Tuesday, December 31, 2019

John Steinbecks Presentation in Of Mice and Men of the...

John Steinbecks Presentation in Of Mice and Men of the Culture and Experience of Itinerant Workers in 1930s America The Story written by John Steinbeck called Of Mice and Men were published in a time of grief, hardship, and great depressions in 1930s. The book takes place in the 1930s, the same time Steinbeck wrote the novel, during the Wall Street crash and the great depression when the United States economy suddenly collapsed in disaster. It was the worst economic crisis it has ever had and it tremendously damaged the face of America. The Aftermath leads to many unemployed men and women, businesses closing down and loss of money through out the country. The Disaster didnt end yet, when the United†¦show more content†¦This symbolizes how the great depression has affected the way people in America use to live. Steinbecks shows this when he describes what the bunkhouse looks like the walls were whitewashed and the floor unpainted, à ¢Ã¢â€š ¬Ã‚ ¦around it were grouped boxes for the players to sit on houses were taken care of any longer and he shows an example of it when the reader finds out what the workers sit on when playing cards grouped boxes instead of chairs, and when George picks up a small yellow can and reads what is written Positively kills lice, roaches and other scourges., What the hell kind of bed you giving us! this pops a question of why would this be here? and the only answer would be how bad quality the beds are with pests and that its needed to get rid of them which is different from beds youd get before that were taken care of to keep it clean and comfortable. At this moment all theyd care about is themselves, how theyd survive, not the things they live with and that their lives were very boring and lonely waiting for their prize at the end of each month. They way they live are like a timetable or routine. All they do is the same as everyday, and everyday theyd have to go work earlier go for lunch and end up

Monday, December 23, 2019

Should Media Law Protect Intellectual Property - 1059 Words

Q1: Should media law protect intellectual property? Why or why not? If media law should protect IP, how long should the protection be in force? Is it ethical to own ideas? Media Law covers media rights and is basically based on court decisions. The three general areas covered are print media, telecommunications and digital communications. Intellectual Property is defined as creations of the mind such as inventions like literary, artistic works, designs, symbols, names and images used in commerce (World Intellectual Property Organization, (n.d.) Sources used for this question is found online, and in our Media Law book. Should media law protect intellectual property? IP is protected by law through patents, copyright and trademarks, this enables people to profit of other peoples work. IP aims to create an environment where creativity and innovation can aspire fairly. The stated purpose of IP law is to promote progress on the consumer side and further on in the society, this is done by disclose new inventions and creative works that will mutually benefit to the society. The idea behind it is that creators wouldn’t have sufficient motivation to invent unless they were legally entitled to own the rights and full value of their work and inventions (Overbeck, W., Belmas, G., 2014) By protecting intellectual property with media law, the protection value treats it likes a type of real property adopting its law and rhetoric. This gives the creator rights to determine how othersShow MoreRelatedCopyright And Intellectual Property Are Still Valid1066 Words   |  5 Pagesdisagree that laws relating to copyright and intellectual property are still valid in social media? Copy right is the limited and flexible legal right, given to the creator for a fixed number of years, to print, publish, perform, film. The copyright law of Australia defines the legally enforceable rights of creators of innovative and artistic works under Australian law. The extent of copyright in Australia is defined in the Australian Copyright Act1968, which applies the national law throughout AustraliaRead MoreEthics And Technology : Controversies, Questions, And Strategies For Ethical Computing773 Words   |  4 PagesStrategies for Ethical Computing by Herman T. Tavani is about intellectual property disputes. Tavani defines intellectual property as an intangible form of property that is protected by a system of laws through which authors and inventors are given ownership rights over their creative works and inventions. There are four legal frameworks for protecting intellectual property. The first of these is copyright laws. Copyright laws protect authors. An author can a lso be an individual or an entity suchRead MoreEthics And Intellectual Property : Personal Property984 Words   |  4 PagesETHICS AND INTELLECTUAL PROPERTY Introduction In this week’s assignment, we will look at the subject of ethics and intellectual property. First, start off by looking at the basics of what intellectual property, and take a closer look at case that has involved these issues. Then we will discuss why it is important to protect intellectual property. Next we will look at how can intellectual property be protected? Then we will discuss if intellectual protections ever go â€Å"too far†? Finally what isRead MoreWhat Is Intellectual Property?1338 Words   |  5 PagesWhat is Intellectual Property? â€Å"Intellectual Property (IP) is a term that describes the application of the mind to develop something new or original. It can exist in various forms such as a new invention, brand, design or artistic creation†. (Ipaustralia, 2014) Therefore, as expressed in the week three lecture, IP signifies the ownership of ones intangible and non-physical goods. This could include ideas, names, designs, symbols, artwork, writings, and other creations. It also refers to digital mediaRead More Copyrights: Intellectual Property and Technology Essay1535 Words   |  7 PagesCopyrights: Intellectual Property and Technology The Government and many other agencies around the world are continuously at work to improve protections for intellectual property rights and the enforcement of intellectual property laws. In today’s age of digital madness, passing legislation and actually enforcing of those laws becomes a very daunting task. However, the protection of intellectual property has both individual and social benefits. It protects the right of the creator of something ofRead MoreEssay on The Internet and Intellectual Property Laws1418 Words   |  6 PagesInternet and Intellectual Property Laws With the emergence and growth of the internet, intellectual property laws are much harder to enforce and many people are saying that they are outdated and obsolete. Intellectual property allows you to own your ideas, thoughts, and creativity as you would own a piece of tangible property. The human mind is a creative tool that comes up with ideas, designs, schemes, and inspirations of all kinds. Intellectual property views these ideas as being property. The ideasRead MoreThe Effects Of Digital Media On The World Of Copyrights1531 Words   |  7 Pagesartists’ whose work(s). Digital media and internet has transformed the world of copyrights in many ways. The digital environment has made it very easy to distribute and re-distribute content (Kankanala,2012). It could also be very possible that many people have little to no familiarity to intellectual property or copyright laws. When dealing with sources found digitally the laws become even more blurred and confusing; Copyright laws, traditionally, were intended protect authors and artists and physicalRead MoreSOPA: Censorships Sweetheart Essay1186 Words   |  5 Pagesconsequences are huge, a loss of much-solicited donations to the company and advertising money. The answer is simple. What Wikipedia is trying to do is raise awareness about two bills: the Stop Online Piracy Act and the Protect IP Act, or SOPA and PIPA (Wikipedia, â€Å"Stop Online Piracy Act, Protect IP Act†). Soon after Wikipedia, other websites joined in the protest, with Internet search engine giant Google blacking out it’s colorful logo and smaller sites like Reddit and BoingBoing joining Wikipedia and shuttingRead MoreEssay on Patent Reform Gives Protection for Financial Investements852 Words   |   4 PagesPatent Reform Protection of intellectual property are investments based on acquired knowledge, thought and effort by one or multiple individuals on behalf of themselves, the business they work for when the property is created, and a financial investment. Each of these – acquired knowledge, thought, physical effort, financial investment – have a value that can be attached as it relates the usefulness or importance of the resulting product. That value will have a level of importance to the individual(s)Read MoreThe Impact Of Sport On The Sport Industry1029 Words   |  5 Pagesadvantage than the socio and ethical movements .Sport events have nothing to sell other than Intellectual Property Rights owned by the organizers and the players. Revenue is generated via the commercial programs such as exploitation of media, sponsorship, ticketing, and merchandising. The relationship between IP rights and sport is an ancient concept and closer than some thought .†Sport shows intelle ctual property in action. Patents -encourages technological advances that result in better sporting equipment

Sunday, December 15, 2019

Presentation of Sex and Sexuality in Brave New World Free Essays

presentation of sex and sexuality in Brave New World brave new world is a dystopian novel about an authoritarian regime and how they control people, in it there are characters that resist the leadership. Huxley’s Brave New World is a darkly satirical novel that uncovers and shows the weaknesses of society (mainly American) in 1932 with ‘pneumatic flappers’ and jazz clubs which, in Huxley’s mind, lack meaning and are too casual. The society uses sex and sexuality as a force to control the masses by removing all ‘love’ in the act, by making it commonplace losing all meaning so they ‘can’t see the forest for the trees’. We will write a custom essay sample on Presentation of Sex and Sexuality in Brave New World or any similar topic only for you Order Now Science In Huxley’s novel plays a key role in how the sex and sexuality is portrayed in the book, it seems that science removes all emotions in everything. In Brave New World children are put through an extensive conditioning process where they are subject to ‘erotic play’ and hypnopaedia. In the 1890’s the psychologist Sigmund Freud said that if you repress your sexual desires it builds up inside of you and can divert itself into damaging channels. I think that in this novel Huxley is satirising him saying that if everyone had sex like he is saying then this is what it would be like:- On page 26 a little boy and girl of seven and eight respectively, ‘were playing gravely and with all the focussed attention of scientists’ Huxley describes the children as playing ‘gravely’ or without emotion, I think that this is him trying to show us what this society has become: one where children are forced to have erotic play, as seen when the little boy is crying because he doesn’t want to play; and secondly that these constant sexual encounters have dimmed the excitement, passion and love in the act of sex to a point where it has become mundane and un-magical. Another thing that Huxley satirises Freud about is his theory about how the family is the prime source of this inner conflict. In Brave New World there are no families and loose living is encouraged, men and women are made in factories. I think ‘the week’s supply of ova’ and ‘standard men and women in uniform batches’ describes perfectly how Huxley thinks the world would be without families. Without them it would dehumanise so much so that we lose our identities and become ‘standard men and women’ Men and women have a complicated relationship in brave new world. Men are usually Alpha plus’s and women are usually beta minus’s, I think that that in itself shows Huxley’s entirely chauvinistic attitude. Her smile flashed readily at him’ (pg13) ‘flashed readily’ portrays an image of automation, she does it without thinking showing an instant submission to him and that with that submission she is readily available. Again, ‘and giving her two or three little pats, received in exchange a rather deferential smile for himself’ the director pats her on the bottom because in this society ‘everyone belongs to everyone’ and he fancies her. This is another example of Huxley’s inbuilt and unconscious chauvinism, he has made it so the female characters all respectfully submit to the men. In 1932 when Huxley wrote this hitting a girl on the bottom was shunned and offensive but in Brave New World it is accepted by everyone including Lenina because they are conditioned to have sex with everyone. When Huxley went to America he encountered what he described as ‘the city of dreadful joy’ in Los Angeles where everyone had a hedonistic lifestyle and went to jazz clubs and there were ‘pneumatic flappers’ I think that Huxley is satirising them and giving a warning to us because that is what might happen in the future and Huxley believe that promiscuity like this is morally wrong and take all meaning out of sex. The Act of Sex in Brave New World is encouraged as much as possible because it is a particular, ‘for particulars, as everyone knows, make for virtue and happiness’ On page 58 some girls invite Helmholtz to a ‘picnic’. The ‘picnic’ replaces the word ‘sex’ which shows how amalgamated sex has become in society. Sex has been integrated into everything: thought, religious ceremonies, music, cinema, picnics etc. the society is very much so recreational and the people have become hedonistic. Huxley points this out because this kind of society – American society – has very loose morals too and is perhaps no the best way to go about progressing. The girls invite only him and not anyone else; it’s quite a suggestive thing to say, even desperate and they only invite him because he is ‘hot’. The society in this sense is very shallow and childlike. Sex is also practiced in mass orgies. Huxley uses metaphors to represent sex a lot like on page 66. The orgy is described using music which rises and climaxes with their climax. Huxley also employs a clever use of sibilance, in which the ‘du’ sound is repeated to give a sense of heartbeats and increasing rhythm to show excitement. I think that Huxley writes about it in this way rather than being explicit is ecause when this book was published the content would have been shunned, but also to show again how sex has been integrated into everything It may seem odd that the government in Bra ve New World encourages sex, I think that the reason that they do is because the world motto, ‘COMMUNITY, IDENTIY, STABILITY’ with its main point being stability believes that happiness = stability and then sex = happiness. It is used as a measure to keep the people in line because whilst having sex and being happy they ‘can’t see the wood for the trees’ which is more subtly put with the slogan, ‘for particulars, as everyone knows, makes for happiness and virtue’ which basically means that they shouldn’t be able to see the bigger picture and stop being happy. To ensure that they only really focus on sex they have installed it into every aspect of their life. On page 66-67 Bernard goes to Westminster Abby in London where they sit around in circles of twelve and then start dancing and then having sex. I think that it is quite a disturbing scene, and is definitely something that most people back in 1932 and now would find disgusting. Huxley seems to be satirising everything now including religion with the twelve disciples and it being in Westminster. The whole book I think is satirising the Roman Catholic Church with the ‘conditioning’ of people to believe something without question and how it leads to false happiness or happiness that is fabricated by someone else and not of your own making. How to cite Presentation of Sex and Sexuality in Brave New World, Essay examples

Saturday, December 7, 2019

Management approach in an Organisation-Free-Sample for Students

Question: Develop the Leadership and Management approach in an Organisation. Answer: Introduction Organizational leadership is dual leadership system that helps in the systematic management of both individuals and that of groups. For being an ideal organizational leader, one must comprise of some essential traits. An organizational leader must be having a proper well-developed worldview. He must be able to know the different forces working in and around him so that he can lead all his followers in the future. He also needs to have a sound knowledge and a worldview of his organization (Nahavand 2016). This is because he will have to lead an entire group of people within the environment of the organization that is often critical and conflicting. An organizational leader must be having proper talent, knowledge, and skill that combine to make up his overall strength. He must work on himself because trying to train his followers. This paper will mainly deal with the kind of leadership practices prevalent in MOL group which is an oil and natural gas company located in Hungary. MOL grou p has a unique leadership and management practice system. The leaders believe in giving tough challenges to their followers and it is through the completion of these tough and challenging tasks that the employees acquire new knowledge. Analysis The two terms that of leadership and management differs from one another in several ways. It must be taken into account that not every manager can be a good leader. For being a sound and an ideal leader there is some particular characteristic feature that must be present within the individuals. It must be noted that the managers are the ones who usually formulate and lay down the different rules and regulations that are to be followed by the employees of the company. However a leader is one who will take up the responsibility of setting the vision of the organization, It is the leader who is responsible for communicating all the goals of the organization to the employees and it is also the leader who will be inspiring the employees to work together in order to achieve those goals. A management system will always focus on the planning, directing the employees, staffing and any other such organizational activities. However, a leader is one who will be focusing on the different ways of directing those rules among the employees. A leader is one who will be listening to his followers and will make them feel wanted within the organization. For the proper running and functioning of MOL group, it is also very essential to see that the employees are happy. This is a global era and there are lots of changes taking place both in the internal and external atmosphere of the company. It is for this reason that the leaders in MOL group are trying to develop the next generation of leaders in a proper way. It is for this reason that MOL group tries to lead and develop their followers for the challenging tasks of the upcoming future days. The leadership and management practices that are mainly followed in MOL Group are to prepare their followers for tough and challenging tasks of the future days. The leaders make sure that their followers are able to fight the tough competition. MOL Group has set up two distinct kinds of leadership styles working within their company,one is the LEAD and the other is INTENSITY (User 2018). The LEAD mainly comprises of three different talent pools Emerging Global Leaders Programme It is under this programme that the leaders in MOL group try to train their followers for the meeting g the tough challenges and situations. They look for the talented individuals who can be made ready for taking part in the leadership assignments. Growing Global Leaders Programme It is under this session that the leaders of the MOL group guide their followers to properly accelerate and channelize their careers. The leaders always try to act as a role model for their followers and carry on the process of knowledge sharing (User 2018). In other words, the leaders try to share their knowledge with their followers. The leaders also practice sharing critical knowledge with their followers. The leaders share their own experiences so that the followers can learn from them and enrich their own knowledge. This, in turn, helps the employees of MOL group to achieve senior roles in the company in the near future and they can also fight the tough market conditions. Advanced Global leaders programme It is under this programme that gathers all the well experience leaders and tries to nurture their skills and take them to the next level by teaching them the skills that will enable them to strengthen the organizational performance.The other kind of leadership practice prevalent within MOL group is INTENSITY. This is a leadership practice that helps in molding the leadership skills so that they can constantly face the challenges and deal with them smartly. This programme also makes sure that there is a kind of unity that is maintained throughout the organization. This programme makes sure that the leaders are speaking the same language and promotes respect towards people of all different cultures and groups (Avolio and Yammarino 2013). The leaders in MOL group have also made sure that that they develop a strong partnership with other organizations like global leadership development organization Management Centre Europe. This partnership helps in training the employees properly for m eeting with the future risks (User 2018). Behavioral theory Three different aspects have been identified under his particular leadership theory. The three important functions that must be performed by a leader are authoritarian, under which a leader must know how to exercise his power over the employees (Cawseyet al. 2016). The second one is the democratic leadership where the leader presides over only collective decisions processes(Nahavand 2016). The third is laissez-faire function under which the leader must give total freedom to his employees and avoid taking part in the decision-making process of the organization. However, a little bit of all these three leadership styles are needed within an organization. However, the leaders must keep in mind as to when to exhibit which style of leadership. It can so happen that they are emphasizing more on the authoritarian style as they enjoy bossing and ruling over their employees. The situational theory This is the theory that is the belief that a leader must act as per the need of the situation. This theory also goes by this belief that there is no particular or no best way of leading. The decisions of a leader often change as per the demands of the situation (Birasnav 2014). In every business organization, there are ups and downs. There will be many critical situations arising within a business set up that will require the leader to use the authoritarian style where he will have to rule or control his employees. There can be many tough situations where it will not be possible for the followers to work without the guidance or the suggestion of their leader. The followers always look up to their leader for getting the important piece of advice during the crisis situation. However, this authoritarian leadership will become invaluable if it is used on a day to day basis. The employees will surely not like to get dominated or ruled over at every single time. The Democratic leadership i s also to be used by the leader as per the right situation. Particularly when the organization needs a new business plan or a consensus to be built, the democratic leadership is useful. Similarly, the laissez-faire leadership is a particular kind of style that is to be used by a leader when the employees are experienced people and they need the freedom to work according to their will. However, it has to be kept in mind by a leader that he will have to change his roles as per the situation. If he is too much bossy over his employee, then the employees might become angry and indiscipline(Junker and van Dick 2014). This is natural that no one likes to be ruled upon every time. The employees often require freedom to work as per their will. In order to give his flexibility to the employees, the leader must use the laissez-faire leadership style in such scenario. Environmental theory MOL Group makes sure that there is a proper environment for their employees to work and learn at the same time. It is essential for the employees to have a suitable work environment in their organization so that they can work peacefully. It is not possible for the workers to work properly if there are lots of disturbances going on around them. For the proper progress of an organization the leader in MOL Group makes sure that there is the optimum utilization of the potential of their employees(Birasnav 2014). In order to assure this, the leaders in the MOL Group have to make sure that the employees are happy and comfortable in the workplace. There are often several issues that create an unsuitable work environment (Cawseyet al. 2016). The issues like ego, jealousy, bullying and several other such aspects. Hence, it becomes the prime duty of a leader to see that these negative factors are somehow removed from the environment. The leader must take all the necessary steps in order to cre ate the exact kind of organizational culture that will be suitable for the employees. Transformational theory In MOL group a leader makes sure that they are acting as the role models and their followers can easily follow their footsteps in the near future. This change has to be brought within the work environment, within the employees, and as a whole within the entire system existing within the organization (Mihalache et al. 2014). It is the leader who has to make sure that they are accessible to their followers whenever the followers need them. It is the leader who has to listen to the grievances of all the employees and also cater to their needs. It is the duty of a leader to motivate the followers at every step and help them utilize their potential to the fullest extent. Respectful towards others A leader must be respectful towards others. A leader must not make unethical usage of his power and position. It is a leader who has to make the employees feel wanted within the organization. He will have to effectively listen to the employees and has to be very liberal towards them. He has to have an amicable behavior so that the employees can easily reach out to him. Justice Leaders in MOL group make sure that there is proper law and order being maintained throughout the company. A leader has to have a clear-cut idea regarding the employees and it is for this reason that he needs to build up effective communication. Often some employees enjoy bullying other subordinate employees. This makes the new joiners feel very insecure and they also feel insulted (Hoch and Kozlowski 2014). Apart from this, there can also be several ego clashes within the environment. It is very natural that different employees will have different kinds of opinion. Many employees may also try to cross each other because of their ego. Managers may often have some personal grudges or even favoritism over some particular employee. However, a leader will make sure that there are no prejudices or bias existing within the organization. He must make sure that none of the employees are being treated differently. It is his duty to promote justice and equality within the organization (Mihalac he et al 2014). Community building- In MOL Group the leaders make sure that he has a clear idea about all the different kinds of leadership styles and must use them for the general good of the organization. A leader is one who will always be concerned about the interests of his followers rather than his own personal interest. He must never overlook the interests of the followers. Motivation One of the major qualities of a leader in MOL Group is to motivate the followers. A leader must always work towards building the transparency between himself and his followers. In MOL Group a leader makes sure that he is encouraging his followers at every step (Hoch and Kozlowski 2014). The leaders in this company make sure that they are letting their followers learn from on their own that is through self-awareness and self-reflection process. Conclusion Thereby, it can be concluded that it is the prime duty of a leader to make sure that none of the employees feel unwanted within the organization. It is the duty of a leader to create a culture that will help in making the employees open up and give up all their hesitations. A leader must individually interact with all his employees. He must make sure that the employees do not stay under excessive pressure. It is a leader who must give not only professional but also the emotional support of his followers. A leader must maintain all the business ethics within an organization. He must make sure that none of his actions ever violates any of the company ethics because his followers are going to follow his footsteps in future. Hence, a leader will always have to develop him and lead him before leading his followers. Recommendations A leader must instill the team spirit within his followers. He must practice what he wishes to preach. He must not be bossy over his employees. He must know how to keep calm his calm and deal with his followers patiently. He must not take the undue advantage o his position and power. A leader must train his followers to develop the feelings of mutual respect towards each other. A leader must always motivate all his followers at every single step. A leader must follow the transformational leadership style. As per this leadership style, a leader must work towards bringing about a change within his followers. A leader must conduct individual feedback session with the followers. This will help in enhancing the leader-follower relationship. A leader must lead him first and then start leading others. He must be very much committed to both his professional and personal field. He must have a strong sense of responsibility. A leader must always remember that he is going to be a role model for all his followers. The followers will follow the footsteps of their leader and will seek his help at all steps. A leader must imbibe positive vibes within the business organization. A leader must arrange for a proper training session for the fresher so that they can enrich their skill and can use them properly in their work field. This will no longer make those employees feel insecure. A leader must make sure that there are no jealous feelings existing within the organization. A leader must develop proper communication system within the organization. A leader has to make sure that there are no obstructions in the communication system. No employees must ever hesitate to communicate with one another. A leader must encourage the employees to talk among one another. Being a leader, he must encourage the process of knowledge sharing so that these followers can work together as a team and move forward with the help of their joint efforts References Avolio, B.J. and Yammarino, F.J. eds., 2013. Introduction to, and overview of, transformational and charismatic leadership. InTransformational and Charismatic Leadership: The Road Ahead 10th Anniversary Edition(pp. xxvii-xxxiii). Emerald Group Publishing Limited. Birasnav, M., 2014. Knowledge management and organizational performance in the service industry: The role of transformational leadership beyond the effects of transactional leadership.Journal of Business Research,67(8), pp.1622-1629. Cameron, E. and Green, M., 2015.Making sense of change management: A complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Cawsey, T., Deszca, G., Ingols, C., Finkelstein, S., Hambrick, C.D., Cannella Jr, A.A., Pitt, M., Koufopoulos, D.N. and Huber, G.P., 2016. Organizational change.Assessment,45, p.49. Donate, M.J. and de Pablo, J.D.S., 2015. The role of knowledge-oriented leadership in knowledge management practices and innovation.Journal of Business Research,68(2), pp.360-370. Goetsch, D.L. and Davis, S.B., 2014.Quality management for organizational excellence. Upper Saddle River, NJ: pearson. Hoch, J.E. and Kozlowski, S.W., 2014. Leading virtual teams: Hierarchical leadership, structural supports, and shared team leadership.Journal of applied psychology,99(3), p.390. Junker, N.M. and van Dick, R., 2014. Implicit theories in organizational settings: A systematic review and research agenda of implicit leadership and followership theories.The Leadership Quarterly,25(6), pp.1154-1173. Mihalache, O.R., Jansen, J.J., Van den Bosch, F.A. and Volberda, H.W., 2014. Top management team shared leadership and organizational ambidexterity: A moderated mediation framework.Strategic Entrepreneurship Journal,8(2), pp.128-148. Nahavandi, A., 2016.The Art and Science of Leadership -Global Edition. Pearson. User, S. 2018.MOLGroup. [online] Molgroupcareers.info. Available at: https://molgroupcareers.info/en/working-at-mol-group/our-employees/career-and-development/leadership-development [Accessed 3 Jan. 2018].

Friday, November 29, 2019

Political Environment In International Marketing Essays

Political Environment In International Marketing THE POLITICAL ENVIRONMENT: The critical concern Political environment has a very important impact on every business operation no matter what its size, its area of operation. Whether the company is domestic, national, international, large or small political factors of the country it is located in will have an impact on it. And the most crucial & unavoidable realities of international business are that both host and home governments are integral partners. Reflected in its policies and attitudes toward business are a governments idea of how best to promote the national interest, considering its own resources and political philosophy. A government control's and restricts a company's activities by encouraging and offering support or by discouraging and banning or restricting its activities depending on the government. Here steps in international law. International law recognizes the right of nations to grant or withhold permission to do business within its political boundaries and control its citizens when it comes to conducting business. Thus, political environment of countries is a critical concern for the international marketer and he should examine the salient features of political features of global markets they plan to enter. THE SOVEREIGNITY OF NATIONS From the international laws point of view a sovereign state is independent and free from external control; enjoys full legal equality; governs its own territory; selects its own political, social, economic systems; and has the power to enter into agreements with other nations. It is extension of national laws beyond a country's borders that much of the conflict in international business arises. Nations can and do abridge specific aspects of their sovereign rights in order to coexist with other countries. Like the European Union, North American Free Trade Agreement (NAFTA) are examples of nations voluntarily agreeing to give up some of their sovereign rights in order to participate with member nations for common, mutually beneficial goals. For example the pajama game discussed in global perspective is not unusual for multinational corporations. The pajama caper was a controversy arose over a US embargo forbidding US businesses to trade with Cuba. Wal-Mart was selling Cuban made pajamas in Canadian market. When Wal-Mart officials in US came to know about this, they ordered all offending Cuban pajama's as it was against US law. Canada was incensed with the obtrusion of US law on Canadian citizens. The Canadian citizen's felt that they should be able to buy Cuban-made pajama's if they wanted to. Wal-Mart was caught between a Canada-US foreign policy feud. Wal-Mart Canada was breaking US law if it continued to sell pajamas, and was subject to a million-dollar fine and possible imprisonment. However, if it did pull out pajamas from Canadian market it was subject to 1.2 million dollar fine under Canadian law. The ideal political climate for a multinational firm is stable, friendly environment. Unfortunately, that is never really the case, it's not always friendly and stable. Since foreign businesses are judged by standards as variable as there are nations, the friendliness and stability of the government in each country must be assessed as an ongoing business practice. STABILITY OF GOVERNMENT POLICIES The most important of the political conditions that concern an international business is the stability or instability of the prevailing government policies. Political parties may change or get reelected but the main concern for MNCs is the continuity of the set rules or code of behavior regardless of the party in power. A change in the government does not always mean change in the level of political risks. In Italy the political parties have changed 50 times since the end of World War II but the business continues to go on as usual inspite of the political turmoil. In comparison is India, where the government has changed 51 times since 1945 but however much of the government policies remain hostile to foreign investments. Conversely, radical changes in policies toward foreign business can occur in the most stable of the governments. Some of the African countries are among the unstable with seemingly unending civil wars, boundary disputes and oppressive military regimes. Like one of the region with the greatest number of questions concerning long-term stability is Hong Kong as since China has gained control, the official message is that nothing will change

Monday, November 25, 2019

Character and Setting Analysis of the Play Fences

Character and Setting Analysis of the Play 'Fences' Arguably August Wilsons most renowned work, Fences explores the life and relationships of the Maxson family. This moving drama was written in 1983 and earned Wilson his first Pulitzer Prize. Fences  is part of  August Wilsons Pittsburg Cycle, a collection of ten plays. Each drama explores a different decade in the 20th century, and each examines the lives and struggles of African-Americans. The protagonist, Troy Maxson is a restless trash-collector and former baseball athlete. Though deeply flawed, he represents the struggle for justice and fair treatment during the 1950s. Troy also represents human natures reluctance to recognize and accept social change. In the playwrights setting description, symbols connected to his character can be found: the house, the incomplete fence, the porch, and the makeshift baseball tied to a tree branch. Origins of Troy Maxson According to Joseph Kelly, editor of The Seagull Reader: Plays, Troy Maxson is loosely based upon August Wilsons step-father, David Bedford. The following can be said about both men: Talented, young athletes.Unable to attend college.Turned to crime for income.Killed a man.Spent decades in prison.Married and settled down to a new life after a  prison term. The Setting Reveals the Man The set description provides several clues to the heart of Troy Maxsons character. Fences takes place in the front yard of Troys ancient two-story brick house. The house is a source of both pride and shame for Troy. He is proud to provide a home for his family. He is also ashamed because he realizes that the only way he could afford the house is through his brother (a mentally unstable WWII veteran) and the disability checks he receives because of it. Building Fences Also mentioned in the setting description, an incomplete fence borders part of the yard. Tools and lumber are off to the side. These set pieces will provide the literal and metaphoric activity of the play: building a fence around Troys property. Questions to consider in an essay about Fences: What does the act of building a fence symbolize?What is Troy Maxson trying to keep out?What is he trying to keep in? Troy's Porch and Homelife According to the playwrights description, the wooden porch is badly in need of paint. Why does it need paint? Well, in practical terms, the porch is a recent addition to the house. Therefore, it could simply be seen as a task not quite finished. However, the porch is not the only thing in dire need of attention. Troys wife of eighteen years, Rose, has also been neglected. Troy has spent time and energy on both his wife and the porch. However, Troy ultimately does not commit to his marriage nor to the unpainted, unfinished porch, leaving each to the mercy of the elements. Baseball and "Fences" At the beginning of the script, August Wilson makes certain to mention an important prop placement. A baseball bat leans against the tree and a ball of rags is tied to a branch. Both Troy and his teenage son Cory (a football star in the making - if it wasnt for his embittered father) practice swinging at the ball. Later on in the play, when the father and son argue, the bat will be turned on Troy - though Troy will ultimately win in that confrontation. Troy Maxson was a great baseball player, at least according to his friend Bono. Although he played brilliantly for the Negro Leagues, he was not allowed to on the white teams, unlike Jackie Robinson. The success of Robinson and other black players is a sore subject for Troy. Because he was born at the wrong time, he never earned the recognition or the money which he felt he deserved and discussion of professional sports will often send him into a tirade. Baseball serves as Troys main way of explaining his actions. When he talks about facing death, he uses baseball terminology, comparing a face-off with the grim reaper to a duel between a pitcher and a batter. When he bullies his son Cory, he warns him: TROY: You swung and you missed. Thats strike one. Dont you strike out! During Act Two of Fences, Troy confesses to Rose about his infidelity. He explains not only that he has a mistress, but that she is pregnant with his child. He uses a baseball metaphor to explain why he had an affair: TROY: I fooled them, Rose. I bunted. When I found you and Cory and a halfway decent job . . . I was safe. Couldnt nothing touch me. I wasnt gonna strike out no more. I wasnt going back to the penitentiary. I wasnt gonna lay in the streets with a bottle of wine. I was safe. I had me a family. A job. I wasnt gonna get that last strike. I was on first looking for one of them boys to knock me in. To get me home.​ ROSE: You should have stayed in my bed, Troy. TROY: Then when I saw that gal . . . she firmed up my backbone. And I got to thinking that if I tried . . . I just might be able to steal second. Do you understand after eighteen years I wanted to steal second. Troy the Garbage Man The final details mentioned in the setting description reflect Troys later years as a hard-working garbage man. August Wilson writes, Two oil drums serve as garbage receptacles and sit near the house. For nearly two decades, Troy worked from the back of the garbage truck alongside his friend Bono. Together, they hauled junk throughout the neighborhoods and alleyways of Pittsburg. But Troy wanted more. So, he finally sought a promotion - not an easy task due to the white, racist employers and union members. Ultimately, Troy earns the promotion, allowing him to drive the garbage truck. However, this creates a solitary occupation, distancing himself from Bono and other friends (and perhaps symbolically separating himself from his African-American community).

Friday, November 22, 2019

Country Profile Assignment Example | Topics and Well Written Essays - 750 words

Country Profile - Assignment Example In reference to the World Bank figures, the urban population in 1990 was 29 percent and 33 percent in 2013 (The World Bank). This shows that 71 percent of individuals were still living in rural areas in 1990 and 67 percent in 2013 hence the population has remained rural. In comparison, 75 percent of individuals in the United States was urbanized in 1990 and 81 percent in 2013, indicating an urbanized nation. In China, 26 percent of individuals lived in urban areas in 1990 and 53 percent in 2013 (The World Bank). This shows Chinas population has changed from a rural to a 50/50 population with approximately half of the population in rural areas and the other half in urban areas. In India, 26 percent lived in urban areas in 1990 and 32 percent in 2013, and 17 percent in 1990 and 25 percent in Kenya (The World Bank). Therefore, both India and Kenya have remained a rural population. South Africa, Zimbabwes immediate neighbor, had a 52 percent population living in urban areas and 64 percen t in 2013 (The World Bank). In this regard, South Africas population can be regarded as urbanized since more that 550 percent have lives in urban areas. B) Between 1990 and 2013, it is clear from the data set that Zimbabwes urban population growth rate was 2.5 percent indicating slow urbanization. In comparison, United States urban population growth was 0.9 percent between 1990 and 2013. This shows the population is not changing much at all. Conversely, Kenyas, Indias, and Chinas urban population growth rate between 1990 and 2013 was 4.4 percent, 2.4 percent, and 2.9 percent respectively. These figures are indicative of a slow urbanization rate in these three countries. South Africas urban population growth rate between 1990 and 2013 was 2.2 percent, an indication a slow pace of urbanization. C) According to 2013 statistics of Zimbabwe, the cities with the largest population were: Harare with a population of 1.5m, Bulawayo 0.7m, Chitungwiza 0.3m, and

Wednesday, November 20, 2019

Do Nurses' Empathy affect the outcome of care Literature review - 1

Do Nurses' Empathy affect the outcome of care - Literature review Example Empathy in a clinical environment involves an ability to communicate, understand and check the truth of the patients and get the feedback (Bloom, 2014). The need of empathy is to ensure that nurses are emotionally taking care to patients. It is believed that the best way for the practising empathy by the nurse periodically is to make contact with the patient’s situation. Nurses through empathy are able to understand the need of patients and their physical concern. However, this may not always be possible by the nurse practitioners because of some difficulties such as lack of understanding or low operating levels and time constraints. The important part of the empathy for the nurse profession is the operating level, lack of empathic services and burnout (Boyle, 2011). During my clinical practise, I have seen that empathy plays a vital role in the nursing profession. Empathy is to be regarded as the skill to see and value the need patients, their feelings and perception. Clinically, empathy plays a crucial role in understanding the perception of patients. This is a way to provide treatment to patients to ensure corrective health care. It is revealed that through empathy a strong relation amid patient and nurse is created, which helps in providing proper medication and treatment. Empathy is the skill to become sensible, aware, understand and be sensitive towards the others attitudes, behaviour and feeling (Canale, Louis, Maio, Wang, Rossi, Hojat, & Gonnella, 2012). Empathy is an intellectual situation where in the same sets of emotions are shared with the individual. Furthermore, it is also stated that the level of empathy felt by people can vary and can be determined by various factors such as the individual behaviour of the people (Cole-King, & G ilbert, 2011). I have also observed that personal communications within the technological advancement, society and shared experience is an important factor, which disturbs the level of empathy within the society and

Monday, November 18, 2019

Globalisation Is Just Americanisation By Any Other Name Essay

Globalisation Is Just Americanisation By Any Other Name - Essay Example It's true that capitalism is a global dispensation. The globalisation expedites its exploitation of the world market given a cosmopolitan character to production and consumption in every country. According to the economic statistician Angus Madison, from 1820 to 1997 National Income per head (the best indicator of the standard of living) rose nineteen times over in the advanced countries. In the less developed countries the increase was just 5.4 times over. With the introduction of globalisation, the gap between rich and poor nations grew ever wider. It's getting worse. According to the World Bank's 'World Development Report' average income in the richest twenty counties is 37 times as high as in the poorest and the gap has doubled in the past twenty years. At present 1.3 billion humans subsist on $1 per day or less. These people are in absolute poverty, and there are nearly 100 million more of them than ten years ago. The capitalism has developed the productive forces, at the same t ime has failed to eliminate poverty. The Globalisation is an undeniably US process. It has taken off as a concept in the wake of the disintegration of the Soviet Union and of socialism as a viable alternate form of economic organisation. The globalisation is the rapid increase in cross-border economic, social, technological exchange under conditions of capitalist.The capital globalisation means two things. First there is the globalisation of accumulated $25 trillion of 'derivatives' swilling around in the global economy. The movement of capital is to be analyzed in terms of trade. The movements of foreign exchange are now no longer the handmaiden of trade. Every dollar that crosses the exchanges for trade, sixty go for pure speculation. The speculative capital movements now overwhelm trade in their importance for the balance of payments. The financial globalisation has simply become isolated from the global surplus value production.Since 1980, multinationals company’s investm ent in foreign countries has been far more striking than the growth of trade, and might be the authentic engine of growth. The Direct Foreign Investment (DFI) grew by 30% a year while trade grew by less than 10%. With in 1990, the world's total stock of DFI was counted to be $1.7 trillion. The multinationals now control 80% of world trade. The extensive acceleration of DFI for the past decade has only been made possible by the technological revolutions in communications (IT) and transport (containerization). The globalisation is a threat to the working class struggle for better living standards in every country. The multinational corporations (MNCs) would have assets, sales, ownership of workforces and control

Saturday, November 16, 2019

Japans culture, geography and history

Japans culture, geography and history Japan is an island-nation found off the coast of Northeast Asia, between the North Pacific and the Sea of Japan. After WWII, the country lay in ruin. Two million Japanese died in the war, a third of which were civilians, and more than 13 million Japanese were homeless (â€Å"Japan†). Today, Japan is a new and prosperous nation, and leading in trading. High-speed trains speed between Japan’s cities, connected by bridge and tunnel systems. Their transition back to being an economic superpower is remarkable, but not uncharacteristic, given their strong belief in hard work, the value of working together, and vigorous education standards (â€Å"Japan†). Since WWII, Japan has turned into one of the most highly urbanized and industrialized countries in the world. The country’s price for success, unfortunately, has been overcrowding issues. Close to two-thirds of the 126 million Japanese live in urban cities, making it understandable why Japan is one of the most d ensely population nations. (â€Å"Japan†). From north to south, Japan consists of four main islands: Hokkaido, Honshu, Shikoku, and Kyushu. There are also thousands of smaller islands stretched around them. The islands are generally covered in mountains, ranging anywhere from 8,000 to 12,000 feet above sea level (â€Å"Japan†). Japan also sits along the volcanic and earthquake-prone belt know as the â€Å"The Ring of Fire†. Minor tremors are common in the region, with most of the ‘quakes causing little to no damage at all. The Japanese islands were formed from earthquakes like these, only much stronger, creating mountain chains that eventually grew out of the water and formed into the islands (â€Å"Japan†). About four-fifths of Japan’s surface is covered in either hilly or mountainous terrain, leaving very little room for the population and agriculture. Most of the Japanese have no choice but to live in lowland plains around the coast where the land is relatively flat. The largest of these p lains is in the region near Japan’s capital city, Tokyo, where 12 million people live in one of the most heavily concentrated areas in the world. Over the course of centuries, the Japanese have developed into a very distinctive people. The Ainu are different from the Japanese because they’re the descendants of the islands earliest ancestors. Most of the Ainu now live on Hokkaido, separate from the majority of the population. The Japanese are primarily descendants from various parts of Asia, who migrated there from much earlier times (â€Å"Japan†). There’s only one official language spoken in Japan, Japanese, though English is taught as the foreign language everyone must learn in school. For this reason, many of the Japanese can understand English to some extent (â€Å"Japan†). Much unlike the rest of the world, the Japanese do not make class distinctions based on their income. Above all else, the Japanese are most concerned about status and rank among their peers. Factors such as age, length of service in the government or a company, and leadership in a group are the most highly regarded. The Japan ese show their respect in the form of a bow; the higher a person’s status, the deeper and longer the bow they receive. In the family, older members get the deepest bows, first dip in the tub, and best seat at the kitchen table (â€Å"Japan†). Japan has two principle religions; Shinto and Buddhism. Most of the Japanese adhere to both faiths. Shinto, which means â€Å"the way of the gods†, is a native religion to Japanese culture. Followers of Shinto worship the forces of nature, much like the gods of ancient Greece, who often personify the forces of nature themselves (â€Å"Japan†). Shinto originally came from the influences of Buddhism, which was introduced from China. Japanese culture is also largely focused on group cooperation. Other than family, the most important group to the Japanese is their company. In Japanese culture, the virtue most valued is harmony, as harmony is the key to success in any group (â€Å"Japan†). When groups make decisions, its important that all the members can agree to the same terms. A simple majority is not enough, as that leaves too many people feeling like they â€Å"lost† – The Japanese system of making decisions relies on long collaboration in which eve ry view is expressed. The Japanese like to avoid confrontation by using language that’s indirect and carefully worded (â€Å"Japan†). Eventually, when there’s a meeting of minds, decisions are nearly always completely unanimous. Japanese culture has long emphasized a heavy focus on education. The Japanese people attribute their development and economic success to a level of educational excellence. Japan often compares its achievements to the rest of the world, and only feels satisfied when it ranks right near the top. Japanese schools are under constant pressure to raise their educational standards, striving for excellence in all areas (â€Å"Japan†). All children must attend a six-year elementary and three-year junior high education from age 6 to 15. About 94 percent go on to attend high school, and 40 percent of high school graduates continue their education (â€Å"Japan†). In Japan, the school day is longer, the school week is five and a half days, and summer vacation is a little more than a month long. Discipline in schools is strict, with homework assigned starting from first grade on. Every student is also expected to study a foreign language, typically English, in junior high. About half of all students seek some kind of outside tutoring or after-school instruction. One result of this vigorous pursuit is almost 100 percent literacy, a rare achievement (â€Å"Japan†). In no other society is a successful future more dependent on an individuals academic achievement. Japanese schools are among the most competitive in the world, with the best companies only recruiting graduates of top-ranking universities. Those who attend lower-ranking programs will often settle for lesser jobs and benefits, but still enjoy a high level of job security as everyone else (â€Å"Japan†). As a result, nearly every student who has high ambitions for success will seek to enter a university. Admittance to national universities is merit based, rather than by social status or an individuals ability to pay tuition. This mindset allows universities to focus on bringing in the best minds, no matter what walk of life they come from (â€Å"Japan†). Students who wish to continue their education after junior high must pass vigorous entrance exams for both senior high school and universities. â€Å"Examination season† is during February and March each year. The p ressure to pass these exams is phenomenal, often referred to as â€Å"examination hell† (â€Å"Japan†). Student’s who fail examinations will often enroll is a special â€Å"cram† school and try again the following year. Under the constitution drafted in 1947, Japan is a constitutional monarchy. The emperor is head of the state, symbolic of the unity of the Japanese people. The legislative body is the Diet, which is made of a House of Representatives (the lower house) and the House of Councilors (the upper house). Councilors are elected to six-year terms, with half the seats up for election every three years. Representatives are elected to four-year terms (â€Å"Japan†). The Diet selects among itself the prime minister, head of the government, and a cabinet. The House can remove the prime minister at any time with a vote of â€Å"no confidence†. The judicial system is led by the Supreme Court, whose members are appointed by the cabinet. The Supreme Court rules on the constitutionality of laws and government actions (â€Å"Japan†). Japan has the world’s third-largest economy, having achieved remarkable growth since the destruction following WWII. The Japanese economy grew Japan has comparatively little farmland compared to the United States. Only 12 percent of the land is cultivated for farming, yet Japan produces about three-fourths the annual food requirement for its people (â€Å"Japan†, HSW). Japan’s fishing industry is also expansive, taking home among the largest catches annually. The war against the United States and its allies in WWII remains one of the greatest disasters in Japan’s history. It cost 2 million Japanese lives, including the hundreds of thousands who were killed in the atomic bombings of Hiroshima and Nagasaki (â€Å"Japan†). As a result of the war, Japan was stripped of its military peacekeeping ability and its forces were disbanded.

Wednesday, November 13, 2019

The Current Status of the Australian Economy :: AustralianEconomics Trade Cycle Essays

The Current Status of the Australian Economy Assignment 3 A Collect, organize, present and analyse a range of data which describes the current state of the Australian economy(with respect to the trade cycle). B Describe and analyse the monetary policy stance which has been adopted by the RBA over the past 2 years. How effective is monetary policy in achieving the policy objectives of the government? Introduction Part A =================== This report contains an informed and balanced analysis of a range of data which assists in depicting the current state of the Australian economy in relation to the trade cycle. Relevant Data For various reasons, economic activity fluctuates from year to year. Periods of rising activity, output and income are called booms and periods of slower activity are called a trough. Generally when real GDP is above 4 per cent p.a. it would be considered a boom year and when there are technically, two consecutive quarters of negative economic growth it would be considered a trough or a recession. In the short term the level of economic activity fluctuates. In some years, growth is fast and business conditions are booming. In other years, the level of activity is slow, so growth in output, income and employment is also less than average. These fluctuations are called the trade cycle. There are a number of economic indicators which are useful for determining what stage of the trade cycle the Australian economy is currently in, such as Gross domestic product, unemployment, inflation, interest rates, building approvals and home loan approval, just to name a few. Changes in Aggregate Demand Changes in the level of Aggregate Demand (AD) are critical determinants of trade cycle fluctuations. GDP is the sum of consumption, investment, government purchases and net exports. Y = C + I + G + NX The following table outlines these elements and influencing factors. Elements of GDP Major factors affecting this component Consumption (C) Disposable income (Yd); interest rates (r); expectations about the future; stock of wealth. Investment (I) Past levels of profit; expectations about the futre business conditions; interest rates (r) Government expenditure Determined in accordance with government policy Net exports Determined by the interplay of C & I conditions in other countries and Australia. Output and Unemployment As Gans, King and Stonecash state, â€Å"Changes in the economy’s output of goods and services are strongly correlated with changes in the economy’s utilization of its labour forces†. Generally as Gross Domestic Product declines then the rate of unemployment rises, basically as companies produce less goods and services, they require less staff or are not employing new members, thus the number of people

Monday, November 11, 2019

An Analysis of “Peach” by D. H. Lawrence Essay

What will you think of, when you eat a fruit, like a peach? I think many people’s answer would be nothing at all. However, a peach triggers some poetic romance in D.H. Lawrence, and some beautiful verses are thus created. The poem _Peach_ was brainless at first glance–this is indeed not an impenetrable poem, but it renders a significant thought that the creations of nature, even the most unconscious ones, has the beauty that no artificial objects can ever achieve. The poem itself in free verse is modernist, defying conventional structured form and the language is more prose than scanned lines – the whole poem is a kick at traditional attitudes and the Victorians were not traditionalists but reactionaries regarding their attitudes to sex, so this is a complex revolutionary poem and extemely modern for its time. The poem is intensely modernist. Not only does D H Lawrence take an everyday activity (eating a peach) and unpack unsuspected and surprising meaning from it. Lawrence suggests that the simple pleasure of eating a peach may be connected with the way that the peach hasn’t been manufactured. Nature’s beauty is embodied in its imperfection because there are no straight lines or perfect shape in nature. It exists randomly and obliquely. After we stepped onto this world mankind has been finding all ways to be ‘perfect’, as defined by them. This is nature’s definition of perfection, or perhaps working towards a common goal of being perfect. Why do we have to turn that 180 degrees and make straight lines all over the world? We grasp our pencils and place the rulers on that sheet of paper and zoom the line goes straight and â€Å"perfect†. We connect the dots with straight lines and we draw geometric figures in mathematic and so on. But maybe we need to adjust our angle of  see the world. Actually nature has very little to do with math. Most things in the world cannot and should not be simply viewed scientifically. Things were, are and will never be judge to be right or wrong. We live in a wonderful world but we are probably making a hash of it. Nature has given us beauty in everything we see and for no good reason – nature or unknown forces could have made the world ugly but it has not and almost illogically has given us wonderfully coloured flowers, incredible animals and sunsets to die for. Lawrence saw man as kind of a mad animal like many painters saw the industrial revolution as a disaster. Next time we encounter a fruit, we should not only eat it for nutrients, but also soak in its incomparable beauty endowed by nature.

Saturday, November 9, 2019

Medline Plus and Himalaya Herbal Essays

Medline Plus and Himalaya Herbal Essays Medline Plus and Himalaya Herbal Essay Medline Plus and Himalaya Herbal Essay In this paper, we studied three different websites which presented information on hypertension. These included Wikipedia, Medline Plus and Himalaya Herbal. Wikipedia is a voluntary organization that contains content prepared and edited by the online users, and validated to some extent by the employees of Wikipedia. Medline Plus is a government-owned organization that presents evidence-based health information for the users. Himalaya Herbal is an Indian herbal manufacturer that provides health information with the basic idea of promoting its own products. The Wikipedia website presented information on hypertension, the incidences of hypertension, causes and risk factors, signs and symptoms, diagnosis, prevention, treatment and the prognosis of the same. The website also presented links to references. However, the identity and the qualifications of the authors were not mentioned on the website. The information presented was generic and all treatment products were not given brand names. Wikipedia did not try to promote any kind of treatment drug or method of any company. However, as the information could be edited by the users and the currency of the information was not mentioned, the validity and reliability of information presented on the Wikipedia website was poor. There were no advertisements on the website. The reliability of Wikipedia publishing evidence-based health information does not seem good and hence there are greater chances of biases. The Medline Plus Website presented information on the disease, incidences, causes, pathophysiology, risk factors, signs, symptoms, diagnosing methods, treatment, lifestyle changes, prognosis and complications. The data of creation of the web page, date of updating, name of the author, credentials of the author, reference list, privacy policy, etc was being mentioned. Users were given an email id for asking queries. It seemed to fulfill the criteria mentioned under HONCODE and hence the information presented was valid and reliable. There were no advertisements on the website. Medline Plus is a reputed source, trying to minimize any kind of biases. Further the information met all the essentials of the search strategy. Himalaya Herbal presented just basic information on the description and symptoms of hypertension and instead of giving details regarding the treatment, gave a list of suggested products. The users could further obtain more details of the suggested products. However, no information was given regarding the author, date of creation, reference list, justification of claims, email address of the author, credentials, etc. The information was not unbiased and did not meet the search strategy. As there was no word on the advertising policy, it could be implied that the information presented was meant for the promotion of the company’s own products. However, the users on navigating further to the specific product name given by the web page, were able to obtain a list of evidence-based studies that substantiated the claims made of the product. Thus it can be found that although the Himalaya herbal website was able to meet the certain criteria mentioned by the HONCODE, there could be further improvements in the manner in which it fulfilled HONCODE. References Himalaya Herbal Healthcare (2010). Hypertension, Retrieved on July 25, 2010, from Web site: http://en.wikipedia.org/wiki/Hypertension

Wednesday, November 6, 2019

Using the Passive Voice in Spanish

Using the Passive Voice in Spanish The passive voice is an approach to structuring sentence that is used in both Spanish and English, although English speakers are more likely to use it. A sentence in which the subject of the main verb is also acted on by the verb is in the passive voice. We can also say that the verb is in the passive voice. A common use of the passive voice is to indicate what happened to the subject of the sentence without saying who or what carried out the action (although the actor can be indicated in a prepositional phrase). How the Passive Voice Is Used One reason the passive voice is much more common in English is because Spanish often uses reflexive verbs where English uses the passive voice. Writing experts usually advise against using the passive voice unnecessarily, because the active voice comes across as more lively and does a better job of conveying action. In English, the passive voice is formed by using a form of the verb to be followed by the past participle. It is the same in Spanish, where a form of ser is followed by the past participle. The past participle in such cases is modified if necessary to agree in number and gender with the subject of the sentence. The passive voice is known in Spanish as la voz pasiva. Sample Sentences Showing the Passive Voice Spanish Sentences Las computadoras fueron vendidas. Note that the subject of the sentence (computadoras) is also the object acted on. Note also that the usual way of stating this would be using a reflexive construction, se vendieron las computadoras, literally, the computers sold themselves.El coche ser manejado por mi padre. Note that the person performing the action isnt the subject of the sentence, but is the object of a prepositional phrase. This sentence is less likely to be said in Spanish than its equivalent in English would be. More common in Spanish would be the active voice: Mi padre manejar el coche. Corresponding Examples in English The computers were sold. Note that in neither language does the sentence indicate who sold the computers.The car will be driven by my father. Note that the car is the subject of the sentence; the sentence would be complete without the prepositional phrase, by my father, which indicates who is performing the action of the verb.

Monday, November 4, 2019

Power, poliics and knowledge Essay Example | Topics and Well Written Essays - 1500 words

Power, poliics and knowledge - Essay Example Power is very important to the managers or leaders of any organization since it is essential in the directing of its staff. However, the process of acquiring power and using it usually ruins the ethics and values held in the organization (Kelly, 1988 p.3). Discussion Power defines leadership in any company and by definition; leadership refers to the ability of directing a group of employees towards achieving the goals of an organization. Therefore, leadership has formed the basis of classifying managers into five groups or profiles, namely: leader, destructive achiever, builder, mechanic, and innovator (Kelly, 1988 p. 4). The leader refers to the ethical manager who effectively uses his charisma to lead other employees towards achieving organization goals. The builder on the other hand refers to the manager who might be ethical but lacks charisma. Therefore, they are referred to as leaders with limited leadership potential. The destructive achiever is an unethical manager who, even t hough might have high potential, he or she will not contribute towards the achievement of the long term goals of the organization. The innovator is a very creative manager in his or her field but is not termed as a leader and is sometimes termed untrustworthy. Lastly, the mechanics refers to the persons that are competent in their profession but lack the personal impact towards settling of group issues. Therefore, they are not considered leaders or builders of the organization. From the managers listed above, it is evident that for any organization to be prosperous, it requires leaders who are ethical and have charisma which are essential in the realization of the long-term goals of the organization. Ethics is demanded by the society in any given part of the world. Therefore, it has led to the classification of ethics into two groups: ethics of integrity and ethics of social responsibility. The demand for integrity in the business came into existence following the arrival of new mil lennium, which led to the increased number of accounting scandals that occurred in different parts of the world. The results were negative for example; many organizations lost their trust in the corporate world. The demand for social responsibility maintains safety to the society as well as the environment it operates (Jeurissen 2007, p. 3). According to ethics, the exercise of power must conform to the cultural standards as well as the legal standards of ethics. For instance, it has been termed unethical for any organization to use power for its own gain by engaging in illegal activities. For example, an HR assistant has the power of representing the services of the company to client companies as a process of obtaining customers. However, if he or she lies to the clients as a way of gaining more clients is an unethical behavior (Society for Human Resource Management, 2006 p.180). Many workers or employees of an organization have been in dilemma following the use of power by the sen iors. Many employees have experienced tough challenges in choosing between what is good for the organization in terms of profitability and what is right according to the set ethical standards in the community. The findings of the research conducted among the graduates at Harvard revealed that young managers were being forced to make decisions, some of which were unethical by their seniors. Even though the actions were unethical, the young managers still complied because of fear of losing their jobs.

Saturday, November 2, 2019

Theory Essay Example | Topics and Well Written Essays - 2750 words

Theory - Essay Example Then cubism is a specific component of his technique, modern style as well. In modern style, Le Corbusier recognises the factors governing the period and establishing its form. And modern style enabled him to achieve his cubistic goals in architecture’s three-dimensional styles (Saeter, 2011). This essay explores the work of Le Corbusier, examining the specific ways in which he had developed a relationship with theory in his work. Exploring Le Corbusier’s Spatial Design Ideas In essence, Le Corbusier’s buildings look like totally devoid of all material weights. Cubes of air enter their fully open forms; huge spaces of glass enhance their clearness. Several of his buildings are elevated, and beneath the structure the garden is constructed like a veranda. In several of these structures, the interior is made, similar to a studio, having only one room the parts of which is partitioned into many units, different in size and form, not detached from one another, and del ineated merely by arched screens or low room dividers (Farmer & Louw, 1993). And a huge mechanism of zigzagging or traditional staircases, of hallways and ramps, constructed like terraces, is applied through the different levels so as to achieve the needed link between these free room divisions (Samuel, 2007). Le Corbusier is indeed a very bold designer. With his artistic talents, commitment, and determination he always prospers in creating a form which through its visual appeal convinces even though it does not logically persuade. The most adventurous models of his spirited talent, revealing all aspects of his artistic skills, are embodied in such structures like Villa Savoye and Villa de Monzie (Crow, 1989). These structures show all the selections of his successful art of architectural arrangement. In fact, all facets in these structures are organised in harmony with cubistic art. Figure 1. Example of Cubistic Architecture (image taken from http://www.google.com.ph/imgres?imgurl= &imgrefurl=http%3A%2F%2Finthralld.com%2F2013%2F02%2Fcubist-inspired-rieteiland-house-by-hans-van-heeswijk-architects%2F&h=0&w=0&sz=1&tbnid=FA2blesTdOQRbM&tbnh=190&tbnw=266&zoom=1&docid=kpyqE9GpE_T70M&ei=d7jIUtOaMo2OiAfit4CADQ&ved=0CAQQsCUoAQ) Even though he created an architectural style which employed modern methods and materials and which constantly aspired to convey the meanings and embody the way of life of the 20th century, Le Corbusier viewed architecture as an on-going discipline and argued that important principles learned from the earlier times could be re-created in ways which would be suitable to the contemporary period. The creative years of Le Corbusier were witnessed during the early 20th century, when it was widespread practice to adopt from previous techniques, employing forms of Byzantine, Gothic, or Classical architecture, based on the function a structure had to fulfil (Roth, 1993). Yet, Le Corbusier abandoned this barren style of reproduction and rather thoroughl y examined those features of previous styles which he believed went beyond their period and which he thought stayed applicable to the 20th century. Le Corbusier firmly believed that forms strongly influence people’s senses and that designers can affect emotions through their structures of form. These arrangements address organisational and structural demands and how

Thursday, October 31, 2019

Principles of Economics Gross Domestic Product Essay

Principles of Economics Gross Domestic Product - Essay Example During the base year nominal and real GDP are equal. Therefore real GDP reflects both prices and quantities of goods and services produced by an economy, whereas nominal GDP reflects the produced quantities only. GDP does not reflect accurately the nation's productivity. There are products that GDP excludes, because it is difficult to measure them. For one thing, GDP includes all items produced and sold legally in the market. This means that products that are produced and sold illegally cannot be traced and measured by the GDP. Additionally, GDP does not include products and services that are actually produced by households but never enter the market. These are, for example, home grown fruit or vegetables that are used within the households that cultivate them. Also, GDP excludes other immeasurable variables like the quality of the environment or leisure time and does not reflect the distribution of income within an economy.

Tuesday, October 29, 2019

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA