Wednesday, October 30, 2019

See the instruction Essay Example | Topics and Well Written Essays - 500 words

See the instruction - Essay Example William’s A Rose for Emily, Poe, Edgar’s The Cask of Amontillado, and Oates, Carol’s Where Are You Going, Where Have You Been, which are examples of the many Gothic literatures available today. In these Gothic novels, the authors use the characters, the setting, and different events to bring out the Gothic style. The setting may serve to create an atmosphere of gloom, mystery, and horror. For instance, dark, ruined, secret rooms, stairways and corridors. Most Gothic literature has women characters that appear to be in distress and sometimes threatened by tyrannical males. The events therein are terrifying, horrific, and sometimes violent. In addition, romance in Gothic literature involves pain and hurt. In Oates’ Where Are You Going, Where Have You Been, â€Å"Connie,† the main character is scared about Arnold Friend. Arnold Friend is cruel and the author does not explicitly identify him as a real human, a psychopath, a demon, or a dream. However, Arnold Friend appears as mysterious and fearful. â€Å"She cried out, she cried for her mother, she felt her breath start jerking back and forth in her lungs as if it were something Arnold Friend was stabbing her with again and again with no tenderness† (Oates 544). This happens when Arnold Friend rapes Connie, although Oates does not directly say it. Violence is a characteristic of Gothic literature, and the vocabulary of violence such as â€Å"stabbing† and â€Å"no tenderness† is used in this literature. Faulkner’s A Rose for Emily is largely influenced by the Southern Gothic. The story involves frightening and mysterious scenes such as putrefaction, grostesquerie; old mansions crumbling, and decay. Additionally, Faulkner has used Emily, the main character and a psychic spinster, as a transformation from a past distressed damsel. Her mental inability makes her the heroine of Southern Gothic. Emily perpetrates different scary and unimaginable acts in the novel. â€Å"Then we noticed that in the second pillow was

Monday, October 28, 2019

Explain How the Understanding of Peace Is Expressed Through the Sacred Texts in 2 Religious Traditions Essay Example for Free

Explain How the Understanding of Peace Is Expressed Through the Sacred Texts in 2 Religious Traditions Essay By looking into their sacred texts and teachings on peace, we can gain a valuable insight into how these religions explain peace. The teaching of peace is central to Christianity. They use the sacred text of the bible, mostly the New Testament with emphasis on the Gospels as the source for teachings on peace. The New Testament states peace as a virtue and identifies it as a key element of God. Christians use Jesus’ example to illustrate the ideal model for peace in their lives. This model allows for adherents to understand the peace of God through the gift of the Holy Spirit and peace in relationships whereby Christians are expected to work in harmony with others in order to achieve peace As well as this the teaching on war and peace â€Å"love your neighbour as yourself. †(Matthew) and the teaching on peace and justice are both exemplified by Pope John XXIII’s notion that there can only be peace if there is justice. The Christian teaching on peace revolves around the covenant relationship between the adherent and God. This peace is given by Christ and is shown in the sacred texts of the New Testament â€Å"My peace I leave with you,† and is described as â€Å"one of the fruits with the spirit. †(Galatians). Jesus tells his followers that â€Å"in me you may have peace,† (John) suggesting that the concept of spiritual peace is embodied in the teachings of Jesus Christ. The importance of peace is clear in the Beatitudes were Jesus stated â€Å"blessed are the pure in heart, for they shall see God†. Christians believe that through baptism they have been called to follow Jesus’ as their model in life. By following his example, Christians acquire peace by obeying the commands of Jesus and therefore the principle teachings of Christianity â€Å"You must love your neighbour as you love yourself. † The bible states that Christians can achieve peace through the specific teaching of Jesus to forgive those who have wronged you. â€Å"If he wrongs you†¦you must forgive him. † (Luke). Forgiveness and compassion is at the heart of the Bibles message. Further to this, Christians can achieve peace through their practice of individual and communal prayer. The Christian biblical view on peace is one that demonstrates the idea that they should work for it. Through the beatitudes, Christians are encouraged to be the peacemakers in society. â€Å"Blessed are the peacemakers for they will be called the children of God. † Further to this, Christians believe in the sanctity of life through the covenant of the 10 commandments which state â€Å"Thou shall not kill. † Peace is work of justice and the effect of charity. In the case of conflict, Christians resort to the idea of violence being a last resort and refer to the Just War theory in order to determine whether conflict is applicable. The bible teaches adherents to promote peace on an international level, aiming to work for peace, justice and reconciliation. Islam like Christianity was a religion founded on the virtue of peace. Islam is referred to in the Qur’an as â€Å"the paths of peace† and it is taught that peace must always be actively sought out by Muslims. The Qur’an sees reconciliation as a basic stance and states that Allah abhors the disturbance of peace. Muslims too believe that there can only be peace if there is justice. In Islam, peace takes a variety of forms. It is seen as a quality of personal tranquillity and fulfilment bestowed by Allah to reward submission. This surrender of mental and physical devotion begins with the concept of Dhikr, the remembrance of Allah in all aspects of Muslim life. The Qur’an states that â€Å"In remembrance of God do hearts fins satisfaction. † This concept is embodied by the 5 pillars of Islam. Through the Salat, attention is drawn to Allah, marginalising distraction in order to devote more fully to the divine. Sawm and Zakat illustrate physical sacrifices for Islam which allows the adherent to appreciate Allah’s role as of life. The Hajj focuses on morality by allowing the adherent o come closer to Allah in their individual search of inner peace. Along with this, the study of the sacred texts of Islam, the Qur’an and Hadith equips adherents with necessary theological understanding for a meaningful life of submission which in turn brings peace. This study allows Muslims to understand peace being a reward for following the teachings of Allah and his prophet Mohammad. Peace be upon you because you have persevered. † Another concept of achieving peace is through collective worship. It encourages commitment in the struggle against the greater Jihad. Like Christianity, Islam encourages adherents to strive for peace. Both typify the complex relationship between religion and peace. The standard greeting to another person in Arabic is â€Å"As-Salamu-Alaykum (Peace be with you) † (Qur’an), which encourages Muslims to â€Å"Promote peace among men. † (Sura). There are various organisations in Islam that promote peace. E. g. The Islamic Conference which promotes world peace and safeguards the interest of the Muslim world. The understanding of peace throughout both Christianity and Islam has been influenced by their sacred texts. It is ultimately through the interpretation of these texts that adherents learn the values of peace. They all demonstrate that peace is not merely the absence of conflict, but is also a complex intertwined system of teachings and that there are various avenues to achieving the ideal state of peace.

Saturday, October 26, 2019

Creon is the Tragic Hero in Sophocles Antigone :: Antigone essays

Antigone Essays: Creon is the True Tragic Hero  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Antigone, which was written by Sophocles, is possibly the first written play that still exists today (www.imagi... 1). There is much controversy between who the 'tragic hero' is in the play. Some people say Antigone, some say Creon, others even say Heamon. I believe Creon displays all of the characteristics of a 'tragic hero'. He receives compassion through the audience, yet recognizes his weaknesses, and his downfalls from his own self-pride, stubbornness, and controlling demands. He is the true protagonist. Though the audience notices how villainous Creon is, they still express sympathy towards him. They realize that he has brought all of his problems on himself and should have been more open-minded, but think no one should have to go through what he has. They understand how the warrior king Creon felt when he notices his son is love struck. The audience also expresses pity towards him because Antigone is a murderer and understands why he is upset. Creon's noble quality is his caring for Antigone and Ismene when their father was persecuted. Creon is a very authoritative person and demands control of others. When talking to the Chorus, Creon does not ask them to agree with the decree but demands that they follow it. Creon expects loyalty from others. It is apparent that Creon is very dominating and wants to be in control. "The man the city sets up in authority must be obeyed in small things and in just but also in their opposites"(717-719). Through this quote the reader realizes that Creon wants obedience in everything he decides even if he is at fault. "There is nothing worse than disobedience to authority" (723-724). Further supporting Creon's belief that everyone shall remain faithful to him even if he rules unfairly. This is proved true when Creon says, "Should the city tell me how I am to rule them?" (790). Creon has forgotten that the ruler is supposed to do what is best for the city and its citizens. Creon is under the impression that he is always correct in his judgments and his beliefs. Before the sentry even explains the event that has occurred, the sentry states that he is only a messenger and has not committed the crime. Yet Creon still accuses the sentry of receiving money to do the crime and threatens to punish him.

Thursday, October 24, 2019

Spaying and Neutering: How Soon Is Too Soon?

English 101 29 May 2012 Spaying and Neutering: How Soon is too Soon? Often referred to as â€Å"man’s best friend,† dogs have been around for thousands of years. They provide their love and services to their human counterparts, and most often receive love, food, and shelter in return. Responsible dog owners everywhere would agree that neutering your dog is important and something that must be done; but the question is when? Most people neuter their dogs between 5- 7 months, simply because this is was common tradition.A common tradition that needs to be re-evaluated. What most people do not realize, is that it is most beneficial to his/her health when a dog is spayed or neutered after his/her first birthday to promote a healthy, prosperous, and disease-free life. First off, what does it mean to spay or neuter your dog? Also known as desexing, it’s the process of removing their sex organs for population control, health, and behavioral modification (O'Meara). The op eration requires general anesthetic, stitches, and a close watch to ensure safe healing.Because the procedure requires anesthetic, most veterinarians recommend that your dog be in the 5-7 month range for desexing. Most veterinarians say it is safer for the dogs to wait until this age before undergoing a anesthetic surgery. They believe the liver and kidneys in younger animals are less mature, and less capable of tolerating the effects of the anesthetic (O'Meara). However, some veterinarians now are saying it is safe and effective to neuter your pet before this 5-7 month-mark.Dog owners can ask to have their pet desexed at an earlier age. The practice was approved by the American Veterinary Medical Association (AVMA) and studies done at the University of Illinois provided evidence of successful early desexing of dogs (Fuess). Another common belief concerning desexing dogs at this stage is to eliminate the ‘naughty behaviors’ dogs will develop if neutered too late. Undesi rable sexual behaviors such as roaming, mounting, and masturbation can be reduced by neutering your male dogs (Clark Animal Hospital ).However, this is untrue: â€Å"The study that identified a higher incidence of cranial cruciate ligament rupture in spayed or neutered dogs also identified an increased incidence of sexual behaviors in males and females that were neutered early† (Zink). After I graduated high school, I got a Bullmastiff puppy. A lot of people told me to neuter him when he was 5 months, but I wanted to wait. They told me if I didn’t do it soon, he would start to develop these bad habits. Now, he is almost a year old and I have no issues with his behavior, at all.He also found a report from the American Kennel Club suggesting males and females who were spayed or neutered early having problems with aggression and fearful behaivors (Zink). Neutering a dog at an early stage in life may not have a positive, but rather a negative effect on their demeanor. Whil e it seems all anyone is interested in how early you can desex your dogs, and some believe it is effective to neuter your animal at an early stage, it is the most beneficial to health to wait until after their first birthday.Chris Zink, veterinarian and Diplomat of the American College of Veterinary Pathologists, considers early neutering and spaying for dogs any desexing procedure done before puberty. He noticed many differences between dogs desexed at an earlier age, and those who weren’t. He noticed variables in dogs’ health concerning orthopedics, cancer, behavior, and other health concerns related to these animals. One common reason people neuter their male dogs before 7 months is to decrease their chance of developing prostrate cancer. However, there have been some studies that suggest that this provides no benefit (Zink).He also noticed a difference between dogs who had developed bone cancer and those who had not. One source indicated a two-fold higher risk in d ogs that were desexed early and others who waited (Zink). Growing up, my family always had a dog. Our first dog was a blonde German shepherd named Clyde. We followed the status quo, and when he was 6 months of age we had him neutered. He was the most loyal, obedient, handsome, fun-loving dog, and we loved him. However, when Clyde got older, we had to have him put him down because he had developed bone cancer.After reading the findings of Dr. Zink I ask myself, â€Å"If we had waited to neuter Clyde, would he still have developed bone cancer? † However, my decision to neuter Bentley at a later age will not make up for the thousands who do not. Most people spay or neuter their dogs at 5 to 7 months, simply because of tradition; but this is a tradition that needs to be re-evaluated. Practices amongst vets need to change. When someone goes in for an appointment with their veterinarian, there should be a lengthy discussion between them and the dog owners about spaying and neuterin g options.Most people don’t even know that waiting to desex is possible. The veterinarians, breeders, and owners who do believe in waiting to desex need to do a better job of advertising, educating, and supporting this campaign. Its an issue I always bring up when I take my dog to the dog park. When discussed most people don’t even realize it’s an option; however, I am not a licensed vet, so not only I do encourage others to research the topic for themselves, but to also talk to their veterinarian about their options to get a professional opinion. Now I am on my own, and I have a dog of my own.Bentley, my 110 pound 11-month old Bullmastiff, is intact and healthy. When I bought him as a puppy, the breeder was very stern about waiting to neuter the puppy. Bullmastiffs are considered a giant-breed-dog; due to their massive size, they are prone to some diseases such as hip dysplasia. â€Å"Another recent study showed that dogs spayed or neutered before 5 1/2 months had a significantly higher incidence of hip dysplasia than those spayed or neutered after 5 1/2 months of age† (Zink). I’m choosing to keep my dog intact until after his 1 year mark because it will promote his best health. and will reduce his risk of developing this painful disease. Waiting also reduces his chance of accumulating a behavioral disorder, and bone cancer. Desexing your dog at the 5-7 month range does no such benefits. Bentley is apart of my family, and I want the best for him. The best food, the best toys, and most importantly: the best health. Although it would have been safe for me to do so earlier, neutering him after his first birthday will be the most beneficial to his health; my vet, my breeder, and myself agree. Works Cited Alice Villaolobos, DVM.Veterinary Practice News. 1 Dec 2008. 29 May 2012 Web. . Chris Zink, DVM, PhD, DACVP. â€Å"Early Spay-Neuter Considerations for the Canine Athlete: One Veterinarian's Opinion. † 2005. caninesports. com. Web. 28 May 2012. Clark Animal Hospital . Spay & Neuter. 28 May 2012. Dr. Becker. Dn't Neuter Your Dog YET- Read This Information First! 17 February 2011. Web. 28 May 2012. Dr. Shauna, O'Meara. Pet Informed. Web. 28 May 2012. Theresa A. Fuess, PhD, VM-3. â€Å"Early Spay/Neuter: An Overview. † Illinois Veterinary Bulletin 6. 1 (1998).

Wednesday, October 23, 2019

Complete and Utter Idiots Guide to Sending an Email Essay

This may seem like a completely impossible task, but trust me, it’s easy. An everyday completely normal task for most people, but you are not most people, are you? Well, there’s one thing you must do. We are assuming you already own a computer and have an email, so the first thing that is vital in this†¦ find your computer. I know! You have to get up, use those long things on the end of your body made for walking, and look. No†¦ that’s the telly. We are looking for something that looks like a smaller telly with a keyboard and a mouse. No, no, no! Not a real mouse! Now get down from your sofa and look for a screen. Yes, that’s it! Gosh, if it takes you this long to find your computer this is going to be a long day. Congratulations! Now, as you are looking at the computer, sit down on the chair in front of it. Sit on the seat, not the top, bottom or legs, on the actually seat. Yes, that’s a bit more comfy isn’t it? I hope your computer is in fully working order? Supposing that it is, you need to find a big button that turns your computer on. No, that opens up the CD drive. Don’t push it back in! Press the button again so you don’t break it. Oh my, look! It’s right in front of you on that big box. Woohoo! You found it, now login using your password that you thought up so you would remember it. Yes, it is the word written on the sticky note stuck to the wall above you. Now, the long oblong in front of you, that’s your keyboard. No, an oblong is another word for a rectangle†¦ a long square? Yes, the thing with the buttons. Now, press the buttons with the letters/numbers/punctuation that are identical to the ones written on your sheet. Yes, you have to write them in the same order, otherwise itswrong. Thank the lord, you’ve logged on! You’ve just achieved something in your life! Be proud, be very, very proud. The next ‘impossible’ task you have to face is finding the internet icon and using your mouse to click on it. We have already established that this is not a real mouse, so calm down. Now, your computer screen will generally look like this: This may look big and scary but it’s simple really, if you just listen. As you probably don’t know, there are different types of internet service providers. The most common one is internet explorer which is automatically downloaded onto most computers. So we will just stick with that one. The symbol is a blue E. found it? No, that’s not it†¦ yes, the blue E. Good.

Tuesday, October 22, 2019

CHAPTER 29 Essays - 20th Century In The United States, United States

CHAPTER 29 Essays - 20th Century In The United States, United States CHAPTER 29 AMERICA DURING A DIVISIVE WAR , 1963 - 1974 Chapter Outline Chronology 1964Civil Rights Act of 1964 passes; Congress approves Gulf of Tonkin Resolution; Johnson defeats Barry Goldwater 1965Congress passes Voting Rights Act; Violence hits Watts; U.S. role in Vietnam dramatically expands 1966Supreme Court decides Miranda v. Arizona; United States begins massive air strikes in North Vietnam 1967Large antiwar demonstrations begin 1968Tet offensive begins; Martin Luther King, Jr. and Robert F. Kennedy assassinated; Civil Rights Act passed; Richard Nixon wins presidency 1969Nixon announces "Vietnamization" policy; My Lai massacre become public 1970U.S. troops enter Cambodia; Congress creates Environmental Protection Agency 1971Stagflation unsets U.S. economy; U.S. dollar begins to "float" on currency markets 1972Watergate burglars caught inside Democratic headquarters' Nixon crushes George McGovern in presidential election 1973OPEC oil embargo begins; Paris Peace Accords signed; Supreme Court decides Roe v. Wade; Special Senate committee begins hearings into "Watergate" 1974House votes impeachment and Nixon resigns; Gerald Ford assumes presidency 1975Saigon falls to North Vietnamese forces 1.Lyndon Johnson, a consummate legislative "wheeler-dealer," greatly expanded government's role in people's lives through a series of initiatives he called the Great Society. a.Johnson used the powerful memory of Kennedy to carry through various Kennedy initiatives. In a sense, Johnson was successfully closing the New Frontier by gaining acceptance of a tax cut and securing passage of the Civil Rights Act of 1964. b.Johnson won a crushing victory in the election of 1964. c.With broad support in Congress, Lyndon Johnson pushed through a series of domestic programs known collectively as the Great Society. d.With the onset of economic problems in the late 1960s, in evaluating the Great Society, critics unfairly came to attack its costs, pointing out specific failures or condemning the entire plan without crediting the actual good that many of the programs had shown. 2.Escalation in Vietnam sapped the economy and alienated large segments of the population. a.The Gulf of Tonkin Resolution gave Johnson authority to implement "all necessary measures" in Vietnam. b.The war continued to widen and grew ever more intense throughout 1965 as bombing campaigns widened, and the number of ground troops increased. c.The early years saw the media and the war maintain a traditional relationship in which there was little criticism. Later news coverage helped turn viewers against the war. 3.By 1967, millions joined in opposing the involvement in Vietnam as activism at home increased. a.Social and political activism came to characterize the 1960s as a movement of movements that challenged and questioned numerous traditional laws, attitudes and cultural institutions. b.During the early 1960s, many college students became part of a new political caucus known as the "new left." c.Supporters of the counterculture ridiculed traditional attitudes toward clothing, hair styles, and sexuality; experimented with drugs; and further popularized rock-and-roll music. d.Malcolm X preached a message fundamentally different from traditional civil rights activists such as Martin Luther King, Jr., giving rise to the "Black Power" movement. e.Those who made up the antiwar movement emerged from diverse backgrounds and interests, just as they expressed their opposition to the war in a myriad of ways. 4.The year 1968 was a pivotal time in the history of America's divisive war and of the Sixties. a.The turmoil in Vietnam, 1968, culminated with the Tet offensive. Though a tactical defeat for the communists, it was a political catastrophe to Johnson because it challenged claims of imminent American victory, thus creating a huge credibility gap. b.Antiwar sentiment surged in a new round of turmoil at home as war critic Eugene McCarthy rose in the early presidential primaries. His success led Johnson to drop out of his reelection campaign. These events were overshadowed by the twin assassinations of King and Kennedy. c.Richard Nixon captured the election of 1968 for the Republicans, defeating both Hubert Humphrey and George Wallace. 5.The comeback of Richard Nixon in 1968 was amazing. However, there would be continued polarization in 1969-1974. a.Political fringe groups such as the Weatherman drew a disproportionate amount of attention from the FBI and Nixon who claimed, as the new president, he would be the right person to lead a fight against lawbreaking and violence. b.Nixon made progress in social policy by expanding Social Security, Medicare, and Medicaid, but his proposal for welfare reform failed

Monday, October 21, 2019

Analysis of A Sound of Thunder essays

Analysis of A Sound of Thunder essays The story A Sound of Thunder takes place in 2055 A. D. and then they go back into the past to the Jurassic Period. These people who go are expert hunters and they want to get a big catch so they intend on shooting and killing a Tyrannosaurus Rex. One of the hunters named Mr. Eckels gets scared when they see the dinosaur and went back to the machine, but he didnt stay on the path and when you step off the path you could change the past present and future of the earth. He stepped on a butterfly and killed and as a result of that, the whole spelling and the president of the United States was changed. Ray Bradburys short story A Sound of Thunder is a futuristic tale of a hunting expedition that takes place in the past during the Jurassic Period that resulted in changing the whole world and everything in it. This story was mostly about how in the future technology is going to be so high-tech that we will be able to go back in time and do things. It has more things that need to be worked out like it effecting everything in the world past, present, and future. It also focuses on how we may do one small thing, but that can change and effect many other things like the domino affect. Mr. Eckels is the person who stepped off the path and killed the butterfly. This is the act that changed the entire world when they arrived home. These hunters are going on a safari hunt that the government approved of to kill a T-Rex. The problem with this is that one of the hunters named Mr. Eckels becomes scared and turns back and steps off the path, which is a rule that they are not supposed to break because of the consequences they will face when they arrive home. When they do arrived home, Eckels figures out that the sign for the program that takes you back in time has changed. It was called Time Safari Inc. It is now Tyme Sefari Inc. He has now found out that he stepped on a butterfly and changed the pho...

Sunday, October 20, 2019

How to Learn the Russian Alphabet

How to Learn the Russian Alphabet The Russian alphabet is based on Cyrillic and Glagolitic scripts, which were developed from Byzantine Greek in order to facilitate the spread of Christianity during the 9th and 10th centuries. Some letters in the modern Russian alphabet look familiar to English speakers - Е, Ð £, К, Ð  - while other letters do not resemble any characters in the English alphabet. Russian Alphabet Sounds The Russian alphabet is relatively easy to learn thanks to its principle of one letter per sound. This principle means that most phonemes (sounds that convey meaning) are represented by their own letters. The spelling of Russian words typically reflects all of the sounds that are part of that word. (This will get more complicated when we move onto allophones- variations of possible pronunciations.) Get to know the Russian alphabet by studying all three columns below. The first column provides the Russian letter, the second column provides an approximate pronunciation (using English characters), and the third column gives an idea of what the letter sounds like, using an example from an English word. Russian Letter Pronunciation Closest English Sound , a Ah or aah Far, lamb , B Boy , V Vest , Gh Guest , D Door E, e Yeh Yes , Yoh York , Zh pleasure, beige , Z Zoo , E Meet , Y Toy , K Kilo , L Love , M Mop , N No , O Morning , P Pony , R (rolled) , S Song , T Train , Ooh Boo , F Fun , H Loch , Ts Ditzy , Ch Cherish , Sch Shhh , Sh (softer than ) Shoe , hard sign (non-vocalized) n/a , Uhee no equivalent sound , soft sign (non-vocalized) n/a , Aeh Aerobics , Yu You , Ya Yard Once you have learned the Russian alphabet, you should be able to read most Russian words, even if you don’t know their meaning. Stressed and Unstressed Vowels The next step is to learn how Russian words are stressed, which simply means which vowel in the word is emphasized.  Russian letters behave differently under stress and are pronounced more distinctly  according to their alphabet sound. Unstressed vowels are reduced or merged. This difference is not reflected in the spelling of Russian words, which can be confusing to beginner learners. While there are several rules governing the way unstressed letters are pronounced, the easiest way to learn is to expand your vocabulary as much as possible, naturally acquiring a sense of stressed vowels along the way.

Saturday, October 19, 2019

First day in college Essay Example | Topics and Well Written Essays - 500 words

First day in college - Essay Example The beginning of college meant the initiation of a different social environment where I would have to settle with my class fellows. When I entered college, my levels of anxiety raised and I walked in quietly towards the seminar room where there was a welcome address for the new students. I was very conscious because of the fear of being bullied. But my experience in the seminar room was not bad as I had expected it to be. This is because I came across many friendly people who like me were trying to settle in the new environment. I started a conversation with two of my class fellows and by the end of the session, we were all pretty comfortable. After the welcome address we moved to our classrooms and I started pondering on who would be teaching us and whether we would be having good teachers or not. I took a seat in my new class and our class teacher entered. She was a sweet lady who understood that most of us were stressed. She calmed us down and interacted with us prior to starting her teaching session. She proved to be not only very friendly but an extremely skilled teacher who was perfect at what she was teaching us. This was a relief as it was a good beginning of the day. When college ended and I was leaving the premises, I was happy that I had taken the decision to join this college. My anxiety had gone and I knew it that I was at the right place. It was a well disciplined place with high quality teaching and a perfect learning environment. I was also glad that I was in a class where the students were positive and optimistic about learning. My first day at college proved the nightmares that I had imagined with regard to it to be wrong. It was a good beginning of a new chapter of my life as I saved many precious memories from my college. Following the first day, I looked forward to going to college as the

BAD NEWS MESSAGES Assignment Example | Topics and Well Written Essays - 500 words

BAD NEWS MESSAGES - Assignment Example The program guarantees insurance of all legal members, but excludes the non-employees from the benefit. The involvement of Uniquix company legally employees enhances a smooth planning process for the program. The management is able to account for the number of employees of Uniquix Company. However, the current scenario has posed a great challenge to the management and the human resource management. The sneaking of the unscrupulous people to the program has increased the cost for the program and caused speculation among the managers. This is because there is uncertainty pertaining to the resources allocated to the human resource department and the number of non-registered employees who require exemption from the program. The issue has caused uproar in the Uniquix company management because of the limitation of the company’s resources. In this regard, there is need for corporate responsibility in the elimination for the menace. The staff ought to be vigilant of the strangers in the fitness program. The non-employees should be reported to the Uniquix company authority to save the company’s resources. The staff should take the initiative of knowing the Uniquix company employees. This will help in the identification of non-employees. The human resource management part will ensure that sophisticated information management systems are introduced at the on-site fitness program to screen the employees who take part in the program (Martin, 2010). The information system will capture the employee details including the names, the date of birth, the sex, the insurance unique numbers, and other biometric features. This results in the reduction of the cost of development and growth of employees of Uniquix Company. Concerted effort in the identification and consequent elimination of non-employees is essential. This move will improve the productivity of the company and help gain a competitive mileage. The

Friday, October 18, 2019

Distribution Models in Emerging Countries Essay

Distribution Models in Emerging Countries - Essay Example In the past nine years, the last-mile submission problem has been an issue for many, 139 public business owners who have joined the Santa Clara School International Social Benefit Incubator.   The cost of transport and middlemen often make it uneconomic to provide essential goods and services to under reserved areas.We have observed that the key issues seem to be:†¢ Build or partner with a channel,†¢ Product mix†¢ Retention, and compensation.With respect to the channel, there are three common alternatives (listed here in order of increasing capital and operating costs): Make use of current route and facilities. Microventures’ Hapinoy expanded in a wide horizon from dinner to remedies by increasing the buying power of current stores in inadequate areas in the Malaysia. They also lease transport from popular â€Å"Jeepney† vehicles to avoid the costs of pickups and individuals.Establish a route using existing social categories or organizations. Solar Sist er works with ladies categories to select well-connected sales-agents to spread solar products in non-urban Africa.Complicated goods and services may require creating techniques to incorporate customers. Husk Energy Systems has used a â€Å"micro-franchising model† to supply equipment and training to local business owners to set up and work town power-systems in India.Choosing the right product mix and determining if service and support are required is not prioritized a decision for all three programs.... Establish a route using existing social categories or organizations. Solar Sister works with ladies categories to select well-connected sales-agents to spread solar products in non-urban Africa. Complicated goods and services may require creating techniques to incorporate customers. Husk Energy Systems has used a â€Å"micro-franchising model† to supply equipment and training to local business owners to set up and work town power-systems in India. Choosing the right product mix (which impacts exercising, strategies and margin) and determining if service and support are required (which impacts abilities and training) is not prioritized a decision for all three programs. To increase and complement income from purchase of solar illumination systems in non-urban Indian, ONergy also provides â€Å"energy review,† individual exercising, fix, and update services.(Genuario, 2006) Business Significance: There are indications of advancement, however, with the restrictions on fore ign-investment companies with store passions in Chinese suppliers being put overdue in 2004, and the government’s latest contract with Avon to fight its 1998 ban on network marketing, starting the way for Avon to begin using its international business in Chinese suppliers. Avon was one of the first newcomers to Chinese suppliers, having designed regional research ability and a collection that involved 30 % products designed for regional customers before the 1998 law. Up to now they have created a multiple style of 6,300 shops with immediate sell employees and 1,600 surfaces in shops, according to The NPD Team. Avon earnings are approximated to have started 24 % last year and the company desires Chinese suppliers to be a $1 million market for them in the next few years. Procter &

No topic(just answer the question) Case Study Example | Topics and Well Written Essays - 250 words - 1

No topic(just answer the question) - Case Study Example At the same time, this option will ensure marriage minded individuals are not undermine by providing them with a platform that lacked previously. This group of individuals are often neglected by many players in the industry eHarmony operates and this makes it a lucrative path. Through the option, eHarmony will be able to market itself more and ensure more growth. The option will also ensure more growth for the company and will be in line with eHarmony investment in research. The final reason, why the option should be given a consideration, is that it provides viable avenues for various differentiations for eHarmony. The company operates in a rather dynamic and competitive industry and these forms the root for constraints and challenges associated with recommended option two. Option two faces challenge of competition. Being that eHarmony company also competes with Yahoo! Personals that attract significant individuals losing customers to them may be possible. Finally, if the strategy such as matching algorithm is not fully implemented, eHarmony may lose significantly on section of

Thursday, October 17, 2019

Community needs analysis Coursework Example | Topics and Well Written Essays - 250 words

Community needs analysis - Coursework Example The needs analysis links the terminal and instrumental values with the community needs, through effective project work and collaboration with the local charity. Family security, health and exciting life are instrumental for individuals with learning disabilities. The project team and charity will collaborate to identify the number of individuals with disabilities who have poor health, exciting life and family support. These individuals will then be supported to enhance comfort, and effective information sharing. Individuals with learning disabilities must also possess significant values such as ambition, responsibility and intelligence. The number of individuals who desire to be part of the project will be identified. The identification will be done through baseline surveys that involve local authorities, religious leaders, and opinion leaders (Bekas 196). Individuals experiencing learning disabilities must be stimulated intellectually. This is through enhancing the information sharing processes within the community (Wright, Foran & Wood 139). They should also demonstrate responsibility through being punctual for learning program, and also illustrates ambition by a great desire overcoming disability challenges (Sanchez 343). The main purpose of the needs assessment is to determine the number of disabled individuals willing to participate in the project, their disability level and category, and also the resource level required for successful operation of the project. The research team will partner with the local charity to collect and analyze data on the learners with disabilities, and in the implementation of the project. 100 participants will be identified for the study, through sampling approach. The study will be conducted through the qualitative research approach. The methods of data collection to be applied are interview, questionnaire and data mining. The data collected will be used to determine the community needs. Data mining

Labor laws Essay Example | Topics and Well Written Essays - 1000 words

Labor laws - Essay Example The best means of establishing a regulatory system that could protect employees against exploitation was through via the legal system that has already been established and holds valid authority on such matters. The legal system established a set of labor laws that were meant for this purpose and designed to fight for the â€Å"Average Joe† so to speak. Labor laws can be described as a set of rules that govern the relationship between an employee and their employer and have been designed to act as a baseline of what is expected from both parties (Ewing, McColgan & Collins, 2005). It can be said that these laws exist because frictionless economic efficiency can often operate to the disadvantage of the employed, even to the point of the violation of the basic civil rights of the employed. However, the role and structure of labor laws will have to be examined to determine whether the above statement contains any truth. By taking an in-depth look at the labor laws and role they pla y for both parties (that is, the employer and the employed) one is able to establish the essentiality of the existence of labor laws. Why Labor Laws Exist In order to properly understand the topic of discussion it is important for one to understand why labor laws were introduced into the legal system and the reason for their creation (Selwyn, 2008). There are a number of reasons that one can find for the existence of labor laws and by observing the main ones, one is able to visualize the need for these kind of regulation to be set in place. There can be said to be three main reasons why labor laws exist, these three reasons cover all the parties involved and the main angles that the subject can studied from. They include: 1. Employee Protection Labor laws exist to ensure that individuals working for organizations are not exploited as a result of their inability to stand up for themselves due to the size of the opposition. Labor laws are put in place to ensure that every employee is able to enjoy their basic needs and rights despite their various positions and circumstances and provides a tool that can be wielded against companies that may attempt to mistreat their employees. This can in fact be said to be the main reason behind the emergence of labor laws (Befort & Budd, 2009). The existence of these laws ensures that employees are treated fairly in their place of work and are not bullied by the large organizations in any context or form. The resources and clout that some large organizations hold in the society and business world would have meant that few individuals would have been successful fighting for their rights unless they had an equally influential backing supporting their cause. This backing has been offered by the labor laws that exist in the country (Ewing, McColgan & Collins, 2005). A good example of such protection is seen in excerpts of the existing labor laws such as the issue of Minimum Wage which entails the least amount of money that an indi vidual can be paid for their work (Keshawn & Arn, 2005). This ensures that a company does not exploit individuals in financial trouble by offering them unfair remuneration for the work that they have put in knowing that in some situations some may not have a

Wednesday, October 16, 2019

Community needs analysis Coursework Example | Topics and Well Written Essays - 250 words

Community needs analysis - Coursework Example The needs analysis links the terminal and instrumental values with the community needs, through effective project work and collaboration with the local charity. Family security, health and exciting life are instrumental for individuals with learning disabilities. The project team and charity will collaborate to identify the number of individuals with disabilities who have poor health, exciting life and family support. These individuals will then be supported to enhance comfort, and effective information sharing. Individuals with learning disabilities must also possess significant values such as ambition, responsibility and intelligence. The number of individuals who desire to be part of the project will be identified. The identification will be done through baseline surveys that involve local authorities, religious leaders, and opinion leaders (Bekas 196). Individuals experiencing learning disabilities must be stimulated intellectually. This is through enhancing the information sharing processes within the community (Wright, Foran & Wood 139). They should also demonstrate responsibility through being punctual for learning program, and also illustrates ambition by a great desire overcoming disability challenges (Sanchez 343). The main purpose of the needs assessment is to determine the number of disabled individuals willing to participate in the project, their disability level and category, and also the resource level required for successful operation of the project. The research team will partner with the local charity to collect and analyze data on the learners with disabilities, and in the implementation of the project. 100 participants will be identified for the study, through sampling approach. The study will be conducted through the qualitative research approach. The methods of data collection to be applied are interview, questionnaire and data mining. The data collected will be used to determine the community needs. Data mining

Tuesday, October 15, 2019

HIV in Humanitarian Contexts Essay Example | Topics and Well Written Essays - 2500 words

HIV in Humanitarian Contexts - Essay Example The outcome is the need to stop HIV and to assist those which are a threat to the health of others continues to increase while PLHIV treatments are in need of reaching larger groups of individuals (Smith, 2010). The need to approach this issue is one which is based on responding to emergency situations as well as considering the growing numbers of individuals who are in need of treatment that have PLHIV. The needs to assist those who have PLHIV are continuing to increase not only from the responses which are required to emergency situations or the spread of the disease in specific regions because of the lack of resources. It is also noted that there are humanitarian needs associated with various regions. The concept of humanitarian responses is one which is associated with responding to vulnerable groups and ensuring that resilience can be built in situations because of the services provided. The humanitarianism which is provided first takes place in emergency situations in which an outbreak or other problem arises. There are also some specific concepts which are linked to assisting vulnerable groups because of culture, available resources and service provisions which combine with food, education and sanitation methods (Okal, Bergmann, 2007). Examining the humanitarian methods and designs, gaps that are associated with the needs in various communities and the way in which these can be reconsidered develops a stronger understanding of what is needed to assist those suffering from PLHIV. This research study will examine the current status of humanitarian efforts, how this is creating changes or gaps in providing assistance for PLHIV as well as how different designs can create stronger responses to those who are suffering from PLHIV. By examining these various associations with humanitarian responses, there will be the ability to identify the gaps in assisting those with PLHIV as well as understanding how designs can be changed to assist communities in need of hum anitarian assistance. Methodology The methodology that will be used will consist of two main studies that will define the needs for those suffering from PLHIV and the humanitarian responses that are required. The first is a review of existing literature. This will examine various statistics from specific organizations which have designs and methods for assisting those who have PLHIV. This will also consist of other pertinent literature that is based on the current understanding of how to respond to outbreaks and what this means to those who are in specific settings. The research methodology will be combined with communication through questionnaires. This will be sent to offices in various regions around the globe. The objective of these questionnaires will be to look at the designs which are currently used to respond to PLHIV in various regions as well as what the strengths and weaknesses of the design are. By examining these various types of responses, conclusions can be drawn whic h relate to the gaps in designs which are used to respond to the needs of PLHIV in a humanitarian context. Special Needs of PLHIV in Humanitarian Contexts The first concept which is associated with PLHIV in human context is based on the vulnerabilities which are established in responding to specific needs. The risk for HIV is known to be a main factor in specific areas that lack infrastructure

Monday, October 14, 2019

Network Security Plan Essay Example for Free

Network Security Plan Essay INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel ports 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559seqNum=3 SANS Information Security Resources | Information Security Policy Templates |.

Sunday, October 13, 2019

Overview and Analysis of the PAPA Model

Overview and Analysis of the PAPA Model PAPA Model: Today, the massive use of computer science information technology in the business world and other intuitions has brought many ethical issues and concern. Mason introduced four most crucial ethical issues of the information era on 1986: which are Privacy, accuracy, property and accessibility abbreviated to PAPA. Mason’s PAPA model focused on the individual impairment which could arise from the unethical or misuse of information and information technology. Based on the Framework developed by Mason we can analyse and reach the conclusion on ethical issues emerged by the unethical use of information technology. PAPA model enlightens depth knowledge on what the Privacy, accuracy, property and accuracy means, how they are interrelated, what are their differences and how they help us to reach the conclusion on ethical issues. Privacy: In general understanding, privacy means the right to be free from secret scrutiny and to determine whether, when, how and to whom, one’s personal or organisational information is to be revealed. The privacy Act 1988 regulates how personal information is handled. The Privacy Act defines personal information as †¦information or an opinion, whether true or not, and whether recorded in a material form or not, about an identified individual, or an individual who us reasonably identifiable. There are two main factors which threaten our privacy today, firstly growth of information technology with its capacity of scrutiny, communication, computing, retrieval and storage, and secondly the increased value of information in decision making. Accuracy: It is the condition or quality of being true, correct or exact; free from error or defect. Inaccuracy may cause detracting situation on person’s life, organisations and business values. Here arises some question: who should be responsible for accuracy and authenticity of collected information? How can one believe that the data will be correctly inputted, processed properly and presented to users? On what basis should we believe bugs in database or system and processing are not done with intention and occurred accidently. Who takes the responsibility for glitch in information and how the victim will be reimbursed. Property: Property issues are concentrated on ownership and value of information. It also seeks the answer of few questions like, who is the owner of the information. What is the value of the exchange, and in which way the access to information or the recourses should be allocated? Here property means the intellectual property and its right. Once the intellectual property is provided somewhere or transmitted, it is complicated to keep the person as it becomes communicable and more difficult to be reimbursed. Accessibility: its issues are concerned on who has the permission to access the information, who holds the rights or keys to access it, what data an individual or organisations are privileged to acquire with which safeguards and under what terms and conditions? After going through the scenario provided and from my own research I consider, all four areas have given rise to ethical issues for Joseph where some have higher level of the issue whereas other has a low level effect. Most importantly it gives rise to privacy issues followed by others. Privacy issues: Joseph’s personal or we can say the very confidential information was compromised which could lead to very disastrous consequences, identity theft makes life miserable. If Joseph had given attention on lecture’s warning to them to be careful and vigilant while providing personal information to companies over the internet, he might be on safe side but rather he thought him old-fashioned and never thought some issues may arise while providing information to a company like Sony. How can one decide on whom to trust? How much information can one give to others? Accuracy Issues: Being the customer of Sony Joseph had right to get accurate and timely information, to whom he had provided his personal information to credit card details with trust. Accurate information of personal information and credit card details being hacked was provided only after a whole week of the incident following by other misleading and fake information. Though, the hackers couldn’t do any misuse of data they might have destroyed everything in a week time customers could take precaution to Property Issues: When Joseph could not restore the backup file it gives rise to property issues. He bought games from Sony he collected trophies but did he really own that? Did Sony own the data that customers provided? Sony’s data breach is one of the biggest data breach to date which has given rise to various concerns in the Sony’s privacy policy and security measures. Though, other issues also marked a question to Sony’s management especially it has fueled to Privacy concern. When an organisation gathers personal information of its customers, employees and other stakeholders they must assure the safety and security of those. Breach of personal information can be proved very dangerous and it has been proved in many cases, for example, Jessica’s Story of the mail scam. The main issue and the question arise to Sony is where they really serious on Privacy issues, had they meet all the privacy measures and followed the protocol. If they had done so how someone could hack and enter into their system. Breach of over 77million accounts including all the personal details and credit card of the customer was not a small issue. This issue gave a big question mark to Sony. The mana gement took a whole week to inform its customer of the actual reason for shutdown of its network, which is questionable. If a breach does occur, effective handling of the response is a key. This means planning and preparing for such an event in advance. A policy should be drawn up, under which it is suggested that prompt notification is made to both the customers and the regulators. All staff should have data protection training appropriate to their role, and appropriate compensation, support and remedial plans should be prepared. Though it was Sony violated the privacy of its customer Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. I find some statements made by Privacy commissioner Timothy Pilgrim questionable. He stated that Sony did have a case to answer as they did not intentionally disclose any confidential information is not surprising, simply put Australia has no real commercial Privacy or security legislation for Sony to breach. The fact that Sony did not show a duty of care and/or displayed a complete lack regard for the personal information entrusted to them by their clients is completely ignored by the commissioner. Sonys duty of care is to maintain appropriate IT security systems, policies and procedures to maintain client data confidential, private and available whether at rest, in transit or in a process. It is obvious that they did not take these duties of care obligations seriously until that proverbial substance hit the fan. Statement by Pilgrim â€Å"Sony has now extra security measures to strengthen protection around the network platforms† highlights its historical disregard for client confidentiality in their corporate culture and I do not think that any Australian Government officials should comment and try to forgive such obvious laissez-faire behaviour. Can he answer us, what reasonable steps Sony took to protect individual’s credentials? Now, they actually created a CSO role. They didnt have this before? What fines were handed down for this breach? How can he show that legislation protects individual’s information to overseas organisations? I opened this investigation because I was concerned that Australians personal information may have been compromised, Pilgrim said. However, his concerns were unfounded, with Pilgrim finding that the company hadnt breached the Act. Seriously, just why does Sony Corporation require our full date of birth? Year only should be adequate to verify a customer is over 18 probe further only if the year reveals someone turning 18 that year. As such, Sony should be 100% liable for any loss plus damages for emotional distress to any customer, their spouse and immediate family, in respect of any customer who has their identity was stolen and fraud committed. And also it has to be made clear that whether it identified a culprit in the intrusion. Guilty must be punished.

Saturday, October 12, 2019

Epiphany :: Literary Analysis, Joyce and Calvino

World War I and World II are basically the same, right? If so, Araby, written around WWI by James Joyce, and The Flash, written around WWII by Italo Calvino, are also the same, no? Indeed, these short stories have many similarities. At the same time, both stories have many differences. Thus, it is difficult to compare both stories when considering all the details. If the subject of comparison is more specific, such as epiphany, then more emphasis and effort can be put into the comparison. In Araby, the protagonist falls in love with a girl, but love deceives him. In his moment of epiphany, â€Å"[g]azing up into the darkness [he] saw [himself] as a creature driven and derided by vanity; and [his] eyes burned with anguish and anger† (Joyce 1). In The Flash, the protagonist suddenly grasps a reality, but only for an instant: â€Å"[He] stopped, blinked: [He] understood nothing. Nothing, nothing about anything. [He] didn’t understand the reasons for things or f or people, it was all senseless, absurd. And [he] started to laugh† (Calvino 1). The comparison between the epiphanies of both short stories reveals the relationship amongst the similarities and differences regarding theme, symbolism and setting. Most importantly, comparing the themes of both epiphanies reveals they can simultaneously be similar and different. An important common theme in both epiphanies is facing reality. In Araby, the protagonist realizes â€Å"[his] stay was useless† (Joyce 6) since the young lady only â€Å"spok[e] to [him] out of a sense of duty† (Joyce 6). Likewise, in The Flash, the protagonist realizes he â€Å"accepted everything: traffic lights, cars, posters, uniforms, monuments, things completely detached from any sense of the world, accepted them as if there some necessity, some chain of cause and effect that bound them together† (Calvino 1). Both characters face the reality and randomness of the world. Even so, each epiphany implies each protagonist faces a different sort of reality. The protagonist of Araby faces the reality of love and â€Å"[sees himself] as a creature driven and derived by vanity† (Joyce 6). On the other hand, the protagonist of The Flash faces the reality of existence and hopes â€Å"[he] shall grasp that other knowledge† (Calvino 2). Therefore, reviewing the theme similar to both epiphanies leads to discovering different themes as well. Conversely, looking at the differences in the symbolism of each epiphany hints at a comparable aspect of symbolism.

Friday, October 11, 2019

Troublesome Listening Barriers

XCOM/200 Troublesome Listening Barriers I believe that both males and females are subject to all forms of listening barriers. Especially since each person has a listening style that they work best with when taking in information. However, both males and females do face different listening barriers regardless of their listening style. The listening barriers that are the biggest challenge for men to overcome would be information overload, external noise and unchecked emotions. With the information overload barrier the male is overwhelmed by the amount of information that the other party is conveying. This can be seen by a wife that is telling her husband every single detail of her day instead of a recap of what her day consisted of. The wife provided an abundance of irrelevant information and overloaded her spouse with details that were not necessary. The external noise barrier stems from there being other distractions that the man is trying to focus on as he participates in the communication. Men are focused on other noises that are taking place around them. They may only be hearing a portion of what is being expressed by the party they are interacting with. A male that is trying to focus on the football game while having a conversation would be an example of this. The last barrier would be the unchecked emotions. Most men tend not to express their emotions openly. This prevents them from a healthy outlet to manage their feelings. When there are unresolved emotions the individual is not able to take in information that does not have a bias. Based on how they personally feel towards the subject matter they may tune out information based upon the unchecked emotions. The listening barriers that are the most challenging for women would be shifting attention and external noise. The listening barrier dealing with shifting attention occurs since women are known for multi tasking. This concept requires that the person listening tune into the item or person that needs the females attention as a priority. Another example of a listening barrier women face would be external noise. Just like men, women are challenged by what is taking place around them and needing to stay focused on the communication to hear what is being said. An example would be a mom that is trying to talk on the phone and listen to what is being said but is distracted by listening to what the kids are doing in the next room.

Thursday, October 10, 2019

Challenges Faced by a Country for Economic Development Essay

An economy is flourishing and is shown to be beneficial and fruitful for the people living in it only when the growth of the economy goes up continuously. It is essential for a country to not only develop politically or socially but it also needs to demonstrate economic development in order to sustain in the international market and in order to come ahead of other countries. But it is not very easy for any economy to economically keep growing because an umpteen number of internal and external factors that affect the growth and the economic development and it is essential and crucial for the countries to address the issues and move ahead. There are some very common challenges that are faced by an economy that are discussed below. The presence of external imbalances in the global economy is one of the most influential causes that impose a challenge on the economic development of any country. There can be reasons such as political disruptions, changes in import-export scenario or foreign currency reserve changes that can lead to imbalance in a country that is external to an economy. But the disruptions taking place in one country can adversely affect the economy and economic growth of other countries as well. The monetary and fiscal policies adopted by the government of an economy also have a huge role to play in the economic development. These policies tend to impact the interest rates, money supply and foreign exchange rates of an economy and if the policies are not in the favor of the growth, they can become major challenges and major issues all over the country. Read more: Essay About Disadvantages of Population The change in trade situations can also affect the economies. Exports of a country help it in generating external revenues while imports can be done for different purposes such as facilitation of a manufacturing process, providing basic necessities to the people etc. And hence if there is an imbalance in the external trade that is taking place in a country, it can lead to severe turbulence and can adversely impact the economic growth. Other economic factors such as poverty, inflation rate, population also are dependent on an economy and also impact the economy. If a nation has higher level of poverty, it is more likely to have economic challenges and similarly high population is not desired and not advisable for high economic growth. And that is the reason why the governments usually try to avoid these unfavorable situations and try to maintain a balance in the countries by different measures. There are many more reasons why the economies face severe challenge of demonstrating growth and hence it is crucial for the countries to adopt different and new policies in order to avoid these challenges and facilitate growth. Reference: http://classof1.com/homework-help/international-economics-homework-help/ View as multi-pages

Of Mice and Men Compare and Contrast

The book, Of Mice and Men by John Steinbeck, is about two men named George and Lennie who are living in the time of the Great Depression. They travel together and after they get themselves into trouble in the city of Weed, they moved to work on a ranch. There is also a movie, â€Å"Of Mice and Men,† that is based off of the book. There are many themes in the story, one of them being power. The movie differs slightly from the book in the fact that it has fewer examples showing the importance of power, unlike the book where there are many instances of power. First off, power is shown, or in some instances not shown, in the characters. In both the book and the movie, George has a certain power over Lennie. He acts as his father: reprimanding him, protecting him, and telling him what to do for his own good like a normal father would have. A second character that supports the theme of power in the book and movie is Lennie. Although he doesn’t have a lot of logical power, he is a very physically powerful person in the movie and book. He’s tall, strong built, and just all around a big guy that can do a tremendous amount of physical labor. Another similarity between the book and movie relating to power is Curly, the boss’s son. He’s a very small man that likes to order people around and has the reputation of beating up bigger guys. Even though there are multiple examples of characters showing power in both the book and movie, there is an example of when the movie makes the theme less relevant to the story. In the book, Lennie has the power to remember to go to the brush, where George told him to go if he got into any trouble. But, in the movie, it was so that Lennie was lost and couldn’t find the brush. It made Lennie seem more vulnerable and with less logical power than in the book where he proved himself, aside from his challenges. The second subject that the theme is shown in is events. The events are both alike and different within the book and movie. In both the book and movie, George talks for Lennie in front of the boss when they first arrive at the ranch. He’s worried that Lennie will say something to reveal that he isn’t the smartest person and that it might prevent them from working there. A similarity is also the fact that when George and Lennie were ran out of Weed, they were being chased for no reason other than the word of the girl that Lennie accidentally scared. He had no intension of hurting her and never did, yet she still had the power to manipulate everyone to think that she was assaulted by Him. The last similarity of events that illustrate power is when Lennie accidentally kills the mice, the puppy, and Curly’s wife. He had so much physical power and didn’t know his own strength that he would kill living things before even realizing what was happening. This got him into a lot of trouble eventually. A significant difference in events that proves the importance power is that in the book, Curly’s wife who was originally looked at as a feeble, vulnerable woman with no power over anyone, all of a sudden demonstrated a great deal of authority over one of the black workers, Crooks. This was a very sudden turnaround in authority and changed the reader’s view about her. This happening never occurred in the movie and tremendously changed the outlook of power from the book. The last topic that displays the value of power is the details of the story. The first thing is that in both the movie and book Curly’s wife does not have a name. This may have been to imply that her name had little importance or power over the story. Her impact of getting Lennie killed from him accidentally killing her had nothing to do with her name. Another detail is that the stable keeper was African-American. This shows a lack of power in the movie and book because he was forced to live by himself and had no impact on the decisions or thoughts of the other men simply because of his race. A third detail is that George was much smaller than Lennie in both portrayals of the story, yet he had power over Lennie as if he was his father. This shows that even though one may be very powerful in a certain way like Lennie, they can still be controlled by someone that possibly had more confidence. All in all, the movie weighs the importance of power to some extent less than the book does. Both the book and movie’s characters are generally the same, except the book shows Lennie with more logical power than the movie does for when Lennie runs back to the brush to meet George. The events are very much alike also. But, the movie is lacking the event of Curly’s wife showing power over Crooks in his own cabin, which dramatically impacts the atmosphere of the story. The book and movie also have similar details showing power like Curly’s wife not having a name, Crooks not having a lot of power because of his race, and little George having power over Lennie. All these subjects help communicate how the movie and book relate to each other for showing power.

Wednesday, October 9, 2019

Ethics and Professionalism Article Example | Topics and Well Written Essays - 500 words

Ethics and Professionalism - Article Example PR exercises are increasingly used to emphasize and disseminate information about the organizations, in order to establish a closer relationship with the various stakeholders, including investors as well as with their valued customers. Public Relation Society of America or PRSA's Code of ethics is highly relevant in the current environment of cut throat business. The well defined code promotes responsible actions and emphasizes accountability, honesty, transparency, loyalty and fairness (PRSA). They are important part of business strategy because they facilitate consistent, accurate and the right message to be communicated to the audience, to investors as well as customers. Public relation campaigns significantly strengthen company's position and provide an effective competitive edge over its competitors in business. Ethically correct practices encourage dissemination of correct information to the public and other stakeholders. Violation of academic trust through plagiarism, cheating, falsifying information or aiding and abetting in any of the nefarious activities are now serious offences and they are considered as totally unacceptable conduct in all areas of work.

Tuesday, October 8, 2019

XCOM WK3 CHECKPOINT Essay Example | Topics and Well Written Essays - 250 words

XCOM WK3 CHECKPOINT - Essay Example They are both affordable. There are some differences between these two technologies. Near-Time allows its users to sort out the source of information and create new informal channels. On the other hand, IBM Lotus Connections does not support creating functions and information sorting. These advanced technological tools are practical and beneficial to many workplaces. For my case, these technologies are not very applicable due to the nature of my work. I can therefore easily achieve my work goals without incorporating these technologies. The answer is no. These advanced communication tools are available in the modern type business environment. However, a majority of businesses do not accept and utilize these tools to in their everyday business operation activities. Many businesses could be considering these advanced tools as novel commodities or be afraid of change. Companies may view these collaborative tools as increased costs since the employees might have to spend extra time to master these technologies. They are therefore extra expenses associated with shifting from traditionally business