Friday, May 31, 2019
Jane Eyre: Imagery :: essays research papers
Jane Eyre ImageryJane Eyre tells the story of a woman progressing on the path towardsacceptance. Throughout her journey, Jane comes across umteen obstacles. Maledominance proves to be the biggest obstacle at each stop of Janes journeyGateshead Hall, Lowood Institution, Thornfield Manor, Moor House, and FerndeanManor. Through the progression of the story, Jane slowly learns how tounderstand and entertain her repression. I will be analyzing Janes stops atThornfield Manor and Moor House for this is where she met the two most importantmen in her life. The easiest way to compare and origin Rochester and St. JohnRivers is by examining when and under what circumstances these two gentlemencome into contact with Jane.It is at Thornfield Manor that Jane first encounters Mr. Rochester. Whileliving at Thornfield, Rochester demands undivided direction from the servants,Jane included. He needs to be in control of every aspect of his life, and heneeds to feel superior to all of those around hi m. Jane de cides to accept hiscontrol and she concedes to him by calling him sir, even after they begin tohave an intimate relationship. At one point, she even goes so far as to excuseherself for thinking. She says, "I was thinking, sir (you will excuse the ideait was involuntary), I was thinking of Hercules and Samson with their charmers"(p.289). This statement possibly begins to suggests Janes unsatisfaction withRochesters position of complete dominance in their relationship. To Jane,Rochester embodies the idea of love which she has so long been denied of. As Istated earlier, the whole movie is about Janes journey towards acceptance, byherself and by others. It is this journey which persuades her to move on whenshe finds Rochesters physical and secular love unacceptable.Janes next stop on her journey is Moor House. Here, she meets St. JohnRivers, her cousin. Unlike Rochester, St. John is portrayed as the ultimatesacrificer, willing to do anything for others, no matter how undesirable thetask might be. St. John also expects this sacrifice from Jane, and she mustdecide whether to accept his proposal. At this point in her journey, Janeunderstands that her search for herself push aside not be accomplished without reallove. She denies St. Johns marriage proposal by saying, "I have a womansheart, but not where you are concerned for you I only have a comradesconstancy a fellow soldiers frankness, fidelity, fraternity. . .nothingmore." (p.433). She knows real love can not be given to her by St. John and she
Thursday, May 30, 2019
Analysis of Harlem by Langston Hughes Essay -- Harlem Langston Hughes
Analysis of Harlem by Langston HughesThrough the turbulent decades of the 1920s d one(a) the 1960s many of the black Americans went through difficult hardships and found comfort only in dreaming. Those especially who lived in the ghettos of Harlem would dream about a better place for them, their families, and their futures. Langston Hughes discusses dreams and what they could do in one of his poems, Harlem. Hughes poem begins What happens to a dream deferred...Hughes is asking what happens to a dream that is being put off. What do these dreams do, do they do good, do they do bad, or do they do neither good nor bad? He continues by stating this parableDoes it dry up like a raisin in the sun? Using this simile he is stating that dreaming can be good or bad. A raisin is a grape that has been dehydrated by the sun. Hughes is conveying that dreams can suck the life story out of a person, mentally dehydrating them. However a raisin is not necessarily bad. When the grape is dehydrated by the sun it turns the grape into a raisin, a lovable and delightful friut which can furnish ...
Wednesday, May 29, 2019
Essay --
Everglades National Park is sanction to some of the most exceptional animal and plant ecosystems. From the tall, sunny rock pinelands to the humid, riotous hardwood hammocks to the tropical, sawgrass marsh, the everglades is believed to be one of the most diverse and astonishing ecosystems in the United States. Sounds of birds tickle your eardrums, beautiful flowers bloom in the radiant morning sun, animals graze peacefully as they go about their day in their natural habitat. It is a breath taking sight and the most popular place for sightseers to go maintain the wildlife or kick back and relax and take in the soothing fresh air. As you travel deeper into the hammocks you start to notice over population of sure plants. These types of plants are called invading species, which are plants that are brought form other countries and other ecosystems and inserted into the everglades ecosystem. These plants begin to take over the everglades and eventually kill off and prevent congenital plants from growing. Plants like the Brazilian pepper, which kills all surrounding vegetation and can cause skin irritation, are of the highest threat to the everglades. They currently cover about 700,000 acres of trade union and southern Florida, and about 400,000 acres just in the Everglades National Park. Roughly 18,000 plants species are native to the numerous ecosystems of North America. Our native flora, United States native plants, allocates the stem of the historic American landscape and determines the diverse ecosystems and regions of our country. These plants also supply natural sources of food, fiber, and other elements that we rely on for everyday life. The communities of various native plants have been significantly minimized as a result of ... ...r controlled activities. Natural upheaval such as fires, floods, tornadoes, and tree falls also win way for invasive species to grow. The long change brought upon the Florida landscape over the last few hundred years ha s set things out of balance. Without exotic species, native species and ecosystems would normally benefit from natural disturbances because they provide a chance for genetic mixing and nutrient recycling to occur.In early 2008, Florida Fish and Wildlife Conservation Commission and Everglades National Park joined in concert to initiate a Florida Invaders, a program used to raise awareness about whats being done and what we should do to help stop invasive flora and fauna from spreading. The program was a good start but they should further raise awareness of the seriousness of the problem, said Christine Beck, Ecology teaching assistance and FIU.
Social Media and its Influence on our Youth Essay -- Twitter, Facebook,
The correlation between the development of youth and amicable media has buzz off blatant. Although few of the consequences are favorable, the majority have displayed a negative impact. The drive social media can implement on youth is exceptional. The pressure and strain social media can place on our youth is an enduring force which leads individuals to question themselves as a person and feel inclined to fit a norm expressed in media and social media of our society. The underlying force social media can play in the lives of the youth is astonishing and is a force that must be dealt with and controlled, for it not only holds the power to give an individual strength, but also to break them down.Social media is described as content created and shared by individuals on the web using freely available websites that allow users to create and post their own images, video and text information and then share that with either the undefiled internet or just a select group of friends (Affilor ama, 2012). They are more like a website allowing you to express your daily activities, beliefs, locations, likes, dislikes, photos, music, etc. They are employ by creating a profile, and logging in through either the website, or apps now used on smartphones, or any portable device with Wi-Fi connection. Although more or less social media networks are directed towards adults and young adults, young children are getting into these websites as well. There are usually age limits but there isnt a certainty that all the users provided their actual age, allowing whoever wants to be a member of these sites to bypass an age limit security procedure. Facebook and MySpace require users to be at to the lowest degree 13, but they have no practical way to verify ages, and many young users prete... ...he Impact of Social Media on Children, Adolescents, and Families. Retrieved whitethorn 14, 2012, from Official Journal of the American Academy of Pediatrics http//pediatrics.aappublications.org /content/127/4/800.fullRon, C. (2010). What is the purpose of LinkedIn and how can it help expand business? Retrieved May 15, 2012, from LinkedIn http//www.linkedin.com/answers/marketing-sales/sales/lead-generation/MAR_SLS_LGN/764379-73067709Thomas, T. (2012). 30 Statistics about Teens and Social Networking. Retrieved May 13, 2012, from Top Ten Reviews http//facebook-parental-controls-review.toptenreviews.com/30-statistics-about-teens-and-social-networking.htmlWikipedia.org (2012). Facebook. Retrieved May 11, 2012, from Wikipedia http//en.wikipedia.org/wiki/FacebookWikipedia.org (2012). Twitter. Retrieved 05 11, 2012, from Wikipedia http//en.wikipedia.org/wiki/Twitter
Tuesday, May 28, 2019
DEPRESSION Essay -- essays research papers
Advertising.com COSHE.COM uncategorized large(p) DepressionGreat Depression The Great Depression was a disastrous business natural depression that affected millions of mass throughout the entire United States. It began in 1929 and continued on, to some degree, untilClick Here to Search COSHEs Database AgainGreat DepressionThe Great Depression was a disastrous business slump that affected millions of people throughoutthe entire United States. It began in 1929 and continued on, to some degree, until 1939. People baffledtheir jobs, and families lost their homes. The country was in total chaos. Some believed thatAmerica could never totally recover.There were several factors that contributed to the start of the Great Depression. One of them wasthe crash of the line market. It was 1929, and Republican Herbert Hoover had just been recentlyelected. During the previous few years, the stock market had been steadily rising, and everyonewanted their piece of the profits. By this time, ove r 1.5 million people owned stock in variouscompanies. People in every kind of financial situation owned stocks. It seemed that it was an easyway to make money, and close investors were getting rich. The stock market reached its all-timehigh on September 3, 1929. This caused up to now more than people to buy stock. In October of 1929,however, the stock prices slowly began to decrease. This did not bother the stockholders that muchbecause they just figured that the stocks would go back up like they always did. Unfortunately,these predictions were terribly wrong. On the 24th of October, the stock market plummeted.Shareholders speed to sell their stocks as quickly as possible, but they found no buyers. The 24thcame to be k directlyn as "Black Thursday." Five days later on there was a "Black Tuesday." That waswhen more than sixteen million stocks were sold at a great loss. One stock had dropped from onehundred dollars to exactly three dollars per share. The Presiden t and the bankers tried to assurepeople that there was not a crisis and that it was only a temporary situation, but they could not havebeen more wrong. When the stock market crashed, it upset the whole economy. Because the stockprices were so low, no one would invest in them. This meant that the large and small companieswho depended on the stockholders support now had major financial problems. Thousands o... .... President Franklin D. Roosevelt had truly done what the American people so desperatelyneeded. He helped save the United States from the worst and most desolate depression in thehistory of the nation. He had become a national hero, and grew to be so popular that he won theelection of 1936 by an even greater majority than the previous one. When the United States enteredWorld War II, unemployment nearly disappeared. Industries became busy again trying to keep upwith the war material orders and numerous young people entered the armed forces to fight for freedom..The damage f rom the Great Depression that Roosevelt and his "New Deal" could not fix, the warcertainly did. Several insights can be learned from the Great Depression. Perhaps the biggest one isthat the United States government can positively influence the economy by creating massiveprograms. Also, that many Americans have the pure tone of compassion which is necessary in order toprovide for the less fortunate. Perhaps the greatest lesson taught was that no matter how big theproblem, there is always hope for a solution, as long as there is determination, devotion, and acommitment to solving that problem.
DEPRESSION Essay -- essays research papers
Advertising.com COSHE.COM uncategorized heavy(p) DepressionGreat Depression The Great Depression was a disastrous business slump that affected millions of great deal throughout the entire United States. It began in 1929 and continued on, to some degree, untilClick Here to Search COSHEs Database AgainGreat DepressionThe Great Depression was a disastrous business slump that affected millions of people throughoutthe entire United States. It began in 1929 and continued on, to some degree, until 1939. People garbledtheir jobs, and families lost their homes. The country was in total chaos. Some believed thatAmerica could never totally recover.There were several factors that contributed to the start of the Great Depression. One of them wasthe crash of the caudex market. It was 1929, and Republican Herbert Hoover had just been recentlyelected. During the previous few years, the stock market had been steadily rising, and everyonewanted their piece of the profits. By this time, over 1.5 million people owned stock in variouscompanies. People in every kind of financial situation owned stocks. It seemed that it was an easyway to make money, and roughly investors were getting rich. The stock market reached its all-timehigh on September 3, 1929. This caused unconstipated much people to buy stock. In October of 1929,however, the stock prices slowly began to decrease. This did not bother the stockholders that muchbecause they just figured that the stocks would go back up like they always did. Unfortunately,these predictions were terribly wrong. On the 24th of October, the stock market plummeted.Shareholders move to sell their stocks as quickly as possible, but they found no buyers. The 24thcame to be k instantern as "Black Thursday." Five days subsequent there was a "Black Tuesday." That waswhen more than sixteen million stocks were sold at a great loss. One stock had dropped from onehundred dollars to exactly three dollars per share. The President and the bankers tried to assurepeople that there was not a crisis and that it was only a temporary situation, but they could not havebeen more wrong. When the stock market crashed, it upset the whole economy. Because the stockprices were so low, no one would invest in them. This meant that the large and small companieswho depended on the stockholders support now had major financial problems. Thousands o... .... President Franklin D. Roosevelt had truly done what the American people so desperatelyneeded. He helped save the United States from the worst and most scourge depression in thehistory of the nation. He had become a national hero, and grew to be so popular that he won theelection of 1936 by an even greater majority than the previous one. When the United States enteredWorld War II, unemployment nearly disappeared. Industries became busy again trying to keep upwith the war material orders and umteen young people entered the armed forces to fight for freedom..The damage from t he Great Depression that Roosevelt and his "New Deal" could not fix, the warcertainly did. Several insights can be learned from the Great Depression. Perhaps the biggest one isthat the United States government can positively influence the economy by creating massiveprograms. Also, that many Americans have the feeling of compassion which is necessary in order toprovide for the less fortunate. Perhaps the greatest lesson taught was that no matter how big theproblem, there is always hope for a solution, as long as there is determination, devotion, and acommitment to solving that problem.
Monday, May 27, 2019
Service Above Self
Ever since I was a child, my teachers, friends, parents, and family have everlastingly complemented me for my assortmentheartedness, determination, and of course my leadership. I have never been one to judge others, I always stimulate hard in every social function I do, and love being able to be in charge. My morals were built by large number that surround me, specifically family. My mom has always taught me that everyone is the same and not one person is better than the next. This is something that has followed me throughout my life and is still one of my main priorities. I take outstanding pride in being pen-minded and kindhearted, because I see that most of the problems we have today is because of certain groups of people feeling more superior than another, and peoples lack to do good for others with no benefit for themselves. Another problem that is here is people are not determined to fix the problems that our nation has and instead work well-nigh them. I am not one to wal k around or run away from a problem, but I am determined to work hard and to not only get rid of the problem but take initiative to benefit sure it does not happen again. I cerebrate that if everyone lived with this, the world ould become a better place by the minute. Unfortunately, the opposite is occurring at the moment and new problems emerge as time goes by. I am very proud of being a leader rather than a follower for many another(prenominal) reasons. One, it gives me the opportunity to express my views, beliefs, morals, and concerns. Two, I continually try to make a difference in society for a greater good, and lastly, it gives me individuality in a good society. This good society is a major instrument in many of todays problems. People tend to do what other people do, even if it is against their personal views. This leads to many problems because leaders with the wrong ntentions can easily be followed by those who are afraid of being their own person and leadership. I am p roud to be a kindhearted, determined leader and have demo it in more ways than one. During my years in high school, I have led my football team to greater heights by reservation the play despatchs for the first time in many years, they also helped me to be the first male All-State player in schools history. I also helped lead my schools basketball game team win the schools first state championship in any sport. I have shown my leadership around the school and was granted the honor to be Mr. EMCA this ward is based on a students excellent Christian testimony, attitude, extracurricular involvement, and overall best represents the school and what we believe in. The award is given to one male in the senior class chosen by the faculty, staff, and administration. I love that I have been said to be a great person and that many people look up to me. I work a lot at my church also by ushering and helping keep the church clean on work days. In The Bible there have been many instances of people using service supra self want in Mark 129-39 Jesus used service above self From church, they went straight home to Simon and Andrews house bulky with James and John. They told him that Simons mother-in-law was in bed with a fever. But when he came in, he took her by the hand and she got up, the fever gone, and began to serve them. That evening, as the sun set, people started bringing their sick and deranged to the door the whole city turned out and he cured many with various illnesses and cast out many demons, but without allowing them to speak they knew him. The next morning at O-dark thirty, Jesus got up and went out to be alone in prayer. But Simon and the others tracked him down and told him, Everyones out looking for you. He said, Lets head out to the next few towns and get the word out there. Thats my mission. So off they went, all over congiusilee, speaking in churches and expelling demons. Also Gal 513 For, brethren, ye have been called unto autonomy only use not liberty for an occasion to the flesh, but by love serve one another. God is telling us to serve others not just oneself. Also in Gal 514 For all the law is fulfilled in one word, even in this Thou shalt love thy populate as thyself. God tells us to love our neighbors. Or in Gal 514 For all the law is fulfilled in one word, even in this Thou shalt ove thy neighbour as thyself. or Gal 522 But the fruit of the Spirit is LOVE, joy, peace, LONGSUFFERING, GENTLENESS, GOODNESS, faith. There are many other verses in the bible like Mark 1043-45 But so shall it not be among you but whosoever will be great among you, shall be your minister And whosoever of you will be the chiefest, shall be servant of all. For even the Son of man came not to be ministered unto, but to minister, and to give his life a ransom for many. and 1 Cor 134-7 Charity suffereth long, and is kind charity envieth not charity vaunteth not itself, is not puffed up, Doth not behave itself unseemly, eeketh not her ow n, is not easily provoked, thinketh no evil Rejoiceth not in iniquity, but rejoiceth in the truth Beareth all things, believeth all things, hopeth all things, endureth all things. and 1 Thes 13 Remembering without ceasing your work of faith, and labour of love, and patience of hope in our Lord Jesus Christ, in the sight of God and our Father. In all of these verses, it shows that service above self is a very important thing to know and do. I really do hope that more people start to use service above self in this world.
Sunday, May 26, 2019
Preventing Central Line Blood Infections Health And Social Care Essay
National Patient Safety Goals ( NPSG ) were introduced in 2002 in order to dish up turn to some of the issues that were responsible for doing a bulk of the state of affairss that were responsible for making patient safety issues. These ends were implemented in order to set digest on what were deemed to be the most preventable of these issues. One of these ends is the bar of cardinal sop up-associated blood watercourse infections ( Lyles, Fanikos, & A Jewell, 2009 ) .Literature ReviewCentral venous catheters ( CVC ) be indispensable in the circumspection of critic totallyy sick patients. While widely utilized the usage of CVC is non without hazard. Catheter-associated blood stream infections ( CA-BSI ) are common healthcare-associated infections in intensive attention unit ( intensive care unit ) patients and have been estimated to happen in 3 % -7 % of all patients with CVC ( Warren, et al. , 2006 ) . It is good documented that intravascular catheter cerebrate complications ar e associated with widening hospital length of stay, increa render direct cost and increasing ICU mortality. Clinicians insert about 7 one thousand million cardinal venous entree devices ( CVAD ) yearly in the United States, and of these, 1 in 20 is associated with a CA-BSI, despite the usage of the best available sterile techniques during catheter interpolation and care. Overall, an estimated 250,000 CVAD-related CA-BSI occur yearly, with an attributed mortality of 12.5 % to 25 % per happening. The national cost of handling CA-BSI peers $ 25,000 per infection, severally, or $ 296 million to $ 2.3 billion in entire. While the figure of CA-BSI has remained comparatively steady, vascular entree device usage has drastically increased, particularly in nonhospital scenes ( Rosenthal, 2006 ) .A huge substance of research is directed toward cut downing these complications in an attempt to better patient outcomes. A reappraisal of the literature provides an overview of current recommendati ons refering intravascular catheter attention and research sing the usage of financial statement excogitations to advance recommended pattern.The Centers for Disease Control and Prevention ( CDC ) published the Guidelines for the Prevention of Intravascular Catheter-Related Infections in 2002, which is the benchmark for all intravascular catheter attention recommendations. The guidelines for CVC suggest the re piazza of dressings every 7 yearss or when soiled or loosened, endovenous tube alterations every 72 hours, and the replacing of tubing used to administrate blood merchandises and lipid emulsions within 24 hours of extract induction ( East & A Jacoby, 2005 ) . Harmonizing to the CDC, about 53 % of grownup patients in intensive attention units have a cardinal venous catheter on any given twenty-four hours ( Rupp, et al. , 2005 ) .Skin cleaning of the interpolation site is regarded as one of the most of import steps for forestalling catheter-related infection. Historically, povidone-iodine is an disinfectant that has been used during the interpolation and care of the intravascular devices. It works by perforating the cell wall of the micro-organism. More late, chlorhexidine has been studied and found to be more effectual as a skin antiseptic to forestall catheter-related infection. It works in less clip, retains its antibacterial consequence against vegetation thirster, is non inactivated by the presence of blood or human protein, and causes tokenish skin annoyance. Chlorhexidine works by interrupting the microbial cell wall. It is active against many Gram-positive and to a somewhat lesser degree Gram-negative bacteria ( Astle & A Jensen, 2005 ) .A multistep procedure is recommended to forestall CA-BSI that includes educating staff, utilizing maximum barrier safeguards ( e.g. a unimpregnated gown and baseball mitts, mask, cap, and big unfertile curtain ) , executing infection surveillance, and replacing occlusive dressing every 7 yearss or when nee ded ( Buttes, Lattus, Stout, & A Thomas, 2006 ) . Other strongly recommended patterns include proper(ip) manus hygiene by all staff using the CVC and turning away of everyday catheter alterations. Catheters impregnated with antimicrobic agents are recommended when infection rates are high or when catheters will stay in topographic point for a considerable clip ( Krein, et al. , 2007 ) . Education of staff on the proper attention of CVC is paramount in cut downing the entirety of CA-BSI. This is possibly one of the most cost-efficient methods of cut downing CA-BSI ( Ramritu, Halton, Cook, Whitby, & A Graves, 2007 ) .ExecutionA staff instruction purpose was initiated for the nursing forces that chiefly deal with CVC. This instruction plan was aimed at developing the ICU and step-down unitaaa?s nursing staff proper attention and care of the CVC. Education focused on proper attention of the CVC, including when dressing alterations should be performed e.g. every 7 yearss or when the dressing is soiled. Nurses were besides trained in how to suitably help with CVC arrangement and the certification legal instrument that infection control utilizes to measure attachment to interpolation guidelines. Posters were besides placed in the nurseaaa?s interruption and conference countries that had educational stuff related to proper attention of CVC. Documentation was besides placed in the physicianaaa?s lounges that bucked up use of maximum barrier safeguards during CVC interpolation.The installation that was observed without delay utilizes a few different agencies of measuring with respects to CA-BSI. First, a checklist is utilised during CVC interpolation that evaluates attachment to interpolation guidelines by the staff. This checklist is sent to infection control and entered into a database which is correlated with patient informations sing CA-BSI. Second, in patients that are identified as holding a CA-BSI, after catheter remotion, laboratory microbiological survei es of the catheter, blood, and interpolation site swabs are performed to place causality of the infection.Execution Compared to Literature SuggestionsPractices that cut down the hazard of CA-BSI include the undermentioned ( 1 ) usage of maximum barrier safeguards during CVC interpolation ( i.e. , a surgical mask, unfertile gown, unfertile baseball mitts, and big unfertile curtains ) , ( 2 ) arrangement of the catheter in the subclavian vena instead than the internal vena jugularis or femoral vena, ( 3 ) altering catheters merely when necessary, and ( 4 ) altering dressings on CVC issue sites when they become nonocclusive, soiled, or bloody. These patterns have been incorporated into national guidelines. Presently, the Healthcare Infection Control Practices consultive Committee ( HICPAC ) of the Centers for Disease Control and Prevention ( CDC ) recommends that infirmaries implement comprehensive educational plans that teach proper CVC interpolation and care techniques ( Warren, et al. , 2006 ) . These patterns are largely in line with what is implemented at the ascertained installation. One difference, which is non in line with these recommendations, is that the ascertained installation has a high figure of internal jugular interpolations compared with the figure of subclavian vena interpolations. When asked about this, many of the doctors stated that entree was easier to place utilizing ultrasound during interpolation and they preferred this method over subclavian interpolation.Recommended ChangesFirst, execution of an instruction plan for suppliers that is focused on infection control, particularly the recommendation of using the subclavian vena interpolation for CVC arrangement as a first pick in patients that have no contraindications to this arrangement. Second, securing the second-generation antiseptic catheter, coated with chlorhexidine and Ag sulfadiazine on the internal and external surfaces, to more efficaciously prevent microbic colonisation in pat ients that are identified as being at hazard. Decreased bacterial colonisation, a critical measure in the pathogenesis of catheter-associated infection, may correlate with bar of catheter-related bacteriemia ( Rupp, et al. , 2005 ) . Third, instruction and preparation demands to be expanded to any nurses that may be responsible for caring for a patient with a CVC. These countries include non-critical attention countries such as paediatric and medical floors. Larger Numberss of patients with CVC are now found in non-ICUs than in ICUs and that CA-BSI rates in those scenes are higher. Catheter types and interpolation sites vary greatly among scenes. For illustration, jugular and femoral interpolation sites are common in ICUs subclavian and peripheral sites are more common elsewhere. So schemes for cut downing CA-BSI must be tailored to the scene ( Hadaway, 2006 ) .
Saturday, May 25, 2019
Erpsim Game Report for Distribution Game
Final analyze and Game describe of ERPsim Distri thation Game To Dr. Shirley Stretch-Stephenson Group C H Members pin Huang Ankit Sethiya Ken Chen Yuankai Wang (GS) aft(prenominal) 2 trial b extincts of ERPsim distribution game, our group got rank 2 out of 4 groups (actu from each nonpareil(prenominal)y climbing from rank 3 to 2). So e actu totallyyone in the group is full confident slightly the real game running in the upcoming week. After several discussions, we settled down our objective as the first trafficker of harvest-homes 1L&500ml ClearPure bottled water. But the result coming from real running game is really out of eachones expectation.And the truth that we got rank 3 on Net Income be is some kind of shock on everyones mind. From my point of view, though, it is a great opportunity for us to look into all the operations and strategies we utilise, analyze all the proper(ip)s and errors we made, discuss all the situation each member got into, perfect our realisel edge and experience background on SAP ERP system. It is a failure, at the same duration, is besides a givengift. In this floor, we give analyze the firm food grocery store as headspring as our compeverys functioning throughout the game.By comparing ourselves to the foodstuff, to the competitors, the differences depart unveil the reasons which part we did right, which part we made errors. Following the securities industry analyze is our sign group objectives and dodge. Then we use section discrepancy to show the differences amongst our results to the objectives. After that, we analyze the unanimous group mathematical operation during the game by integrating the reports from each member. For results analysis section, we conclude all the problems we were facing and all the errors we made.Last but not the least, is the summary summarize concluding the intact reportvaluable lessons we got from this ERPsim game. Market Analyze For the whole market, we leave alone use sev eral charts below to show the market collects in different termsperspectives. By products pic Chart 01 tote up sales revenue for each product after 3 turds From the chart 01, we brush off clearly rede that the 1L & 500mL ClearPure argon the major products on the market. They totally took 79. 35% market sh be of bottled water, within this 79. 35%, 1L took 42. 46%, and leaves 500mL occupied 57. 54%.So the 500mL ClearPure is the best product in this distribution game and 1L ClearPure follows closely. It is the same story when you check the quantities of each product ex flip on market in chart 02. By aras pic Chart 02 Total sales revenue for each theater after 3 fourth parts From chart 02, we can conclude that the area has soaringest demand for bottled water is zero(prenominal)th area due to its highest sales revenue of $796622. 67, followed by West and South areas. By Competitors pic Chart 03 Sales performance of each group in every quarter From the chart, we discovered all the groups as internal competitors in the classroom only took 54. 5% market share of the whole market. The stick 45. 95% has gone to those outdoor(a) competitors bottled water importer companies. Due to we didnt retain the total sales revenue for each quarter of the whole market, it is impractical to draw any conclusion on the performance of us our company quarterlyfor each quarter. But from the chart, all the teams together here has a simileally steady contribution to the market throughout 3 quarters. And down the stairs this condition, we can start to compare the performance of each team in every quarter. Group Objectives and Game Roles ReviewPerformance Objective Our goal is to be the No. 1 distributor on sales of the product ClearPure bottled water (including 1L and 500ml) in Germany. The operational objective is tutelage the rolling turnover rate of ClearPure as debauched as we can. That means we should maintain adjusting our B-01 and B-04 products wrong according to plan and having a steady fall take aim on these two products. Financial goal is keeping the gross beach over all of our products exceeds 7% in last time we played. Game Role Set Ankit oversee the Reporting transactions report the situation every five daytimes.Iris adjust price of products in the Decision transactions. Ken track Accounting transactions and make bargain for vagabonds. GS follow operative transaction, calculate requirements and forecasting. Discrepancies From the results of each round, our group got rank 4th after round 1st, 3th after round 2nd, and stayed in that rank after round 3rd. The result is simply anyones expectation on that point. So, what are the differences and how those differences showed up as results of our game performance? In this section, let us first figure out what are the differences between our results and the objectives.From our Professor Dr. Stretchs final report, we got full financial information for each round of the game. pic pic p ic Comparing the afterwards performance to our objectives and chart 03 in Market Analyze section, our group found out that speaking of our master(prenominal) goal No. 1 portion outer of 1L&500mL ClearPure products we only achieved it during quarter 2 (without erudite how much importers sold in quarter 2), but failed on overall, and totally failed on the goal of financial objective to keep 7% gross allowance after 3 quarters due to the negative exculpate loss we go through.So how and why we come to this situation, what kinds of mistakes we made affected our companys performance? Are there any good methods leftimprovements we could make if there is an other(a)(prenominal) chance? Analyzing the Game In this section, we will analyze each group members performance throughout 3 quarters according to his/her role in the game. Some methods we were taking should stay as a good model for future day reference some methods should refer as a lesson we l benefitt. Planning GS in our group is in bam of forecasting and prep purchase nightspots in the whole game.The basic rule of this player is to go steady the reports data from member overseeing the market and calculate then predict the future market demand as well as plan the var. level. In Quarter 1 Our Goal Earn enough shekels and make accepted(a) we have enough express level at the lineage of quarter 2 since no procurement could be done in quarter 1. From the start, each group has 1000 units on each product. As prepared, GS (me) set the stock level of products B-01, B-04 (ClearPure) to 1500 units, the rest got 500 units.Due to the inability to make procurement order (as we understand in that way at that time, here is our major and most lethal mistake), there is not much I can do in this quarter. By following up the market report, I helped Ankit calculate the amount market price from the report. Our sales were very slow during that time even Iris constantly decrease the price point by bit. Only after ove rhearing other groups started to make purchase orders for inventories, we started to realize the procurement system under menu round2&3 can be used to increase stock level in round 1.I directly made my plan into purchase orders and let Ken to process the first purchase order on day 17. In Quarter 2 Our Goal Sell as many as BO1 and BO4 as we can and also clear the stocks of the rest 4 products (here is our second big mistake) at the same time. In this quarter, my role was trying to decide the reasonable stock level for each of the product. To decrease the accounts due liability, I chose 1000 units instead of 1500 for our main products B-01, B-04, left 500 units as the target level for the rest products.The truth is except B-01 and B-04, there is no any other product will have a stock level even close to 500 in the first 10 days of round 2. After the dreadful sales revenue from quarter 1, Iris directly dropped the prices closing to the approach (this is the move we should apply in r ound 1), and the sales hustle broke loose. The sales were flying I was so busy trying to figure out when I should make the purchase order standby. Fortunately, the tight piddle didnt break me and Ken. We managed always keeping our inventories for our main products over 300 units (This is a pretty wise move to keep it over 300 units. ).Due to the temperament of procurement system, if we started the purchase after the inventory dropped down to 300, when sales order larger than 250 came in we would face a limit of time running out of inventory. If we started the purchase before the inventory went below 500, we would have a larger account payable and inventory cost when round was finished. At the later 10 days of quarter 2, I changed the stock level to 800. Although this would increase the risk of running out of inventory, we could have tellingly low cost on main products, which directly increase our net income (although it is trivial to the losses on the cost of other products).Ne ar the discontinue of quarter 2, Ken spotted the inventory of B-06 500mL Sprintz was close to under 200 units. Thus he noticed and urged me to make a purchase order on it. I made the stock level of 300 units for that product and finished the purchase order (Here is another direct hit on our net income performance. Without this purchase we will decrease our net loss by $3844. ). In Quarter 3 Our Goal All products had to be sold out and make maximize profit from BO1 and BO4 (Our terzetto major error to consider the initial inventory will not reflect on the balance sheet. ).During quarter 3, the role for play was the same as in quarter 2. But I set an even begin stock level of 500 units later 300 units to B-01, 04 in order to achieve a lowest ending inventory on them. This would dramatically increase the difficulty of predicting when I should proceed the purchase order. Meanwhile it can give us a hope when the time reaches day 20, our inventory would be precisely close to zero. The plan was working, lilliputian by little our inventory dropped to around 300 units. Then I adjusted the stock level to 150 units as the sale speed started slowing down.At the end, we had 9 units of B-01 and 30 units of B-04 left in inventory. Procurement Ken is the man in charge of procurement. His role mainly involve him to follow the planned stock level and inventory level, and decide when is the best time to finish one purchase order is. In Quarter 1 During the first quarter of the Game, our groups product inventory did not significantly fluctuate since we set a relative high price to them and hoped this strategy could save some inventory for adjacent quarter.Nonetheless, from the sales report of quarter 1, our group failed to acquire any market demand in day 7, 8, 18, and 19. It is such a factor that renders to us ranking the 4th in both sales and net income in the first quarter. Although we well-kept a reasonable stock level in the first quarter, Ken suggested us to lower th e product prices in day 8 since bottled water is a price- containn product that retailers tend to choose the lower price while purchasing, though we didnt follow. In Quarter 2 Ken didnt finish any purchase order in quarter 1.Our first procurement delivered on day 21 quarter 2. Since then, whenever B-01, B-04s inventory dropped to below the stock level at a certain rate, Ken would finish one purchase order to stay us in the competition. Ken and I had a very good time working together. We managed to keep inventory level away from zero but also had enough stock to sale except the purchase of B-06 500mL Sprintz 300 units. From our point of view, procurement is more like a delicate job than a difficult one as long as you got right stock level to maintain, though this job requires lots of efforts on requiring information.During quarter 2, Ken finished dozens of purchase orders. The first one is the biggest one of them all, as time passed to later half, the purchase orders became smaller because it the human activity purchased is the difference between your planned stock level and present inventory level. In Quarter 3 In quarter 3, the main purpose of procurement was to closely follow the order from planner and together keep the inventory level gradually lower down to zero. Ken just did that. Each time when I adjust the stock level of the main products, Ken would know the best time to replenish.When we passed the middle of day 10, the inventory level was around 300 for each product. At day 15, still in a tight purchase schedule, Ken was doing a great job to reduce the inventory level by increasing purchase frequency. At day 17, Ken stopped purchasing any more orders, and we were sitting on a very healthy inventory of 150 units. There we come to the final inventory level as chart 04 is showing. pic monetary value Iris is in charge of all the price adjustments due to her experienced retail background. As our professor pointed out, bottled water is a commodity highly dainty to its price strategy and adjustment.So, in this section, we analyzed all our adjustments as well as the market average price based on the information Iris recorded. In Quarter 1 Our Goal Earn enough profit and make sure we have enough stock level at the beginning of quarter 2 since no procurement could be done in quarter 1. Pricing Strategy Skim Premium Pricing Strategy, we set the prices high in the beginning and reduce prices periodically, to maintain the inventory level for quarter 2. Price Setting We set the high profit margins and try to keep the quantities we sell to make sure we would earn enough profit.Since every team have the same 1,000 Initial stock for each of the 6 products for the first 20 days, the orders can only be purchased in the beginning of the Quarter 2, and invite 1-3 days to the stocks and the market demand for the bottle water is high, so we set the prices a little bit higher to make sure we have enough inventory to last 20 days. Then we reduce p rices periodically, to attract more retailers. The prices for both sizes of the ClearPure are higher than the initial prices and the prices for all flavors and all sizes of Sprintz and crumb Sprintz are lower than the initial prices. Material $$-B01 $$-B02 $$-B03 $$-B04 $$-B05 $$-B06 Name 1L ClearPure 1L squeeze out 1L crumb Spritz 500mL ClearPure 500mL Spritz 500mL Lemon Spritz Cost $11. 99 $14. 99 $16. 99 $16. 99 $19. 99 $22. 99 Initial price $14. 99 $17. 99 $19. 99 $19. 99 $22. 9 $25. 99 Our price $16. 59 $16. 99 $17. 99 $22. 59 $21. 99 $23. 99 Chart 05 The prices for the D1 of Q1 Price adjustment The prices adjustment is based on the uncommitted stock, the market reaction and the market average price (Here is another mistake we made. ). 1. If the product sells too fast, we would increase the price a little bit, to make sure we have enough stock for 20 days. For example the bestselling item BO1, was marked up 58% from the cost, but sold out 55 units and brought us $385 net profit.But it was most profitable with the 38% mark-up. 2. If the inventory is static for more than 2 days, we would mark down the price, close to the cost or even lower the cost to create sales revenue. Especially for product BO2, BO5 and BO6, the market less favorable products, we marked down their price even lower than the cost, in order that we would not left lots of inventory in the Quarter 3. harvesting BO1 prices changes and relative factors in the Q1 pic Product BO2 prices changes and relative factors in the Q1 pic Product BO3 prices changes and relative factors in the Q1 pic Product BO4 prices changes and relative factors in the Q1 picProduct BO5 prices changes and relative factors in the Q1 pic Product BO6 prices changes and relative factors in the Q1 pic In Quarter 2 Our Goal Sell as many as BO1 and BO4 as we can and also clear the stocks of the rest 4 products (here is our second biggest mistake) at the same time. Pricing Strategy Penetration pricing strategy, achieve high tawdrinesss and ultimately earning profits from high sales volumes, but low profit margins. Price setting We cut down the profit margin for BO1 and BO4. Lower all the other prices, since some of the prices were setting too high in the Q1.The prices set for the D1 of Q2 were as below, Material $$-B01 $$-B02 $$-B03 $$-B04 $$-B05 $$-B06 Name 1L ClearPure 1L Spritz 1L Lemon Spritz 500mL ClearPure 500mL Spritz 500mL Lemon Spritz Cost $11. 99 $14. 99 $16. 99 $16. 99 $19. 99 $22. 99 Initial price $14. 99 $17. 99 $19. 99 $19. 99 $22. 99 $25. 99 Our price $12. 00 $145. 7 $16. 99 $17. 00 $19. 89 $22. 88 Price adjustment Adjust the prices for the products based on the available stock, the market reaction and the market average price. Product BO1 prices changes and relative factors in the Q2 pic Product BO2 prices changes and relative factors in the Q2 pic Product BO3 prices changes and relative factors in the Q2 pic Product BO4 prices changes and relative factors in the Q2 pic Product BO5 prices changes and relative factors in the Q2 pic Product BO6 prices changes and relative factors in the Q2 pic In Quarter 3Our Goal All products had to be sold out and make maximize profit from BO1 and BO4 (Our third major error to consider the initial inventory will not reflect on the balance sheet. ). Pricing Strategy Penetration pricing strategy Price setting Kept the prices close or lower to the market average price. The prices for the D1 of Q3 were as below, Material $$-B01 $$-B02 $$-B03 $$-B04 $$-B05 $$-B06 Name 1L ClearPure 1L Spritz 1L Lemon Spritz 500mL ClearPure 500mL Spritz 500mL Lemon Spritz Cost $11. 9 $14. 99 $16. 99 $16. 99 $19. 99 $22. 99 Initial price $14. 99 $17. 99 $19. 99 $19. 99 $22. 99 $25. 99 Our price $12. 99 $14. 99 $17. 00 $17. 99 $20. 00 $22. 89 Price adjustment Product BO1 prices changes and relative factors in the Q3 pic Product BO2 prices changes and relative factors in the Q3 pic Product BO3 prices changes and relative factors in the Q3 picProduct BO4 prices changes and relative factors in the Q3 pic Product BO5 prices changes and relative factors in the Q3 pic Product BO6 prices changes and relative factors in the Q3 pic Overseeing Ankit is our guy for overseeing the whole market report for each five days. After each market report announced, he will first quickly calculate out the average price for each product (There is a good move in our group), and pass them to Iris for price adjustment reference. But he hadnt reported the quantity sold on each products during five days (Here is another mistake we made). In Quarter 1After the first report came out, Ankit readily passed his estimate of average market price to Iris. Then Iris and Ken could revise the price according to the available inventory and also the market price. We were so focusing on price change and inventory level, thus only the slow sales speed did we discover, we neglected the total sales for five days on the report. At that time, we didnt know the relationship between our own sales to the overall sales. In Quarter 2 Ankit still kept his amazing work about reporting the market average price, the average price collected from the reports were proved to be very helpful.Each time we changed our price to be a little bit lower than the market average, the retailers would response to that immediately. Finally, after all the efforts we put down, the sales volume and orders really shot up. Beside the regular activity, Ankit also suggested us to cut down price of B-02, B-05, B-06, which was undergoing at the same time. For the rest of the quarter 2, he started to look into the sales quantity of five day on each product and tried to compare the number with our own. But at that time, he didnt report on this matter which should be done from quarter 1.In Quarter 3 Directly following up the strategy from last quarter, the overseeing activity didnt change its role in quarter 3. Ankit still reported on the average market prices as referen ce. later he noticed the number of sales in quarter 3 was much less than that in quarter 2. He gave us his estimation about market demand for bottled water was dropping. In order to move all the inventory, after group discussion, Iris go on her marking down on prices which cut down more harm on our profitableness. Results analysis Financial Statement for Quarter1 pic picAfter the Quarter 1, from the performance chart above, we were facing 2 problems. BO1, BO3 and BO4 were profitable and moving at certain rate, and BO2, BO5 and BO6 were selling lower than cost and without too much sales. Our team sold the least quantities and had the least net income among the 4 teams. Whether should we start to put money on marketing expense to promote our low price B-01 and B-04? Errors we made about Quarter 1 1. We misjudged the market demand for products B-01 and B-04. As we expected, the initial market will be so thirsty about ClearPure products even we set premium price on them.So we could assure our profit as well as average sales on it. The truth is even the market is very thirsty, retailers will always have choices between domestic vendors or importers. The competition directly drive down the demand for higher priced goods as the basic economic principle Quantity and Demand would show. This is our major and most lethal mistake leading to a very poor performance on profit in quarter 1 and no turning back whatever we do in next two quarters. 2. We thought we can only make the replenishment in the beginning of Quarter 2, but actually the purchased orders were available in Quarter 1.The MD61 planning menu and purchase order menu are both under folder round 2&3. So our assumption is no purchase for the inventory in quarter 1. We build our strategy based on this assumption. The decision leads to two consequences overvalued price and small sales volume. 3. It was 20 days in one quarter, but I told them it was 30 days, and then we missed the selling momentum. I should take this the responsibility for this error. 4. The average prices setting were too high since the profit margin was too high as we already explained in error 1 and 2. 5.The person responsible of overseeing the market failed to report the relationship between our sales volumes to the whole market sales volumes during five days. If we applied this control method, we would discover our sales volumes were too low at the beginning period of quarter 1. So we would have 10 to 15 days to correct the wrongs. Without this powerful control method, we were totally blind during the first 5 to 10 days regarding to our sales performance. This error undermined our performance during the first one and half quarters, until Ankit and GS started to report. 6. Negligence of foreign import competitors.The reason we dare to set a very premium price on B-01 and B-04 is we didnt realize there are foreign import company competing. If we took that into consideration at first time, we wont choose premium strategy to earn profit and save inventory. The Financial Statement for Quarter2 pic pic After Quarter 2, from the performance chart, we were facing 2 problems. 1. We were losing money. Only BO1 and BO4 had positive income, the rest four were all negative. And the profit could not cover the cost. 2. The Profit Margins of BO1 and BO4 were too low. They were much less profitable in Q2 than in Q1. Material Description Qty Total Profit Q1 BO1-1L ClearPure 1124 $3224. 2 BO4-500mL ClearPure 868 $2801 Q2 BO1-1L ClearPure 4642 $213. 06 BO4-500mL ClearPure 4781 $379. 5 3. There were still so many available stocks of BO2, BO3, BO5 and BO6. Errors we made about Quarter 2 1. In this quarter, our goal contains clearing out the inventory of products B-02, 03, 05, 06 this is another big mistake leading us to a net loss at the end. The cost of 1000 units initial inventory is actually NOT a sunk cost according to the final financial statement. If we just set the price at the cost level and never care d about their sales, we will have all the positive net income from B-01 and B-04 as results, which will added up to over $10000 net income.As long as you keeping the prices higher than cost, B-02, 03, 05, 06 will contribute to the net income in certain ways. 2. A wrong decision was made on order purchasing. 300 units of product B-O6, which is the highest cost and lowest yield, were purchased at the end of Quarter 2. 3. In order to clear the inventory of those products and pursuit our objective of sales, the prices were set too low. The Total Sales was high, actually ranked 1st in that round, but we were trading our profit with sales volume. This will help us got closer to our goal, but it is not a wise move because it doomed the whole profit margin.Financial Statement for Quarter 3 pic pic After Quarter 3, from the performance chart, we can conclude our errors in this quarter, Errors we made about Quarter 3 1. We continued the strategy applied in round 2 which are setting average pr ices way lower than cost for BO2, BO3, BO5and BO6, so we were continuing losing money. 2. The purchasing conduct of retailer stores for BO2, BO3, BO5 and BO6 was misunderstood. According to the sales reports, those products were purchased periodically, and less price sensitive than BO1 and BO4. 3.The prices on those four products were changing too frequently. The market could not react to the change, and the market needs a longer period to consume those products before repeat purchasing. Improvements If we ever have another chance to perform in this distribution game, we will keep our goals and objectives, though several improvements will be carried out as follows. In Quarter 1 1. Prepare the whole game plan only pore on 1L&500mL ClearPure products, for other products, prices should be set slightly higher than cost. 2. Set the prices of our main products close to the cost in order to reate huge sales volume to meet our goals and objectives. 3. Prepare the inventory purchase order i n quarter 1, and proceed the first purchase when the unit number hit 500. 4. The whole period is only 20 days, meaning day 10 will be the checking point to control teams performancedecide whether we should adjust our strategy. 5. Analyzing the sales volume in the market reports, compare to our summary sales report data as a controlling method of sales volumes. Using the same information, we could evaluate the performance of our direct competitors and also foreign importers. 6.Put $25 to $50 on marketing expense per day on B-01 and B-04, so more retailers could be attracted and establish relation with us. In Quarter 2 1. Stay in the price battle for main products, but do not directly cut the price under cost. 2. Maintain the price on other products do not use pricing penetration strategy to increase the sales. 3. Better management on stock level and inventory level following the same code applied in game before. 4. Keep relatively stable price on B-02, 03, 05, 06. Allowing time taken by market to consume the products. Do not rush into price war.In Quarter 3 1. According to the performance in quarter 2, we will adjust slightly on our game plan to respond. Still we should stay in the price war of our main products and avoid price war of other products. Sometimes without losing money is also earning money from the market. Summary From this 3-quarters ERPsim distribution game, our group learnt a lot about price sensitive commodity market. For the market, we start to understand why healthy, competitive environment is so vital to it. Two extremes, whether monopoly or simply price war,will not do any good to the industry.The harm inflicts on the different sizes of firms will later affects the market, and ultimately reflects on the end user normal customers. For each company in the market, careful thought plus preparedness are a must to whatever the project is. Always think big, move slow, check twice will help one company girdle in healthy growing mode. To achieve t hat, every company will need practical control method to implement. How to set those control methods will need our knowledge and experience from all the courses we learnt here. And if a company is selling commodity products, DO pay attention to price competitiveness.Try to make sure positive profitability and high sales volume, at the same time avoid price war. It is not a wise move as our group showed in quarter 2, after actively involved in the price contest, we successfully grab the No. 1 seat of sales for one round, but lose heavy on profit. For each member in Group C, we had fun, argument, discussion all through our participation in the ERPsim game. We learnt, evolved, and developed our skills and abilities of marketing throughout the whole process. It doesnt matter what results or rank at last, only those knowledge and friendship matter and will last forever.
Friday, May 24, 2019
Alliant Energy Case Study
1. Who are the main players (name and position)? William D Harvey, Chairman and CEO of Alliant push button Jamie Toledo, head of supplier salmagundi program- Alliant Energy 2. In what business or businesses and industry or industries is the company operating? Energy/Utility- Alliance provides electricity and immanent gas service 3. What are the issues and problems facing the company?That diversity within the workforce and supplier base does not meet corporate core determine and goals (to bring forth and retain/maintain a diverse workforce/supplier base, and place women in positions not traditionally held by women, still need much ethnic diversity) in order to maximize their abilities Employees are confused about Alliants definition of diversity Employees perception of diversity (affirmative action, work attitudes, job satisfaction) 4. What is the primal problem for the company/organization in this case?That diversity within the workforce and supplier base does not meet corporat e core determine and goals 5. Why have the problem (s) you cite emerged? Identify the causal chain (the events or Circumstances that caused the problem-Some will be Internal Weaknesses, others EXTERNAL Threats). Employees perception of diversity (affirmative action, work attitudes, job satisfaction external threat, people come to the workplace with preconceived notions regarding diversity.Employees confused about definition of diversity- Internal cause by drop of training and lack of understanding regarding managements expectations 6. What are the characteristics of the industry that the company is in and how is the Industry changing over time? Not typically an industry that includes many women, and is not located in an area of the United States that is particularly diverse. Industry is continuously growing as the need for energy increases, thusly more people will need to be hired and more suppliers will be needed. The mart is full of many different ages, races, and religions.An organization with employees that hypothecate these different groups will be more successful in serving consumers because their workforce reflects the diversity of the marketplace 7. What is the firms strategy for differentiation, enabling them to compete within the scope of their industry? According to Jamie Toledo, having diverse suppliers leads to new perspectives and creativity, it supports local communities, and ensures diverse businesses have fair opportunities. In addition, having a diverse workforce enables the company to understand the marketplace and increases the companys chances of succeeding . What are possible solutions to the problems you have identified? Continue to communicate senor managements commitment to diversity, explain the benefits of diversity, active participation of employees in the training, create an internal diversity council 9. What are the advantages and possible disadvantages of your solution(s)? Advantage more training and more continued reinforce ment typically leads to more enfolding and awareness, employees now receipt the definition and of and benefits of diversity at it applies to their jobs and company.Possible disadvantage the scripted training may reinforce stereotypes. All day, mandated training may lead to some employees not covetous all the elements of the training 10. Are there any possible problems with your suggested recommendations? What contingencies need to be accommodated? Training may be too scripted, not enough employee involvement. Solution= include more informal forums or guest speakers. Could also spread the scripted training over the course of multiple days.
Thursday, May 23, 2019
Personal statement for nursing
As the first child growing up in a Chinese family In a predominantly minority Oakland community, I watched my grandfather take countless prescribed medications for Illnesses from cancer and thyroid Issues, and being Diabetic. Noticing the medicine cabinet full of drugs made me interrogatory what exactly went on in my grandfathers body when he took these daily medications. I attended most my grandfathers health care appointments to translate because of his limited English or even none.They needed my interpretation to understand the information about each drug received for my grandfather. Unable to elaborate on the physiological effects of token drugs, however, my explanations were limited to basic side effects and indications drowsiness or pain relief. Or the reasoning to why the medical procedure is being done to film certain tests results. As an intermediary in my grandfathers health situation, I gained not only an acute awareness of the patients experience in medical interaction s but as well as an appreciation for the nurses crucial role.Translating for my grandfather, I was vitiated by the rageate nurses knowledge of skills and explanation of procedures and education, her eagerness to consult with the patient to meet his inevitably. Beyond patient interactions, I gained insight into nurses role in communicating with doctors about what the patient want or needs. I began to understand the crucial role of communication in promoting patients take into account healing process.My determination to pursue a career In Nursing remains strong, As a volunteer at Asia Healthcare Center In Oakland, I regularly Interact with low-income minority tenets experiencing challenges similar to my grandfathers limited education, financial need, language barriers. I play an important role in addressing patients clinical needs through direct interactions with them I build rapport with patients, enabling them to trust the nurses and discuss personal issues.The nurse plays a cru cial role In find whether a patient Is able to follow through with a prescribed treatment through careful consideration of an Individuals personal circumstances and the feasibility of treatment. linger at Aslant Healthcare provides me fuller appreciation for the compassionate, professional communication required for effectiveness as a nurse. My commitment to developing communication skills and my passion for being a nurse has evolved through my involvement in the Oakland community, which often lacks clinical education.Working with the East Bay Asian Youth Community, an after- school program do underprivileged students, strengthened my Interest In working closely with youth. I maintained a classroom of 10-15 teenage students, providing support in and outside of the classroom. anyway teaching basic math, I provided weekly lessons about drugs such as Ethylene to back up the students understand their physiological effects. Despite the challenge of teaching these students, I realize d the value of my contribution when a high school student In my class said, l really appreciate your lesson about drugs.If not for you, I could not This experience gratified me and strengthened my resolve to pursue Nursing. As a Nurse, I desire to continue my development as a skilled, culturally competent, compassionate professional. I place a high priority on understanding the effect of patients personal circumstances on their ability to follow a prescribed treatment and facilitating their understanding the necessity of such treatments. In the long term, as role model to my family and as leader to the community, I want to help minorities, especially Asian immigrants, by educating them and providing effective, appropriate service to meet their needs.
Wednesday, May 22, 2019
An analysis of Information Security Governance in the Universities in Zimbabwe Essay
AbstractThe complexity and criticality of entropy auspices and its judicature demand that it be elevated to the highest organizational levels. at heart a university setup, entropy assets aloneow in bookman and personnel records, health and financial study, look into data, t to each oneing and learning materials and only restricted and unrestricted electronic subroutine library materials. Security of these information assets is among the highest priorities in terms of endangerment and liabilities, business continuity, and protection of university reputations.As a critical resource, information must be treated homogeneous every early(a) asset essential to the survival and success of the organization. In this paper the writer is going to discuss the wishing for implementing teaching Security organisation within institutions of higher education.Further than that, a discussion on how to best practice selective information Security brass dent within the universities in Zimbabwe followed by an judicial decision on how far the Zimbabwean universities ca-ca enforced nurture Security plaque. A combination of questionnaires and interviews is going to be used as a wight to gather data and some recommendations are stated towards the end of the paper. IntroductionGovernance, as be by the IT Governance Institute (2003), is the set of responsibilities and practices exercised by the maturate and executive centering with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that chances are managed countenancely and verifying that the enterprises resources are used responsibly. Information protective covering governance is the system by which an organization directs and tallys information shelter (adapted from ISO 38500).It specifies the accountability frame lock and provides oversight to agree that risks are suitablely mitigated as well as ensuring that surety strategies are aligned with business and consistent with regulations. To exercise impelling enterprise and information hostage system governance, display boards and senior executives must have a low-cal understanding of what to expect from their enterprises information earnest programme.They need to know how to directthe implementation of an information warranter programme, how to evaluate their own positioning with regard to an existing tribute programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more than and more interested about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of.Executive forethought has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance ch onlyenge that involves seemly ris k management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organizations response to them ( collective Governance Task Force, 2004).Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated The diffusion of engineering and the commodification of information transforms the role of information into a resource equal in importance to the tradition all(prenominal)y important resources of land, labor and capital.Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to inflict unfavorable impacts on the organizat ion to an acceptable level of risk. Information security protects information assets against the risk of loss, in operation(p) discontinuity, misuse, wildcat disclosure, in devilibility and damage.It alike protects against the ever-increasing potential for obliging or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information transites, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and tierce parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization.John P. Pironti (2006) suggested that among mevery reasons for information securitygovernance, the most important one is the one concerned with the legal liability, protection of the organizations reputa tion and regulatory conformity. With the university setup, all members of the university comm social unity are compel to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain look and other intellectual property-related records are, melodic theme to circumscribed exceptions, confidential as a matter of law.Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university constitution, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which overture is closely monitored. Networks provide connection to records, information, and other networks and also require security protections.The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in todays complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down work out requiring a comprehensive security strategy that is explicitly linked to the organizations business processes and strategy.Security must address completed organizations processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a epochal degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006).In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say remember inZimbabwe security is regarded as an expense not an investment (Rutsito, 2012). Benefits of Information Security GovernanceGood information security governance generates significant benefits, including The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care.The struct ure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of government agency that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities.Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology nucleotide The benefits add significant value to the organization byImproving self-assertion in customer/client relationshipsProtecting the organizations reputation change magnitude likelihood of violations of privacyProviding greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing resu lts online and online registration. bring down operational costs by providing predictable outcomesmitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance OutcomesFive basic outcomes can be expected to result from developing an effectivegovernance approach to information security strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value deli genuinely through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are metBest practicesThe National Association of incorporated Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are Place information security on the boards agenda.Identify information security leaders, hold them accountable and ensure support for them. Ensure the military capability of the corporations information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006).To achieve effective information security governance, management must indicate and maintain a framework to guide the develop ment and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of An information security risk management methodologyA comprehensive security strategy explicitly linked with business and IT objectives An effective security organizational structureA security strategy that talks about the value of information both protected and delivered Security policies that address each aspect of strategy, control and regulation A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk A process to ensurecontinued evaluation and update of security policies, standards, procedures and risks.This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supp orts an organizations goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some shareistics of good corporate governance coupled with good security governance.These include and not limited to Information security existence treated as and organization wide issue and leaders are accountable. Leads to viable Governance, attempt and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of securityProper frameworks and programs have been implementedIt is not treated as a cost but a way of doing businessRoles, responsibilities and segregation of duties are defined It is addressed and enforced by policyAdequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measuredIt is reviewed and auditedThe overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the UniversityIn their article titled Information Security Policy Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned 1. Risk assessment and managementThe universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of theinformation systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to germane(predicate) criteria for acceptab le risks.Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria authorise by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policyThe Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems.The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to univ ersitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organizationThe Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the ancient responsibility for the information security in connection with the student registry and other student related information.The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility i s delegated according to the management structure.The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of theemployees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be rewrite on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys serve Prior to employment security responsibility and roles for employees and contractors should be described.A telescope check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal informa tion. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized.The IT regulations should be reviewed regularly with all users and with all new hires. exclusively employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private work is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department.On exhalation or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditionsIT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control toensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsi bility should ensure that work performed by third parties in secure zones is suitably monitored and documented.All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on take-away computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department.During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations managementPurchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department sho uld ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems.Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unlicensed or unforeseen abuse of the universitys assets.Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, t he requirements for information security must be taken into shape when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed forchange management and system development/maintenance.IT systems must be dimensioned according to efficacy requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is oddly important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place.Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data GatheringA structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I presidential termal Reliance on ITThe first section was designed to help in determining the institutions credence on information technology for business continuity. Table 1 Characteristics of OrganizationQuestionsScores/Frequency01234 dependency on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services9Value of organizations intellectual property stored or transmitted inelectronic form27The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy234Level of regulation regarding security (international, federal, state, or local regulations) 1431Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups?5121Total score196722Scoring Very Low = 0 Low = 1 Medium = 2 High = 3 Very High = 4 Section II Risk ManagementThis section assesses the risk management process as it relates to creating an information security strategy and program. Table 2 Information SecurityRisk AssessmentQuestionsScores/Frequency01234Does your organization have a documented information security program?252Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program?243Has your organization set critical assets and the functions that rely on them?225Have the information security threats and vulnerabilities associated with each of the critic al assets and functions been identified?2421Has a cost been assigned to the loss of each critical asset or function?1332Do you have a written information security strategy?2421Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4221Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2331Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 22321Total1016261416Scoring Not utilize = 0 Planning Stages = 1 Partially Implemented = 2 Close to Completion = 3 to the full Implemented = 4 Section III PeopleThis section assesses the organizational aspects of the information security program. Table 3 Information Security Function/OrganizationQuestionsScores/Frequency01234Do you have a person that has information s ecurity as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4311Do the leaders and staff of your information security organization have the necessary experience and qualifications? 522Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3411Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2232Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2331Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies?342Total16171470Scoring Not Implemented = 0 Planning Stages = 1 Partially Imple mented = 2 Close to Completion = 3 Fully Implemented = 4 Section IV ProcessesThis section assesses the processes that should be part of an information security program. Table IV Security Technology StrategyQuestionsScores/Frequency01234Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2331Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 12321Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2331Are consequences for noncompliance with corporate policies clearly communicated and enforced? 13231Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 234Are information security issues considered in all important decisions within the organization? 3231Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 13311Is sensitive data encrypted and associated encryption keys properly protected? 23211Do you have an authorization system that enforces time limits and defaults to minimum privileges?2223Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation?2322Based on your information security risk management strategy, do you haveofficial written information security policies or procedures that address each of the following areas?Individual employee responsibilities for information security practices4311Acceptable use of computers, e-mail, Internet, and intranet2322Protection of orga nizational assets, including intellectual property2232Access control, authentication, and authorization practices and requirements 12312Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors systems) 21321Disaster recovery contingency planning (business continuity planning)1134Change management processes2322Physical security and personnel clearances or background checks1332Data backups and secure off-site storage1134Secure disposal of data, old media, or printed materials that contains sensitive information234For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations234Are multiple physical security measures in place to restrict forced orunauthorized entry?1233Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities?2133Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats?144Total1745585047Scoring Not Implemented = 0 Planning Stages = 1 Partially Implemented = 2 Close to Completion = 3 Fully Implemented = 4 DiscussionAs shown by the total scores on Table 1, a bulk of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a bunch to be desired by the universities. Most the universities have partially implemented such programs.A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In supplementto that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. delinquent to l ack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. ConclusionThere is a need for institutions to start focusing on proper information security governance.For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads in concert and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework.As the Zimbabwean economy is slowly sprouting, the art of information s ecurity governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted.ReferencesDrucker, P. Management Challenges for the 21st Century, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance song to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500 Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.orgIT Governance Institute, COBIT Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, Information Security Oversight Essential Board Practices, USA, 2001 John P. Pironti,Information Security Governan ce Motivations, Benefits and Outcomes, Information Systems Control Journal, vol. 4 (2006) 458. 21. Rutsito, T. (2005) IT governance, security define new era The Herald, 07 November. Kaitano, F. (2010) Information Security Governance Missing Link In Corporate Governance TechZim. http//www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance accessed 02 May 2013.Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. & Parker, D.B. (2000). Information Security Management and Assurance A Call to Action for Corporate Governance. United States of America The Institute of indwelling Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance Call to Action, USA
Tuesday, May 21, 2019
I Feel Great
DBQ 15 The Debate Over American Imperialism Catriona Whalley Imperialism was not a proper and legitimate policy for the United States to follow at the unit of ammunition of the 19th century. Americans defended their countrys attentions with ethnocentric, hypocritical, and overall un-American rationalizations. They imperialized for their own profit and benefit, and had no true justification behind their reasoning. While Americans did not usually rubric that they anted to maintain rule of other territories for American Profit, it was a factor.Some saw the Pacific Ocean as the key to thriving trade in the future by holding claim to that ocean though ruling the Philippines they would hold the power that rules the world. (Doc 5) The country was also needed to meet the US growing production demands (Doc 2) For the States to corking turn the land they acquired over to France or Germ whatever who were commercial rivals to the US- would harm their own trade. (Doc 3) If you were to stric tly interpret the Declaration of Independence, you would find that the U.S reasons for imperializing go against the beliefs set by their founding fathers. The solution clearly states that you cannot govern any country but your own against their will, even if it is believed that it is for their own good. (Doc 4) The loved President Abraham Lincoln once said, no man is good enough to govern another man without that others consent, as advocates of self-government, they should have listened to these words of wisdom.Americans also claimed that as a superior, much civilized nation, they held the occupation to led in the regeneration of the world, to spread their beliefs, customs and religion. (Doc 1) The declaration cites that All men are created equally, therefore all men outside of the U. S should be treated as equals to Americans. (O. I) In the past the United States made foreign countries sign a document called the Monroe Doctrine this contract banned any country from imperializing the States.The United States was also born in a revolt against colonialism. Both of these events in the past cause the country to be considered a phony how can they claim that no country can imperialize and rule them, but they can do the same to others? (O. I) The United States only began to imperialize as its thirst for more power grew after completing manifest destiny. As a country that boasted democracy, will of the people, and self-government, they should not have imperialized during the turn of the 19th century.
Subscribe to:
Posts (Atom)