet Airways as a fullservice scheduled airline that would give competition to state-owned Indian Airlines. Indian Airlines had enjoyed a monopoly in the domestic market between 1953, when all major Indian air transport providers were nationalised under the Air Corporations Act (1953), and January 1994, when the Air Corporations Act was repealed, following which Jet Airways received scheduled airline status. Jet Airways’ 45 destinations include most of the big cities in India. International destinations include Kathmandu, Colombo, Singapore, Kuala Lumpur, Londons Heathrow Airport, Bangkok, Brussels and Newark. Jet Airways was the first private airline in India to fly to international destinations. It started international operations in March 2004 between Chennai and Colombo after it had been cleared by the Government of India to operate scheduled services to international destinations. MACRO ENVIRONMENT FACTORS: Economic Economic environment of India and world affects the airline industry to a great extent. Factors like fluctuations in global fuel prices, exchange rates, slowdown etc have varying impact on the way Jet Airways has been operating in this sector. One of the most important aspect that has greatly affected the worlds transportation system is the high fuel price. Besides high taxes, jet fuel prices have become costlier than crude oil prices which have greatly affected the bottom-line for many airlines including Jet Airways. State taxes on ATF available through government agencies vary between 4% and 30%, making the fuel 30% to 50% costlier than the global average. In Tamil Nadu, Karnataka, Bihar, Madhya Pradesh, Gujarat, West Bengal, Maharashtra and Himachal Pradesh the cess is 25% or higher. The three listed airline companies – Jet Airways, Kingfisher and SpiceJet – all of which reported losses in the quarter ending December 2011, blamed rising ATF cost for their bad financial performance. In February 2012, the Centre gave a nod to direct import of ATF on a case-to-case basis But once airlines start importing ATF, traffic at the countrys congested ports is likely to increase, making matters worse for exporters and importers. Airlines will also have to factor in the cost of transporting ATF from the various ports in the country to airports around the country, something which could eventually lead to increase in the ATF cost. Jet Airways in its financial report has also indicated the losses that it has incurred due to rupee depreciation. It has been reported that revenue from exceptional items decreased by 61% from Rs. 18,919 lakhs in Fiscal 2011 to Rs. 7,319 lakhs in Fiscal 2012 mainly on account of depreciation of the Rupee against the Dollar in the current year. Even in the past Jet Airways has experienced slowdown because of global recession. In 2008 during recession, Jet Airways was forced to discontinue the following routes: Ahmedabad–London, Amritsar–London, Bangalore–Brussels and Mumbai–Shanghai– San Francisco. It also had to put an indefinite delay on its expansion plans. Naresh Goyal, Jet Airways promoter is unable to put in more funds via his holding company due to FDI restrictions. He holds 80% in Jet Airways through Tailwinds. He claims NRI status, where 100% ownership is allowed. However, Goyal’s investment is via Tailwinds, which is considered FDI by the Indian government. Tailwinds is registered in the Isle of Man. In India, only 49% FDI investment is permissible in aviation. Airline business is a complicated one and only airlines would be interested in investing domestic carriers. The government is looking at allowing foreign airlines to invest in domestic carriers but there would be no change in FDI cap of 49%. In this 49%, currently foreign airlines are not allowed to participate. So if this change happens then there would be inflow of funds from foreign airlines. The announcement of ECB (External Commercial Borrowing) with a limit $1 billion in the Budget 2012 will also give some relief to debt ridden airline companies. Shareholding Naresh Goyal 80% FII 6. 7% DII 7% Public hold 6. 3% Social The backbone of the airline industry is people. Individuals in the management, technical and crew are responsible for undertaking the task of serving their customers with utmost care and excellence. These individuals are trained and tailored to the industrys needs before they are allowed to work. They need to meet certain standards of service and technical knowledge designed to satisfy the customers. For this reason the players invest millions of dollars to improve the knowledge of their workers. Jet Airways plans to set up a marketing services firm and launch an aviation training academy, with a total investment of Rs 1 crore. The proposal is, however, subjected to regulatory approvals, including those from the Foreign Investment Promotion Board and the Reserve Bank of India. The proposed academy would be based in Mumbai and offer certificate courses in in-flight services, ticket reservation and check-in services, according to a brochure brought out for the institute. Operations in the northeast are guided by the governments Route Dispersal Guidelines (RDG) which entails that all Indian carriers fly to the northeast and other remote parts of the country, more so as a social obligation. After posting a loss of Rs 298 crore in the last quarter, Jet Airways has sought government clearance to scale down its flights to the northeastern region by about half to stem the losses. Technological Technological factors in macroenvironment are the most dramatic forces in changing the market place. They help the business to create new products and harness new opportunities. Jet Airways makes strategic use of the latest technology to interact with passengers at a global level. Its significant presence on social media platforms like Facebook, Twitter, LinkedIn, YouTube and Flickr ensures increase in awareness and reach of the company brand. The companys growth on the social media networking platform has been noteworthy registering an exponential increase in the number of followers and fans on Twitter and Facebook. In the coming year, the Company aims to introduce state-of-the-art mobile applications for Android, iPhone, BlackBerry and Windows mobile phones. These applications will provide passengers with a convenient and seamless option to book tickets, check-in, access their JetPrivilege account etc. using their mobile phones. Additionally, the Company intends to commence the use of 2D Mobile Bar-coded boarding passes for guests who have checked-in for their flights, thus providing a paperless travel experience. Political In India, one can never over-look the political factors which influence each and every industry existing in the country. Like it or not, the political interference has to be present everywhere. Given below are a few of the political factors with respect to the airline industry: The airline industry is very susceptible to changes in the political environment. One instance of Government Policy resulting in great uncertainty is the fact that the Indian Government has not allowed foreign airlines to participate in FDI in aviation as yet. So the airline industry, which is currently facing draught of funds can still not expect foreign players to chip in. International airlines are greatly affected by trade relations that their country has with others. Unless governments of the two countries trade with each other, there could be restrictions of flying into particular area leading to a loss of potential air traffic (e. g. Pakistan India) Political factors can also affect the day-to-day working of the airline industry. For instance, in 2009, Jet Airways announced plans to lay-off 1800 employees that were undergoing probation with the Company. What happened was a PR disaster for the Airline. First the laid off employees suddenly became socialist in their approach and later went a step further managing to politicize the whole matter by seeking support from MNSs Raj Thackeray. Other parties and sundry ministers then followed the suit and jumped into the bandwagon, until the Jet Management had to revert the decision and ask laid off employees to join the duty back. Legal and Regulatory Operating in a cross border network of alliances and partnerships, multinational companies like Jet airways are subject to international and national regulations in terms of assignment of routes and destinations; international aviation regulations; partners legal standing as well as local laws. These constraints not only leave little room for airlines to operate but are also the sources for its highly efficient value chain. Another aspect is industrial relations. Personnel in the airlines industry from pilots to cabin crew to technicians everyone work in the capacity and provisions given by the laws prevalent globally. For this reason, everyone is cognizant of their rights to legal aid if required. Since most of the airline personnel in the world have associations and unions they tend to have an upper hand over management. The management therefore has to comply with their demands if it is within the capacity of the law Not only is this but the airlines also subject to strict safety, hygiene and efficient regulations. Airlines that do not deliver services according to international standards do not only lose out in the competition but are also subjected to aviation penalties. The principal regulatory authority that regulates the civil aviation sector in India is the Director General of Civil Aviation, or DGCA. To operate scheduled services in India, an airline requires an operating permit from the DGCA. This permit is required to be renewed on a year-to-year basis. An airline incorporated in India and operating scheduled services is also required to register all its aircraft with the DGCA, save and except aircraft which are wet leased. On July 10 2012 aviation regulator E K Bharat Bhushan was abruptly removed from his key position in the backdrop of his tough stance against debt-ridden Kingfisher Airlines over its failure to pay salaries to its employees. Newly-appointed chief of the Directorate-General of Civil Aviation Prashant Sukul on 13th July 2012 asked all airlines to strictly adhere to prescribed safety standards. Demographics Indian aviation industry promises huge growth potential due to large and growing middle class population, favorable demographics, rapid economic growth, higher disposable incomes, rising aspirations of the middle class, and overall low penetration levels (less than 3%). Few prominent factors we need to look at from demographics perspective: Working age population India is blessed with a young and growing population. India has amongst the best demographic ratio globally and this would continue to improve over next three to four decades. As compared to children and elderly, a relatively higher percentage of the earning population travels by air to save working hours and for business. The rising proportion of people of working age also implies higher disposable income as pressure on household for the needs of dependent children elderly comes down. Both the above factors along with a growing working age population would lead to higher demand for air travel. Exploding Middle Class McKinsey Global Institute (MGI) predicts that the India’s middle class will reach 583 million from the current 50 million by 2025. With this exploding middle class the demand for air travel is bound to go up in a unidirectional way. Nuclear families increase Increasing VFR (Visiting Friends and Relatives) Travel The traditional ‘joint-family’ system in India is rapidly breaking up. With increasing expenses and with more people migrating to cities for work, people are increasingly opting for nuclear and small families. This trend of smaller families has also bought a change to their lifestyles, with friends relatives visiting more frequently and families taking more vacations – implying greater frequency of travel. Air travel is finding a growing proportion of this additional travel, with smaller families making air travel for the entire family more affordable. Increasing Employment Growing employment means higher disposable income, more business travel and higher opportunity cost of travel time. All these contribute to higher demand for air travel. Increasing Leisure Travel Tourism accounts only for 2. 5% of India’s GDP, versus 6% in Asia Pacific and 5. 3% in China. However this ratio is fast changing with India emerging amongst the fast growing tourism destinations in the world.

Saturday, October 26, 2019

The Paleolithic and Neolithic Stone Ages Essay -- Essays Papers

The Paleolithic and Neolithic Stone Ages The first scholars that existed named the whole period of human devolvement the â€Å"Stone Age.† The stone age is divided into three periods which are Paleolithic which means the old Greek age, Mesolithic and Neolithic which is the new Greek age. The Paleolithic and Neolithic stone ages have many great differences and has changed greatly between the two periods. The Paleolithic is divided into three phases which are Lower, Middle, and Upper. The upper stone age began about 42,000-37,000 years ago and has continued up until the ice age ended. Their ways of forms of communication are much different of the way we communicate now. Their forms of communication is visual arts which consists of sculpture, architecture, painting and other arts we just haven't figured out. Animals and the women in the nude were very popular form of art in the upper phase. They also believe because of the many women figures during that period that women dominated during this time. Their forms of shelter were by living in the mouth of a cave or building a hut or tent next to a protective cliff. Building these structures weren't quiet easy. The huts were made of light branches or hides that accommodated about 6 people. Most of the activities were inside the fire pit, where food and tools were prepared, making clothing, sleeping and working on stone was also taking place there. Most of their art work was made of cave work and cave painting. As...

Thursday, October 24, 2019

Stop Smoking Right Now

Diamanta Stop Smoking Right Now Do you know every 10 seconds someone dies from smoking related diseases? There are many people who have smoking habit nowadays, and the age of first time smokers is getting lower in Taiwan. People start smoking for many different reasons, some think smoking lets them feel relaxed, some think smoking looks cool, and others may just want to try. However, when people start smoking, it will be hard to stop because cigarette contains tobacco which makes them become addicted.These smokers enjoy smoking every day, but they seem to not know that smoking causes so many problems which not only concern themselves, but also other non-smokers. In my opinion, people should give up smoking right now because smoking affects their interpersonal relationship, does harm to human health, and brings secondhand smoke. For one thing, smoking concerns smokers’ interpersonal relationship. When people are smoking, most non-smokers dislike the smell of cigarette. In fact, this irritant smell will cling to smokers for a long time, including their hair, body, and clothes.Moreover, smokers’ breath always reeks of cigarettes, and it is also hard to be removed. Actually, it is very impolite and offensive to talk with others with the stale cigarette smoke. On the other hand, smokers’ teeth will become yellow if they smoke too much. Expect the smell of cigarettes; unclean teeth also give others a bad impression. In short, smokers should try to be considerate to others’ feeling, especially when they are in public. Second, smoking influences on human health. Smoking can seriously damage human body, and it is considered to a health killer.Actually, the most serious problem is studies have confirmed that smoking causes various kinds of cancer, including cancers of nose, mouth, throat, and lung. The more cigarettes a person smoked each day, the more risk of cancer increases. However, heart disease also relative to smoking. Heart disease is the leading cause of death today, and there are a large number of people who die from heart problems because they smoke heavily. Another bad effect of smoking is aging of the skin. Smoking consumes Vitamin A in the skin and cause wrinkles, especially around the lips and the eyes.On the other hand, pregnant women also should not smoke. A pregnant woman who has smoking habit also influences on the  unborn baby, and it may cause her baby born too early or with low birth weight. To sum up, smoking really causes a variety of bad effects on human body. Finally, smoking makes secondhand smoke. Secondhand smoke is also called environmental tobacco smoke. In fact, Secondhand smoke is the smoke that comes from the burning end of a cigarette and the smoke exhaled out by the smoker. When people stand near a smoker, they breathe secondhand smoke. However, many people still do not realize the dangers of secondhand smoke.Actually, secondhand smoke also affects non-smokers, and it is very harmful to human body. Secondhand smoke has more than 50 chemicals that cause lung and breathing problems, including coughing, hard to breathe, moreover, it is possible that it causes lung cancer even people do not smoke. In addition, according to the researches, secondhand smoke increases the risk of heart disease by 15 to 20 percent. In Taiwan, secondhand smoke cause about 20,000 of the deaths of heart disease each year. As a result, everyone should keep away from smokers because secondhand smoke is dangerous.In conclusion, smoking is against social politeness, causes damage to both smokers’ and non-smokers’ health, and makes terrible secondhand smoke. Smoking really does not bring any benefit, so people should not smoke or buy cigarettes anymore. I think smokers must realize that not just their health will be affected; everyone around them is also influenced by their bad habit. For staying in good physical condition, smokers should consider to take steps towards quitting s moking from now. Staying smoke free let people keep healthy, get more energy, and live a better life.

Wednesday, October 23, 2019

Classroom observation Essay

I have been observing several elementary teachers during the past eight weeks. All instructors bring into the classroom their individual teaching styles. Within that style there are various and assorted behaviors and actions they performed in their instruction. Most of the teachers observed presented the topic they were teaching. The instructors used teaching aids such as overhead and PowerPoint slides. It helped to keep students on track in the presentation of information. Teachers encouraged class participation in the subject to be taught by asking questions related to the topic. The students connected easily with the material when they could relate it to prior knowledge. Teachers were very organize and interested in communicate with their students. They periodically asked question and made sure students were understanding the concept presented. Students seem to be enjoying the instructional time with their teachers. They seem relaxed, attentive, on task, and actively participating in the subject. I could see that there were hardly any behavioral problems. When students were beginning to lose track of subject, there was one teacher that use humor to bring them back. I run into one exemption when observing a 1st grade teacher. His classroom was not well organized. You could see stacks of papers on different tables. Wall signs were falling down, trash on the floor. Students were the same way. Their desks were full of trash. Their books and supplies under their desk were all over the place. The instructor asked the students to take their language art book out and wrote the page number where they were going to start reading. He had another student controlling the a CD player to star reading along with the CD. It was chotic in that classroom I believe that instructor was not prepare enough to teach this subject and he needs classroom management.

Tuesday, October 22, 2019

Ethical Reasoning to Determine the Course of Action

Ethical Reasoning to Determine the Course of Action Developing software that controls the autopilot system on a prototype of a commercial airplane is highly recommendable for safety reasons. Testing the system suitably is equally imperative. Hurrying up the testing to meet the publicly announced testing deadline may lead to compromising the reliability and safety of the entire aircraft system.Advertising We will write a custom essay sample on Ethical Reasoning to Determine the Course of Action specifically for you for only $16.05 $11/page Learn More Various theories recommend different methods of handling the moral dilemma.  The managers, travelers and professional bodies have the right to obtain trustworthy information about the security system installed in the aircraft. Bodies such as the Global Agenda Council on Space Security and Department of Defense Space Management have legal and moral responsibilities for ensuring space safety. An engineer also has the responsibility to model an autopilot that recei ves data from the Global Positioning System software installed in the aircraft. The GPS receiver should be able to calculate the aircraft’s position in space. Equipped with such positioning information devices, an autopilot helps keep the plane straight. Moreover, it helps efficiently execute the flight plans. Performing the right task is essential. It would be morally challenging to decide whether to implement the universal professional demands or those of the boss or not. There are two alternative actions for solving the dilemma. The first possible action is implementing the demands.The other option is objecting to implement them. Objecting to implement the unprofessional demands is the best course of action to take since it would guarantee the safety of those on-board. The decision to object to the demands obeys the rules of Kantianism theory. The theory states that what an individual desires to accomplish and what he/she should accomplish are often incompatible. This mean s that an individual may make decisions that result to immediate discomfort and unhappiness. However, the decision should ultimately lead to satisfaction. The entire rationale of morality is taking the right course of action just for the sake of it. The manager’s appreciation of the intention to test the aircraft appropriately should have no impact on the decision to turn down his/her request. The short-lived feeling of displeasure should not also have an impact on the decision made. Therefore, I would take the decision to comply with the correct rules and procedures and save lives of people and the aircraft.  Certain groups of people may disagree with the decision. This may be due to their inability to determine independently what is either wrong or right.Advertising Looking for essay on ethics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Kant states that an individual determines his/her behavior by making use of the l aw of autonomy. Therefore, a decision is either wrong or right depending on the intention of the action. In addition, morality is never relative. An individual is either morally upright or not. This happens because morality is not determined by the outcome of the decision but by the intention of the action. Since it is impractical to predict accurately the consequences of human actions, I would adopt the Kantianism theory in order to save the situation. This means that the task is accomplished professionally. The action would ensure that the stakeholders incur no losses. However, if they incur losses due to the decision, I would remain contented that the intention was non-malicious and the consequences were beyond my control. Alternatively, one would prefer to act based on the theory of Consequentialism. The accuracy of this theory is determined by two ethical principles. The first principle states that the consequences of an act establish whether an action is morally right or not. The other principle affirms that the degree of superiority of the results determines the scale for measuring the morality of the action. The problem with this theory is that it is difficult to accurately predict the outcome of an action. A person who adopts this theory can choose to comply with the demands of the boss and keep details of their action secret. They may comply with unprofessional requests and hope that no evil would befall the stakeholders. Another group of people may prefer to adopt the theory of Virtue Ethics. The hypothesis deemphasizes rules, consequences, and particular acts. It greatly focuses on the personality of the actor. The important factor, according to this hypothesis, is whether the person who is acting is articulating excellent personality or not. Therefore, an act is considered to be right when performing this act, the individual exercises, demonstrates or builds up an ethically virtuous character. Any one undergoing through similar challenges can rely on the theory, evaluate the moral character of the boss, and comply with the demands, particularly if he/she is convinced that the boss is morally upright. Conclusively, the right decision should not be based on general assumptions. The character of the boss has no direct influence on the consequences of the decision. Similarly, the theory of Consequentialism may be irrelevant since outcomes of decisions are influenced by a myriad of factors. Some of the factors are beyond human control. I, therefore, prefer the Kantianism theory because it requires an individual to take control over his/her decisions.Advertising We will write a custom essay sample on Ethical Reasoning to Determine the Course of Action specifically for you for only $16.05 $11/page Learn More

Monday, October 21, 2019

Meteorological Hazards in Aviation

Meteorological Hazards in Aviation Introduction Throughout its history, the aviation industry has had a close but unpleasant relationship with the vagrancies of weather (Vickers et al., 2001). Indeed, it has been proved that weather is the single largest contributor to delays and a foremost factor in aircraft disasters and incidents, implying that real-time weather information is substantially critical for hazardous weather avoidance in aviation operations (Witiw, Lanier Crooks, 2003).Advertising We will write a custom essay sample on Meteorological Hazards in Aviation specifically for you for only $16.05 $11/page Learn More Weather continues to exact its toll on the aviation sector, particularly when this argument is viewed in the context of past accidents that have been reported in mainstream media as caused by either meteorological hazards or a combination of human factors and weather elements (Broc et al., 2005; World Meteorological Association, 2007). The present paper critically discus ses some of the well known meteorological hazards in the aviation industry. Concept Definition Meteorology has been described as â€Å"†¦the science of the atmosphere, a sea of air that is in a constant state of flux† (Vickers et al., 2001, p. ix). Within this science exists a wide allay of weather/climatic conditions arising from natural interactions with other factors, products and byproducts, but which triggers a set of hazards that may prove disastrous to the aviator who must operate within the precincts of the atmosphere (Simpson et al., 2002). It is reported in the literature that no one is immune to the everyday oscillations of these meteorological hazards as they sweep across huge sections of the globe before dissipating (Vickers et al., 2001). Meteorological Hazards in Aviation Available literature demonstrates that there exists a multiplicity of weather conditions that qualify as hazards in aviation due to the scope and context of the dangers they present to th e industry (Broc et al., 2005). Some of the most predominant ones include icing, volcanic ash, poor visibility, windshear, heavy rains, lee waves, fronts, thunderstorms, cold weather and deformation zone (World Meteorological Association, 2007). This section samples a few of these meteorological hazards in aviation. Windshear Witiw et al (2003) describe the windshear as â€Å"†¦a sudden shift in wind direction, velocity, or both† (p. 131). These authors also report that the most aggressive expression of the condition occurs in a microburst, which is an intense downburst of cool air generated by, or released from, a large convective cloud. The World Meteorological Organization (2007) defines windshear as â€Å"†¦layers or columns of air, flowing with different velocities (i.e. speed and/or direction) to adjacent layers or columns† (p. 1). Windshear is a foremost hazard for low, slow flying aircraft in either the approach or departure phases due to the complica ted wind patterns occasioned by the downdrafts. As the aircraft glides through the microburst it stumbles upon intense headwinds accompanied by a substantial increase in aerodynamic drift and successive severe downdrafts, ultimately causing it to experience a rapid loss of lift and crash into the ground (Witiw et al., 2003).Advertising Looking for essay on aviation? Let's see if we can help you! Get your first paper with 15% OFF Learn More Consequently, some of the detrimental hazards caused by windshear include: 1) loss of aerodynamic lift and airspeed, making the aircraft to plunge into the ground before corrective action is taken by the flight crew, 2) turbulence especially in light aircraft, and 3) structural damage to the aircraft (Witiw et al., 2003; World Meteorological Organization, 2007). In the United States, the National Transport Safety Board (NTSB) database reveals that nearly 250 accidents involving U.S. aircrafts have been attributed to windshe ar, with 30 of them reported as major (Witiw et al., 2003). Thunderstorms Although one of the most beautiful atmospheric phenomenon (Harding, 2011), extant literature demonstrates that â€Å"†¦no other weather encountered by a pilot can be as violent or threatening as a thunderstorm† (Vickers et al., 2001, p.34). Indeed, thunderstorms generate more threats to the aviation industry and it is always important for the flight crew, air transport safety agencies, meteorologists and other interested stakeholders to not only understand their scope and context, but also how to deal with them effectively. Thunderstorms are generated by the coming together of several ingredients, including: 1) unbalanced air mass, 2) atmospheric moisture in the low levels, 3) some triggering mechanism, e.g. daytime heating or upper level cooling, and 4) other related meteorological vagrancies such as windshear (Vickers et al., 2001). These ingredients interact through a process called convection ( transport of heat energy) to produce thunderstorms that basically attempt to correct the imbalance generated when the atmosphere becomes heated unevenly (Harding, 2011). It is important to note that there exist different types of thunderstorms that affect the aviation industry. Some of the most common types of include: 1) air mass thunderstorms – form within a worm, moist air mass and are non-frontal in character, 2) frontal thunderstorms – form either as a result of a frontal surface lifting an unbalanced air mass or a stable air mass becoming unbalanced due to the lifting, 3) squall line thunderstorms – aggressive combinations of strong winds, hail, rain and lighting, 4) orographic thunderstorms – occur when moist, unbalanced air is forced up a mountain slope at high pressure, and 5) nocturnal thunderstorms – develop during or persist all night (Vickers et al., 2001). Thunderstorms have the capability to generate hazards that can cause untold suf fering in the aviation industry. For instance, â€Å"†¦all thunderstorms can produce severe turbulence, low level windshear, low ceilings and visibilities, hail and lighting† (Harding, 2011, p. 1).Advertising We will write a custom essay sample on Meteorological Hazards in Aviation specifically for you for only $16.05 $11/page Learn More It is not uncommon to hear news of aircraft that get lost in severe thunderstorms or helicopters that get struck by lightning, implying that each of these conditions can be potentially catastrophic (Broc et al., 2005). Other hazards generated by thunderstorms include ruthless clear icing, extremely profound precipitation, and dangerous electrical releases within and near the thunderstorm cell (Vickers et al., 2001; World Meteorological Organization, 2007). Visibility It is reported in the literature that reduced visibility is the meteorological element which impacts aviation operations the most through cancelled flights, accidents as well as incidents (Vickers et al., 2001). These authors posit that the aviation industry uses various types of visibility, which include: 1) horizontal visibility – the furthest visibility achieved horizontally in a particular direction by referencing objects or lights at known distances, 2) prevailing visibility – the ground level visibility which is common to one-half or more of the horizon loop, 3) vertical visibility – the maximum visibility achieved by looking vertically upwards into a surface-based impediment such as mist or snow, 4) slant visibility – visibility achieved by looking forward and downwards from the cockpit of the aircraft, and 5) flight visibility – the standard range of visibility at any given time forward form the cockpit of an aircraft in flight. Reduced visibility is caused by a multiplicity of factors, including lithometers (dry particles suspended in the atmosphere, such as haze, smoke, sand and dus t), precipitation, fog (radiation fog, frontal fog, steam fog, advection fog and ice fog), as well as snow squalls and streamers (Vickers et al., 2001). As already mentioned, low visibility leads to flight cancellations, fuel wastage as aircraft is unable to land in designated destination, aircraft damage in midair collisions, and deaths resulting from aircraft accidents (Watson, Ramirez Salud, 2009). Volcanic Ash The 2011 massive flight cancellations in Europe that were triggered by airborne volcanic ash from the Grimsvotn volcano in Iceland prove that volcanic ash is a major hazard to aviation safety at all levels. Indeed, â€Å"†¦like fine-grained mineral dust, volcanic ash affects radiative forcing and climate, public health, vegetation, and can cause property damage and disruption to community infrastructure† (Hadley, Hufford Simpson, 2004, p. 829). The major problem with volcanic ash emanates from the fact that onboard aircraft radars are unable to detect concent rated ash within or near eruption plumes, leading to life-threatening encounters, huge losses in flight cancellations, and aircraft damage (Simpson et al., 2002).Advertising Looking for essay on aviation? Let's see if we can help you! Get your first paper with 15% OFF Learn More The damage caused by volcanic ash often calls for expensive repairs or total equipment replacement, thus it is of outmost importance for flight crew to ensure total avoidance of the ash for flight safety. What’s more, the pumice material contained in volcanic dust acts to abrade the aircraft’s leading edges (i.e. wings, struts, and turbine blades) to a point where the aircraft can cause a fatal accident if no replacement is done (Vickers et al., 2001). Icing or Icy Weather Schreiner (2007) acknowledges that â€Å"†¦icy weather, including ice pellets and cloud droplets that freeze on contact, affects air travel all over the world, especially during colder months† (p. 152). Aircraft icing takes place when supercooled water droplets from the atmosphere hit an aircraft whose body temperature is colder than 0oC, crystallizing into ice and occasioning serious detrimental effects that often expose an aviator to the real probability of causing an accident (World Me teorological Association, 2007). The two most important meteorological factors that affect icing include liquid water content of the cloud and temperature structure in the cloud. Some of the detrimental effects caused by icing include: 1) restriction of visibility as windshear glazes over, 2) disturbance of the smooth laminar air flow over the aircraft wings, occasioning a decrease in lift and an increase in the stall speed, 3) increase in aircraft weight and drug, hence decreasing fuel efficiency, and 4) incomplete or absolute blockage of pitot heads and static ports, thereby allowing erroneous instrument readings (Vickers et al., 2001). A study conducted by the NTSB demonstrates that approximately 819 people lost their lives in accidents linked to in-flight icing between 1982 and 2000 (Schreiner, 2007). Heavy Rain Although there is no agreed upon definition regarding rainfall intensity, heavy rainfall is defined in the literature as rates in excess of 4 mm per hours, while heavy s howers are perceived as rates in excess of 10 mm per hour (World Meteorological Association, 2007). Heavy showers, which are often associated with thunderstorms, qualify to be seen in the context of a meteorological hazard to aircraft due to their capacity to not only reduce physical and canopy/windscreen visibility, but also permit water ingestion into the cabin/cockpit/engine partitions of light, non pressurized aircraft, thereby endangering the effective and efficient operations of electronic equipment within the aircraft. There exists a possibility for aircraft turbine engines to ‘flame out’ and cause destructive effects under conditions of extreme rainfall and subsequent water ingestion (World Meteorological Association, 2007). Additionally, it has been reported that intense rainfall affects aircraft braking mechanism and may cause the aircraft to skid off the runway during takeoff and landing (Vickers et al., 2001). Duststorms/Sandstorms Duststorms and sandstorms, according to the World Meteorological Association (2007), are regions of raised dust and sand due to intense wind activity. The particles are propelled to different altitudes depending on the speed, instability and resolution of the wind flow, in line with the principle that smaller and lighter elements are lifted more readily and to much more elevated altitudes than weighty elements. Duststorms and sandstorms bring potentially destructive outcomes in aviation, such as reduced visibility, reduction of engine power in the event of dust and sand ingestion into aircraft engines, costly repairs, and aircraft crash in the event of a complete engine lockdown (Hadley et al., 2004; World Meteorological Association, 2007). Conclusion The paper set out to critically discuss some of the well known meteorological hazards in the aviation industry. It has been sufficiently demonstrated how normal meteorological processes, such as windshear, thunderstorms, visibility, volcanic ash, icing, heavy r ain, as well as duststorms and sandstorms, operate to become potential hazards in aviation. The potentially destructive outcomes arising from the different meteorological processes have been discussed at length, with the results demonstrating that many meteorological hazards lead to loss of life through aircraft accidents, loss of profits through frequent flight cancellations and rescheduling, loss of aircraft through structural damages, as well as costly repairs. It should therefore be the task of meteorology experts to conduct intense awareness campaigns in the aviation industry regarding the serious issues posed by meteorological vulnerabilities. Reference List Broc, A., Delannoy, A., Montreuil, E., Lalande, P., Laroche, P. (2005). Lighting strike to helicopters during winter thunderstorms over North Sea. Aerospace Science Technology, 9(8), 686-691. Hadley, D., Hufford, G.L., Simpson, J.J. (2004). Resuspension of relic volcanic ash and dust from Katmai: Still an aviation hazar d. Weather Forecasting, 19(5), 829-840. Harding, K. (2011). Thunderstorm formation and aviation hazards. National Weather Service. Retrieved from https://aviationweather.gov/general/pubs/front/docs/jul-11.pdf Schreiner, P. (2007). Enhanced icing product to guide aircraft around hazards. Bulletin of the American Meteorological Society, 88(2), 152-154. Simpson, J.J., Hufford, G.L., Pieri, D., Servranckx, R., Berg, J.S., Baver, C. (2002). The February 2001 eruption of Mount Cleveland, Alaska: A case study of an aviation hazard. Weather Forecasting, 17(4) 691-704. Vickers, G., Buzza, S., Schimidt, A., Mullock, J. (2001). The weather of the Canadian Prairies. Ottawa, Ontario: NAV Canada. Watson, A., Ramirez, C.V., Salud, E. (2009). Predicting visibility of aircraft. PLoS ONE, 4(5), 1-16. Witiw, M.R., Lanier, R.C., Crooks, K.A. (2003). Integrating human factors into the human-computer interface: How best to display meteorological information for critical aviation decision-making and performance. Journal of Air Transportation, 8(2), 129-138. World Meteorological Organization. (2007). Aviation Hazards. WMO/TD-No. 1390. Web.

Sunday, October 20, 2019

Hrotsvitha von Gandersheimâ€Dramatist, Poet and Historian

Hrotsvitha von Gandersheim- Dramatist, Poet and Historian Hrotsvitha of Gandersheim wrote the first plays known to be written by a woman, and she is the first known European woman poet after Sappho. She was a canoness, poet, dramatist, and historian. Surmised from internal evidence of the writings that she was born about 930 or 935, and died after 973, perhaps as late as 1002 The German Dramatist is also known as Hrotsvitha of Gandersheim, Hrotsvitha von Gandersheim, Hrotsuit, Hrosvitha, Hrosvit, Hroswitha, Hrosvitha, Hrostsvit, Hrotsvithae, Roswita, Roswitha Hrotsvitha von Gandersheim Biography Of Saxon background, Hrotsvitha became canoness of a convent in Gandersheim, near Gà ¶ttingen. The convent was self-sufficient, known in its time for being a cultural and educational center.  It had been established in the 9th century by Duke Liudolf and his wife and her mother as a free abbey, not connected to the hierarchy of the church but to the local ruler.  In 947, Otto I freed the abbey completely so that it was also not subject to a secular rule.  The abbess in Hrotsvithas time, Gerberga, was a niece of the Holy Roman Emperor, Otto I the Great.  There is no evidence that Hrotsvitha was herself a royal relative, though some have guessed that she might have been. Although Hrotsvitha is referred to as a nun, she was a canoness, meaning that she did not follow the vow of poverty, though she still took the vows of obedience and chastity that the nuns did. Richarda (or Rikkarda) was responsible for the novices at Gerberga, and was a teacher of Hrotsvitha, of great intellect according to Hrotsvithas writing.  She later became an abbess. At the convent, and encouraged by the abbess, Hrotsvitha wrote plays on Christian themes. She also wrote poems and prose. In her lives of the saints and in a life in verse of Emperor Otto I, Hrostvitha chronicled history and legend. She wrote in Latin as was usual for the time; most educated Europeans were conversant in Latin and it was the standard language for scholarly writing.  Because of allusions in the writing to Ovid, Terence, Virgil, and Horace, we can conclude  that the convent included a library with these works.  Because of mention of events of the day, we know that she was writing sometime after 968. The plays and poems were shared only with others at the abbey, and possibly, with the abbess connections, at the royal court. Hrotsvithas plays were not rediscovered until 1500, and parts of her works are missing.  They were first published in Latin in 1502, edited by Conrad Celtes, and in English in 1920. From evidence within the work, Hrostvitha is credited with writing six plays, eight poems, a poem honoring Otto I and the history of the abbey community. The poems are written to honor saints individually, including Agnes and the Virgin Mary as well as Basil, Dionysus, Gongolfus, Pelagius and Theophilus.  Poems available are: PelagiusTheophilusPassio Gongolphi The plays are unlike morality plays that Europe favored a few centuries later, and there are few other plays extant from her between the Classical era and those. She was obviously familiar with the classical playwright Terence and uses some of his same forms, including satirical and even slapstick comedy, and may have intended to produce more chaste entertainment than Terences works for the cloistered women. Whether the plays were read aloud or actually performed, is unknown. The plays include two long passages which seem out of place, one on mathematics and one on the cosmos. The plays are known in translation by different titles: Abraham, also known as The Fall and Repentance of Mary.Callimachus, also known as The Resurrection of Drusiana.Dulcitis, also known as The Martyrdom of the Holy Virgins Irene, Agape and Chionia or The Martyrdom of the Holy Virgins Agape, Chionia, and Hirena.Gallicanus, also known as The Conversion of General Gallicanus.Paphnutius, also known as The Conversion of the Thais, the Harlot, in Plays, or The Conversion of the Harlot Thais.Sapienta, also known as The Martyrdom of the Holy Virgins Faith, Hope, and Charity or The Martyrdom of the Holy Virgins Fides, Spes, and Karitas. The plots of her plays are either about the martyrdom of a Christian woman in pagan Rome or about a pious Christian man rescuing a fallen woman. Her Panagyric Oddonum is a tribute in verse to Otto I, the abbess relative.  She also wrote a work about the abbeys founding, Primordia Coenobii Gandershemensis.

Saturday, October 19, 2019

Debate the merits and problems of oil nationalisation for Iran Essay

Debate the merits and problems of oil nationalisation for Iran - Essay Example This paper will analyze the various merits and problems that faced Iran as a result of nationalization of its oil industry. Structure of the Paper The basic structured in a manner that its initial page provides a cover page detailing basic information on the paper such as the name, course and institution that the writer attends. A concise thesis statement follows there after and provides a brief highlight of what the paper is essentially all about. The main body of the paper is characterized by an adequate description of the turbulent nationalization of the oil industry in Iran, This is followed by a detailed outline that Iran stood to actually gain from the Nationalization of its oil industry as well as the eventual demerits of the country’s oil nationalization program. All the different sections and subsections of the paper have been adequately outlined by preceding relevant headings. These headings serve to provide a brief overview of what that particular section of the pap er is all about. What is Nationalization? The concept of nationalization can broadly be defined as the general process where by a state or government takes into public ownership the overall running of a private industry or assets that had previously been perceived to be private. Although the concept of nationalization is usually seen to refer mostly to the taking over of private assets by the government, in some instances, it can also be seen to refer to taking the taking control of some of the assets that are normally controlled by the lower levels of a given government. When this form of nationalization occurs, it usually results in lower government assets such as municipalities being effectively owned and operated by the state. History of Nationalization Concerns as to the effects of nationalization were seen to be largely prevalent during the most part of the twentieth century. This concern was mainly as a result of the increased and aggressive nationalization of most of most of the industries in Europe by the various socialist and communist governments. During the 1960s through to the 1970s that there was the emergence of a myriad of newly independent governments all over Africa, Latin America and Asia that sought to take over the operations of the foreign-owned business enterprises that operated in their countries. During the process of nationalization of various industries, there always emergences various questions relating to the establishment of if there was adequate compensation paid out to the owners of the previously private industries during the nationalization process (Schaffer, Agusti and Earle, 2009, p. 606). Soon after the concept behind communism started dying out late in the 1980s, most of the governments that had initially taken to nationalizing their various industries were seen to run these industries to the ground due to several factors. In a bid by most of these government to try and redeem this situation, most of these governments took to trying to sell nationalized assets to various private sectors organizations in a bid to try to privatize these assets by transferring the various assets that were owned by the government to the private sector’s control. This privatization of the previously nationalized business enterprises was basically a reversal of the nationalization-expropriation process. (Schaffer, Agusti and Earle, 2009, p. 606). The Iranian Oil Industry Oil was initially discovered in Iran in 1901 when William Knox D’

Friday, October 18, 2019

The creative use of music within occupational therapy Essay

The creative use of music within occupational therapy - Essay Example This "The creative use of music within occupational therapy" essay describes what types of illnesses music can heal, why and how it happens. Many hospitals, special schools, prisons and community service centers offer music therapy for children through adults. â€Å"Developmental delay, emotional and behavioural problems, autistic, spectrum disorders, learning disability, communication disorders, mental health problems stress, stroke recovery/rehabilitation and physical illness† describe some of the conditions for which people have found music therapy to be beneficial. â€Å"By offering support and acceptance the therapist can help the client to work towards emotional release and self acceptance† (What is Music Therapy 2005). A music therapist might work in public practice such as a hospital, at the government level, e.g: at the local education facilities, a national health organization or social service work. They may also choose private practice with an office to them selves. â€Å"In all work settings, music therapists function as part of the multi-disciplinary team, their observations adding greatly to the understanding of each client's needs, abilities or problems†. Often working as a part of a team, music therapists may â€Å"coordinate programming with other professionals such as early intervention specialists, medical personnel, child-life specialists, psychologists, occupational and physical therapists, speech/language pathologists, adapted physical education specialists and art and dance/movement therapists†.

Describing and explaining the picture attached Essay

Describing and explaining the picture attached - Essay Example There are rough expressions of colors, and a feeling comes that one of the colors has been ripped off at many a places, giving the feel of an old, worn-out painting. The overall look of the painting appears to be flat because the artist has not used vivid colors to distinguish one object from another. The proportion of the size of all objects is regular. Although there is not a clear message in the painting, yet I feel that there is a very deep note, keeping in view the murkiness of the white and black color that rules the painting. There is a sense of gloominess; and, the mother seems sad, but the presence of her baby is a spark of life. The painter has tried to reinforce the truth of life, which is a combination of sadness and happiness, or of dark and light shadows in life. Sadness rules in the painting, as the mother is not able to cope with the stressful moments of her life; while, joy is also there in the form of a

Thursday, October 17, 2019

International Relations Paper Essay Example | Topics and Well Written Essays - 750 words

International Relations Paper - Essay Example It has been one of the most researched topics by professionals and academics alike. The field has made more development over the last decade than it ever made in the past. Many scholars suggest different reasons for the implementation of good international relations. They cite different benefits of international relations accruing to the implementing countries and to the entire world as a whole. One scholar suggests that international relations are dominated by two poles. At one end, the sphere of International Relations should be the policies of the United States with the rest of the world, and on the other, it is the EU controlling the flow of policies in the international relations. International Relations gained more prominence after the USSR-USA Cold War in the 1990s. Both of these nations tried to win allies and hence it started a cycle of every country trying to find a partner in the sphere of politics, trade, security and power. International Relations have become an importan t aspect in international relations because every country days is trying to show the strength in number after the US-Iran tensions. There are a lot of advantages of developing a sound policy of international relations, not just by the super powers of the world, but for every nation of the world. (Krotz & Maher, 2005) Many social scientists have argued that International Relations are totally driven by Trade Policies. In fact the economies of the world have become so interlinked that is unimaginable to separate them with the politics and other important facets of the international political environment. Therefore an important part of foreign or international relation is the economic and business development part. No two countries can have stable relations unless they are involved in the international trade. Many social scientists believe that it is the bilateral trade that drives the foreign policy of all countries. The breakdown in the relationship between Iraq and the United States of America happened when Saddam Hussein threatened that Iraqi would not sell oil to American companies. This caused the international crude oil prices to soar and resulted in uncertainty and economic instability around the world. There were question marks regarding what the future holds for Iraq and how will the United States of America going to change its foreign policy in response to Saddam’s threat? It led the two countries to war. It can be said that International Relations policies are a function of trade and economic policies. Not a long ago, there was a tension between the United States of America and Republic of China. But over the years two countries have patched up their difference. Many economists believe that two nations have covertly decided that their economies are too big to go to war. In case, there is a war between the United States of America and Republic of China no one nation could emerge as a winner, but instead it would create economic instability in bo th countries, more so in the United States of America. International Relation hence cannot work alone without the economic policies. Both economic policies and International Relations work together to shape a foreign policy and hence no nation in the world cannot succeed without having sound economic and international relations policies. Another important role that good international relations play is the stable global environment. Without having stable global env

Negative Effects of Advertising on American Youth Essay

Negative Effects of Advertising on American Youth - Essay Example One of the ways through which companies use technology is through advertising and marketing. Through this, companies communicate with consumers, mainly creating awareness about their new products, or promoting their companies, for increased profitability. Marketing and advertising benefits the company the most, since this promotes company products, hence more sales for the company. On the other hand, consumers too benefit from marketing and advertising, as this makes them aware of the products in the market by different companies, thus are able to make their purchasing decision, after comparing various products in the market. However, advertising and marketing is also known to have negative influences on the target population for which the adverts are aimed. Marketing and advertising has negative effects on the youth in America, and these include eating disorders and obesity, body dissatisfaction, violence, and consumerism. Commercial broadcasting is highly used by different companie s today. The television is the most known for airing most commercials advertisements today. This is probably because more people have access to the television; therefore, companies can reach a larger number of people through the television. On the other hand, print magazines are also a channel for advertisements, which is used by different companies. Most youth, especially the females, are highly attracted to fashion magazines, which are available and produced by various companies. Similarly, outdoor advertising, which involves different outdoor activities planned by a company, are mainly aimed at promoting the company and its products. Other forms of outdoor advertising include transit posters, bus adverts, bench advertising, and highway billboards, which communicate various messages from a company to the public. Nonetheless, apart from promoting and boosting company sales, these different forms of advertising have negative effects on the youth in America. Advertisements and the ap proach used therein are considered to brainwash most people and affect the perspective of people on morals and self-image (Harper, Brit and Tiggemann 645). In the United States, there is the right to freedom of speech for advertisers, and this could probably be the reason why these sometimes ignore the negative implications of most of their advertisements. With regard to body dissatisfaction, most youth in America are influenced by the body images in various advertisements, and therefore, think of those as the ideal body images (Hargreaves and Tiggemann 469). In television advertisements for beauty products for both male and females, model women and men are used. In the past, women models were portrayed as plumb and healthy, however, today, models are portrayed as skinny (Sparks 217). On the other hand, male models on television advertisements today are portrayed as men with steroidal masses, with muscles, and great strength. According to Hargreaves and Tiggemann, the exposure to th e model body images in television advertisements has a negative impact on the perceptions of the youth about their bodies (470). These might therefore, look for ways of attaining the â€Å"ideal† body, as portrayed in television advertisements. The second negative effect of advertisements to the youth in America is obesity and eating disorders. Obesity is a growing problem in the United States today. This problem affects the youth also, and this is highly attributed to the massive advertisements shown on the television and other advertising platforms, promoting fast food. Obesity is lethal, since this could lead to type 2 diabetes. The main factor promoting this in the United Sta

Wednesday, October 16, 2019

International Relations Paper Essay Example | Topics and Well Written Essays - 750 words

International Relations Paper - Essay Example It has been one of the most researched topics by professionals and academics alike. The field has made more development over the last decade than it ever made in the past. Many scholars suggest different reasons for the implementation of good international relations. They cite different benefits of international relations accruing to the implementing countries and to the entire world as a whole. One scholar suggests that international relations are dominated by two poles. At one end, the sphere of International Relations should be the policies of the United States with the rest of the world, and on the other, it is the EU controlling the flow of policies in the international relations. International Relations gained more prominence after the USSR-USA Cold War in the 1990s. Both of these nations tried to win allies and hence it started a cycle of every country trying to find a partner in the sphere of politics, trade, security and power. International Relations have become an importan t aspect in international relations because every country days is trying to show the strength in number after the US-Iran tensions. There are a lot of advantages of developing a sound policy of international relations, not just by the super powers of the world, but for every nation of the world. (Krotz & Maher, 2005) Many social scientists have argued that International Relations are totally driven by Trade Policies. In fact the economies of the world have become so interlinked that is unimaginable to separate them with the politics and other important facets of the international political environment. Therefore an important part of foreign or international relation is the economic and business development part. No two countries can have stable relations unless they are involved in the international trade. Many social scientists believe that it is the bilateral trade that drives the foreign policy of all countries. The breakdown in the relationship between Iraq and the United States of America happened when Saddam Hussein threatened that Iraqi would not sell oil to American companies. This caused the international crude oil prices to soar and resulted in uncertainty and economic instability around the world. There were question marks regarding what the future holds for Iraq and how will the United States of America going to change its foreign policy in response to Saddam’s threat? It led the two countries to war. It can be said that International Relations policies are a function of trade and economic policies. Not a long ago, there was a tension between the United States of America and Republic of China. But over the years two countries have patched up their difference. Many economists believe that two nations have covertly decided that their economies are too big to go to war. In case, there is a war between the United States of America and Republic of China no one nation could emerge as a winner, but instead it would create economic instability in bo th countries, more so in the United States of America. International Relation hence cannot work alone without the economic policies. Both economic policies and International Relations work together to shape a foreign policy and hence no nation in the world cannot succeed without having sound economic and international relations policies. Another important role that good international relations play is the stable global environment. Without having stable global env

Tuesday, October 15, 2019

The Legendary Abolitionist And Fictional Lady Essay

The Legendary Abolitionist And Fictional Lady - Essay Example More than eighty years later, Francie Coffin is the protagonist of Daddy was a number runner by Louise Meriwether. Set in the Depression-era ghettos of Harlem in the 1930’s, Francie is a young (12 years old) girl who helps her father in his business, numbers running. Prior to the state lotteries, the gangsters had one going and the runners picked up the bets from the customers. Meanwhile, the novel explores every facet of gritty New York street life. She is trying her best in school and gets brilliant marks but outside of its comfortable environments, she has to deal with such horrible realities as the perverted old men who try to molest her and bullies and street gangs who abuse her. All around Francie is abject poverty and brave and proud but beaten people. Finally, her family is forced to go on relief. In the novel, one sentence is almost a mirror of modern times when Francie’s mother tells her â€Å"Elizabeth's coming back home today with her kids and Robert. Their furniture got put out on the street." Elizabeth was her sister. Yet she and Douglass share one thing in common, their fierce determination that no matter what their circumstances, their lives would eventually be much better. For example, Douglass made a New Year’s Resolution in 1836 that he would be a free man that year. It actually took another two years but the point is his vow came true for him due to his willpower. As he said, â€Å"I could see no reason why I should, at the end of each week, pour the reward of my toil into the purse of my master†.... Prior to the state lotteries, the gangsters had one going and the runners picked up the bets from the customers. Meanwhile the novel explores every facet of gritty New York street life. She is trying her best in school and gets brilliant marks but outside of its comfortable environments, she has to deal with such horrible realities as the perverted old men who try to molest her and bullies and street gangs who abuse her. All around Francie is abject poverty and brave and proud but beaten people. Finally, her family is forced to go on relief (welfare). In the novel one sentence is almost a mirror of modern times when Francie’s mother tells her â€Å"Elizabeth's coming back home today with her kids and Robert. Their furniture got put out in the street." Elizabeth was her sister (Meriwether). Yet she and Douglass share one thing in common, their fierce determination that no matter what their circumstances, their lives would eventually be much better. For example, Douglass made a New Year’s Resolution in 1836 that he would be a free man that year. It actually took another two years but the point is his vow came true for him due to his willpower. As he said, â€Å"I could see no reason why I should, at the end of each week, pour the reward of my toil into the purse of my master† (Douglass II). Likewise, Francie Coffin makes a vow to never pickled herring again, for evidently that was one of the staples of relief handouts. Whether she made good on her promise was never revealed, for the novel ended only a year later with her father departing. WORKS CITED Douglass, Frederick, Narrative of the Life of Frederick Douglas, An American Slave†, Web, November 27, 2012.

Monday, October 14, 2019

Project Manager Essay Example for Free

Project Manager Essay The main communication method they use is the telephone. This is because it is handy and convenient to use, and it is also fast. They use telephone for various reasons such as to arrange an appointment, to confirm orders, to book activities etc. The alternative method instead of using the telephone could be e-mail and letter, this way they can keep the letter for hard copy and evidence to confirm that they did arrange the appointment if there are any complications. The Fax machine is quite useful because it is fast and the letter can be kept for hard copy so there will be no need to type up any information. A meeting saves quite a lot of time and they get feedback from people immediately. Some information may be confidential so a certain method may need to be used such as face to face or letter, this way no confidential information is being leaked. There are different types of communication used because they need to know which type of communication to use for each purpose for example if its confidential they can either use telephone or letter so that no confidential information is being released out. And also if letter or email is being used, this can be kept for future reference and hard evidence for any purpose. Although there are some disadvantages of using the alternative methods, this is due to the confidentiality of information handling. Some information needs to remain or private in a company so a certain method has to be used. How information is collected, processed and stored All administrative staff play a key role in: Collecting information: whether it arrives in the mail, electronically, by telephone or is passed on by word of mouth. Processing information: inputting it, merging it with other information, sorting it, reorganising it, reproducing it or updating current records. Storing information: in filing systems and on computer. The main aspect of a storage system is so you can find things quickly and the items stored are kept in good condition. Information is processed when it is changed or converted in some way. It may be improved or may be prepared for a particular use such as notes from meetings, messages from telephones, sales figures that need to be input into a spreadsheet etc. These roles are important to the Business because it depends how well information has been organised and stored so that it can easily be accessed when it is needed. Every day, Businesses receive a vast amount of paperwork that is generated by organisations such as forms, fax messages, telephone messages, letters, memos reports and many more. So the administrative staff is responsible for the storage, processing and collecting these information in order to keep the constant flow of the Business going. Post arrives at the reception and then is sorted and stored separately by name in a little locker by the reception assistant, each locker is provided with a key so the administration assistant or the manager has to collect their post from their locker. After all the post is bought back to the department to be opened and read, they also have to do certain things such as processing and storing the type of information. For example: When they receive an invoice for the art and crafts equipment, the amount is processed onto spreadsheet on the computer by the administration assistant. This is because they need to record how much money is spent using the companys money. Then the assistant writes a number on top of the invoice to help keep all the invoices in order which is then kept in a box file then stacked on the shelf. When the cheque is made out, the same number as the invoice is also written on the top of the cheque so they know they match. Records of the young people who join the community are kept on a CD Rom. Their details are also kept in a lever arch file and are updated if any changes have been made. The lever arch file is then stacked on the shelf along with some other files. When an application form is received, it is read by the manager and details of that person are noted down and then the form is filed in a vertical filing cabinet. If the manager approves one or two forms, he then photocopies them and then the original copy is filed and the other is sent to the director. All other information such as catalogues and booklets from the suppliers of office organisations are stored in a tall cardboard box file and is kept on the shelf. Decision making Decisions are made every day within businesses. The Board of Directors makes the major decisions at GAZ and the Project Manager makes the simple decisions such as what equipment to buy.

Sunday, October 13, 2019

Problems Faced By Chinese Students

Problems Faced By Chinese Students This current research is titled as Problems faced by Chinese students in learning English language: A case study of S.M. Pei Yuan KAMPAR. This chapter consists of nine sections which is background of the study, statement of problem, purpose of study, significance of study, research question, scope of study, methodology, limitation and definition of key words. Background of the study Learning English language as second language (L2) is a big challenge for second language learners. Students still have problems with grammatical functions most of the time, although they have 11 years of English language exposure. Hence, this study focuses on the first language (L1) grammatical functions that interfere with Chinese learners of English as a second language. In Malaysia, there are numerous learners who have Chinese language as their L1. Most of them have problems in learning English language especially the English grammar. Learners are more or less likely to be influenced either positively or negatively by their first language. According to Hassan (2002), learners L1 background knowledge will affect them in learning English language especially in speaking and writing. As a result, the interference of L1 has become the major problem for Chinese ESL learners in the process of learning English especially in writing. Chinese ESL learners will get interference from their L1 when they write. It is because they will get influence by their L1 grammatical structure. Besides, the differences of syntactic between L1 and L2 also will affect them in writing. A few studies have reported that Chinese ESL learners will use their mother tongue to plan an outline before writing (Cumming, 1989; Jones Tetroe, 1987), transfer the writing context to English language by using their mother tongue (Edelsky, 1982; Friedlander, 1990; Lay, 1982). Second language learners will use their mother tongue in such circumstances and the interferences from L1 to L2 can either be positive or negative. Learners L1 will influence In this study, researcher will examines mother tongue influence on Chinese learners 1.2 Statement of Problem To learn English as second language, learners at least have to master four basic skills which are listening, reading, speaking and writing. However, seldom Chinese ESL learners can fully master the skills especially in writing. It is because the L1 interferes of English Language causes grammatical errors in the writing process. According to Nik Safiah (1978), this kind of grammatical error can be obviously found in Chinse ESL learners essay writing. The differences between L1 and L2 grammatical funtions intefere on students English essay writing process. As we know that mastering English Language is not an easy task especially for learners who study in Chinese independent schools. It is because they mostly will get inteferenced from their L1 and affect the way they learn English. As a result, Chinese learners will face difficulty in learning English grammatical functions such as tenses, subject-verb agreement or countable and uncountable nouns. Although Chinese learners have exposed to English language since primary one, the errors still occur. Chinese ESL learner make this kind of grammatical errors because they do not fully utilize the language even though they are able to use it. As the saying goes, practise makes perfect if the learners do not polish their English language even with years of exposure to the language, it will make no different. 1.3 Purpose of Study The purpose of this study is to find out if L1 interference have a significant effect on Chinese ESL learners English essay writing. Besides, this study is also to identify types of errors that Chinese ESL learners commonly make with English grammatical functions in the English essay writing. 1.4 Significance of Study Although learners learn English since the first day enter they school. However, most of them cannot fully master English as their second language. This study can help teachers to understand the problems that learners face when they are learning English. Besides, teachers can identify the influence of learners L1 in learning English and among the errors, they help to correct the grammar. This can help to reduce the inteference of L1 from happening to students learning English. 1.5 Research Questions Based on the problems and purpose mentioned in the earlier sections, this study will focus on two research questions which are: Does L1 interference have a significant effect on Chinese Learners English essay writing? What types of errors do Chinese ESL learners commonly make with English grammatical functions in the English essay writing? 1.6 Scope of Study The aims of this study is to identify the inteference of learners L1 in learning English language. Learner who study in S.M. PEI YUAN (P) KPR would be chosen as participate in the writing test. This study is using purposive sampling because only one class of Chinese ESL learners will be selected as participants. 1.7 Methodology This study will utilize a test to find out why Chinese ESL learners have problems in learning grammar. The learners will be asked to write a short essay. The topic of the essay is My family and learners have to write around 100-120 words each. This test will be distributed to the learners during their classes. Thus, they will take the test seriously and the results of the data collected will be more precise. 1.8 Limitation This study is designed for those whose first language is not English language and have L1 background knowledge. The survey will only be conducted with one class of learners who study in S.M. PEI YUAN (P) KPR. Thus, the result do not represented all Chinese ESL learners. 1.9 Definition of key words Inteference learners make an error in ther L2 which influnced by their L1 (Lott,1983:256).

Saturday, October 12, 2019

Chocky - Tv Vs The Book :: essays research papers

Chocky The Novel Chocky was written by John Wyndham and was later adapted into a TV drama by the BBC. The producers, Pamela Londale and Vic Hughes, kept the same title for the TV series as the Novel, and named it Chocky, but the Film text had some changes in events, different character interpretation and alternative way of showing foreshadowing. The Film version differs quite a lot from the Novel. There were a number of changes to the plot, but most of these were only little issues. One of the major differences in plot was Matthew’s relationship with Colin. Colin was Matthew’s next door neighbour in the Novel, but there was no close friendship or relationship between them. However in the Film, Colin is Matthew’s best friend, classmate and neighbour, whom Matthew was always visiting and playing with. One of biggest changes occurs in the character Piff. Piff was Polly’s long gone imaginary friend in the Novel who was only talked about, whilst in the Film Piff was still around and living. Another change from the Novel was the way in which Chocky helped Matthew. Chocky gave Matthew the ability to draw properly, helped him to swim and then save Polly, and taught Matthew to do the binary code in both texts. However in the Film Chocky also gave Matthew super strength to play cricket, develop fast reflexes to play computer games and do the rubix cubes at amazing speeds. The Film Editor, Oscar Webb left out some scenes and added some different ones. One of these new scenes included the visit to the planetarium. Later we saw Chocky entering Matthew’s body during a Maths class, along with other scenes in the class rooms, such as biology, not previously mentioned in the Novel. Also Matthew visited Colin’s house on numerous occasions and we saw Matthew’s Mother and Father shopping for a new car and then Matthew winning a cricket game. The editor also added more detailed facts about the holiday at the Cottage. All of these extra events added more to the Film than the original Novel. n 2 - The two texts had quite a few different character interpretations. One of the major differences being in the interpretation of Chocky. In the Novel Chocky was only a voice in Matthew’s head which Matthew would translate to other people, whilst in the film she had an actual voice which was presented by the Actor, Glynis Brookes’ voice.

Friday, October 11, 2019

Medical Unknown

** Introduction : A medical microbiology lab performs testing on human samples collected from different body sites. The tests are used to detect and identify any microorganisms capable of causing disease. Knowing of unknown microorganism is important on how this microorganism   works and how it is structured, means knowing how it can affect humans. The purpose of this study was to identify an unknown bacterium by applying all methods that were previously conducted and learned in the medical microbiology laboratory class. **Materials : 1) Blood agar plate . 2) Mannitol Salt agar (MSA) plate. ) DNase agar plate . 4) Novobiocin disc . 5) Inoculating loop. 6) flame ( Bunsen burner) . 7) 1N hydrochloric acid (HCl) . 8) Two slides . 9) Plasma tube. 10) 3% Hydrogen Peroxide (H2O2) . 11) One unknown plate . 12) Crystal violet. 13) Gram’s iodine . 14) Safranin. 15) Alcohol . ** Methods : An unknown labeled with number 8 was given out by the lab instructor. The goal at this point was to determine unknown gram positive vacteria. The procedures performed consisted of sterile technique in addition to being followed as stated in the referenced course laboratory manual by Matar (1) , unless otherwise noted.Not all of the tests were performed on every culture. However, there are as some of the tests were used only for gram (+) others were even more specific and used only for cocci bacteria . The first procedure have been done was to observe and record the morphology of the unknown sample. However, Gram stain should be done to be sure that unknown sample were gram positive and to identify cells morphology. After that biochemical tests were chosen for unknown identification . first of all was done the catalase test to differentiate between the two types of cocci bacteria ( Staphylococcus and Streptococcus ) .Since unknown 8 was determined to be Staphylococcus coagulase test in addition to the following tests were performed on this unknown : 1) Production of DNase on DNa se agar. 2) Blood agar with novobiocin (NB) test . 3) Mannitol fermentation on Mannitol Salt agar (MSA) . **Results : Colonies morphology on plate was given were as follows : circular, raised, smooth, opaque, white-yellow pigmens. After knowing that it was Gram positive cocci , a catalase test and coagulase test was done , in addition to different plates incubation ( Blood agar , DNase and MSA plates ) .The following table lists all of the tests were done : Test| Purpose| Reagents| Observations| Results| Gram stain| To determine The gram rxn ofBacterium. | Crystal violet,Iodine, Alcohol&Safranin. | Purple cocci| Gram positive Cocci . | Catalase test| To determine ifBact. Posses catalase enzyme. | 3% H2O2| Oxygen bubblesWere observed. | Positive catalaseTest. | Coagulase test| To detect thePresence of â€Å"Clumping factor†. | Plasma. | No clot was Formed. | Negative coagul-ase test . | DNase plate Test| To determine ifBact. producesDNase enzyme. | 1N HCl . Cloudy zone (notCle ar one ). | Negative . | Hemolysis test(blood agar). | To determine ifBacteria do Hemolysis. | None . | No visible Changes wereAround colonies. | Gamma hemolysis| Mannitol Fermentation. | To determineThe ability of Bacterium to ferment mannitol. | None . | Color changeFrom pink to Yellow . | Positive mannitolFermenter. | Novobiocin Test| To detect Sensitivity or Resistance of Bact to NB Antibiotic. | NB antibiotic . | No zone ofInhibition aroundDisc. | Resistant bact. | Flowchart Unknown 8 Gram stain Gram positive cocci Catalse test(positive)Positive Negative Staphylococcus aureus. Streptococcus pneumonia Staphylococcus epidermidis. Viridans Streptococci Staphylococcus saprophyticus S. pyogens S. agalactiae Coagulase and Dnase test (Negative) Enterococcus sp. Positive Negative Staphylococcus aureus. Staphylococcus epidermidis. Staphylococcus saprophyticus Novobiocin test(Resistance)Sensitive Resistance Staphylococcus epidermidis. Staphylococcus saprophyticus MSA plate (Positive) Neg ative Positive Staphylococcus epidermidis. Staphylococcus saprophyticus Staphylococcus aureus. Blood agar plate(hemolytic test) (no hemolysis) Staphylococcus saprophyticus Unknown 8- S. saprophyticus **Discussion /Conclusion : It was concluded that Unknown 8 was S. saprophyticus . After applying Gram stain the gram positive bacteria was cocci in shape when viewed with a light microscope so a catalase test was performed.The bacteria was able to break down hydrogen peroxide upon its addition into water and gaseous oxygen which created bubbling and indicated a positive result. A sample was then inoculated on a mannitol salt agar plate. After incubation growth was present and the red media had turned yellow around the growth as a result of high levels of acid production. The data suggests that the gram positive bacteria was Staphylococci saprophyticus because it was gram positive, was catalase positive with the production of O, and was resistant to novobiocin disc.Staphylococcus saproph yticus is a strain of Staphylococcus bacteria. Approximately 25 percent of individuals carry this bacteria in the anal area, genitals, nose and mouth. People who walk barefoot are prone to acquire the bacteria from the floor. Staphylococcus may cause an infection when the bacteria enter a cut in any area of the body. These staph infections can range from boils to flesh-eating infections. The most common staph infection is Staphylococcus saprophyticus which commonly occurs in women.This staph is one of two bacteria which can invade the urinary tract. Approximately 20 percent of women who suffer from a urinary tract infection (UTI) will have another infection. **References : 1) Matar, Suzan. Medical microbiology Laboratory Manual. Jordan: University of Jordan publishing. 2) http://www. studymode. com/subjects/unknown-lab-report-on-gram-positive-bacteria-page1. html . 3) http://en. wikipedia. org/wiki/Gram-positive_bacteria . 4) http://www. ehow. com/about_5453276_staphylococcus-saprop hyticus-infection. html

Thursday, October 10, 2019

The effect of occupational fraud and abuse on the company

Occupational fraud and abuse is defined as â€Å"The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets† (2012 Report To Nations On Occupation Fraud And Abuse, 2012). Occupational fraud entails deceiving employing organization to obtain resources or assets for personal gain and abuse involves misapplication of the resources provided by the employer. Occupational fraud is typically for three types:1. Corruption 2. Asset Misappropriation 3. Fraudulent Statement.Amount these three categories, asset misappropriation, and corruption are the most common types of fraud and abuse. In 2012 total number of median loss of occupational fraud and abuses of all the reported cases was $140,000, and one-fifth of the cases involved losses of least $1 million (2012 Report To Nations On Occupation Fraud And Abuse, 2012).On an average United States organizations incurred 6% of revenue lo ss every year due to occupational fraud and abuse (Scott, A, 2002). Victim organizations not only bear the revenue loss but these types of frauds can also damage its goodwill in the community as well. Large organizations with multimillion turnovers can bear these losses but can have a devastating effect on small organizations. U.S. governmental oversight of accounting fraud and abuse and its effect on the company In the past many companies used the flexibly in accounting framework to modify its financial statements to present the perfect picture to the investors.Security and Exchange Commission (SEC) finally than introduced some detailed changes in the accounting framework. In addition, it introduced processes to enhance outside auditing, made recommendation to strengthen the audit committee, and encouraged cultural change. SEC’s Division of Corporate Finance is responsible to review critically the financial statements of the targeted companies to ensure that it is new and ex isting accounting rules are being followed and to minimize fraud and abuse using fraudulent statements. Additionally, SEC’s Division of Enforcement is responsible to bring civil  cases and penalties against the companies that attempts to conduct fraud or violets the security acts. Because of this oversight by SEC and government, companies are providing detail disclosures, more transparent financial statements to the investors and users of financial statements.Potential corruption schemes to be aware of in the companyCorruption means misusing the entrusted power or authority against the official duty to obtain benefits. Corruption schemes can be broken down into four categories: 1. Bribery- This entails offering, giving, and receiving anything of value to influence the decision. Official bribery involves providing or offering anything of value to influence the decision of government agent or employee. Commercial bribery deals with providing something of value to influence a business decision rather than decision of government employee or agent. Generally, there are two types of schemes involve in bribery: †¢Kickback Schemes: These schemes are possible because of collusion between employee of the victim company and outside party, typically vendors. In this, vendor submits either inflation or fraudulent invoices to the victim company, and the employee in the victim company makes sure that the payment is made on those invoices.After the payment, employee gets his or her share of payment that is known as kickback. In some cases, employee receives payment just by diverting excessive business to vendor. 2. Illegal Gratuities- In this corruption scheme, something of value is given to the employee to reward the decision. This is different from kickback schemes because benefits are provided as a reward for the decision made not to influence the decision. 3. Economic Extortion- This scheme is different from bribery and illegal gratuities, as in this case em ployee of the victim company demands something of value from outside party, and refusal to pay by outside party may causes loss of business.4. Conflicts of Interest – This occurs when employee has an undisclosed economic or personal interest in a transaction that makes the employee not to think in the best interest of the victim company that ultimately adversely affects the company. Recommendation of types of accounting evidence and methods of gathering such evidence to support the financial status review It is of great importance that every fraud examiner or forensic accountant to have good knowledge of the rules of the court, legal  system, and evidence for successful competition of the investigation. In order to be accepted as evidence, it must be relevant, material, and competent. â€Å"Relevant evidence means evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it w ould be without the evidence† (â€Å"Rule 401: Relevant Evidence- TN Court†, 2013).Materiality requires that evidence must prove a point and competency entails that evidence must be sufficient, reliable, and relevant to the case (WELLS, 2011). There are two types of evidence can be used to support the financial status review: 1. Primary evidence: This type of evidence is regarded as the best evidence because of its authenticity, credibility, and existence to prove a point and can value to a case. In addition, it provides direct evidence on the topic under review. These include original documents, accounting records, account statements, interviews, hand-written statements, etc. 2. Secondary evidence: This type of evidence is typically used and acceptable when the primary evidence is not available or destroyed.Every effort should be made to introduce and use primary evidence for better and credible representation of facts. These can include photocopies of the original doc uments, testimony of witness, etc. While doing full financial status review we can obtain information using various sources, such as emails, operating systems, database, accounting records, interviews with different personnel, bank statements, etc. We can also deploy audit techniques such as testing controls, analytical procedures, using substantive procedures, computer assisted audit techniques to obtain sufficient and reliable evidence to support financial review.

Is411 Study Guide

Study Guide IS 411 Security Policies and Implementation Issues A perfect policy will not prevent all threats. Key to determining if a business will implement any policy is cost. Policies support the risk assessment to reduce the cost by providing controls and procedures to manage the risk. A good policy includes support for incident handling. Pg 15 Policy may add complexity to a job but that is not important. Unmanageable complexity refers to how complex and realistic the project is. The ability of the organization to support the security policies will be an important topic.Pg 105 Who should review changes to a business process? Policy change control board, minimally you should include people from information security, compliance, audit, HR, leadership from other business units, and Project Managers (PMs). Pg 172 ————————————————- Policy – a document that states how the organization is to perform and conduct business functions and transactions with a desired outcome. Policy is based on a business requirement (such as legal or organizational) ————————————————- ———————————————— Standard – an established and proven norm or method, which can be a procedural standard or a technical standard implemented organization-wide ————————————————- ————————————————- Procedure – a written statement describing the steps required to implement a process. Procedures are technical steps taken to achieve policy go als (how-to document) ————————————————- ————————————————-Guideline – a parameter within which a policy, standard, or procedure is suggested but optionalpg 11-13 Resiliency is a term used in IT to indicate how quickly the IT infrastructure can recover. Pg 279. The Recovery Time Objective (RTO) is the measurement of how quickly individual business processes can be recovered. Recovery Point Objectives (RPOs) is the maximum acceptable level of data loss from the point of the disaster. The RTO and RPO may not be the same value. Pg 287 Policies are the key to repeatable behavior.To achieve repeatable behavior you just measure both consistency and quality. Oversight phases to operational consistency: * Monitor * Measure * Review * Track * Improve pg 40 Find ways to mitigate risk through reward. Reward refers to how management reinforces the value of following policies. An organization should put in place both disciplinary actions for not following policies and recognition for adhering to policies. This could be as simple as noting the level of compliance to policies in the employee’s annual review. Pg 78 Domain | Key policies and controls|User | Acceptable Use Policy (AUP)E-mail policyPrivacy policy – covers physical securitySystem access policy – IDs & passwordsAuthorization – Role Base Access Control (RBAC)Authentication – most important| Workstation| Microsoft system center configuration manager: * Inventory – tracks LAN connections * Discovery – detects software and info installed for compliance * Patch – current patches installed * Help desk – remote access to diagnose, reconfigure, reset IDs * Log – extracts logs to central repository * Security – ensures use rs have limited rights, alerts added administer accounts| LAN| Hub – connects multiple devicesSwitch – can filter trafficRouter – connects LANs or LAN-WANFirewall – filters traffic in and out of LAN, commonly used to filter traffic from public internet WAN to private LANFlat network – has little or no control to limit network trafficSegmented – limits what and how computers are able to talk to each other by using switches, routers, firewalls, etc. | LAN-WAN| Generally, routers and firewalls are used to connect LAN-WAN. Demilitarized Zone (DMZ) provide a public-facing access to the organization, such as public websites. DMZ sits between two layers of firewalls to limit traffic between LAN-WAN| WAN| Unsecure public Internet. Virtual Private Network (VPN) secure and private encrypted tunnel. Firewalls have capability to create and maintain a VPN tunnel.Lower cost, save time for small to medium companies with VPN instead of leased line| Remote A ccess| Enhanced user domainRemote authentication – two factor * Something you know (id/password) * Something you have (secure token) * Something you are (biometric)VPN client communicates with VPN hardware for tunneling, client-to-site VPN:Maintains authentication, confidentiality, integrity and nonrepudiation. | System/Application| Application software is the heart of all business applications. Application transmits the transaction to server. Data Loss Protection (DLP) or Data Leakage Protection (DLP) refers to a program that reduces the likelihood of accidental or malicious loss of data. DLP involves inventory, perimeter (protected at endpoints) and encryption of mobile devices. Pg 67|Motivation – pride (work is important), self-interest (repeat behavior rewarded, most important pg 326), and success (winning, ethical, soft skills). Pg 91 Executive management support is critical in overcoming hindrances. A lack of support makes implementing security policies impossibl e. Listen to executive needs and address in policy. Pg 341 Security policies let your organization set rules to reduce risk to information assets. Pg 22. Three most common security controls are: * Physical – prevent access to device * Administrative – procedural control such as security awareness training * Technical – software such as antivirus, firewalls, and hardware pg 27Information System Security (ISS) is the act of protecting information and the systems that store and process it. Information Assurance (IA) focuses on protecting information during process and use. Security tenets known as the five pillars of the IA model: * Confidentiality * Integrity * Availability * Authentication * Nonrepudiation Policy must be clearly written. Unclear purpose refers to the clarity of value a project brings. In the case of security policies, it’s important to demonstrate how these policies will reduce risk. It’s equally important to demonstrate how the pol icies were derived in a way that keep the business cost and impact low. Pg 104 ———————————————— Head of information management is the single point of contact responsible for data quality within the enterprise. ————————————————- ————————————————- Data stewards are individuals responsible for data quality with a business unit. ————————————————- ————————————————- Data administrators execute policies and procedures such as backup, versio ning, up/down loading, and database administration. ————————————————- ————————————————-Data security administrators grant access rights and assess threats in IA programs. Pg 188 ————————————————- ————————————————- Information security officer identifies, develops and implements security policies. ————————————————- ———————————————à ¢â‚¬â€- Data owners approves access rights to information. ————————————————- ————————————————- Data manager responsible for procedures how data should be handled and classified. ————————————————- ————————————————-Data custodian individual responsible for day-to-day maintenance, grant access based on data owner, backups, and recover, maintain data center and applications. ————————————————- —————â₠¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Data user end user of an application. ————————————————- ————————————————- Auditor are inter or external individual who assess the design and effectiveness of security policies. Pg 115 Separation of duty principle – responsibilities and privileges should be divided to prevent a person or a small group of collaborating people from inappropriately controlling multiple key aspects of a process and causing harm or loss. Pg 156Internal control principle – information security forms the core of an organization’s information internal control systems. Regulations mandate that internal control systems be in place and operating correctly. Organizations rely on technolo gy to maintain business records. It’s essential that such technology include internal control mechanisms. These maintain the integrity of the information and represent a true picture of the organization’s activities. Pg 155 Lines of defense in the service sector: 1. Business Unit (BU) deals with controlling risk daily, mitigate risk when possible. Develops long and short-term strategies, directly accountable. 2. Enterprise Risk Management (ERM) program, team owns the risk process.Provides guidance to BU, aligns policies with company goals, oversight of risk committees and risk initiatives. 3. Independent auditor assures board and executive management the risk function is designed and working well. Pg 192 Health Insurance Portability and Accountability Act (HIPAA) protects a person’s privacy. HIPAA defines someone’s health record as protected health information (PHI). HIPAA establishes how PHI can be collected, processed and disclosed and provides penaltie s for violations. Health care clearinghouses process and facilitate billing. Pg 50 Executive management is ultimately responsible for ensuring that data is protected.Information systems security organization enforces security policies at a program level. The team is accountable for identifying violations of policies. The front-line manager/supervisor enforces security policies at an employee level. Employees are responsible for understanding their roles and the security policies. They are accountable for following those policies. Employees can still be held liable for violations of the law. Employees can be prosecuted for illegal acts. Sampling of key roles to enforce security policies: * General counsel- enforces legal binding agreements * Executive management- implements enterprise risk management * Human resources- enforces disciplinary actions Information systems security organization- enforces polices at program level * Front-line manager/supervisor- enforces policies at employ ee level pg 366 A Privileged-level Access Agreement (PAA) is designed to heighten the awareness and accountability of those users who have administrative rights. Security Awareness Policy (SAP) laws can outline the frequency and target audience. Acceptable Use Policy (AUP) defines the intended uses of computer and networks. A good AUP should accompany security awareness training. Pg 220 Auditors are feared Contractors comply with the same security policies as any other employee (such as an AUP). There may be additional policy requirements on a contractor such as special non-disclosure agreement and deeper background checks. Pg 215Data Class| Class Description| Recovery Period| Examples| Critical| Data must be recovered immediately| 30 minutes| Website, customer records| Urgent| Data can be recovered later| 48 hrs| e-mail backups| Non-vital| Not vital for daily operations| 30 days| Historical records, archives pg 263| U. S. military classification – nation security information document EO 12356. * Top secret – grave damage to national security * Secret – serious damage to NS * Confidential – cause damage to NS * Sensitive but classified – confidential data under freedom of information act * Unclassified – available to the public A Business Continuity Plan (BCP) policy creates a plan to continue business after a disaster. Elements include key assumptions, accountabilities, frequency of testing and part includes BIA.Business Impact Analysis (BIA) purpose is to determine the impact to an organization in the event that key processes and technology are not available. Assets include critical resources, systems, facilities, personnel, and records. Pg 278 Desired results of the BIA include: * A list of critical processes and dependencies * A work flow of processes that include human req to recover key assets * Analysis of legal and regulatory requirements * A list of critical vendors and support agreements * An estimate of the maximum allowable downtime pg 286 Disaster Recovery Plan (DRP) is the policies and documentation needed for an organization to recover its IT assets after a disaster (part of BCP). Pg 288Governance – requires a strong governance structure in place. This includes formal reporting to the board of directors. Most boards receive formal GLBA reporting through the audit committee. The head of information security usually writes this report each quarter. Pg 51 An Incident Response Team (IRT) is specialized group of people whose purpose is to respond to major incidents. The IRT is typically a cross-functional (different skills) team. Pg 297. Common IRT members include: * Information technology SMEs * Information security representative * HR * Legal * PR * Business continuity representative * Data owner * Management * Emergency services (normally outside agency i. e. olice) pg 302 Visa requires its merchants to report security incidents involving cardholder data. Visa classifies incid ents into the following categories: * Malicious code attacks * Denial of service (DOS) * Unauthorized access/theft * Network reconnaissance probe pg 299 Declare an incident, develop a response/procedure to control the incident. Before a response can be formulated, a discussion needs to be made. This involves whether to immediately pursue the attacker or protect the organization. Having a protocol in advance with management can establish priorities and expedite a decision. It is important to have a set of responses prepared in advance.Allowing the attacker to continue provides evidence on the attack. The most common response is to stop the attack as quickly as possible. Pg 309 How do you collect data? A trained specialist collects the information. A chain of custody is established and documented. Digital evidence, take a bit image of machines and calculate a hash value. The hash value is essentially a fingerprint of the image. IRT coordinator maintains evidence log and only copies ar e logged out for review. Pg 311 Why do policies fail? Without cohesive support from all levels of the organization, acceptance and enforcement will fail. Pg 19 Which law allows companies to monitor employees?The Electronic Communication Privacy Act (ECPA) gives employers the right to monitor employees in the ordinary course of business. Pg 356 Policy enforcement can be accomplished through automation or manual controls. Automated controls are cost efficient for large volumes of work that need to be performed consistently. A short list of several common automated controls: * Authentication methods * Authorization methods * Data encryption * Logging events * Data segmentation * Network segmentation pg 361 Microsoft Baseline Security Analyzer (MBSA) is a free download that can query systems for common vulnerabilities. It starts by downloading an up to date XML file. This file includes known vulnerabilities and release patches. Pg 378Business Continuity Plan (BCP) sustain business durin g disaster Continuity of Operations Plan (COOP) support strategic functions during disaster Disaster Recovery Plan (DRP) plan to recover facility at alternate site during disaster Business Recovery Plan (BRP) recover operation immediately following disaster Occupant Emergency Plan (OEP) plan to minimize loss of life or injury and protect property from physical threat pg 292 Extra notes: There are two types of SAS 70 audits: * Type 1 – is basically a design review of controls. * Type II – includes type 1 and the controls are tested to see if they work. Pg 61 Governance, Risk management, and Compliance (GRC) and Enterprise Risk Management (ERM) both to control risk. ERM takes a broad look at risk, while GRC is technology focused.GRC top three best frameworks are ISO 27000 series, COBIT, COSO. Pg 197 Incident severity classification: * Severity 4 – small number of system probes or scans detected. An isolated instance of a virus. Event handled by automated controls. No unauthorized activity detected. * Severity 3 – significant probes or scans. Widespread virus activity. Event requires manual intervention. No unauthorized activity detected. * Severity 2 – DOS detected with limited impact. automated controls failed to prevent event. No unauthorized activity detected. * Severity 1 – successful penetration or DOS attack with significant disruption. Or unauthorized activity detected.Pg 308 To measure the effectiveness include IRT charter goals and analytics. Metrics are: * Number of incidents * Number of repeat incidents (signifies lack of training) * Time to contain per incident (every incident is diff, least important) * Financial impact to the organization (most important to management) Glossary terms Bolt-on refers to adding information security as a distinct layer of control after the fact. Business Impact Analysis (BIA) a formal analysis to determine the impact in the event key processes and technology are not available. Committee of Sponsoring Organizations (COSO) focuses on financial and risk management.Control Objectives for Information and related Technology (COBIT) framework that brings together business and control requirements with technical issues. Detective control is a manual control that identifies a behavior after it has happened. Federal Desktop Core Configuration (FDCC) a standard image mandated in any federal agency. Image locks down the operating system with specific security settings. Firecall-ID a process granting elevated rights temporarily to resolve a problem. Flat network has little or no controls to limit network traffic. Information Technology and Infrastructure Library a framework that contains comprehensive list of concepts, practices and processes for managing IT services. IRT coordinator documents all activities during an incident, official scribe.IRT manager makes all the final calls on how to respond, interface with management. Non-disclosure Agreement (NDA) also known as a confidentiality agreement. Octave is an acronym for Operationally Critical Threat, Asset, and Vulnerability Evaluation. ISS framework consisting of tools, techniques, and methods. Pretexting is when a hacker outlines a story in which the employee is asked to reveal information that weakens the security. Security Content Automation Protocol (SCAP) NIST spec for how security software products measure, evaluate and report compliance. Supervisory Control and Data Acquisition (SCADA) system hardware and software that collects critical data to keep a facility operating.