Tuesday, November 26, 2019

Free sample - Negative Campaign Advertisement. translation missing

Negative Campaign Advertisement. Negative Campaign AdvertisementOutline I. Description of Negative campaigning It may possibly be described as â€Å"a form of an ad that is normally utilized by political aspirants during the campaign period to offer facts regarding unconstructive aspects of the opposing contender. II. Brief History of Negative Campaigning   In USA, during the 18th century, door to door campaigning was the main means of spreading information regarding an aspirant or a political party. III. Reasons behind the rise of negative advertising in the political arena There are several reasons which explain the rise of negative advertising in the contemporary USA. IV. Impacts negative forms of political communication may have on our system of government and democratic participation The negative forms of political communication may possibly pose a number of effects in the USA’s system of government and democratic participation. V. Analysis of political advertising Political advertising in the United States of America comprises any spread of information which backs or counters an aspirant for appointment to a public office. VI. The Detrimental and Positive Consequences of Employing Negative Ad Strategies Many electors detest this form these strategies. VII. The suggested negative effects of exposure to negative advertising It may possibly introduce thoughts of suspicion amongst the electorate. VIII. Effects of Exposure to negative advertising on voter turnout The decision by majority of America’s electorate to partake in a voting exercise is largely depended on exposure to political advertising. IX. Conclusion A key origin of predicament as far as political advertising is concerned is whether to make use of negative or positive advertising during the campaign period.       Description of Negative campaigning Scores of politicians across the globe, especially those who aren’t powerful and popular make use of negative campaigning to divert attention or even tarnish the popularity of their opponents. This type of campaign is usually stimulated by deceit(s) fashioned by one contender or more. This deceit may possibly turn out to be truthful to the electorate, and can make them not to vote for their initial preferred candidates. Negative campaigning crafts a non-conducive condition which alters the ability of the electorate to distinguish truthful information from untruthful one. Furthermore, it is capable of capturing electors’ interest as regards to a number of vital parameters affecting them such as the state of economy, and the unemployment rates. This type of campaigning may possibly be described as â€Å"a form of an ad that is normally utilized by political aspirants during the campaign period to offer facts regarding unconstructive aspects of the opposing contender.† It is broadly categorized into 2. The preliminary one is designed in order to launch a scathing attack on the challenger’s position on matters affecting the electorate. The second one is intended to launch a scathing attack on the challenger’s personality. Talking of USA, during the year 2008 campaign period, the Republican candidate, John McCain argued that his main competitor, Barrack Obama had no any experience concerning the USA economy, and therefore couldn’t manage to repair it subsequent to the ravaging effects of the recession that had threatened to tear apart our economy completely. This criticism was occasioned by the fact that John’s popularity was significantly low and also due to the fact that he had less experience regarding the economy. He couldn’t even explain the manner in which he could repair it (the USA economy) if elected. However, most Americans and the Media concurred with John’s remarks despite the fact that they were incorrect. Also, during this period, John’s camp and the Press at large considered President Obama an Islam simply because his middle name is â€Å"Hussein† in order to woo voters to vote for him (John McCain). Brief History of Negative Campaigning   In USA, during the 18th century, door to door campaigning was the main means of spreading information regarding an aspirant or a political party. Additionally, most contenders organized a number of gatherings especially at the city chambers so as to make vital speeches. They (the gatherings) were also aimed at strategizing their campaigns. The era between the start and the 9th decade of the 20th century was characterized by the usage of image advertisements at the commencement of a campaign period. This stage was aimed at setting up a positive image of a particular aspirant or political party. Subsequently, unconstructive/negative advertisements were utilized at the closing stages so as to launch a scathing attack against a challenger(s) or an opposing political party. But these tactics were discarded at the start of the 9th decade of this century (20th). The modern-day campaigning tactics on the other hand are structured in such a manner that the unconstructive advertisements are utilized right from the start to the closing stages. The use of media particularly the TV by aspirants to negatively spread political information has escalated to unprecedented levels (Thurber, Candice and Dulio 29). It has been well documented by well known researchers that TV advertising represents sixty to sixty five % of campaign financial resources (Hale, Fox and Farmer 330). The majority of campaign specialists are well versed with the fact that negative TV campaigning is capable of yielding the desired results within the shortest timeframe. Reasons behind the rise of negative advertising in the political arena A number of reasons which explain the rise this form of advertising exist. The preliminary reason is the Communication Act that came into law in the year nineteen hundred and thirty four (1934). This Act required the media not to broadcast any advertisement that is/was believed to be untruthful. However, deceptive advertising for political commercials is/was to be advertised. Two, in the year nineteen hundred and seventy six (1976), an alteration of the election campaign Act was made. This amendment was geared towards permitting campaign consultants to spend huge sums of money so as to back a meticulous aspirant. This money was also channeled towards commercial advertisement of the political party and candidates affiliated to it (Freedman, Wood, and Dale 40).   Three, many campaign consultants discern the fact that any aspirant who desires to be appointed by the public for a particular post must use it so as to amass the required votes. As a consequence, more and more contenders make use of negative advertising during the campaign period as a tool for convincing the voters that they are the best candidates. Four, in USA, in order for a political party to run a negative advertisement on a particular media station, it must obtain a permit from the concerned party. However, this permit is normally utilized liberally in the sense that there are no restrictions imposed as regards to the kind of information that ought to be featured or published in an advertisement. Impacts negative forms of political communication may have on our system of government and democratic participation The negative forms of political communication may perhaps facade a number of negative impacts. One, it is crystal clear that negative forms of political communication sprung at the start of the 9th decade of the 20th century. At that time, they were aimed at offering opposition to the office holders including the president. This state of affairs eventually gave rise to â€Å"negativism† (Freedman, Wood, and Dale 21). Two, it is perceived by many political analysts across USA as an acidic manipulator of the democracy. They have argued that due to the fact that it is characterized by aspirants employing various strategies in order to woo electors, the electors have significantly been repelled. As a result, a number of them end up not excising their democratic rights at the ballot, and are totally disillusioned by the leaders who use negative forms of communication so as to win elections (West 802). Three, in the recent times, it has turned out to be a strong political vehicle. This is attributed to the fact most candidates and their consultants use it so as to manipulate voting patterns. Four, there is a research that was conducted concerning the nineteen hundred and ninety two (1992) United States of America’s presidential and Senate elections. It found that this form of advertisement made many Americans not to trust the political processes. This significantly contributed to lesser voter attendance in the subsequent elections that were held in the year 1996. Five, negative forms of political communications have to an extent contributed to a decline in USA’s system of government. This has been occasioned by the low voter attendance in both the presidential and senate elections, and the electorate’s failure to trust the political system (Nimmo 23). Analysis of political advertising Political advertising in the United States of America comprises any spread of information which backs or counters an aspirant for appointment to a public office. Also, it may possibly comprise any spread of information aimed at backing or countering a ballot proposal. Political advertising may take various forms. One, written political advertising entails usage of billboards, pamphlets, fliers and more. Two, it may perhaps engross publishing of information regarding a candidate or a political party in newspapers such as the New York Times, and other types of publications. Three, political advertising may involve the spread of information to the voters via the radio, TV (television), and through an internet website.   Many political parties and aspirants across the United States tend to use Television to broadcast their commercials due to 2 main reasons. One, the information to be broadcasted is crafted and relayed precisely as desired. Two, it is known that TV is a key communicative connection in between the aspirants and the voters. Most political advertisements normally run for thirty seconds. They are properly designed in order to relay the most important information and capture the listeners/readers/viewers interest. In USA, there are a number of advertising companies which are mandated to trail and list different political advertisements. One of them is the â€Å"Wisconsin Advertising Project.† The Detrimental and Positive Consequences of Employing Negative Ad Strategies Various studies that have been conducted regarding negative advertising all over the USA by various researchers have shown that many electors detest these strategies. It has also been established that negative political advertising has slim chances of enabling an aspirant to garner more support from the electorate. Three, negative advertising strategies have a higher likelihood of causing pessimism amongst the citizens. Four, these strategies can make voters to lack interest in participating in major elections. Five, they (the strategies) have a higher likelihood of crafting uncertainties within the electors’ brain as regards to the capability of the target aspirant (s) to lead the nation or a State without any hitches. Six, the strategies pose a great peril of crafting empathy to the target aspirant(s). Fifth, the outcomes of an election in which the aspirants utilized negative advertisement strategies have been found to be poorer by scores of well known scholars all over the world. Seven, some of them (the scholars) after having conducted researches concluded that these types of strategies have explicit impacts on the electors, and therefore there is an urgent need for the relevant authorities to amend the communication Act so as to ban it or regulate the content to be aired. The positive consequences of negative political advertisement include the fact that it may possibly lessen the targeted aspirant appraisal. At the same time, it can swell the supporting aspirant voting intent. An American political scientist (Goldstein, K.), denies the fact that negative political advertising has can result to unconstructive outcome. According to him, if this advertisement is aired on a regular basis on the television during the campaign period, then the electorate is more likely to gain extensive facts regarding the candidates, and issues affecting them. He also argues that the more the electorate acclimatizes with these facets, the more they are liable to exercise their democratic rights by taking part in an election. Some scholars have argued that this type of advertising is a bad recipe for United States of America’s democracy. Others have suggested that it has a higher likelihood of restraining electorates’ participation. But in accordance with Kennedy, a great deal of this condemnation by the various scholars and researchers is based on a concept that USA’s electorates are not well educated, and therefore they are more liable to be effortlessly influenced by the ads. He states that â€Å"this type of advertising empowers the electorate’s capability to brightly select the best aspirant.†Ã‚   This is due to the fact most Americans have the intellect of pin-pointing differences as much as matters political are concerned. Kennedy however emphasizes that the campaign consultants ought to devise an ad which isn’t extremely despicable. He argues this is due to the fact that it has a higher chance of bouncing back on a political crusade. Furthermore, he advise s political consultants to ensure that they have substantiated the assertions they are intending to run on the television or publish. Kennedy reiterates that the unconstructive/negative advertisements are aimed at coaching the public. Constructive/positive advertisements on the other hand are geared towards amusing the electorates’ sentiments. According to him, unconstructive/negative advertisement is liable to be factual. In contrast, constructive/positive advertisements are less liable to centre on the policies of the candidate. Kennedy says that most voters pay heed to unconstructive advertisements because it has a huge prospect of unearthing the truth about the background of certain aspirants. He further laments that this form of ad has a long-history as much as the United States of America’s political scheme is concerned. As such, there is no need for its detractors to persist criticizing it. Kennedy asserts that the pronouncement of United States of America’s independence on 4th of the seventh month of the year 1776 is an unconstructive advertisement. Also, most candidates during the 19th century did not make use of the negative advertisements since at that time; television had not yet been invented (Chaptman). It has been documented by well known researchers across United States that those candidates who shift from one State to another in bid to raise money so as to fund their political crusades have a huge potential of running numerous ads on the TV and over the radio. Nonetheless, this kind of candidates end up disappointed if the ads don’t produce the most effective results.   During the November 2nd elections of the year 2004, one of the key policies of the Democratic candidate (John Kerry) was to increase the number of peacekeeping combatants in the war-torn Vietnam .However he was sharply criticized by several human rights watchdogs. According to them, this initiative had a potential of violating human rights and unconstitutional. Many political analysts have suggested the various reasons that made him to lose to the incumbent (George Walker Bush). One of the reasons is that John did not traverse the country to raise funds from well-wishers and other stakeholders. This meant that his camp couldn’t manage to pay for ads to counter ads that were specifically aired and published by the Republican candidate (Chaptman). The paid negative advertisements that were aired and published by the Republican camp made the electorate to turn out to be further acquainted with political matters, and as a result, they ended-up voting for Bush in spite of many criticisms that were leveled against him by critics such as the unwarranted invasion of both Afghanistan and Iraq (Chaptman). The suggested negative effects of exposure to negative ad Scores of voters, scholars, and researchers have suggested several negative effects of exposure to negative ads. One, it may possibly introduce thoughts of suspicion amongst the electorate. Two, negative ads were extensively used throughout the year two thousand and four (2004) elections that pitted George Bush, John Kerry and others. As a consequence, they crafted an element of squat/low self-value amongst the electorate. Three, some researchers have found that this form of advertisement has a higher likelihood of changing the electorates’ mind-set as regards to engagement in a number of democratic processes. These include referendums and Senate elections.   Four, owing to the fact that the negative advertisements are usually broadcasted during the campaign period, they create monotony. As a consequence, majority of the electorate protest against the real intention of this form of advertising. Five, some of them (the scholars) have argued that negative advertising is characterized by dishonesty. Also, they have argued that it is unjust since it is intended to tarnish the political supremacy of certain aspirants. Effects of Exposure to negative advertising on voter turnout There are 2 main parameters which explain the reason as to why most voters in USA take part in a voting exercise such as the election of the President and State representatives. One of them is the exposure to political advertising. This exposure can increase or lessen their curiosity as far as a particular voting process is concerned. Another one is the participation in political matters prior to the ballot day. It has been confirmed by well known researchers that the two determiners may possibly impact the electorates’ reaction sensitivity to negative advertisements. Furthermore, if the two determiners set off at a lower momentum, then negative advertisements are implausible to be effectual. This is due to the fact that the electorate may perhaps find the negative advertisements to be upsetting. Also, these advertisements may possibly fashion unconstructive sentiments towards the political leaders. The two determiners may possibly swell to unprecedented intensities. Furthermore, they have a higher likelihood of turning out to be further engrossed in the voting process. These have an impact of making the electorate to strongly react to negative advertisements. Negative ads have been found to generate fewer facts. This is has an impact of reducing the extent of sympathetic benevolence towards the aspirant during voting. However, owing to the electorates’ discernment that it was needless, he or she may possibly decide to reassess the sympathy for the aspirant. In United States of America, most presidential, senate and other elections may possibly feature a current office holder. These aspirants are usually at a better position to triumph over their rivals due to the fact the electorate are acquainted with a lot of facts concerning them.   Due to this reason, unconstructive advertisements aired against them (incumbents or current office holders) can have a repercussion impact. This is attributed to the fact that the incumbent’s advertisements may possibly swell to a larger extent the contender’s profile identification and have an impact on both the voter turnout and voting tendencies (Karen and Hensel, 67). It has been verified that those electorate who are autonomous (whose reaction to negative advertisements of the contestants is low) are likely to turnout in large numbers to exercise their democratic rights through voting. Conclusion A key origin of predicament as far as political advertising is concerned is whether to make use of negative or positive advertising during the campaign period. Negative advertising tactics normally poses a myriad of detrimental consequences not only to our political system but also to the electorate who are required by law to partake in a voting process in order to select their preferred candidates. For that reason, there is a need for the politicians to make use of positive advertising strategies since they are likely to breed a more cohesive American society. I strongly believe that the â€Å"prevailing† state of mind of political advertisement campaigns requires to be stabilized by an additional â€Å"fostering† point of reference. This will ensure that the ideologies of laissez-faire democracy remain sustainable.    Freedman, Paul, Wood, William, and Lawton, Dale. â€Å"Do’s and Don’ts of Negative Ads: WhatVoters Say†. Campaigns and Elections 20 (1999): 20-5. Hale, Jon, Fox, Jeffrey,   and Farmer, Rick. â€Å"Negative Advertisements in U.S. Senate Campaigns: The Influence of Campaign Context.† Social Science Quarterly 77 (1996):   329-43. Karen, James, and Hensel, Paul. â€Å"Negative Advertising: The Malicious Strain of Comparative Advertising.† Journal of Advertising, 20.2 (1991): 53-75. Nimmo, D. Political persuaders: The techniques of modern election campaigns. New Brunswick: Transaction, 2001. Rahn, Wendy M., and Rebecca M. Hirshorn. â€Å"Political Advertising and Public Mood: A Study of Children’s Political Orientations.† Political Communication 16 (1999): 387-407. Thurber, James, Candice, Nelson, and Dulio, David. Crowded Airwaves: Campaign Advertising in Elections. Washington, D.C.: Brookings Institution Press, 2000. West, Darrel. â€Å"Television Advertising in Election Campaigns.† Political Science Quarterly 109 (1995): 789-809.

Saturday, November 23, 2019

Learn About the Sirenians

Learn About the Sirenians Sirenians (Sirenia), also known as sea cows, are a group of mammals that includes dugongs and manatees. There are four species of sirenians alive today, three species of manatees and one species of dugong. A fifth species of sirenian, the Stellars sea cow, became extinct in the 18th century due to over-hunting by humans. The Stellars sea cow was the largest member of the sirenians and was once abundant throughout the North Pacific. Identifying a Sirenian Sirenians are large, slow-moving, aquatic mammals that live in shallow marine and freshwater habitats in tropical and subtropical regions. Their preferred habitats include swamps, estuaries, marine wetlands, and coastal waters. Sirenians are well-adapted for an aquatic lifestyle, with an elongated, torpedo-shaped body, two paddle-like front flippers, and a broad, flat tail. In manatees, the tail is spoon-shaped and in the dugong, the tail is V-shaped. Sirenians have, over the course of their evolution, all but lost their hind limbs. Their hind limbs are vestigial and are tiny bones embedded in their body wall. Their skin is gray-brown. Adult sirenians grow to lengths of between 2.8 and 3.5 meters and weights of between 400 and 1,500 kg. All sirenians are herbivores. Their diet varies from species to species but includes a variety of aquatic vegetation such as seagrass, algae, mangrove leaves, and palm fruit that falls into the water. Manatees have evolved a unique tooth arrangement due to their diet (which involves the grinding of a lot of coarse vegetation). They only have molars that are replaced continuously. New teeth grown in at the back of the jaw and older teeth move forward until they reach the front of the jaw where they fall out. Dugongs have a slightly different arrangement of teeth in the jaw but like manatees, teeth are continuously replaced throughout their life. Male dugongs develop tusks when they reach maturity. The first sirenians evolved about 50 million years ago, during the Middle Eocene Epoch. Ancient sirenians are thought to have originated in the New World. As many as 50 species of fossil sirenians have been identified. The closest living relative to sirenians are the elephants. The primary predators of sirenians are humans. Hunting has played a major role in the decline of many populations (and in the extinction of the Stellars sea cow). But human activity such as fishing, and habitat destruction can also indirectly threaten sirenian populations. Other predators of sirenians include crocodiles, tiger sharks, killer whales, and jaguars. Key Characteristics The key characteristics of sirenians include: large aquatic herbivoresstreamlined body, no dorsal fintwo front flippers and no hind legsflat, paddle-shaped tailcontinuous tooth growth and replacement of molars Classification Sirenians are classified within the following taxonomic hierarchy: Animals Chordates Vertebrates Tetrapods Amniotes Mammals Sirenians Sirenians are divided into the following taxonomic groups: Dugongs (Dugongidae) - There is one species of dugong alive today. The dugong (Dugong dugong) inhabits coastal marine waters of the western Pacific and Indian Oceans. The dugong has a V-shaped (fluked) tail and males grow tusks.Manatees (Trichechidae) - There are three species of manatees alive today. Members of this group are usually solitary animals (except for mothers with their young). Manatees prefer freshwater aquatic habitats and coastal saltwater marshes. Their distribution includes the Caribbean Sea, the Gulf of Mexico, the Amazon Basin, and parts of West Africa such as the Senegal River, Kwanza River, and Niger River.

Thursday, November 21, 2019

Masquerades Essay Example | Topics and Well Written Essays - 2500 words

Masquerades - Essay Example The masquerades are dramatized to an extent with music and dances that it symbolizes power and infallibility. They are made in such macabre, grotesque yet illuminant manner that they at once evoke attention and awe1. The festivals and rituals surrounding masquerades have become regular part of the African culture. It is difficult to put a stop to them now. 1The attention and awe inspired by masquerades did not come because of their appearance. The masquerades were part of a system that ruled Africa for thousands of years. History reveals that the masquerades were silent witnesses to mayhem and murder. If you're thinking about getting a masquerade, make sure you are up to date with all the rest of the outfit that must cover your body. You must also familiarize yourself with the music and dance steps and movements that accompany the masquerade. Added to these, you have to take the precaution of consulting your witchdoctor without which the masquerade will only remain a mute part of your grotesquely stylized garment. The masquerades were part of large-scale mumbo-jumbo commanding obeisance of societies and nations. They were the cause of festivals and mass processions. They provided omens and cures in the hands of witchdoctors. They were ideal leverages in the hands of power-brokers. With such advantages, it was difficult to neutralize the influence of masquerades. The maThe masquerades are made in all shapes and sizes.1They may resemble the hyena or the vulture. These have their specific significance. The hyena is associated with possession of ethereal knowledge. The vulture, a flying bird of prey, is believed to bring knowledge from the spiritual world (Lamp, Frederick; 2010). It is not only the mask that prominently figures in the dancer's scheme. It is the entire outfit. The mask plays a vital role due to the importance associated with the countenance. The transformation in the dancer's behavior permeates every iota of his being. The head, bearing most sense, takes the cake. 1Whatever the shape and size, the object of the masquerade was to dominate and demand respect. They exist in the form of art today. But they cannot undo the havoc they wreaked in the millions of lives that even dared to question them. The Significance of the Masquerades' Longevity The African continent is over 26,000 years' old culture. That art has existed for such a long period of time in human history is mind-boggling. It is another matter that it has continued in this fashion till date. The African contin

Tuesday, November 19, 2019

APPLIED DECISION METHODS CLASS; MOD4; Regression Models discussion Essay

APPLIED DECISION METHODS CLASS; MOD4; Regression Models discussion - Essay Example Sales, and Price vs. Sales determined. Using computer software or excel, the coefficients can be generated and measures of goodness of fit determined hence assisting in drawing the scatter diagrams. Render et al. asserts that assessing the plots (measured and calculated values of the dependent variable) and can be used to determine the quality of the model (pg. 127). For a good and apposite model, the trends should not be very dissimilar, and if the difference between measured and calculated points is huge, an ostensible trend should exist. What’s more, in the residual plot, the residual values of the dependent variable should be arbitrarily scattered around the line err=0 and the mean should be zero (normality). For the model to be statistically valid and stable, the confidence intervals to be used should be significantly small. An awkward model yields inaccurate derivative values and impractical results for even smallest extrapolations. Additionally, for an appropriate model, the errors should have a constant variance that expedites the

Sunday, November 17, 2019

Chinese Giant Salamander Essay Example for Free

Chinese Giant Salamander Essay 1. What role does your species have in its ecosystem? Shallow mountain streams are home to the rare and shy Chinese giant salamander, where it has many roles within its ecosystem. It is a symbol of a healthy freshwater ecosystem that humans and other animals depend on (McNeil, 2010). The Chinese Giant Salamander is a key component of the food chain as both prey and predator. Salamanders eat many invertebrates, making sure that the rivers and streams do not become over populated (Mcneil, 2010). The Chinese Giant Salamander’s ecological role is to provide aquatic animals with food when they are young and as the salamanders grow up they become the predators and feed on the aquatic animals that once fed on them; this has a positive effect on the ecosystem keeping the balance of species populations. The Chinese Giant Salamander also ensures that within its ecosystem there is great biodiversity (Qiang, 2009). Without the Chinese Giant Salamanders the ecosystems in the mountainous regions of China would be unbalanced. These salamanders have an important role in showing the vast biodiversity in China and Japan and losing them decreases biodiversity. Amphibians in general are often referred to as â€Å"indicator† species, species that indicate environmental change and vital aspects of safe water (Qiang, 2009).On land, the amphibian serves a purpose of indicating whether the environment is healthy or not. The salamanders do this by breathing through the pores in their skin (McNeil, 2010). The Chinese Giant Salamander also belongs to the flesh-eaters, which is an important species for the freshwater ecosystems of mountainous areas, playing an important ecological role in maintaining the balance of freshwater ecosystems of mountainous areas (Qiang, 2009). Most of the rivers where the giant salamanders live have becomes very polluted forcing the animals to migrate downstream to breed. Many of them die on their journey downstream or never end up finding clean and safe water to lay their eggs. The ones that do find safe water lay their eggs and decide to return, have trouble getting back as dams have been built or roads running straight through their path. The Chinese Giant Salamander has important significance in discussing evolution of vertebrate from aquatic animal to terrestrial animal as it is a species that lived in the same period with dinosaur, and continuing to survive until now, it is called as â€Å"living fossil† (McNeil, 2010). Not much is known about t he salamander when it lived with the dinosaurs, as that information in still being found out today. The Chinese Giant Salamander is just one example of the many amphibians that are vanishing quickly of the face of this earth. Without the amphibians less and less will be known about the health of the environment. This species is very important to not only surrounding animals in their ecosystem but also to humans as the salamanders are telling us that it is time to change our ways because if not, they will die out. The Chinese Giant Salamander shows that whatever wiped out the dinosaurs wasn’t strong enough to kill off all the giant salamanders. 2. What, if any efforts are being made to preserve your species outside of its natural habitat? The Chinese giant salamander is listed on Appendix I of CITES (Convention on International Trade in Endangered Species). Appendix I states that trade in specimens species threatened with extinction, is permitted only in exceptional circumstances (Amphibian Species Information: Chinese Giant Salamander). Unfortunately, although CITES regulate s international trade in the species, it has no jurisdiction over the domestic trade within China which constitutes the primary market. The salamander is also listed as a Class II State Major Protected Wildlife Species in China (Amphibian Species Information: Chinese Giant Salamander). This plan is to protect the habitat of the Chinese Giant Salamander. While it does state that the habitat will be preserved to the best extent, many people break this law as they cut down trees to build houses. The Zhangjiajie Giant Salamander Nature Reserve is one of the largest reserves offered to the salamanders (Qiang, 2009). China has already set up 22 nature reserves to protect the endangered species. These reserves aim to protect not only the animal itself but also its habitat (Creating a Future for Wild Chinese Salamanders). There are a few organizations that go out and clear the rivers of pollution. There are currently six â€Å"Giant Salamander Reserves† in China that are trying to restore the salamanders’ population. Unfortunately, all of these reserves are affected by a shortage of funding and employees, lacking a conservation action plan, poaching, uncertain reserve status, and a lack of protection for salamander habitat. Currently the Chinese Giant Salamander has no recovery plan, but hopefully soon one will be created. 3. What else could/should be done in your opinion? Chinese Giant Salamanders are seriously misunderstood animals. Even though they are not so attractive as one might think, there is no excuse to destroy their habitats and hunt them to extinction. Many of them are being captured for illegal pets and they are being hunted for their meat which is considered a delicacy in China. Because their meat is rare it is profitable and expensive, making an easy income for poor hunters with large families to feed. Many hunters of the Chinese Giant Salamander spread pesticides into the rivers and streams in order to get the one animal. This creates not only an inhabitable environment for the salamanders but also all the other wildlife that come to those rivers and streams. This pollution also creates unsafe drinking water in some areas as the toxins are carried downstream. In 2004 there were 3200 larvae of Chinese Giant Salamanders, but in 2009 there were zero (Qian, 2009). This shows the enormous impact of pollution in the streams where the salamanders live. They are also hunted for their medicinal uses. In addition to be ing hunted, Chinese Giant Salamanders are threatened by habitat defragmentation, as China becomes grossly populated and more houses are built. It would be helpful to organize more environmental education to encourage pride in this species as it shows China’s vast biodiversity. It would be helpful to provide better wildlife preserves for these animals. The establishment of a Chinese giant salamander education center in an area of this species’ range, with a captive breeding facility to provide individuals for a reintroduction program, could provide a much-needed focus for active conservation and monitoring of this species (Qiang, 2009). More organizations and funding should be provided to support the natural reserves protecting these species habitats. Stricter laws and punishment for the hunting of this animal would also ensure the species’ population to grow. 4. From an environmental perspective, why should your animal be saved? With the absence of the Chinese Giant Salamander, we will lack another natural indicator of whether ecosystems are clean and safe. It is important to know that all amphibians, not just Chinese Giant Salamanders are indicator species. But recent studies have shown that many amphibians are becoming more and more extinct. These species not only provided indicators of the environment but they als o are species that were around when the dinosaurs were here and provide a resource for more research (Thomas, 2010). This species eats all the invertebrates that can easily overpopulate an area. Without the Chinese Giant Salamanders mountainous rivers and streams will become overpopulated by many invertebrates and soon exceed the carrying capacity of the ecosystem. Threatened by factors such as habitat loss, disease, climate change, pollution, and invasive species and over hunting, this species faces challenges that could draw millions of years of survival to an abrupt close if nothing is done (Thomas, 2010). These species react very quickly to environmental change and are able to give a clear response to this change, whether it’s beneficial or detrimental.Their contribution to both traditional and modern medicine has been invaluable as many species have been found to secrete and contain therapeutic compounds that can be used in the treatment of HIV, cancer, heart disease, diabetes, Alzheimer’s, strokes and depression (Meredith, 2010). These large animals need to be saved to ensure the health of the mountainous ecosystems. Without the Chinese Giant Salamander, we will have lost an indicator species, an evolutionary key species, and a valuable medicinal recipe holder.

Thursday, November 14, 2019

Special Education Essay -- Educacional Policies, Non Discrimination

According to the democratic theory postulated by Amy Gutmann, citizens should be entitled to make rules that govern educational policies at national levels. These policies should reflect the ongoing scrutiny of the liberal principles of nonrepression (education may not proscribe deliberation pertaining to any particular set of rational ideas) and nondiscrimination (parents nor educators may espouse practices that may deter children from partaking in a democratic education). Importantly, the discretional power of these citizens should be constrained by those fundamental principles of nondiscrimination and nonrepression. The realm of special education and its historical background in conjunction with the many facets of nondiscrimination should be the focal point. Thus, it is my hope that this paper will give students, parents, and educators the knowledge and insight into the issues i.e. court cases, which surround nondiscrimination and its key ideologies in the domain of special education reform. To understand how special education reform emerged, we need to bethink some of the first federal laws of the United States that were designed to assist people with disabilities. Specifically, there was a federal law passed by the Fifth Congress dating back to 1798. This law authorized a Maine Hospital Service later known as the Public Health Service to bestow medical services to disabled sailors (Braddock, 1987). Unfortunately, up until World War II there were only a paltry number of federal laws able to assist persons with disabilities. Only war veterans with service-related disabilities were allowed assistance (NICHY, 1997). This purported that, for nearly all of United States history, institutions i.e. schools were permitted to... ...cided in its ruling that all students including those with disabilities be provided a publicly supported education. The court also adjured that the board of education allocate its funds equitably so that all children receive a free and appropriate education. Lastly, the court ordered the board to provide due process safeguards in the event the school attempt to alter a child’s educational status i.e. reassignment, transfers, suspension, and expulsion. In response to the seminal cases elucidated above, specifically PARC and Mills and impending litigation, Congress began passing new laws to further augment the rights of those students with disabilities. These new laws, most notably, utilized many of the legal principles that were integrated in those preceding suits insofar that students would be entitled a free and appropriate public education. Special Education Essay -- Educacional Policies, Non Discrimination According to the democratic theory postulated by Amy Gutmann, citizens should be entitled to make rules that govern educational policies at national levels. These policies should reflect the ongoing scrutiny of the liberal principles of nonrepression (education may not proscribe deliberation pertaining to any particular set of rational ideas) and nondiscrimination (parents nor educators may espouse practices that may deter children from partaking in a democratic education). Importantly, the discretional power of these citizens should be constrained by those fundamental principles of nondiscrimination and nonrepression. The realm of special education and its historical background in conjunction with the many facets of nondiscrimination should be the focal point. Thus, it is my hope that this paper will give students, parents, and educators the knowledge and insight into the issues i.e. court cases, which surround nondiscrimination and its key ideologies in the domain of special education reform. To understand how special education reform emerged, we need to bethink some of the first federal laws of the United States that were designed to assist people with disabilities. Specifically, there was a federal law passed by the Fifth Congress dating back to 1798. This law authorized a Maine Hospital Service later known as the Public Health Service to bestow medical services to disabled sailors (Braddock, 1987). Unfortunately, up until World War II there were only a paltry number of federal laws able to assist persons with disabilities. Only war veterans with service-related disabilities were allowed assistance (NICHY, 1997). This purported that, for nearly all of United States history, institutions i.e. schools were permitted to... ...cided in its ruling that all students including those with disabilities be provided a publicly supported education. The court also adjured that the board of education allocate its funds equitably so that all children receive a free and appropriate education. Lastly, the court ordered the board to provide due process safeguards in the event the school attempt to alter a child’s educational status i.e. reassignment, transfers, suspension, and expulsion. In response to the seminal cases elucidated above, specifically PARC and Mills and impending litigation, Congress began passing new laws to further augment the rights of those students with disabilities. These new laws, most notably, utilized many of the legal principles that were integrated in those preceding suits insofar that students would be entitled a free and appropriate public education.

Tuesday, November 12, 2019

Story of Stuff

The Story of Stuff is a fun, clear, lively, and timely treatment of the materials economy that shows how the real industrial economy intersects with sustainability. Although the economy appears to undermine sustainability, it works for the burgeoning global middle classes, for now, as the middle class increases consumption, the demand that elicits production. This theme is central. I test marketed the book and others among students in various settings, discovering that students preferred The Story of Stuff and learned from studying the book.The core concept, the materials economy, is not a formal term derived from economic theory. The materials cycle comes close to the concept of supply chains, however. Annie may have invented the term to suit her purpose here: more trees and less stuff (read, waste). I have used the cycle process model effectively in my public policy course. View the logo and click on the ovals to see this process framework in action. The material cycle model is a c omprehensible, dynamic, and flexible container.The book treats the economy as a grounded and concrete phenomenon rather than an abstract and detached set of theories. The actual economy provides the substance of ENST305, not the abstracted theories such as neoclassical economics, which will be treated immediately after The Story of Stuff, as displayed in the schedule. The strategic move, from Karl Polanyi: examine the substantive economy, not formal economic theory per se. See my overview of Karl Polanyi as social ecology.The critique of ecological economics at the macro-level, or big picture level, is squarely upon the growth in physical scale of the economy. Note that growth is distinct from development, an improvement in quality or the actualization of potential. But expansion and intrusion is what stuff is all about: stuff is tangible and physical. Note that the book does not really treat the service economy, but focuses on the world of commodities that are products (goods), not services per se. The notion of externalities, the micro-level critique of ecological economics, is central to the The Story of Stuff.See page XX. View a video that explains how even this page, located in the cloud, contributes to climate change/. Fairness is central to the book. World Sustainability, after all, must be fair. See the article recommended by Joaquin Maravillas about Ugandans being pushed off their land for the sake of environmental services. This may help in dealing with climate change but is unacceptable. This shows how commodification, even of environmental services, can lead to what David Harvey terms dispossession.I have discovered that The Story of Stuff works for students who have not yet studied economics or feel put off by economics. The book makes economics accessible but does so in the context of sustainability. Students report that they learn from the book and find the book accessible to them. This matters, a lot. Notice the chapter titles. We will discuss and contrast with the paradigm of orthodox economic theory (neoclassical economics) and also ecological economics. This gets us into the materials economy from an industrial ecology perspective. Story of Stuff The Story of Stuff is a fun, clear, lively, and timely treatment of the materials economy that shows how the real industrial economy intersects with sustainability. Although the economy appears to undermine sustainability, it works for the burgeoning global middle classes, for now, as the middle class increases consumption, the demand that elicits production. This theme is central. I test marketed the book and others among students in various settings, discovering that students preferred The Story of Stuff and learned from studying the book.The core concept, the materials economy, is not a formal term derived from economic theory. The materials cycle comes close to the concept of supply chains, however. Annie may have invented the term to suit her purpose here: more trees and less stuff (read, waste). I have used the cycle process model effectively in my public policy course. View the logo and click on the ovals to see this process framework in action. The material cycle model is a c omprehensible, dynamic, and flexible container.The book treats the economy as a grounded and concrete phenomenon rather than an abstract and detached set of theories. The actual economy provides the substance of ENST305, not the abstracted theories such as neoclassical economics, which will be treated immediately after The Story of Stuff, as displayed in the schedule. The strategic move, from Karl Polanyi: examine the substantive economy, not formal economic theory per se. See my overview of Karl Polanyi as social ecology.The critique of ecological economics at the macro-level, or big picture level, is squarely upon the growth in physical scale of the economy. Note that growth is distinct from development, an improvement in quality or the actualization of potential. But expansion and intrusion is what stuff is all about: stuff is tangible and physical. Note that the book does not really treat the service economy, but focuses on the world of commodities that are products (goods), not services per se. The notion of externalities, the micro-level critique of ecological economics, is central to the The Story of Stuff.See page XX. View a video that explains how even this page, located in the cloud, contributes to climate change/. Fairness is central to the book. World Sustainability, after all, must be fair. See the article recommended by Joaquin Maravillas about Ugandans being pushed off their land for the sake of environmental services. This may help in dealing with climate change but is unacceptable. This shows how commodification, even of environmental services, can lead to what David Harvey terms dispossession.I have discovered that The Story of Stuff works for students who have not yet studied economics or feel put off by economics. The book makes economics accessible but does so in the context of sustainability. Students report that they learn from the book and find the book accessible to them. This matters, a lot. Notice the chapter titles. We will discuss and contrast with the paradigm of orthodox economic theory (neoclassical economics) and also ecological economics. This gets us into the materials economy from an industrial ecology perspective.

Sunday, November 10, 2019

Fdi Norms, Foreign Participation in an Indian Insurance Company

As per the current (Mar 06) FDI norms, foreign participation in an Indian insurance company is restricted to 26. 0% of its equity / ordinary share capital. The Union Budget for fiscal 2005 had recommended that the ceiling on foreign holding be increased to 49. 0%. The government approved the much-awaited comprehensive Insurance Bill that seeks to raise foreign direct investment (FDI) cap in private sector to 49 per cent from 26 per cent. abc 4JVGh 7596 Insurance Market in India: Past-Present-Future pic2 pyYXW 7596FDI Cap 49% from 26%: Impact on Indian Insurance Industry A higher foreign direct investment (FDI) will unshackle the insurance industry and drive growth and long-term development enrich the business by bringing world-class business practices and processes expand distribution capabilities and deepen market penetration. Over US$ 2 billion of foreign capital could flow into the country if the Government were to pass the Insurance Amendment Bill that raises the FDI limit. Scene 1: Change in waive service tax on micro insurance productsThe growth of the rural insurance industry necessitates a waiver of the service tax, which currently stands at 10. 3 per cent, including education cess. This tax is detrimental to the growth of the rural insurance industry and insensitive to the plight of rural populace which lacks quality healthcare and is vulnerable to numerous perils, including illness, accidental death and disability, loss of property due to theft or fire, agricultural losses, and disasters of both the natural and man-made varieties.Rural insurance has an enormous potential for growth and a service tax waiver will make micro insurance products more affordable for the rural populace, and will drive pan-India penetration of this market. Scene 2: Revision on Service tax on small transactions There is an urgent need to increase the threshold for the levy of service tax on policies. The present notification exempts small transactions involving premium of less than Rs 50 (except motor insurance) from the ambit of service tax.The threshold limit of Rs 50 which was fixed in 1994 needs urgent revision. Small transactions involving premium up to Rs 1,000 should be exempt from service tax which will benefit the under-privileged sections of our society. Insurance premium for covering small and medium enterprise risks should be exempt from service tax. For other insurance products, we would like a reduction in the service tax by at least 3-4 per cent. Scene 3: Exempting personal insurance from service taxThere is an overwhelming demand across all players in the industry that individual health insurance policies should be totally exempt from service tax. Exemption of health insurance from the service tax will make health cover affordable and accessible for the layman. Consequently, cheaper health insurance will increase its pan-India penetration. Additional IT exemption for householders’ policies and concessional IT rates will give a fill ip to home insurance and will also reduce the burden on the government in the event of catastrophes. Scene 4: Exemption for profit on sale of investmentsTo encourage general insurance players to be active participants in capital markets, there is a requirement for specific exemption from income-tax on profit on sale of investments. The issue of admissibility of UPR (unexpired premium reserves) as per IRDA regulations rather than as per Insurance Act only, for IT deductions. The UPR is at present restricted to the extent of limits specified in rule 6E of the Income Tax rules due to which insurance companies need to pay tax beyond their profit disclosed in their audited accounts. Hence, the UPR created as per IRDA regulations should be allowed as per rule 6E.

Thursday, November 7, 2019

Management of Information Security and Control

Management of Information Security and Control Abstract Information is a very important ingredient of any organization. This is because no business can operate without it. In the current business environment whereby the computer has interconnected businesses and transactions are no longer carried out through paperwork, information system has become a very important part of an organization.Advertising We will write a custom research paper sample on Management of Information Security and Control specifically for you for only $16.05 $11/page Learn More Therefore the management of information should be one of the priorities if the organization is to be successful. However, the concern for information security has also risen in the recent past. In some business the need to protect information assets has even surpassed that of physical assets. This is so because any business in the current information environment that intends to be competitive and sustain growth must be ready to develop and exploit as well as protect its information assets. Information Security Needs of an organization Information security needs of an organization refer to reasons why an organization may find it necessary to have information security and control. They are as follows: To protect the functionality of the business because when operations are interrupted, costs that could otherwise have been avoided are incurred. Organizations need to have a system that ensures that operations are carried out smoothly which means there are no interruptions and work also goes according to plan. As such, the general manager and the IT managers need to design and implement an information system that cuts out intruders as well as human error that might interrupt operations (Whitman Mattord, 2008) Secondly, an organization needs to ensure that its operation applications are safe. These applications include electronic mail, operating system platforms as well as instant messaging. The laws governing information security award dama ges to the plaintiff and these damages are at times punitive. Therefore any organization needs to ensure that its information system cannot be used to infringe other peoples’ rights as this ends up costing the organization. This means that all information system applications need to be assessed to ensure that they do not pose a security threat to users (Whitman Mattord, 2008). Thirdly, there is the need for safeguarding technology assets in order to sustain growth. As an organization grows it needs to come up with secure software and infrastructure that helps it to sustain that growth. For instance an organization may develop innovations that help it to have an edge over its competitors.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More As such, its networks must grow to be able to accommodate its changing needs otherwise the competitors will easily have access to i ts new technologies and use them to outdo the company. Some of the measures that can be taken to shield an organization from its competitors include protection of manufacturing procedures, chemical formulae and technological innovations (Kouns Minoli, 2010). Fourthly, there is the need to protect data that is used by organizations. An organization cannot plan effectively and deliver value to clients if it losses its record of transactions. Any business entity, government agency or any other institution that is operating in the modern business environment, where responsive services depend on information systems to provide support to transactions, must protect its data. For that data to be reliable, the management needs to ensure that the processes of collection, storage and usage cannot be interfered with. Otherwise the decisions made will not be effective or even beneficial to the organization (Kouns Minoli, 2010). Types of threats involved in the management of information securit y and appropriate control measures Threats refer to any entity person or object that poses a security risk to an organization’s assets. There are various threats that face information, systems or people of an organization. This means that the management needs to be aware of transport, processing and storage systems that need protection from threats. For instance, when an organization connects to the internet then threats that originate from the external sources are bound to increase. There are various categorizations that show the types of threats and what in the organization is faced by that threat. However, each organization needs to find out the priority threats that it needs to deal with. The prioritization will depend on the security situation of its operating environment, the exposure levels of its assets and its risk strategy (Whitman Mattord, 2008). The categories of threats include acts of human error, which refers to acts done without malicious intentions. People are likely to do mistakes when using information systems. This may be due to inadequate training, making of assumptions that are incorrect or even working under fatigue. Employees feature among the greatest security threats because they use organization’s data on a daily basis hence making them the closest threat agents. This means that their mistakes can undermine the integrity, availability as well as the confidentiality of data. Their mistakes can also pose a threat to the organization or to outsiders. For instance they can accidentally reveal classified information, delete or even modify data (Whitman Mattord, 2008)Advertising We will write a custom research paper sample on Management of Information Security and Control specifically for you for only $16.05 $11/page Learn More Most of the mistakes can be prevented by carrying out continuous awareness activities, training and also setting up controls. The controls can range from the requirement t hat a user types an important command twice to the requirement that a particular command be verified by a second party. The second category of threat is debate act of trespass. This refers to an act where an unauthorized individual intentionally gains access to an organization’s protected information. Although some information gathering techniques are acceptable, some information gatherers use techniques that are beyond the legal or ethical threshold. Some of these attacks can cost the firm financially or dent its reputation with clients. This threat can be prevented by putting up controls that notify a trespasser whenever they try to access unauthorized areas. Valuable information and systems can also be protected by using sound authentication and authorization principles. Such controls use multiple factors or layers to prevent the unauthorized users from gaining access (Alberts Dorofee, 2002). Forces of nature or acts of God are another form of threats. These types of thre ats are very dangerous as they usually take place with little on no warning at all. They can interfere with data storage, its transmission or even its usage. They include the following: fire, which can burn down the building that houses part or all of the information system. Secondly, there is floods which refers to water that is overflowing to areas that are expected to be dry under normal circumstances. This can end up destroying part or all of the information system. It can also prevent access to the building that houses the system. Thirdly, there is earthquake which refers to an abrupt shaking of the earth’s crust as a result of the volcanic activity below the earth surface. This directly affects the system as it can destroy part or all of the system, as well as the building where the system is housed (Vacca, 2009). Lastly, there is lightening, which refers to a sudden natural electric discharge within the atmosphere. This also has a direct effect on the system as it can destroy part or all of the system or its power components. All these risks cannot be controlled per se; however they can be mitigated by purchasing insurance policies that address each of the insurance risks (Vacca, 2009) A software attack is another information security threat and it involves an individual or group coming up with a malicious code or malicious software to attack an organization’s information system. These programs are designed in such a way that they can damage the target systems or even deny access.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More They take various forms which include viruses, which are software that attach themselves on other programs and can destroy the system when activated. Viruses can be controlled by using anti-viruses which prevent them from accessing a computer system. Secondly are worms, which are able to replicate themselves several times such that they fill the computer memory. Anti-viruses can also be used to control them as they are capable of detecting them and inhibiting their performance (Vacca, 2009) Technical hardware failure is another type of threat whereby an organization purchases equipment that has a defect from a manufacturer. The defect can be known or unknown. Such flaws can result in unexpected performance of the system such as unreliable service. These can therefore lead to losses to the organization, some which are irrevocable. The best control measure is to ensure that the organization purchases from reliable vendors who can offer products with guarantees as well as quality produ cts. However, it is also important that regular check ups and service be done to the equipments so as to be able to detect defects in advance and correct them (Vacca, 2009). Risk management Before defining risk management it is important to define the key terms that make up its definition. Threat: refers to any event, object or circumstance which has the possibility and capability of adversely affecting an organizations asset, through destruction, denial of service or unauthorized access. Vulnerability: refers to the â€Å"existence of a weakness in design or implementation or an error that can result in undesirable or unexpected event that may compromise the security of the information system† (Alberts Dorofee, 2002 p. 28). Therefore, risk management is a process whereby vulnerabilities as well as threats and potential impacts that are as result of security incidents are evaluated against safeguard implementation costs (Alberts Dorofee, 2002). Risk management strategies ar e developed and implemented so as to reduce adverse impacts and to provide a framework that can be used to make consistent decisions concerning the options of risk mitigation. Risk management is broadly divided in to two phases: the first one is risk assessment which involves identifying threats and assessing the possibility and ability that the threats can exploit some vulnerability of the organization as well as the impact in the event that the threat happens. The other stage involves risk treatment; where an organization responds to the risks identified earlier. Risk management is important to the organization because it helps the management to determine the protection needed by various assets at the most efficient cost. Investment in risk management is beneficial both now and in the future and to everyone that deals with the organization (Alberts Dorofee, 2002). Risk Assessment This process has various stages which include: first identification of assets where the assets of the organization are identified and their value is determined. Secondly, there is threat identification and assessment of threats. This involves identifying the categories of threats and the adversaries that pose the threats as well as their motives. Such threats can be terrorists who want attention, political activists fighting for some rights or disgruntled employees who feel wronged by the company. The next step in assessment of threats is determining the adversary’s capability, how frequent the threat can occur and the extent of damage it can cause on the related asset (Kouns Minoli, 2010). When documenting the adversaries it is important to consider technical and human capabilities as well as their modes of operation. These include even those parties that are able to cooperate with them as well as how easy they can communicate with them. Being that threat is the most difficult to assess, it is important that both facts and assumptions are recorded. Lastly there is the dete rmination of vulnerability level of each of the assets that need protection. Here an in depth knowledge of the capabilities of countermeasures that an organization has is important. As a result an appropriate scale can be developed for measuring (Kouns Minoli, 2010). The third stage of risk assessment is analytical risk management. Here the threats and vulnerabilities are evaluated in regard to the respective assets so as to provide an expert opinion on the possibility of loss and the impact as guideline for action. In order to asses the risk effectively and to determine what to prioritize in asset protection one should do the following: first, estimate what level of impact the undesirable events have compared to each target asset. This involves reviewing the impacts based on the information acquired on vulnerabilities and threats. As a result the ratings can either increase or reduce (Calder, Watkins Watkins, 2010). Secondly, estimate how likely an attack can happen from the pote ntial threats. This involves evaluating the adversary’s capabilities, his intentions and other details of their history. After this, rating is done to determine the most and least likely threat. Thirdly, estimate the probability that a given vulnerability will be taken advantage of by a given threat. Here a review is done on the vulnerability ratings that were done previously. Armed with information from all the ratings done, an overall level of risk of the information system is done. As a result suggestions of measures to be taken are made (Calder, Watkins Watkins, 2010). Risk Treatment This is the ultimate goal of risk management as information from the assessment stage is used to determine the appropriate treatment measures that will be implemented. There are various options available in treating risk. It can be reduced, avoided, accepted or even transferred. However a combination of more than one option is also possible. There are various factors that determine which opt ions to pick and these include the cost incurred each time the event associated with the risk happens, the expected frequency with which it will happen, the attitude of the organization concerning risk, availability of resources and the current priorities of the organization concerning technology (Roper, 1999). When an organization chooses to reduce risk, it will have to choose whether to reduce the chances of occurring or reduce the chances of the adversary exploiting vulnerability or even reduce the effect of the threat should it successfully occur. The organization can also choose to accept the risk when reducing is not possible. This includes lack of appropriate measures to be implemented, whose costs outweigh the losses to be prevented. In cases where the risk cannot be reduced to acceptable levels it can be transferred to a third party, for instance to an insurance firm by buying a policy to protect the property against the threat (Roper, 1999). Risk avoidance is another optio n, whereby the firm chooses to avoid all business dealings that are associated with the risk. After identifying the risk treatment decisions to use, the next step is implementing the decisions. This is later followed with monitoring and reviewing stage, which is a continuous process as long as the organization is in operation. However, risk cannot be eliminated completely and instead it can only be minimized to acceptable levels. What remains after minimization is referred to as residual risk. There are chances that the residual risk can grow to unacceptable levels and this shows another importance of monitoring and reviewing (Roper, 1999). Importance of information security and control management Research has shown that most managers as well as employees do not regard information as a primary priority particularly because it seems not to have a direct impact as effectiveness and efficiency. This calls for training to create awareness on its importance and its roles. Different level s of management should be given specialized training on the relevance of information security in their level. Then the link between the training and the organization needs at each level should be established. In addition the training should be customized to focus on specific security issues (Isaca, 2010). An organization’s failures related to security can really be costly to a business. These costs can be recovery costs or even reputation costs. When an organization’s system is easily accessed by intruders, it ends up losing confidence from the public. As a result customers will be reluctant to deal with them. Therefore it is important that an organization invest in designing and development of effective information system. This calls for an organization to develop an information security policy which defines its information system as well as the access to its information property. It also explains the control measures that are appropriate for the organization. As a re sult the company increases its efficiency in managing its information assets (Kadam, 2002). In addition, an information system that has effective security and control measures in place can be an area of competitive advantage to an organization. This is because in such a system customers’ and suppliers’ documents will not be lost or be destroyed. Particularly because access to the system is controlled and incase part or all of the system is destroyed, back ups are available. Stakeholders are therefore attracted to such an organization as they feel that their documents will be secure. On the other hand the organization is able to plan how to better meet the stakeholders’ needs using the reliable information (Kadam, 2002). Conclusion Every organization has a need for information security and control. Therefore, when designing and implementing the information system the management must ensure that it meets those needs. An assessment of the organization should be don e to find out the needs and get information that will help in addressing the needs effectively. The assessment includes assessing the assets of the organization, the threats it is facing and its vulnerable areas. As a result the organization becomes equipped with adequate information that can help it come up with effective treatment decisions and in the end these decisions are implemented. In addition, the system should be monitored and evaluated continuously to ensure that the system is actually meeting the objectives which it is meant to. References Alberts, C. J. and Dorofee, A. J. (2002). Managing information security risks: the OCTAVE approach. Upper Saddle River, NJ: Pearson Education. Calder, A., Watkins, S. and Watkins, S. G. (2010). Information Security Risk Management for ISO27001/ISO27002. Cambridgeshire: IT Governance Ltd. Isaca. (2010). CISA Review Manual 2011. Rolling Meadows, IL: ISACA. Kadam, A. (2002, September). Why Information Security is important for your organi zation: Network Magazine. Retrieved from networkmagazineindia.com/200209/security2.shtml Kouns, J. and Minoli, D. (2010). Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams. Hoboken, NJ: John Wiley Son. Roper, C. A., (1999). Risk management for security professionals. Burlington, MA: Butterworth-Heinemann. Vacca, J. R. (2009). Computer and information security handbook. Burlington, MA: Morgan Kaufmann. Whitman, M. and Mattord, H. J. (2008). Principles of Information Security. Boston, MA: Cengage Learning EMEA.

Tuesday, November 5, 2019

Cover Letter Writing Guide

Cover Letter Writing Guide When applying for a job, apart from your resume you should send your cover letter. Writing a great cover letter can get your foot in the hiring managers door, even if you dont have the perfect resume. Usually, there are only 2 types of cover letters – predictable and boring ones and the rare specimen† of cover letters that grab the hiring managers undivided attention and increase your chances of landing the job interview. Keep in mind that you need to accomplish these 4 aspects with your cover letter: Introduce yourself to the hiring manager. Explain why you should get the job. Write things you didnt describe in your resume. Give a short explanation of other aspects of your resume. Sections of ?over Letter In this regard, the standard format of the cover letter contains these 3 sections: 1. Contact Information At the beginning of your cover letter, you should write some personal information. In this section, you should briefly mention a basic info about yourself – degree, area of study/expertise, and your career goals (make sure that those terms align with the goals of the company). Tip: Find out to whom youre writing by researching. Use the companys official website, LinkedIn, or call the company and ask for the hiring managers name. Even if you write it wrong, the hiring manager will appreciate the effort youve made. 2. Introduction (self-promotion) In this section, its important to directly respond to the job description that hiring manager wrote. Explain how your skills, abilities, and previous job experiences can help you to meet the companys needs. The best way of doing this is by literally including words and phrases hiring manager used in the job description in your cover letter. Tip: Include a bulleted list of your accomplishments because that way your experience looks more impressive. 3. Conclusion The final paragraph is often called the call to action section of your cover letter. Inform the hiring manager that youre looking forward to meet in person. Write something like Thank you for taking the time to read my cover letter and thats it. Tip: Write that youll call or send e-mail in a week if you dont get back the response. That is a good way to show that you know how to take the initiative when needed. Cover Letter Page Format Congratulations! Now you have great content for your cover letter but your work isnt over yet. You should not forget about how your cover letter really looks and feels as its the document that gives hiring manager the first (and often the most relevant) impression about you. That is a very important aspect of the cover letter so you need to pay attention to elements such as font style and size, alignment, and margins. When it comes to the font style, its really a matter of choice. You should use a professional looking one that matches/or similar to the font used on the companys website. Standard font size is 10-12 depending on the font style you chose. Make sure that person who will read your cover letter will not strain the eyes. You should maintain a uniform alignment through the whole cover letter. Its the best to keep all paragraphs left-aligned. When we talk about margins, 1 – 1.5 margins are always a safe choice. If you are having troubles fitting everything on one page, you can make the margins little smaller but make sure not to make the content look crammed together. Formatting For Applicant Tracking Systems (ATS) An applicant tracking system (ATS) is a tool that most of the companies use during hiring process to make the reviewing applications faster. Its basically a software that works like some kind of resume database and sorts and organizes applications. Some of ATS are programmed to screen candidates based on the content you included in your resume. Conclusion If youve carefully read the guide above, you should be able to write a great cover letter. So, if youve responded directly to the job description, and included keywords and phrases from it in your own cover letter, you already have high chances of highlighting yourself among bunch of others. After all, your goal is to make the hiring manager to read your cover letter carefully. Your part is to write a great cover letter, in order to give you a higher chance of getting a job and if you feel like you need some help you can buy a cover letter from us. The rest is up to a hiring manager. Good luck!

Sunday, November 3, 2019

Telltale E-Mails Coursework Example | Topics and Well Written Essays - 250 words

Telltale E-Mails - Coursework Example He would not be let free from the ethical wrongdoings that he committed in the first place (Crosbie, 2008). I would have comprehended how the supervisor went out of his way to make his point apparent and the role of the police officer within the equation as it put my client (Drake’s) case into jeopardy. My arguments would be such that I will ask for a proper compensation for my client and the changes in the policy that the organization has whilst hiring individuals like Drake’s supervisor (Wood, 2011). Sav-Mart should improve its e-mail policy by incorporating a proper measure that lists down how works get done within the related domains. It would disallow any individual who is not a part of the intended e-mail to keep away from the same quarters. I would ask for a change within the stance that is adopted by the company at the present (Finn, 2010). This would mean that the organization will amend where it is going wrong, and work upon the tenets of harmony amongst understanding each other’s private zones and

Friday, November 1, 2019

Loyalty Programmes in Hotels Essay Example | Topics and Well Written Essays - 19000 words

Loyalty Programmes in Hotels - Essay Example This research attempts to achieve an insight into the value of loyalty programmes to businesses and more specifically examine the value of loyalty programmes to hotels. Review of secondary data is applied to understand the value of loyalty programmes to businesses while a survey among hotels is conducted to examine its value to the hotels. Loyalty Programmes are defined as â€Å"schemes offering delayed, accumulating economic benefits to consumers who buy the brand†. Satisfaction does not equal loyalty. A customer can be very satisfied with the product, but still be not loyal towards it. In order to encourage loyalty, firms develop loyalty programs. Typically, in a Loyalty Program, customers accumulate assets, points or rewards by accumulating their purchases from a local firm which is either exchanged for goods or the services, though not always associated with the firm. This generally adopts the system of points wherein the points can be exchanged for a variety of benefits s uch as free flyer points, gifts, trips, etc. â€Å"Airline frequent-flier programs have been a prototype for many of the schemes†. Such schemes are based on the concept of repeat purchase, and in most businesses today, a large part of sales results from repeat purchase. This fact is being increasingly recognized by enterprises that are implementing loyalty programmes to encourage such purchase pattern.  ... The literature in general helped in understanding various factors and concepts associated with loyalty programme and then those had to be applied to the hotel industry for the research. 34 3.4 Research Approach 36 3.5 Research Strategy 38 3.6 Sample selection 41 3.6.1 Administering the questionnaire 41 3.6.2 Analyzing the responses 43 3.7 Time Horizon 43 3.9.1 Reliability 47 3.9.2 Validity 48 Limitations 49 50 Ethical Considerations 50 4. Analysis and Discussion of Findings 51 4.1 Hotels' definition of loyal customers 52 4.2 Reason for launching loyalty programme 53 4.3 Target segment and benefits offered 55 4.4 Designing loyalty program for corporate segment 58 4.5 Loyalty programmes that attract maximum guests and justify expenses 59 4.6 Objective of loyalty programs 61 4.7 Managing loyalty programme 63 4.8 Delivery mechanism 64 4.9 Involving staff 65 4.10 Assessing the success of loyalty programme 66 4.11 Failure of loyalty programme 70 5. Recommendations 72 Introduction Brief overview and background This research attempts to achieve an insight into the value of loyalty programmes to businesses and more specifically examine the value of loyalty programmes to hotels. Review of secondary data is applied to understand the value of loyalty programmes to businesses while a survey among hotels is conducted to examine its value to the hotels. Loyalty Programmes are defined as "schemes offering delayed, accumulating economic benefits to consumers who buy the brand". Satisfaction does not equal loyalty. A customer can be very satisfied with the product, but still be not loyal towards it (Charles and Lamb, 2008).In order to encourage loyalty, firms