Thursday, August 27, 2020

Banking, Customer Satisfaction IDBI Bank Awareness

Banking, Customer Satisfaction IDBI Bank Awareness Part I 1.1 Title of the examination 1.2 Scope of the examination 1.3 Objective of the examination 1.4 Significance of study 1.5 Researcher system 1.1 Title of the investigation:- â€Å"A overview on banking items, consumer loyalty consciousness of IDBI Bank† 1.2 Scope Importance of the Study Every single venture concentrate alongside its specific targets additionally have scope forâ future. Also, this degree in future provides for new investigates another need to explore aâ new venture with another extension. Extent of the examination comprise a couple futureâ business plan as well as gives thought regarding another business which becomesâ much progressively beneficial for the explores then the more established one. Extent of the investigation could give the anticipated situation for another saw in my projectâ are not actually having all the highlights of the extension which I depicted above yet alsoâ not coming up short on all the highlights. Exploration study could give a thought of system extension for catching moreâ market and client with better administrations and lower cost, with out compromisingâ with quality. In future client prerequisites could be included with the item and administrations forâ getting an edge over contenders. Shopper conduct could likewise be utilized to dispatch a newâ product with additional advantages which are required by clients for their accountâ (saving or current ) as well as for their speculations. Variables which are liable for the exhibition for bank can likewise be utilized forâ the adjustment of the system and item for being progressively productive. 1.3 Objectives of the investigation:- To know the client needs and desires. To discover the elements which client think about in opening a record To realize that up how much a client is happy with the bank To know the client objections and their redressal 1.4 Significance of the investigation:- Each exploration is led to satisfy certain destinations and these target thusly satisfy some reason and are of essentialness for at least one then one gathering these examination is noteworthy for:- To the Researcher:- This examination gives the specialist a reasonable knowledge of different exercises and capacity of the bank The specialist will likewise have the option to create on inside and out information on banking part The investigation is likewise required for the halfway satisfaction of the prerequisite for the level of MBA according to the educational program To the Bank:- The investigation would help IDBI Bank to know the clients disposition (about mindfulness and fulfillment level) towards its different items. 1.5 Research Methodology:- 1) Type of Research is elucidating in nature 2) Universe Customer of IDBI Bank in New Delhi 3) Sampling Unit Existing client of IDBI Bank 4) Sampling Technique Convenience strategy for examining was utilized 5) Sample Size 200 respondents 6) Data Type Primary optional information Essential DATA The Primary information are those which are gathered once more and just because, and thusâ happen to be unique in character. Optional DATA The optional information are those which have just been gathered by somebody elseâ and which have just been gone through the factual procedure. Section II 2.1 Industry Introduction 2.2 Introduction to IDBI bank: All about 2.3 Management Organization 2.4 IDBI bank business outline 2.5 IDBI bank hierarchical diagram 2.6 Product Services 2.7 Subsidiaries of IDBI 2.8 Review of writing 2.1 Industry presentation The Indian Banking industry, which is administered by the Banking Regulation Act of India, 1949 can be comprehensively characterized into two significant classes, non-booked banks and planned banks. Planned banks compriseâ commercial banks and the co-employable banks. As far as ownership,â commercial banks can be additionally gathered into nationalized banks, the State Bank of India and its gathering banks, local rustic banks and private sectorâ banks (the old/new local and remote). These banks have over 67,000â branches spread the nation over in each city and towns of all niche andâ corners of the land. The main period of money related changes brought about the nationalization of 14 majorâ banks in 1969 and brought about a move from Class banking to Mass banking. This thusly brought about a huge development in the geological inclusion ofâ banks. Each bank needed to reserve a base level of their loanâ portfolio to segments recognized as â€Å"priority sectors†. The assembling sectorâ also developed during the 1970s in ensured environs and the financial area wasâ a basic source. The following influx of changes saw the nationalization of 6 moreâ commercial banks in 1980. From that point forward the quantity of planned commercialâ banks expanded four-overlap and the remote banks (numbering42), local ruralâ banks and other booked business banks represented 5.7 percent, 3.9â percent and 12.2 percent separately in stores and 8.41 percent, 3.14â percent and number of bank offices expanded eight-overlay. Furthermore, that was notâ the breaking point of development. After the second period of money related segment changes and progression of theâ sector in the mid nineties, the Public Sector Banks (PSB) s discovered itâ extremely hard to contend with the new private part banks and theâ foreign banks. The new private area banks previously showed up afterâ the rules allowing them were given in January 1993. Eight newâ private segment banks are directly in activity. These banks due to their lateâ start approach best in class innovation, which thus causes them toâ save on labor costs. During the year 2000, the State Bank Of India (SBI) and its 7 associatesâ accounted for a 25 percent share in stores and 28.1 percent share in credit. The 20 nationalized banks represented 53.2 percent of the stores and 47.5â percent of credit during a similar period. Current Scenario: The business is as of now in a change stage. From one perspective, the PSBs, which are the backbone of the Indian Banking framework are in the process ofâ shedding their fat as far as inordinate labor, extreme non Performing Assets (Npas) and unreasonable administrative value, while on theâ other hand the private part banks are solidifying themselves throughâ mergers and acquisitions.â PSBs, which as of now represent in excess of 78 percent of absolute bankingâ industry resources are burdened with NPAs (an amazing Rs 830 billion inâ 2000), falling incomes from conventional sources, absence of present day technologyâ and a gigantic workforce while the new private segment banks are forgingâ ahead and revamping the customary financial plan of action by method of theirâ sheer advancement and administration. The PSBs are obviously at present working outâ challenging procedures even as 20 percent of their huge representative strengthâ has dwindled in the wake of the effective Voluntary Retirement Schemes (VRS) plans. The private players anyway can't coordinate the PSBs extraordinary reach, incredible sizeâ and access to ease stores. Thusly one of the methods for them toâ combat the PSBs has experienced the merger and obtaining (M A) course. In the course of the most recent two years, the business has seen a few such occurrences. For example, HDFC Banks merger with Times Bank Icici Banks acquisitionâ of ITC Classic, Anagram Finance and Bank of Madurai. Centurion Bank, Indusind Bank, Bank of Punjab, Vysya Bank are supposed to be keeping watch. The UTI bank-Global Trust Bank merger anyway opened a pandoras box andâ brought about the acknowledgment that everything was not well in the working of manyâ of the private part banks. Private part Banks have spearheaded web banking, telephone banking,â anywhere banking, versatile banking, charge cards, Automatic Teller Machines (ATMs) and joined different administrations and incorporated them into theâ mainstream banking field, while the PSBs are as yet wrestling with disgruntledâ employees in the result of effective VRS plans. Likewise, following Indias duty to the W To understanding in regard of the administrations sector,â foreign banks, including both new and the current ones, have been permittedâ to open up to 12 branches every year with impact from 1998-99 as against theâ earlier specification of 8 branches. Assignments of government weakening their value from 51 percent to 33 percent in November 2000 has additionally opened up another open door for the takeover ofâ even the PSBs. The FDI rules being more excused in Q1FY02 may alsoâ pave the path for remote banks taking the M A course to gain willing Indianâ partners. In the interim the financial and corporate area log jam has prompted anâ increasing number of banks concentrating on the retail section. A significant number of them areâ also entering the new vistas of Insurance. Manages an account with their incredible reachâ and a standard interface with the retail financial specialist are the best positioned to enter intoâ the protection area. Banks in India have been permitted to give charge basedâ insurance administrations without hazard interest, put resources into a protection companyâ for giving foundation and administrations backing and set up of a separateâ joint-adventure insurance agency with chance cooperation. Total Performance of the Banking Industry Total stores of planned business banks expanded at aâ compounded yearly normal development rate (Cagr) of 17.8 percent during 1969-99, while bank credit extended at a Cagr of 16.3 percent per annum. Banksâ investments in government and other affirmed protections recorded a Cagr ofâ 18.8 percent for each annum during a similar period. In FY01 the monetary lull brought about a Gross Domestic Product (GDP) growth of just 6.0 percent as against the earlier years 6.4 percent. The WPI Index (a proportion of swelling) expanded by 7.1 percent as against 3.3 percentâ in FY00. Essentially, cash gracefully (M3) developed b

Saturday, August 22, 2020

Leadership and Responsibilities Nelson Mandela

Question: Talk about theLeadership and Responsibilities for Nelson Mandela. Answer: What makes one a pioneer? Is administration inborn or made after some time? These inquiries are among those which have given individuals a ton to consider. The two elements can impact the administration characteristics of an individual (Gujral, 2013). For example, through instruction, people acquire abilities on the board of assets. Appropriate administration is the thing that great authority is about. What number of individuals on the planet can fall in the rundown of good pioneers? The rundown is interminable. Individuals like Malcolm X of the US, Mother Teresa of India, and Nelson Mandela of South Africa among a few others. A decent pioneer consistently assumes liability (Krass, 2017). Nelson Mandela was an extraordinary pioneer who is notable on the planet history. He was a government official, hostile to politically-sanctioned racial segregation progressive and later the President of the South African Republic from 1994 to 1999 (Hollingsworth, 2013). Nelson Mandela had the option to end the politically-sanctioned racial segregation framework in South Africa. By and by, he set a model for the remainder of the world. Individuals are altogether equivalent paying little mind to their race, sexual orientation, age or position in the administration. The politically-sanctioned racial segregation framework started when South Africa was under the provincial government. There was segregation of individuals by race (skin composition) to the degree whereby the blacks were made slaves in their nation. As a bold chief, Mandela rose to shape bunches which would battle for human rights. There are a few authority characteristics which can be ascribed to Mandela. They include: Mandela was certain reasoning, he generally thought of how to improve the lives of the considerable number of networks living in South Africa. Mandela was a visionary chief. He had the option to see the comprehensive view of South Africa, the enduring the network experienced and the route forward to tackle all the difficulties. A decent pioneer ought to have the option to recognize the necessities of his kin and how every single one of them can benefit from outside assistance to accomplish what they want. Nelson had an ordering He was a valiant pioneer who showed up at whatever point his kin required him. He never loved savagery and effortlessly worn foes with a grin. He was centered around his crucial vision. He never halted the battle till he accomplished what he needed. He had trust. Great pioneers ought to have trust in whatever they do. A pioneer with no expectation is a disappointment. Assurance was additionally part of his system driving South Africa to autonomy in 1994. A decided pioneer has faith in himself. Having faith in oneself prompts improvement of confidence. An individual with confidence will consistently mind the lives of others. There are numerous things which can be found out about administration from Nelson Mandela. People can differentiate between a pioneer and a ruler. Mandela was a pioneer. A pioneer consistently contemplates others, in contrast to a ruler. To be a noteworthy pioneer for your kin, you need assurance. One ought to be prepared to accept duty as there are a few difficulties that pioneers face. For example, Mandela was detained. There are times pioneers face hardships. A decent pioneer will exploit the difficulties to fortify his group to continue battling for what they accept. From Nelson, pioneers get familiar with the noteworthy of being centered around their undertaking. Be it business, political or sports; center is the most significant. For example, when understudies are in bunch conversations, those with pioneers without center wind up neglecting to accomplish their primary target. A less engaged individual is effectively influenced aside by others. Settling on choices become a major issue for such a pioneer. Practicing persistence is likewise something else which pioneers gain from Mandela. Things don't come as quick as most will anticipate. In any case, the easy method of doing things isn't generally the most ideal way. Systems should be included for a pioneer to settle on a choice (Strategy and administration, 2016). In the system, consultancy is basic. A group head should shape a gathering to help in running the administration. Two heads are superior to one, differing assessments from a few people lead to the improvement of a dependable choice. The idea of the impact of a pioneer relies upon various elements like for example, how well does the general public know the pioneer? Nelson had the option to impact practically all individuals from South Africa to battle in completion the politically-sanctioned racial segregation framework (Sadler, 2013). This set a genuine model for most pioneers in the African Continent who chose to assemble their endeavors to end bigotry. Actually, the entire world was moved by the battle of this man. His quality, voice, humbleness and serene method of dealing with debates roused numerous individuals. From that, we discover that quiet exchanges can likewise unravel issues, brutality isn't the main method of moving toward major issues in the general public. The nearness of a pioneer when tending to issues influencing the network is significant. Individuals don't require virtual pioneers. They need pioneers they can see, pioneers who can settle on choices for their benefit. By and by, bold people who are prepared, to come clean, consider a spade a spade and not a spoon. On the off chance that things are terrible, they are awful, no compelling reason to cover up. A pioneer who uncovers things of numerous regularly gets the help of the greater part. Having a lion's share close by is an affirmation of accomplishment. Individual attributes contribute much in making a decent pioneer. From the manner in which you handle things, the manner in which you direct your organizations and the manner in which you communicate with individuals, it is anything but difficult to tell the sort of pioneer you are. References Gujral, G. S. (2013). Initiative characteristics for compelling pioneers. Hollingsworth, T. (2013). Nelson Mandela: Leading The Way Forgang, W. G. (2016). Serious methodology and administration: a manual for unrivaled execution. Lanham, Md, Rowman Littlefield Publishers Krass, P. (2017). The book of initiative intelligence: exemplary compositions by incredible business pioneers. New York, Wiley. Sadler, P. (2013). Initiative. London, Kogan Page Ltd Methodology and administration. (2013). Bradford, England, MCB University Press. Swart, I. (2015). Religion And Social Development In Post-Apartheid South Africa: viewpoints for basic commitment. Stellenbosch, SUN Press Whyte, Q. (2014). Apatheid and different strategies. Johannesburg, South African Institute of Race Relations

Friday, August 21, 2020

Tips to Help You When Writing Research Papers Online

Tips to Help You When Writing Research Papers OnlineWriting research papers online can be extremely daunting, but if you know what you're doing and you have a few tips you can do this. You just need to focus on getting a good guide to help you along the way.There are many different online sources you can use to write your research papers, and most of them will give you an outline that you can follow. You'll want to make sure you find a good guide that will help you understand how the different steps of writing research papers online work.You can get great information from reviews and forums in regards to writing research papers online. You'll be able to see first hand what other people are doing and find out what they've experienced with writing research papers online. You'll also be able to find out some great tips that you can take and use to make your life easier.You can start by trying to find a good guide to help you with writing research papers online. These guides typically in clude what steps you should be taking, which is helpful and where to find the resources that you will need to successfully complete the project. They also usually have the outline of what you'll be working on so you can focus on the areas you're interested in.They will also be able to help you with the key words you will need to be using when you're researching online sources. This is very important because the online sources you're looking for won't always be available in the English language, which makes it very important that you have the right keywords for the terms you're looking for.You can also find many great ways to make writing research papers online easier by choosing the right paper templates and software. Many of these templates are based on well-known research papers that will help you get the project done quickly and easily. You can get help from forums and review sites to get a good idea of what to look for when you're choosing your template.Another great resource to use to help you get started on writing research papers online is a guide that can help you get your own copy of the original research papers. Most of these guides are free, but you might need to pay for this kind of help. You can find these types of guides in most public libraries and bookstores.As you can see, there are many different things you can do to help you get started on writing research papers online. Finding a good guide and getting the right knowledge is the first step to being successful.

Monday, May 25, 2020

Risk Workshop and Risk Register Free Essay Example, 2000 words

Medium risks would be considered crucial too and the low Risks would be considered containable for the project. Alternatively, a high risks posts much threat to the project, a medium Risk could occur occasionally and a low risk would not be likely to affect the project. These scales provide standard measures for the stakeholders (Heldman, 2005). In the above mention analysis, numeric values play a vital role in the estimation of the impacts of the risks felt. This analysis is normally applied for big projects where Risks could cause serious problems. There is System software specifically designed for the above task though smaller projects can be handled manually. The values can be estimated and specific points. In the above mention analysis, numeric values play a vital role in the estimation of the impacts of the risks felt. This analysis is normally applied for big projects where Risks could cause serious problems. There is System software specifically designed for the above task t hough smaller projects can be handled manually. The values can be analyzed depending on level of the threat to be analyzed. Flayton electronics had the following problems or risks. We will write a custom essay sample on Risk Workshop and Risk Register or any topic specifically for you Only $17.96 $11.86/pageorder now ID CATEGORY RISK IMPACT DESCRIPTION PROBABILITY RISK VALUE 1 Technical Scope definition Vague scoop allows scoop throughout the project Caused by the technical errors made 89 80 management Project management Project management vaguely established Management problems encountered 78 80 Commercial Contractual terms and the tendering conditions The Memorandum of Understanding signed is not clear and specific Problems involving the system of commerce in the project 80 80 Each of the Risks tabled above are critical to the well being of the project. According to Gray & Larson (2008), â€Å"Defining the Project Scope sets the stage for developing a project plan. Project scope is a definition of the end result or missions of the project- a product or service for your client/ customer† (p. 92) a well-defined scoop ensures the success of a project since it is the main motive of the project. If a project misses a scoop then it is as well a dead project. The scoop outlines all the aspects of the project. Other factors critical to the success of a project include such as risk analysis are equally crucial to the success of a project. If these factors are not brought out prior to the project then the stake holders are clearly handling a visionless project that will crumble the moment Risks start knocking. Furthermore, agreeing on proper terms helps in making a logic approach to the project.

Thursday, May 14, 2020

The Dnp Essay - 724 Words

Statement of Purpose Doctor of Nursing Practice Essay Luisa Walsh 2/18/2013 In today’s healthcare system, nursing is a challenging field as a result of rapid technological advances and changes in healthcare policies. As a dedicated nursing professional, with a great passion for learning, I strive to stay on top of these changes. I am determined to increase my knowledge to be an instrumental part of providing quality healthcare. The demands of nursing are high; however the rewards are even higher. Nursing requires both a supreme understanding of the science of health, and a caring bedside manner befitting only those who seek a position of such a personal involvement in the well-being of a patient. Academically, I will put forth all of†¦show more content†¦In addition, a DNP degree will help me better serve my community by advocating for quality and safety healthcare system. Once attained, I would seek employment at either a school or university with the mission of educating nursing students to practice the highest quality of patient care. One of the major issues facing the nursing profession today is the lack of advance nursing practices. The medical field is in crisis. Doctors are stretched to the limits, and patients are demanding more advanced care. To alleviate some of the concerns facing medicine in the 21st century, advance nursing practices is a vital area in the contribution of understanding and working within the bounds of a team structure, and the promotion of communication between the interdisciplinary health team. The mission of the advance nursing practice is to help individual patients, and their families, determine and achieve optimum physical, mental and social potential, and to do so within the challenging context of the environment in which they live and work Nurses are among the largest professional care group within the healthcare service industry. We are responsible for providing quality care and assisting patients towards independent and healthy living. Considering the changing working environment, health care practitioners like nurses areShow MoreRelatedThe Argument For The Dnp1975 Words   |  8 PagesThe Argument for the DNP Nurses have been an integral part of health care for years. Many of the nurses people see regularly are Registered nurses or BSN, aka Bachelor of Science nurses that more or less are similar in work load, only separated by amount of education. It takes two years to receive an RN as well as passing a rigorous examination while it takes four years to receive ones â€Å"BSN†. Advanced practice nurses are those who have taken their education further and have received a master levelRead MoreWhat Comparisons Can Be Found Between the Gcu Mission and Domains/Con Mission and Program Competencies (for Your Selected Specialty Track, Links Located in the Course Materials) with the Aacns Essentials for Masters655 Words   |  3 Pages| Admission Essay to University of Miami Elizabeth Akande | | | My name is Elizabeth Akande and I am seeking for an admission into the Master’s degree program at University of Miami (UM) at the School of Nursing. I have always believed in giving back to the community and in sharing my competencies and skills with others. My desire to help people in the field of nursing has powered myRead MoreStatement of Purpose: Master of Science or Family Nurse Practitioner616 Words   |  3 PagesPersonal Statement Essay I appreciate this chance to let you know a little bit about myself, my career ambitions, my educational plans, and my dreams and aspirations. For as long as I can remember I have been interested in the field of medicine. My journey in nursing began when I became a Certified Nursing Assistant (CNA) and then went on to become a Licensed Practical Nurse (LPN). I continued my education earning an Associates degree and now will be graduating with my Bachelor of Science NursingRead MoreThe Image Of Nursing1280 Words   |  6 Pagesindividual, specializing in delivery of quality, compassionate and caring care that is so unique in a meaningful way. With the media involved, the images, both reflect and reinforce the social aspect of nursing throughout the continuum of care. This essay will seek to explore common and complexed images of nursing and tell a story of how those images can play a part in the reflecting and the various status of the nursing we know today. Images left on our patients In the hospital settings, patientsRead MoreEssay on Theoretical Framework: Compassion Fatigue2255 Words   |  10 Pages2148-NURS-5327-400-EXPLOR-SCI--THEORIES-NURSING--2014-Fall Theoretical Framework Paper Word Count: 2,335 THEORETICAL FRAMEWORK: Framework of Compassion Fatigue University of Texas at Arlington Exploration of Science and Theories for Nursing N5327 Rhonda Mintz-Binder, DNP RN CNE September 11, 2014 Compassion fatigue, which is also known, as secondary traumatic stress is a natural effect that occurs as a result of taking care of patients who are in pain, stressed, suffering, or traumatized. Compassion fatigueRead More65 Successful Harvard Business School Application Essays 2nd Edition 147256 Words   |  190 PagesGRIFFIN NEW YORK 65 SUCCESSFUL HARVARD BUSINESS SCHOOL APPLICATION ESSAYS, SECOND EDITION. Copyright  © 2009 byThe Harbus News Corporation. All rights reserved. Printed in the United States of America. For-information, address St. Martins Press, 175 Fifth Avenue, New York, N.Y. 10010. www.stmartins.com Library of Congress Cataloging...in..Publication Data 65 successful Harvard Business -School application essays : with analysis by the staff of The Harbus, the Harvard Business School newspaper

Wednesday, May 6, 2020

Lifeboat Ethics By Garret Hardin And A Modest Proposal By...

Lifeboat ethics by Garret Hardin and a modest proposal by Jonathan Swift Garrett Hardin in Lifeboat Ethics: The Case against the Poor Garrett Hardin describes about how the well-off states are in the lifeboat and the deprived states are swimming in the sea. He also tells about how the US facilitates other states. Hardin thinks that if the administration remains serving other states and letting citizens in then America will also sink. We must encourage them if we desire to save at least part of the world form ecological destroy. Why should I support the deprived states? Why should I let the migrants in? I notice no reason for serving somebody that is not an American. These non American care taking my diligent assets that they did not produce. I am exhausted of the USA giving my funds to the deprived states. The administration is giving these people my funds. By letting these people on our lifeboat the administration is sinking us all. If we do let an additional 10 people in our lifeboat, we will have misplaced our security aspect, an engineering code of value. I cannot acquire opportunity in serving people if it is going to put me in threat. Instead of giving the funds to non Americans it should be utilized just in America. The funds utilized to facilitate the inferior states can be very helpful in the US. The traditional people work had for their money. The administration supports deprived families with housing, food, education and different things. The well-off have more

Tuesday, May 5, 2020

IT Risk Management Cryptanalysis and Security Enhancement

Question: Describe the IT Risk Management and Cryptanalysis and Security Enhancement. Answer: 1. The case study is based on the activities of ENISA (European Union Agency for Network and Information Security) regarding the rising numbers of the cyber security threats and attacks. ENISA deals with these threats and attacks and takes suitable steps against the reported activities within the countries that are under the European Union (Enck et al., 2014). ENISA takes steps against all kinds of cyber attacks like Malicious Code Injection, Web-based Attacks, Denial of Service Attacks, Spamming, Phishing, Botnets, Exploit Kits and others. Before ENISA started working against cyber threats, there were rising number of cyber attack cases. In addition to regular virus and malicious codes attacks, some more methods of attacks were reported at various parts of the world (Sridhar, Hahn Govindarasu, 2012). Unethical hackers and software experts are always trying to invent new ways to break into secure systems without getting traced or detected. Some of these attacks are so strong that they cannot be prevented even using the strongest antivirus softwares. Due to these attacks, many international business organizations, commercial and government sectors lose huge amount of confidential information and business statistics. ENISA is taking a number of steps for stopping these attacks (Peltier, 2013). They have already arrested a number of hackers who have invented strong undetectable hacking softwares. ENISA is also very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently. In addition, they are trying to create an awareness among people so that they do not fall trap to malicious web links and softwares. However, in spite of the activities of ENISA, nothing will be successful unless the internet users are more careful while using the internet and take suitable protection for their computer systems before using the internet. 2. ENISA security infrastructure can be represented as follows. Figure: ENISA Security Infrastructure (Source: Created by Author) As seen from the diagram, ENISA has a central network surveillance system that keeps checking data traffic through all the servers connected to it. If some unusual activity is detected, it is evaluated and classified (Humaidi Balakrishnan, 2012). If it is authorized and ethical hacking, it is released from the server. However, if it is an unethical hack or hacking tool, it is immediately banned using firewalls or anti-virus softwares. Moreover, suitable steps are taken to locate the hacker and arrest him. However, with advanced technology, hackers are creating undetectable attack softwares that are extremely hard to trace and detect. Hence, there is a need to design even better and stronger antivirus and firewall softwares with the latest technology available to detect and block these activities. 3. In addition to external threats, there are insider threats that must be mitigated in order to maintain an ethical environment within the organization. Some suitable strategies for combating insider threats are as follows. Internal Surveillance System Internal surveillance system should be implemented in order to keep tabs on the activities of the employees in the computer. For this purpose, surveillance cameras can be installed in the employees cubicles (Zissis Lekkas, 2012). Moreover, internal server surveillance should also implemented in order to monitor employees activities in the internet. Again, there should be an employee appointed to keep watch on the monitoring process so that no employee can tamper proof of his misdeed. Access Restriction System With the change in hierarchy of the job posting in the company, access to organization documents and information should be changed. In other words, with decreasing role in the organization, access should be more restricted (Kuperman, Gardner Pryor, 2013). For instance, the assistant manager should have lesser access to companys documents that the manager and so on. Website Blocking In order to prevent misuse of the internet and accidental downloads by the employees, certain malicious websites should be banned completely in the companys server. This will minimize the chances of the malicious file downloads by accidental clicking of unwanted links. In spite of all these, insider threats will still remain and can only be removed completely by the company by implementing strict guidelines on the use of the internet and websites. Moreover, the companys internal server must be monitored and maintained every day in order to detect any unusual activity (He Johnson, 2012). Moreover, some strong firewalls should be installed in every employees system to prevent unwanted and malicious attacks. 4. Of all the top threats, the most significant one is web application attack. It is most significant due to the following reasons. Literally Everywhere Web application attacks can occur anytime from any website, be it within secure domain or open server. These attacks come in the form of malicious links. These links appear anywhere in the internet in the form of some attractive offer or some advices regarding PC upgrade / repair (Crossler et al., 2013). Many internet users fall prey to these offers and whenever they click on the link, the malicious files get downloaded automatically. Accidental Click Sometimes, these links are hidden so properly that the user cannot differentiate between safe link and malicious link. Most of the times, the user accidentally clicks on the malicious links and downloads the malicious files that infect his computer immediately (Yang et al., 2013). Due to these hidden links, chance of accidental clicking increases substantially. Infected Download Links Sometimes, the hackers hide the malicious files even within some legitimate download link of a verified and trusted website (Power, Sharda Burstein, 2015). Whenever the user chooses to download that particular file or application, the malicious files also get downloaded and they infect the computer easily, without the knowledge of the user. Some of these links also come in the form of fake emails promising huge rewards for the user. Whenever the user downloads the link, his system gets infected. Ransomware There have many reported cases where even a ransomware has been found within the malicious files. This is the most extreme case of web application attack where important files of a user are encrypted by the ransomware within a few seconds (Kolkowska Dhillon, 2013). These files cannot be decrypted unless the user pays certain amount of money demanded by the ransomware. 5. The most significant and key threat agents are as follows. Cyber Criminals These are highly skilled and powerful unethical hackers that use hacking tools for robbing money by ransom, leak of confidential data and others. These hackers have invented extremely powerful and almost undetectable hacking tools and malicious softwares, which they use as ransomware and spyware (Peltier, 2016). Using these softwares, these hackers access confidential data and steal or encrypt them for ransom. Hacktivists These are some hackers that are motivated politically for the unauthorized activities. Mostly, these hacktivists use their hacking techniques against some opposition political parties in order to leak confidential information or damage their database by destroying important files. Nation Threats These are international internet terrorists that are authorized by a countrys government to spy on some other country or leak their defensive strategies (Von Solms Van Niekerk, 2013). These hackers work from a country that has authorized them and hence, they are extremely hard to catch. Cyber Terrorists These are some skilled group of hackers that use the internet as mean for spreading the idea of terrorism among common users. These groups do not do hacking for money, they use hacking techniques for simply destroying confidential files of a country or use the web service to spread viral and hardcore videos like beheading a man alive, burning a woman alive, etc. They also break into the personal profiles of the citizens of a country or even some public sectors for creating a hazard (terrorism) in the future. In order to minimize their impacts on system, the systems should be strongly protected with security firewalls and additional encryption safety (Bin Muhaya, 2015). Moreover, automated malicious attack detection system can be designed and installed in order to warn the user regarding some unusual activities in the server. In addition to these, regular server maintenance and surveillance should carried out in hourly basis. 6. Social hackers are those who use social media for stealing someones personal information by phishing, hacking into account, etc. According to Van Huis et al. (2013), this is an extremely common type of hacking that targets mainly unprotected profiles (weak predictable passwords) and use the personal information of a user for making a fake identity. Cherdantseva Hilton (2013) said that these types of hackers have good engineering knowledge and they apply it for hacking others profiles in the social media. Although these hackers primary target is not money, they are a major threat to the community as they as act as someone else and use the fake identity for unethical purposes. In more serious cases, these hackers use someone elses identity for committing serious crimes in the internet and the user gets caught even though he is not responsible for the crime. On the other hand, Peltier (2015) said that these are generally low or medium skilled young hackers that do social hacking mainly for fun or testing skill. According to Cherdantseva Hilton (2013), social hacking is done by two ways phishing and hacking through some low cost hack tools. Phishing is done to record someones username and password and the hacker uses these records to break into the users profile. On the other hand, some hackers use cheap hacking tools to directly hack a users profile for stealing his personal information. Bin Muhaya (2015) has suggested that social hacking can be minimized by enforcing double or multiple security checks before the user is allowed to login to his account. However, social hacking is still extremely prevalent and the users must be more careful over using the social media in order to prevent social hacking. The user must a use a strong password encryption and should not share his personal information in the social media. 7. The threat probability and threat level has been shown in the table below. Threat Probability Extent of Threat Drive-by downloads (renamed to Web-based attacks) Very High High Worms/Trojans High Very High Code Injection Medium Medium Exploit Kits Low Very High Botnets High High Physical Damage/Theft/Loss Low Medium Identify Theft/Fraud High High Denial of Service High Very High Phishing Medium Low Spam Low Medium Rogueware / Ransomware / Scareware Medium Very High Data Breaches High High Information Leakage Very High Very High Targeted Attacks (renamed to Cyber espionage, merged with Watering Hole) Low High Watering Hole (threat consolidated with other threats/attack vector) Low Medium From the trend of the threats, it can be seen that the threats that deal with other users or companys confidential information are most likely to occur and in most of these cases, the possible threat extent is catastrophic. Other threats are less likely to occur but they can also cause some severe damage against a general user. However, there are also some common threats that are very like to occur but these attacks can be stopped by taking simple measures. On the other hand, some attacks like ransomware are less likely to occur but they can deal extremely severe damage to a companys servers and systems. As seen from the statistical table in the case study, the cases of strong hacking like ransomware and others are constantly rising as more and more advanced technologies are being used by the hackers. Unless suitable steps are taken against these cyber hazards, more and more secure data will be lost and many business organizations, commercial sectors will lose their business data, co nfidential information forever. 8. The ETL process can be further improved with the help of more powerful technology. Hackers are designing new software and hacking tools every day. In fact, nowadays, hackers have invented some technology such that most of their unethical activities mostly go undetected or untraced due to the use of very high advanced technology (Bin Muhaya, 2015). ENISA should take more strict steps like monitoring every systems connected to the server as well as protecting systems using strong firewalls and encryptions. Moreover, ENISA can do back hacking i.e. they can monitor activities of traced hackers using their own technique (hacking). This will be ethical hacking and can be done by employing very highly skilled software experts and using them as threat agents to the hackers (Von Solms Van Niekerk, 2013). ENISA also needs to upgrade its networking infrastructure in order to do faster access to main server, more accurate tracing of a hacker, quick response to unusual activities in the server a nd others. Before ENISA started working against cyber threats, there were rising number of cyber attack cases. ENISA has already taken a number of steps for stopping these attacks (Power, Sharda Burstein, 2015). They have arrested a number of hackers who have invented strong undetectable hacking softwares. ENISA is also very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently (Sridhar, Hahn Govindarasu, 2012). In addition, they are trying to create an awareness among people so that they do not fall trap to malicious web links and softwares. However, in addition to all these, upgrading to latest technology and using more powerful firewalls will help the company improve the ETL process significantly. On the other hand, the common users will have to be more careful and install latest firewall softwares to prevent unethical activities as much as possible. 9. As per the studies of different researchers, from 2016 onwards, there will be a rising number of identity theft / fraud, information leakage, cyber espionage and data breaches. Unethical hackers and software experts are always trying to invent new ways to break into secure systems without getting traced or detected. Some of these attacks are so strong that they cannot be prevented even using the strongest antivirus softwares (Sridhar, Hahn Govindarasu, 2012). Due to these attacks, many international business organizations, commercial and government sectors lose huge amount of confidential information and business statistics. ENISA is very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently (Power, Sharda Burstein, 2015). They mentioned breaches are on the rising from 2013 although some of them have already been stopped, banned and mitigated. However, with the development of science and technology, more and more hackers are entering into the internet using fake account and fake names and are using them for unethical activities. With the advancement of technology, these attacks are occurring more and more using more powerful tools (Von Solms Van Niekerk, 2013). It is expected that in 2020, these attacks will occur so much that ENISA will be unable to shut them down easily unless they upgrade to the latest technology. ENISA should also install server surveillance system in order to maintain and monitor traffic activities in the server. However, all these upgrades and improvement of services must be done immediately before it is too late to recover. 10. ENISA should not be satisfied with the current state of Information System Security. Although they have done a very good work in banning many unethical websites and arresting unethical hackers, they should not be satisfied as there are still increasing numbers of unethical hacking and data security breach (Cherdantseva Hilton, 2013). ENISA has a central network surveillance system that keeps checking data traffic through all the servers connected to it. If some unusual activity is detected, it is evaluated and classified. If it is authorized and ethical hacking, it is released from the server. Again, if it is an unethical hack or hacking tool, it is immediately banned using firewalls or anti-virus softwares (Bin Muhaya, 2015). However, recently, hackers have developed certain tools that are extremely hard to detect or trace. To this, ENISA should further strengthen its cyber security and surveillance systems in order to stop the new types of attacks more effectively (Peltier, 2013). They should also invent new softwares to detect untraceable malicious files and prevent them immediately from entering into the system. Moreover, they should encourage people to use strong firewall softwares in order to prevent unethical activities while using the internet. References Bin Muhaya, F. T. (2015). Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system.Security and Communication Networks,8(2), 149-158. Cherdantseva, Y., Hilton, J. (2013, September). A reference model of information assurance security. InAvailability, reliability and security (ares), 2013 eighth international conference on(pp. 546-555). IEEE. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2), 5. He, Y., Johnson, C. W. (2012, October). Generic security cases for information system security in healthcare systems. InSystem Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on(pp. 1-6). IET. Humaidi, N., Balakrishnan, V. (2012). The influence of security awareness and security technology on users behavior towards the implementation of health information system: A conceptual framework. In2nd International Conference on Management and Artificial Intelligence IPEDR(Vol. 35, pp. 1-6). Kolkowska, E., Dhillon, G. (2013). Organizational power and information security rule compliance.Computers Security,33, 3-11. Kuperman, G. J., Gardner, R. M., Pryor, T. A. (2013).HELP: a dynamic hospital information system. Springer Science Business Media. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Power, D. J., Sharda, R., Burstein, F. (2015).Decision support systems. John Wiley Sons, Ltd. Sridhar, S., Hahn, A., Govindarasu, M. (2012). Cyberphysical system security for the electric power grid.Proceedings of the IEEE,100(1), 210-224. Van Huis, A., Van Itterbeeck, J., Klunder, H., Mertens, E., Halloran, A., Muir, G., Vantomme, P. (2013).Edible insects: future prospects for food and feed security. FAO. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Yang, Y. P. O., Shieh, H. M., Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, 482-500. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.

Tuesday, April 7, 2020

Family theories free essay sample

In this answer, I am going to discuss about the conjugal relationship in modern industrial societies. This means I will assess the claim that conjugal relationships are based on equality in modern industrial societies. I plan to structure my answer from housework and childcare, power and money management. The hours worked between husband and wife become more equal by the increased participation by women in the labour market have led to more equality in modern family life. This view is highly supported by many sociologists like Young and Willmott who suggest that the family is becoming more symmetrical and therefore, is in fact becoming more egalitarian via a ‘march of progress. ’ They suggest that the family is gradually improving in terms of equality as there has been a trend away from segregated conjugal roles and more of a shift towards joint ones. This they argue is due to major social changes in that women are more financially dependant with employment opportunities and so there is less of a need to rely on extended kin. We will write a custom essay sample on Family theories or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This is further explained by Gershuny who suggests that because women have these employment opportunities, they are more likely to do less domestic work. This is shown by the item as it suggests that ‘men were making more of an effort to do housework when their wives were in full-time employment. By this change of position for women, it has meant that men are now more responsible for different household tasks therefore suggesting that equality within modern family life is evident and so this view seems correct. He emphasises the change in social values as a reason for this which is also supported by Sullivan’s study (2000) which found an increase in equal division of labour. This supports Young and Willmott’s ‘march of progress’ view that conjugal roles are becoming more symmetrical; thus suggesting that the view of equal gender roles and relationships is likely. Also, due to post-modern society, there are better living conditions compared to those during industrialisation and so this has drawn the men back into the family and thus has enabled them to help with housework and childcare as well as providing leisure time; enhancing equality in relationships. The social changes have meant that equality is becoming evident and so the statement seems highly likely. However, the functionalist view of equality in modern family life has been highly criticised particularly by feminists like Ann Oakley (1974). Oakley rejects the ‘March of progress’ view described by Young and Willmott as she suggests that this is simply exaggerated as we still live in a patriarchal society where women do most of the housework. She suggested that the methodology used by Young and Willmott was hardly convincing as their questions lacked in detail. In Oakley’s research, she found only 15% of husbands had a high participation in housework, showing how the statement is flawed as this clearly does not show evidence of equality in relationships and gender roles. Despite Gershuny suggesting that paid work entitled equality for women, Oakley suggested that this was only an extension of the housewife role. Therefore, unlike Parsons claim of a ‘natural’ role, feminists argue that this was socially constructed to enforce dependence on men which became worse with industrialisation as it forced women to stay within the home. Thus, it is clear that joint conjugal roles are not as ‘joint’ as functionalists initially suggested they were as the social changes have only exacerbated the role of women suggesting this so called equality does not exist. Besides, other feminists like Elsa Ferri and Kate Smith (1996) suggest that the changed position of women in terms of employment has only created a dual burden as they now have to undertake paid work as well as the unpaid housewife role. Ferri and Smith suggest that unlike Gershuny, increased employment has had little impact of the domestic labour as fewer than 4% of families had a father responsible for childcare. Therefore, women still remain responsible for the children as well as their employment responsibility; clearly suggesting that modern family life is not as equal as it seems. The dual burden is also supported by Dunscombe and Marsden’s theory of a triple burden in that women are expected to do the double shift of housework and paid work but also the caring of the emotional welfare of the family. This clearly disputes Gershuny’s idea that women are more equal due to employment as the triple burden means that they in fact gain more responsibilities than losing them. Next, feminists ‘point to inequalities of power and control that persist in modern family relationships’ as a key reason for inequality; again challenging the statement. Allan suggests that ideological factors limit women’s power in that they are ‘disadvantaged from the start. ’ This suggests that the family is always going to be founded on inequality; thus suggesting that the view of equality is limited. This is supported by Barrett and McIntosh who suggest that men gain far more from women’s domestic work than they give in financial support and that in turn this support often comes with ‘strings’ attached. Also, men are usually the ones who make decisions about finances despite some families being dual-earners. This is due to the fact that women are statistically still paid on average less than men; enhancing male economic power. Therefore you can question the extent of equality in modern family life. Resources are also said to be shared unequally like Kempson’s (1994) study among low-income families. This leaves women in poverty and so restricts their power in the family which creates an atmosphere of inequality in conjugal relationships. This is further explained by feminists Pahl and Vogler (1993) who focused on the effects of decision making within the family through ideas like ‘pooling’ and ‘allowance systems. They found a 31% increase in pooling where both partners have joint decision responsibility as well as a decline in allowance systems. However, it was still evident that men usually made huge financial decisions. Edgell also supports this as the levels of decision making are not equal due to the male economic power that still exists. Therefore, women have less say in the decisions and thus it is obvious that the view that gender roles and relationships are becoming more equal is incorrect as inequality in pay and decisions still exist. Similarly, this inequality of power has led to domestic violence which clearly shows how inequality is evident in that relationships are being gender dominated. Radical feminists like Millett and Firestone (1970) use domestic violence as a way to show that society is primarily founded on patriarchy and that men oppress and exploit women. They suggest that the inequality of power within the family maintains men’s power and so domestic violence is inevitable. Similarly, Dobash and Dobash suggest that marriage legitimises violence against women as it provides the male with power and the women with dependency, therefore evidently showing no signs of equality. Thus, this disputes the statement of gender roles and relationships becoming more equal with 1 in 4 women being assaulted in their lifetime according to Mirrlees-Black. Finally, childcare which is essentially about exercising responsibility for another person who is not fully responsible for herself and it entails seeing to all aspects of the child’s security and well-being, her growth and development at any and all times. Mary Boulton ( 1983 ) argues the exaggeration in the extent of men’s involvement in childcare and she denies that questions about who does what give a true picture of conjugal roles. She also claims that although men might help with particular tasks, it is their wives who retain primary responsibility for children. It is the wives who relegate non-domestic aspects of their lives to a low priority. This shows that there is still inequality in terms of childcare in conjugal relationships. In addition, Elsa Ferri and Kate Smith provide some empirical support for Boulton by conducting a study based on National Child Development Survey. The survey found it was still very rare for fathers to take primary responsibility for childcare. In both the sample of mothers and the sample of fathers it was very rare in dual-earner families, no-earner families or families where only the mother worked, for the man to be normally responsible for the children or to look after them when they were ill. In almost every category the man was the main carer in 4 percent or less of families. This is also supported by the radical feminist idea of ‘gender scripts’ in that there are expected norms in terms of gender roles and so patriarchal relationships are inevitable. Therefore, they suggest that equality without burdens will only be reached through same-sex relationships as this eliminates the ‘gender script’ idea. Thus, this enhances the inequality of the family, and suggests that the view that conjugal relationships are becoming more equal is in fact incorrect as the inevitability of patriarchal relationships means that equality cannot be established. In conclusion, I have discussed and assessed the view that conjugal relationships are based on equality in modern industrial societies by evaluating three sections which are hours worked, power and childcare. With all of the statement, I believe that conjugal relationships in modern industrial societies are not based on equality.

Monday, March 9, 2020

Environmentalists say Down with the WTO essays

Environmentalists say Down with the WTO essays Environmentalists say "Down with the WTO" "Trade is the ally of working people, not their enemy," WTO Director-General Mike Moore told trade union representatives. "As living standards improve, so too does education, health, the environment and labor standards." That is false; the main goal of the WTO, since established in 1995 is to promote international trade. They don't care about the trade off of a safe environment. Their main concern is flourishing economies despite environmental conditions worsening. "Such actions worry environmentalists who argue the WTO favors the growth of trade over public safety." People not profits need to be WTO's top priority. We are striving to get across the importance of environmental safety over free trade. Us environmentalists want them to listen and take action to insure the safety of people and the environment. Environmentalist met in Seattle to peacefully convey our safety concerns. We want the WTO to understand that we are not against the international organization, we only want to be assured that the environment will not be compromised for free trade. Daniel Seligman of the Sierra Club said it's not trade and the globalized economy that upsets environmentalists, but "the way that World Trade Organization rules work to promote trade." Their main concern should be to enforce and control safety of people and the environment in the following areas: clean water, clean air, flourishing forests, naturally grown (organic) vegetable, healthy animals without injections, and no sweat shops. The WTO needs to allow countries to ban countries export because of unsafe environment practices. "The WTO aim s to eliminate what they are calling non-tariff trade barriers," Seligman told CNN. "And a lot of those trade barriers are actually hard-won environmental and food safety protections." According to ABC news online, "Countries have already proposed another 150 items they want negotiated, includi...

Friday, February 21, 2020

African American Women in Labor Unions Black, Brave and Bold Essay

African American Women in Labor Unions Black, Brave and Bold - Essay Example Black women operated in American workforce and labor movements throughout the span of the mid nineteenth to mid-twentieth century.During this time,America was not a place where people of color were treated fairly, which was more evident in the south. However, this was also the span of time that marked the emancipation of slaves through the Thirteenth Amendment, which caused a mass migration of African Americans into the northern parts of America. Blacks had a better opportunity, though immensely unequal to that of whites, to minutely progress in status due to many laws and stipulations placed upon them because of their skin tone.Black women operated in American workforce and labor movements throughout the span of the mid nineteenth to mid-twentieth century. During this time, America was not a place where people of color, particularly African Americans, were treated fairly, which was more evident in the south. This prospect was more probable in the North.Moreover, during this time, wo men in general were not viewed positively. In fact, women were also emancipated from the bondage of not being able to vote, just as blacks through the Nineteenth Amendment. Therefore, to be an African American female laborer in American society in this time period was accompanied with many trials and tribulations.Since there were two strikes (being a black female) of African American women in the mid-nineteenth to mid-twentieth century, this study will investigate a few cases that showcase the strength of the black woman worker during this time. This study will compare and contrast the success of the various examples and explain how each one glorifies Marxists views. Marxist thinking caused black women of that era to stand for equality in the workplace. A synopsis of each case will be given and will explain how they relate to Marxist ideas. The study will be divided into empirical and theoretical questions that exist in Marxist ideologies. It will answer the question whether or not there is evidence that forms of society exist only for as long as they advance productive power, and are replaced by revolution. The theoretical question is whether there are sufficient evidences to support Marxist functional explanations. 1. Karl Marx (1813-1883) Karl Marx is a philosopher but is popularly known for his works as a revolutionary communist that inspired the foundation of many communist regimes in the 20th century. He has many philosophical ideas on other subjects, but this study will dwell on the political economic policy of Karl Marx that deals on the economic inequalities. He rejects the assumption that economic inequalities do not affect political equalities but focuses on the inequalities of neither individuals nor citizens but by the entire class. For Marx, the most fundamentally problematic inequality is that between those who own the means of economic production and those who do not. That some are rich and others poor is of concern, but this is only symptomatic of the former, deeper inequality. (Stamford Science Encyclopedia) Marx points out also to the inequality of sexes that is no longer economic in nature, but still forms a basis of capitalist political economic system. In a capitalist political economy, Marx contends that the economy, institutions of society and structure of society are controlled by the capitalist class and become basis for legitimacy. He said that the " ideologies of liberal democracy only serve to legitimate what is in fact a system of freedom and democracy only for some. The political equality emphasized by liberals is but a veil for the economic inequality that is so fundamental to a capitalist society and so detrimental to human freedom." (Source) As for other thinkers, equality is not an end in itself for Marx. Instead, equality in ownership and control of the means of production is a necessary prerequisite for freedom. 2. Other dedicated source synopsis 2.1 "We are all leaders". This is a kind of unionism that existed in 1930s. Staughton Lynd describes it as different from the bureaucratic business unions today. This was inspired by women nut pickers in St. Louis

Wednesday, February 5, 2020

Does the technological revolution change the basic rules of media Essay

Does the technological revolution change the basic rules of media economics - Essay Example In order to understand the impact of technology on media economics in cultural industries, it is essential to understand the concept of cultural industry (Albarran & Dimmick, 1996, 48). Cultural industry can defined as that industry that incorporates different types of medium including television, music, print media along with art and architecture. From research, it is evident that this industry has adopted technology. The developments and growth of mass media in the cultural industry created foundations for media economics. The concept of media economics first emerged in the fifties(Albarran, 2002, 32). The cultural industries played an important role in offering the main fundamentals for investigating and analyzing the economics of media. â€Å"Content providers, offering information and entertainment, became the suppliers, whereas consumers and advertisers formed the demand side of the market. Furthermore, various regulatory agencies (e.g., Federal Communications Commission [FCC] , Federal Trade Commission, and other government entities) affected macroeconomic market conditions, and the relationship among suppliers in various industries created microeconomic market conditions† (Albarran, 2002, 115). During the fifties, the emergence of media economics became the subject of study of several micro and macro economists. For instance, Rau concentrated on studying the competition between newspapers, Steiner studied the competition in the radio industry and Reddaway studied the economics of several newspaper firms (Albarran, 2002, 201). The initial studies related to television and cultural industry sought to understand the structure of the market and the competition it had with other forms of medium(Albarran & Dimmick, 1996, 48). Furthermore, it concentrated on studying the influence of technology on revenues. In the same

Tuesday, January 28, 2020

Overview Of Krump Dancing Drama Essay

Overview Of Krump Dancing Drama Essay Krumping is an urban art form, reflecting the African American expressive culture and the street culture. The regional location and its history of violence has propelled the style into the mainstream. Born in 1990s from the slumps of Los Angeles, it blends elements of spiritual and physical energy. Krumping is an emerging movement that is quite fresh on the dance scene, exploding with positive energy it comes from a torn world of poverty and oppression. As a spiritual art form it encompasses core elements of its history and religion through its powerful movements and sounds. Through its spiritually Krump transforms its African American dance form to a communal public art form while incorporating its street culture through its music as a creative outlet for the hardships of urban life. Each element in Krump excretes pure energy in a unique way that releases the pent up frustration of each performer, from its highly energetic movements, expressiveness and the physical toll on the perfo rmers body, the art form has yet to hit its peak. The history of Krump and its spiritual energy originates from the hard streets of South Central Los Angeles, California, but can also be traced back to its African tribal culture. Born amongst the 1965 Watts riots, a large-scale riot which lasted 6 days in protest to the American Civil Rights Act leaving the African American community a feeling of injustice and despair, and the 1992 Rodney King riots, were the acquittal of LAPD officers in the trial of the beating of Rodney King sparked a further 6 days crime spree, the dance created an escape for the youth. Being brought up in a community upheaved by of violence and oppression blighted by racism, left the youths pursuing a sense of belonging and nurturance from there distressed families of substance abuse and violence. Turning to gangs for a sense of compassion, the ongoing harassment and recruitment of gangs left a sense of hopelessness, were within a dance movement emerge, from the dissatisfaction of their daily struggles, classif ied as an urban hip-hop variation, Krump like Capoeira started as a way for trouble youths to express themselves, and escape their gang filled lives. Krump dancers would form structured and organised crews or families, a tight-knit group of individuals whose loyalties and commitment extends beyond dance. These dance circles of fellow Krumpers provide the support and stability many in their community dont receive from their own families at home. Thus through their oppressed urban culture a sub-culture of Krumping immerged, providing an alternative to the gang life style. Seen as an aggressive competitive dance due to its release of the performers personal anger, hiding beneath the rebellious exterior, lays a religious imagery of enslavement calling out for protest. There is a spirit in the midst of krump-ness. There is a spirit thereà ¢Ã¢â€š ¬Ã‚ ¦most people think, theyre just a bunch of rowdy, ghetto, heathen thugs. No, what we are is oppressed. (Julie Malnig, 2009) Krumping at its roots are connected by its history but also at its core there are traces of the African tribal culture, Dancers would perform in a circle, as a way for them to assert their wholeness. The circle is an arena of a warrior, the ring shout of slave times, in which slaves would move in a round circle while stomping and clapping. The circle of the dance is a permissive circle: it protects and permits. At certain times on certain days, men and women come together at a given place, and there, under the solemn eye of the tribe, fling themselves into a seemingly unorganized pantomime, which is in reality extremely systematic, in which by various meansshakes of the head, bending of the spinal column, throwing of the whole body backward -may be deciphered as in an open book the huge effort of a community to exorcise itself, to liberate itself, to explain itself. There are no limitsinside the circle. Frantz Fanon (1961) But also a spiritual ritual; combat, competition and artistry build a world within and the circle contains elements of a spiritual energy, a holy dance and religious trances. Even as their paths in lives may seem fray and unbound Dancers accomplishments in krumping gain them street credibility, earning respect and absorption from a life of violence. Furthermore embodied with competitiveness and spiritual aspect krumping provides sanctuary of the urban city, a state of mind with no boundaries, lines or limitations, just a sense of freedom. Rize follows the practitioners of krumping from its origins at childrens clown parties to the popular dance form that has reached mainstream audiences. LaChapelle never explores krumping beyond its inner-city setting, enforcing the krumping as an authentic art form in the city of Los Angeles in direct opposition of the materialistic, commercialism of mainstream. Beginning with Tommy the Clown, an American dancer and the inventor of clowning style, it quickly spread and evolved in to dance-battles serving as an alternative to gangs. Tommys performances developed loyal followers, growing throughout Los Angeles. Taking it upon himself he used this opportunity to give the youth a chance by being a model living positive at all times. As dancers got older the style continued to morph into even more outrageous styles. The abrasive nature of Krump makes it difficult to locate its sacred connotations; the spiritual energy brewing within its movements often convey sexuality, violence and suffe ring, but within the circle of Krumping this is the only way of making ourselves feel like we belong. (Julie Malnig, 2009) During these moments of belonging, the dancers become a contest of physical and spiritual energy, revealing their spirit and raw emotion that Krump demands. The energy and vigor of Krumping in a spiritual sense exorcises the demons and conjure spirits, but thought Krumping look wild and out of control to the unaware, it is actually self-governing and defies claims that youths are inherently violent and disruptive. The music in Krumping is danced to hardcore, beat-heavy hip-hop tracks, sometimes with no vocals. These amorphous circles and repetitive rhythmic loops entrances dancers to a spiritual state. During Rize a dancer falls under a trance which then she loses spiritual control and consciousness, collapsing into the arms of a fellow Krumper, when she is asked what has happened, she answers, I dont knowà ¢Ã¢â€š ¬Ã‚ ¦ I just let go. (Rize, 2005) The circle of spiritual energy is also used as organised healing and cathartic release, Krumpers channel their anger into a positive form , making Krumping more than a dance art form; its a coping mechanism that reveals this sub-culture to be something another than youths engaging in criminal behaviours and mentalities. Derived from Hip-Hop and Breaking, Krumping fires up people with its energetic enthusiasm of its powerful emotional expressiveness in certain Krump movements, it may represent elements joyful and painful emotions; in which can help the performer in alleviating anxiety and depression while also sharing emotions artistically. The movement exhibits an electric body shock which moulds and distortions in the body of the head, arms, face, legs and pelvis. Krump is intended as an outlet for anger or to release pent-up energy, the dance movements reflect this type of physical release, both males and females display combinations of movements similar to a blend of street fighting, moshing, spiritual possession and aerobic striptease. It is described as a volatile, warrior-like, spastic and quaking dance that involves the vigorous banding of the spine, the thrusting and popping of the chest. While the overall appearance of Krumping may look violent with battles between dancers a central compone nt, Krumpers hit each other to get energised to dance in the radical expressive and explosive ways the dance is known for. The Physical Energy is used as an outlet for frustration this passionate dance is adapted to each performers unique style, with the level of intensity differing by the emotions felt in that moment, giving the dance its own personality. When performing these actions I noticed the energy involve, initially it was about the visual actions of throwing, tossing, grabbing smashing, breaking and slashing but the more I performed these movements the more I noticed the actions that require a lot of energy, momentum and physical power to execute. In power moves, the dancers relies more on upper body strength and is usually on his or her hands during moves. An arm swing entails the arm to be tense up; as they tighten into a stiff plank, and the hand is crunched into a fist. The basic arm swing motion, the arm tended to rise and fall into the body, the movement is rhythmic with each swing. There is lift upwards and outwards where the swing is grasping for contact, each swing is flung with a strong and fierce force, while tearing at the arms socket. As the arm falls it loosens and bends, contracting into the body. The hands and arms in each one of these movements begin a chain reaction that spreads through the body, resulting i n being covered with a cloak of pure powerful energy. Wavelike movements in the torso, arms and hips are descendent from the African origin. Theres a sense of being, and a connection to your body but also a sense of power and strength. Each movement is skilfully controlled to the beat of the music. Form the Arm swing to the power moves the movements in Krump give you a sense of being untouchable while being empowering. Krumpers face off one-on-one and try to out-Krump one another, this fusion of sport, dancing and fighting With a semblance of physical combat and African tribal culture in their dance movements, Krumping allows dancers to pop their limbs, gyrate their torsos and stomp their feet to hip hop music (Rize, 2005) The pace and intensity of the music is so frantic that it suggests a kind of spiritual possession, dancers seemingly and often are instructed to lose control, this loss of control has been lyrically manifested allowing the dancers to slip out of their constraints and boxes and just let go. After losing control in the beats, they recognise that there are both limits and no limits within the circle. This expression of their true self runs on their remaining energy before passing out. The Krumping dance style makes explicit claims to the importance of its regional location and history of violence as a major propellant of the style. Spiritual Energy Religion Sound Physical Energy Movement Journal (in body experience) Expression Toll

Monday, January 20, 2020

Harold and Maude and The Book On The Taboo About Knowing Who You Are Es

Comparing the Movie, Harold and Maude and The Book On The Taboo About Knowing Who You Are The character Maude, in the movie Harold and Maude, lives a life congruent with the ideas Alan Watts expresses in The Book On The Taboo About Knowing Who You Are. In his book, Watts explores the relationships between life, death, ego, and environment. Watts's purpose is not to lecture but rather to let the book serve as a "point of departure" (11) for its readers. Maude also serves as the "point of departure" for the character Harold. Under Maude's guidance, Harold transforms from a depressed teenager obsessed with death into a new, positive person. Maude, however, dies shortly thereafter because she cannot guide Harold for the rest of his life. Indeed she, like The Book, is merely "a temporary medicine...not a perpetual point of reference [for Harold]" (11). Both Maude and The Book are only starting places from which Harold and Watts's readers must learn to achieve peace and understanding within themselves. Watts first addresses the issue of religion. Although the goal of many religions is to lead followers to "enlightenment," Watts believes that "irrevocable commitment to any religion is not only intellectual suicide, it is a positive unfaith because it closes the mind to any new vision of the world" (11). People become so obsessed with their religion and convinced that it is the only true religion that they become blind to new ideas and experiences. Instead of being incarcerating, religion should be enlightening. In the movie, Harold asks Maude if she prays to a god. Maude responds, "Pray? No. I communicate." Maude understands that it is restraining to blindly worship a god. By using the word "communicate," sh... ...ime in his life, Harold loves another person, Maude. When Harold tells Maude he loves her, however, she tells him, "Good. Now love some more." Now that Harold has found that capacity to love, he is able extend his love beyond only Maude. He has also learned about his senses: he "smells" snow, feels the contours of wood, hears music, and sees the beauty of nature. Finally, Harold learns how to accept death. Instead of continually pretending to commit suicide to desensitize himself to death, Harold realizes that death is an inevitable part of the circle of life. At the end of the movie, Harold lives, while Maude dies, because he has not yet experienced life. Unlike Maude, Harold is just beginning to defy the taboos of society and find himself. Works Cited: Watts, A. W. (1966). The Book: On the Taboo Against Knowing Who You Are. New York: Vintage Books Harold and Maude and The Book On The Taboo About Knowing Who You Are Es Comparing the Movie, Harold and Maude and The Book On The Taboo About Knowing Who You Are The character Maude, in the movie Harold and Maude, lives a life congruent with the ideas Alan Watts expresses in The Book On The Taboo About Knowing Who You Are. In his book, Watts explores the relationships between life, death, ego, and environment. Watts's purpose is not to lecture but rather to let the book serve as a "point of departure" (11) for its readers. Maude also serves as the "point of departure" for the character Harold. Under Maude's guidance, Harold transforms from a depressed teenager obsessed with death into a new, positive person. Maude, however, dies shortly thereafter because she cannot guide Harold for the rest of his life. Indeed she, like The Book, is merely "a temporary medicine...not a perpetual point of reference [for Harold]" (11). Both Maude and The Book are only starting places from which Harold and Watts's readers must learn to achieve peace and understanding within themselves. Watts first addresses the issue of religion. Although the goal of many religions is to lead followers to "enlightenment," Watts believes that "irrevocable commitment to any religion is not only intellectual suicide, it is a positive unfaith because it closes the mind to any new vision of the world" (11). People become so obsessed with their religion and convinced that it is the only true religion that they become blind to new ideas and experiences. Instead of being incarcerating, religion should be enlightening. In the movie, Harold asks Maude if she prays to a god. Maude responds, "Pray? No. I communicate." Maude understands that it is restraining to blindly worship a god. By using the word "communicate," sh... ...ime in his life, Harold loves another person, Maude. When Harold tells Maude he loves her, however, she tells him, "Good. Now love some more." Now that Harold has found that capacity to love, he is able extend his love beyond only Maude. He has also learned about his senses: he "smells" snow, feels the contours of wood, hears music, and sees the beauty of nature. Finally, Harold learns how to accept death. Instead of continually pretending to commit suicide to desensitize himself to death, Harold realizes that death is an inevitable part of the circle of life. At the end of the movie, Harold lives, while Maude dies, because he has not yet experienced life. Unlike Maude, Harold is just beginning to defy the taboos of society and find himself. Works Cited: Watts, A. W. (1966). The Book: On the Taboo Against Knowing Who You Are. New York: Vintage Books

Saturday, January 11, 2020

Human Papillomavirus Essay

The human papillomavirus (HPV) has been established as a substantial threat to public health among the sexually active youth of America. HPV is a common sexually transmitted disease that primarily affects women. It is also responsible for thousands of cancer related deaths each year. There are about 20 million Americans each year that are currently infected with HPV and nearly 5 million people will become newly infected this year with the virus. There are over 100 different strains of HPV, however only four are primarily responsible for causing substantial health complications such as genital warts and cervical cancer. Nevertheless, recent efforts to eliminate these most dominant strains have proven to be extremely victorious with the development of a unique vaccine that can exhibit an extraordinary level of efficiency. As a result, the pervasiveness of HPV has begun to slowly dwindle, but the virus still continues to violently infect millions of sexually active individuals who still remain unexposed to proper vaccination. Of the 100 different HPV strains, types 16 and 18 have been proven to cause cervical cancer. Although cervical cancer is able to be prevented, it is the second most common gynecologic cancer worldwide and the third most common cancer amongst women in the United States. In 2008 alone, 11,070 new cases of cervical cancer were diagnosed in the United States, and among these, 3,870 cases were fatal (Linton 235). In order to effectively protect themselves, it is necessary that women frequently obtain regular cervical cancer screenings and Pap tests to detect any precancerous lesions early on and subsequently prevent any instance of invasive cervical cancer from taking a potentially fatal course. Ultimately, the incidence and mortality rates of cervical cancer are much higher among women who do not obtain these regular screenings. Pap testing is an effective strategy for reducing the risk of invasive cervical cancer. Pap smear screening involves taking cells from the cervix to identify the presence of any abnormal or precancerous cells. In an effort to combat the growing number of cervical cancer cases among young women in the United States, the Center for Disease Control recommends that women receive a Pap test within the first two years following their first sexual encounter (Roland 8). Moreover, since the virus infects women ages 14 – 24 more prevalently than any other age group, it is vital that every woman receives at least one pap smear before they reach 21 years of age, followed by regularly scheduled annual screenings until the age of 30 (Roland 9). In doing so, young women can substantially decrease the prevalence of the virus while also decreasing their risk of contracting cervical cancer through early detection of the cellular abnormalities caused by HPV. Furthermore, recent studies have shown that even the mere act of performing a Pap smear can produce an inflammatory, immunologic response to HPV which subsequently initiates the body’s defense mechanisms that could potentially lead to clearance of the virus. As a result, Pap testing has proven to be an extremely effective method for reducing the incidence of cervical cancer among women exposed to the virus (Roland 9). In addition to HPV prevalence among women, the virus can also affect the overall health of infected males. Although the male is generally considered an asymptomatic â€Å"silent† carrier of HPV, the virus can produce lesions or warts on the male genitalia and can even lead to penile cancer (Rosa 1032). However, currently there is no cost effective test designed to detect the virus in male carriers. The only methods of detection consist of a peniscopy followed by a second-generation Hybrid Capture test. In this process, acetic acid solution is used to identify any lesions on the genitals so that a biopsy can be taken from all infected areas (Rosa 1033). Unfortunately, this manner of detection is far too complex to be performed on a mass scale. Consequently, male carriers continue to spread HPV unknowingly to their sexual partners and subsequently increase the prevalence of the virus throughout the sexually active community. Due to this asymptomatic spread of the virus by male carriers, it is paramount that a male vaccine is developed to further combat the growing prevalence of HPV among young sexually active individuals. On June 8th 2006, the FDA introduced Gardasil, a gender specific quadrivalent vaccine which prevents the initial infection of the four most dominant and high risk HPV types, 6, 11, 16, and 18. Consequently, the vaccine not only directly prevents the development of cervical cancer in women but also defends against the lower risk types 6 and 11, which are generally known for causing genital warts in both genders. The Gardasil vaccine is very unique because it appears to be the only 100 percent effective vaccination ever created. Furthermore, there is no live material inside the vaccine. Instead, it is made up of the virus-like proteins which coat the outer portion of the HPV virus. The vaccine cannot treat individuals already infected with the virus, but it will protect the infected female from attaining any of the other strains in the vaccine (McLemore 559). The vaccination is a three dose process, with followup doses at two and six month intervals from initial vaccination. Furthermore, the observed side effects are minimal but can include fever, nausea, respiratory tract infection, insomnia, and several other complications. Ultimately, the Gardasil vaccine is recommended for women ages 9 – 26 in an attempt to effectively decrease the prevalence of HPV among the sexually active community and also directly lower the related incidence of cervical cancer in young women (McLemore 559). However, even with the development of this vaccine the human papillomavirus still continues to infect millions of Americans and is responsible for thousands of cervical cancer deaths each year. It is absolutely paramount that young sexually active women not only become vaccinated with Gardasil, but also continue to maintain regular Pap test screenings annually with their doctor. In doing so, women can substantially reduce their incidence of cervical cancer and effectively fight to combat the growing prevalence of the HPV virus in the United States. Ultimately, the incidence and mortality rates of cervical cancer are much higher among women who do not obtain these regular screenings, and therefore fail to identify HPV abnormalities and precancerous cells early in their development. REFERENCES Linton, D.M. (2009). Cervical cancer screening interval. Clinical Journal of Oncology Nursing. 13(2): 235-7. Roland, K.B., Benard, V.B., Saraiya, M., Hawkins, N.A., & Brandt, H. (2009). Assessing cervical cancer screening guidelines in patient education materials. Journal of Women’s Health. 18(1): 5-12. McLemore, M.R. (2006). Gardasil: introducing the new human papillomavirus vaccine. Clinical Journal of Oncology Nursing. 10(5): 559-60. Rosa, N.T., De Carvalho, J.J., & Syrjanen, K.J. (2007). Identification of males at increased risk for genital human papillomavirus (HPV) infection among patients referred for urological consultation. Scandinavian Journal of Infectious Diseases. 39(11-12): 1029-37.

Friday, January 3, 2020

Injust and Inhumane Transgender Discrimination Essay examples

Transgender people are no strangers to society: the concept of not feeling comfortable in ones birth-assigned gender has been around since man can remember. Its quite puzzling to see that many centuries later, people still treat transgender people of an alien-like nature, of some sort of non-human species. Transgender people have been discriminated for long enough. The discrimination sent towards them is wrong: theyre just humans who made changes to their lives for the better as all people have. Transgender people are regular people who do not deserve the amount of discrimination directed towards them as they get right now. â€Å"Transgender† is an umbrella term that includes gender non-conforming people, transsexuals (female-to-male and†¦show more content†¦Transgender people are discriminated on an almost daily basis. They are discriminated in the workplace, as shown in a study commisioned by the Equalities Review. In a group of transgender people who have jobs and are prone to workplace-enviroment effects and opinions, â€Å"many respondents experienced harassment from co-workers and employers.† Nearly 29% of the group experience verbal abuse and harassment in the workplace enviroment, and about 4% received physical abuse. About 7% experienced threats, and about 27% experienced some sort of different treatment due to their gender non-conforming ways.(Whittle 38-39). In another study, it was found that being mistreated in the school years would have a negative effect on future outcomes relating to employment. â€Å"Those who were physically attacked in school were considerably more likely to stay in a job (64%) compared to those who were not (42%) (Grant 50).† They are also discriminated in public as well, adding on to the distress that many transgender people suffer from regularly, making it seem as if all transgender people are crazy. Transgender people are just more likely to be diagnosed as someone with a mental disorder beca use its helpful to see that those who have been diagnosed are â€Å"hurting and something needs to be done to help (Kreitler 1).† In