Thursday, October 31, 2019

Public Relation Strategy Term Paper Example | Topics and Well Written Essays - 750 words

Public Relation Strategy - Term Paper Example The company’s business line is the provision of greetings cards to the market, specifically traditional, Arabic, and Islamic cards. This business is based on the importance of celebrating traditional, social, economic, and political occasions. Most importantly, traditional celebrations are prioritized due to the fact that they constitute the majority of social celebrations that occur at different times of every year. A public relation strategy comes in handy for the operations of the company, due to the high-level publicity and exposure that the company needs in order to market and sell its products (Wilcox & Cameron, 2011). These products include greetings cards, musical greetings cards, gift boxes, musical gift boxes, and gift wrapping papers. On the same note, all the aforementioned products can be customized or non-customized. In order to facilitate efficient and effective information flow from the company to the public, the company has to understand the nature of the environment within which it operates. This has to consider the target market, competition level, consumer tastes and preferences, public notion on the company’s products, and the most appropriate approach to use towards the public and all other stakeholders factored in the public relation concept. The idea is to create a company image and brand that the public wants to associate with. The public relation strategy for the company is made up of five components, all of which are central to the business operations undertaken by the company. These are: knowing the market, using technology, media relations, social awareness, and monitoring the web (Wilcox & Cameron, 2011). Knowing the market entails identifying the target market. Product definition by the company identifies the target market. All persons who engage in traditional celebrations constitute the target market.  

Monday, October 28, 2019

Inspire to educate Essay Example for Free

Inspire to educate Essay Education is an avenue that enables the production of individuals who knows the proper way to live, learn and work together for the foundation of a strong community. Each and every child deserves the chance to be educated. Such learning must be the kind that involves challenges and stimulates them to achieve their maximum potential. On the Importance of Education The importance of education is quite clear. Education is the knowledge of putting one’s potentials to maximum use. One can safely say that a human being is not in the proper sense till he is educated. This importance of education is basically for two reasons. The first is that the training of a human mind is not complete without education. Education makes man a right thinker. It tells man how to think and how to make decisions. The second reason for the importance of education is that only through the attainment of education, man is enabled to receive information from the external world; to acquaint himself with past history and receive all necessary information regarding the present. Without education, man is as though in a closed room and with education he finds himself in a room with all its windows open towards the outside world (Khan, 2007). Education has an immense impact on the human society. One can safely assume that a person is not in the proper sense till he is educated. It trains the human mind to think the right decisions. In other words, man becomes rational when he is educated. It is through education that knowledge and information is received and spread throughout the world. An educated person cannot read and write and hence he is closed to all the knowledge and wisdom he can gain through books and other mediums. In other words, he is shut off from the outside world. In contrast, an educated man lives in a room with all its windows open towards the outside world. The quality of human resource of a nation is easily judged by the number of literate people living in it. This is to say that education is a must if a nation aspires to achieve growth and development and more importantly sustain it. This may well explain the fact that rich and developed nations of the world have very high literacy rate and productive human resource. In fact these nations have started imparting selective training and education programs so as to meet the new technical and business demands of the 21st century. Keeping the importance of education in mind, the US Department of Education aims to promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access. It also establishes policies regarding federal financial aid for education, and distributing as well as monitoring those funds. It also continuously strives to focus national attention on key educational issues and providing equal access to education. The importance of education cannot be neglected by any nation. And in today’s world, the role of education has become even more vital. It is an absolute necessity for economic and social development of any nation (Goel, 2007). Inspiring Children to Learn At one of their forums organized by the Walden University entitled â€Å"M. S. In Education: Teaching in Linguistically and Culturally Diverse Classrooms,† the speakers addressed the issue on how to be able to inspire the children to learn, especially the ones who due to their culture are not supported by their family to succeed in their education. This is what they have to say: Set and environment where they choose to become inspired, where the students choose to make the decision. Many families who are from ethnic minorities are not people who have traditionally been successful in school. You need to initiate the phone call to the parents on a consistent basis and let them know how important they are to their childrens education. Do it in ways that are consistent and that show people you care. This is an idea that transcends culture. A mothers love for a child transcends culture. If you can get through to the mother, thats what transcends. You can really be proud of knowing that you have changed a life. I have never met a parent who wasnt interested in his or her child doing well in school. Dont think you can motivate people. You set an environment where people elect to be motivated and ultimately empowered. Its a choice that people make and that sets them up for success. Dont give up on anyone. Understand peoples prior knowledge of schools, where they came from. Give them a message of hope and inclusion. Dont give up and dont try to motivate. Set this environment, and youll meet with unexpected success (Walden 2006). The need for such environment has never been so great. As educators, we need to trace the path that realizes the many needs of our children. We’ve come to the realization that we cannot do it alone. We need the role of the parents as part of the team. This involvement nonetheless affirms the role of the parents as primary stakeholders in their children’s future, particularly in education. A team whose aim is to be able to provide for our children a great investment that they made be able to reach their true promise. This teamwork is headed to achieve an increased engagement in the advocacy of parents on behalf of their children’s opportunities in learning. We are after molding fully developed citizens who will do good things to their community in return. Academic achievements are only a bonus and not an end in itself. The realization of the importance of education forbids us to deny our children the ability to achieve their fullest promises. Through this light, we cannot deny our society the benefits of our children’s untapped talents. References Alrisala Organization. (2007). The Importance of Education.Retrieved December 8, 2007 from www. alrisala. org/Articles/mailing_list/importance_of_education. html. SearchWarp. com. (2007, July 6). The Importance of Education. Retrieved December 8, 2007 from http://searchwarp. com/swa230219. html. Results for America. (2007). Learn More About Education. Retrieved December 7, 2007 from http://www. resultsforamerica. org/education/learn. php. Walden University. (2006, June 6). M. S. in Education: Teaching in Linguistically and Culturally Diverse Classrooms. Retrieved December 6, 2007 from www. waldenu. edu/c/Files/DocsSOE/Q-a_Ed_DiverseClassrooms. doc.

Saturday, October 26, 2019

Factors influencing the success or failure of Small Business

Factors influencing the success or failure of Small Business Small businesses have certainly started to play an important role in the growth and development of a lot of economies in the world today, and they are becoming increasing popular. The reasons for this are not particularly hard to discern. Growing firms provide significant benefits to regions, with job generation, knowledge spillovers, economic multipliers, innovation drivers and cluster developments. The exact processes of growth and an analysis of the development and transitions from small to high growth rates and size development has generated limited study from an initial review of literature. The birth of new firms and their subsequent growth or failure has captivated the interest of researchers especially during the past decade and a half. The central theme dominating this segment of research focuses on the question of why Jason Fast Foods failed in their business. An initial review of literature on small firms reveals that many of them fail early in their lifecycles, presumably due to the many impediments and obstacles that they are unable to overcome. There is also the less than satisfactory growth rates observed among firms that survive the initial inception stage. Whereas the specific factor that led to the failure of this business was poor operational plan, a congregations of other factors was responsible for the failure of this business. This means that Jason Fast Foods failed because of a combination of poor product/service, marketing plan, operation plan and financial plan. The dynamics of changing demographics and consumer purchasing patterns, coupled with ever stronger competition, put increased pressure on Jason Fast Foods enterprises. This impacted a lot on the small business who had to devise new avenues for driving productivity and develop distinct competencies that was aimed at ensuring their survival. Basically, Jason Fast Foods suffered from limited information, finance, management time and experience and was vulnerable to environmental changes. The scale of operations was also low which meant that this firm did not benefit from the economies of scale which limited its operations and generally inhibited its growth and ability to develop and dominate the markets. The small firm sector has been described as very turbulent, with fluctuations in profits and sales being more imminent than larger firms, mainly because they are more likely to depend on single products or customers (Storey et al., 1987). Large firms on the other hand often exist becaus e competitive factors within industries make the use of economies of scale in productions which are necessary for survival. Operational factor that greatly contributed to the failure of Jason Fast Foods was the inability to attract higher quality people than its competitors. The differentiators between success and failures lie in the ability of a firm adopting strategies in the utilization of its capabilities that ensure the firm has higher quality people than its competitors, its able to develop and nurture its capabilities and that a culture is developed that encourages organizational learning. When competition intensified, the possession of these competencies became increasingly important for the firms continued success. Moreover, these were the distinctive capabilities that supported a market position that was valuable and difficult to imitate. The aim of developing and improving the resources basses and capabilities are aimed at achieving a strategic fit between resources and the opportunities that will ensure for added value from the effective deployment of resources. The overall inability to effect ively deploy resources for the best operational practice was inhibited by its scarcity. In addition to the above, the interaction between competitive advantage and distinctive competencies are well researched issues that Jason Fast Foods failed to exploit. The general concurrence is that firms that develop and exploit their distinctive capabilities and key competencies generally outperform their rivals and are able thrive in the said markets. For example, Day (1994) found that smaller firms that chose to compete with clearly defined strategies outperformed those firms with a less clearly defined focus. These believe is supported by Armstrong (2007) who found a close correlation between the entrepreneurial orientation of firms and the possession of a wide assortment of distinctive competencies. Operational inefficiency deprived Jason Fast Foods the ability to find a close correlation between its entrepreneurial orientation and the possession of a wide assortment of distinctive competencies. The role of financial factor contribution to the failure of Jason Fast Foods was precipitated by the skyrocketing health care and energy costs, tightening credit conditions and increasing labor costs. Generally, the small businesses are facing a challenging economic environment. The major constraints that were facing Jason Fast Foods can be broadly categorized into four groups that are cost factors, credit conditions, trade competitiveness and industry metrics (HSBC, 2005). The major cost factors associated with doing business in America for the small businesses stems from the health care, oil, natural gas, retirement and savings and total employee compensation and regulatory costs (HSBC, 2005). These costs continue to rise by day, meaning that the proprietors of Jason Fast Foods were receiving the same amounts of inputs to run their businesses but at a higher cost. These increased costs limited the ability of Jason Fast Foods to purchase new equipments, hire new employees and expand businesses. The most significant increase in these costs has been the rising oil and natural gas prices. Additionally, the employees compensation costs have also grown, coupled with increased health care and medical costs which continued to impact on the bottom line of Jason Fast Foods. Another constraint that led to the failure of this firm was with credit conditions and access to credit. A lot of researchers agree that business financing is a key ingredient to business success through the provision of the ability for entrepreneurs to start or develop an existing business. As Child (1972) intones, capital availability ebbs and flows as business cycles evolve, essentially meaning that enough capital resources should be available at all stages of growth. The major contributing ingredients to the ease with which small business can gain access to capital encompasses such issues as budget deficits, commercial and industrial loans, interest rates and venture capital. For example, most credit that is extended to businesses either in the form of credit cards or commercial loans are tied to the prime rending rates, which are dictated by the overall operating conditions. These are basically reflected by the prevailing rending rates, which have been rising of late with severe implication on the cost of doing business. The fact that Jason Fast Foods encountered more difficulties in generating alternative financing (example through issuance of stock or commercial paper) become more resilient, meaning that they were being forced to pay high interest costs to secure a loan to finance ventures. This was compounded by the fact that interest rates are usually higher as private sources of capital compete with the public sector for investors in an economy, meaning that borrowing costs continues to rise regardless of growths in the economy. The end result is that small businesses are hugely disadvantaged. Without favorable credit conditions, entrepreneurs will either pay higher prices for capital or forgo adequate capitalization all together (HSBC, 2005). Another constraint faced by Jason Fast Foods that led to its failure was with regards to growth and development and the competitiveness of the operative industry. The major factors as regards competitiveness usually stem from trade deficits and the trends and manufactures new order. The contentious issues are that while the increased globalization has provided business owners with the opportunity to market and sell their goods abroad, small business have continually struggled and failed to exploit the potential. All the above factors clearly illustrate the major difficulties faced by small business in their endeavors that eventually led to the failure of Jason Fast Foods. While the same factors have been found to also impact on the larger counterparts, a clear deduction can be discerned that the impacts have greater implications on the small businesses.

Thursday, October 24, 2019

The Human Brain versus Computers :: Technology Neurology Sensory Organs Essays

The Human Brain versus Computers In the past few decades we have seen how computers are becoming more and more advance, challenging the abilities of the human brain. We have seen computers doing complex assignments like launching of a rocket or analysis from outer space. But the human brain is responsible for, thought, feelings, creativity, and other qualities that make us humans. So the brain has to be more complex and more complete than any computer. Besides if the brain created the computer, the computer cannot be better than the brain. There are many differences between the human brain and the computer, for example, the capacity to learn new things. Even the most advance computer can never learn like a human does. While we might be able to install new information onto a computer it can never learn new material by itself. Also computers are limited to what they â€Å"learn†, depending on the memory left or space in the hard disk not like the human brain which is constantly learning everyday. Computers can neither make judgments on what they are â€Å"learning† or disagree with the new material. They must accept into their memory what it’s being programmed onto them. Besides everything that is found in a computer is based on what the human brain has acquired though experience. In addition, emotions can be only transmitted by the human brain and cannot be programmed into a computer. One of the reasons is there are too many emotions to be described and they can be a mixture of feelings that it would be hard to put it into one category. Furthermore, the computer wouldn’t have the ability to know to what situation he should apply certain emotion. And different emotions can be applied to the same situation; it all depends on the experiences in our past. Emotions are personal and are different for every person and it would have to be different for every computer. Another difference between the human brain and the computer is, the creativity of the human brain. For instance humans can create art, act in plays, or write stories and songs but computers can only help us in these activities not come up with them. While computers can help us solve math problems and find answers to certain questions it can never think of new solutions until they have been programmed into them. Furthermore computers cannot create new games or produce anything they desire like humans.

Wednesday, October 23, 2019

Death Penalty Synthesis

The death penalty goes back as far as the 17th century. From burning alive to beating to death, the death penalty was carried out in some of the cruelest and most painful ways one could imagine. Although more efficient ways of execution have been discovered, such as lethal injections, capital punishment is still ruthless and a lot of times unnecessary. Capital punishment is like the easy way out of dealing with criminals by â€Å"eliminating the complexities of judge and jury† (Source J), when there are much more efficient punishments that could be used when dealing with a felony.Capital punishment should not be used for so many different reasons; it is immoral, very costly and mistakes that could be prevented happen way too often. Some may argue that capital punishment should be used to remove the criminal because they are dangerous and they deserve to be executed but â€Å"the deed is done and taking another life cannot change† (Source A) the fact that one life is alr eady gone. There are other ways of preventing the culprit from harming others, such as removing them for society by putting them in jail.Being sentenced to â€Å"life imprisonment is a far more practical form of retribution† (Source F) for the defendant; it’s much fairer, more efficient and a lot less cruel than execution. Citizens are just as safe when the criminal is in jail as they would be if capital punishment was used. Plus, if the criminal was eventually found guilty then they could be freed from jail. According to the Declaration of Independence, â€Å"everyone has the right to life, liberty and security of person† (Source B).Capital punishment â€Å"violates the constitutional ban against cruel and unusual punishment† (Source K) by taking away the right to life that every citizen has. The criminal has the right to â€Å"equal protection under the law† (Source K) no matter what the situation might be. The death penalty is promoting violence more than anything else.Executing someone for their wrongdoing makes it appear that killing someone is acceptable, but it’s not and shouldn’t be tolerated no matter what the  circumstances are. Studies have shown that capital punishment does not affect the amount of crimes committed (Source F); therefore using the death penalty has no impact on preventing the murders from happening. Capital punishment is not only the most â€Å"cruel and uncivilized punishment† (Source F), but it is also the most expensive and most time consuming solution to punishing the criminal.On average, one â€Å"death penalty case resulting in a death sentence costs approximately $3 million† (Source C), which is â€Å"a waste of taxpayer funds and has no public safety benefit† (Source K). Taxes need to be spent on improvements for the state, not on the execution of one person when there are much more efficient solutions to punishing the culprit. The most brutal part of ca pital punishment is the fact that it is possible to take an innocent person’s life, which happens way more than it should.There have been 142 people â€Å"freed from death row after being exonerated with DNA or other kinds of evidence† (Source F), if that evidence wouldn’t have been found in time then any one of those innocent people could have been executed for doing nothing wrong. Some research shows that one in every ten people executed were later found guilty; if they hadn’t been put through capital punishment then many innocent people could have been saved from suffering for something they were never responsible for.Not only are innocent people executed, also deciding â€Å"who should be sent to death row is arbitrary and discriminatory† (Source F). Studies by professors at North Carolina University have shown that the â€Å"odds of receiving a death sentence raised by 3. 5 times among those defendants whose victims where white† (Source C), which shows how race might have an impact on whether or not the death penalty is used in the case. There are so many reasons why capital punishment is not the answer to a crime. Everyone has the right to live and deserves a second chance.The death penalty doesn’t prevent violence, it only promotes it. It is an expensive process that can end up accidently putting innocent people to death because they were blamed for something they really didn’t do. Without capital punishment, the world would be a much better place and many innocent lives could be saved, and the guilty criminals can get help and continue their lives while not harming anymore citizens. Capital punishment is unconstitutional and should be avoided at all costs, no matter what the situation may be.

Tuesday, October 22, 2019

What Is Summer Institute for the Gifted Should You Join

What Is Summer Institute for the Gifted Should You Join SAT / ACT Prep Online Guides and Tips Want to challenge yourself this summer? Interested in showing colleges some of your academic interests? If so, you might heave heard about the Summer Institute for the Gifted. In this post, we'll explain what the Summer Institute for the Gifted is all about; cover logistics such as application materials, cost, and dates; and help you decide whether it's a good fit for you. Feature image:Alfred Hutter/Wikimedia What Is Summer Institute for the Gifted? The Summer Institute for the Gifted (SIG) is an academic summer program for the â€Å"gifted and talented† aged 5-17. "Gifted and talented" basically means that you have been placed in a gifted program in school or that you have tested above the 95th percentile on a nationally normed test (we'll go over the eligibilityinfo in more detail below). You don't have to take a special test or submit an elaborate application to be considered. The program consists of three-week sessions held on various campuses around the country. Some camps are residential (meaning you live on-campus for the entire session) but also allow for commuter students, whereas others are exclusively day programs. Each program has its own dates. The earliest programs begin in late June and run through mid-July, while the latest programs run from late July to mid-August. (See specific dates for the residential programs and day programson SIG’s website.) If you're in a residential camp, you take a series of courses during weekdays and participate in recreation during evenings and weekends. What Are SIG Classes Like? Your classes will be a mix of academic (in subjects from the humanities, science, and math) and recreational. Courses vary by location and are mostly separated by age level. So you might be in some academic classes with only students of your grade but in recreation classes with students of various ages. You sign up for your classes before you get there, but you can change your courses in the first two days. This gives you a chance to get a feel for different classes and hopefully come up with a schedule that’s a good balance for you. Schedule and Residential Life at SIG You take your classes during the day from 8:45 am to 4:15 pm with a lunch break, followed by a recreation period, dinner, and a study tutorial in the evenings. So in some ways it’s kind of like your schedule during the school year, but a bit more intense since you’re living with other students and taking more challenging classes. On the weekends, there are local excursions, planned activities, and free time. You live in a residence hall with students of your same age and gender, and also have a roommate (it’s possible to request a single room, but it’s a bit more expensive). While the layout and size will vary, you can expect your typical dorm room to have a bed, dresser, desk, and, of course, a roommate! The day programs consist of the academic portion of the program, but you don’t stay in a residence hall or have weekend activities. The day program could be a good option if you want the academic experience but have other extracurricular or social commitments over the summer. Locations for Summer Institute for the Gifted SIG has a variety of locations all across the country. The residential programs are housed at universities, and the day programs are housed at a mix of universities and local schools. See below for a complete list. Residential Program Bryn Mawr College (Pennsylvania) Emory University (Georgia) Northeastern University (Massachusetts) Princeton University (New Jersey)* University of California, Berkeley University of California, Los Angeles University of Chicago (Illinois) University of Miami (Florida) Yale University (Connecticut) *Does not allow for commuter students. Day Program Boston University (Massachusetts) Bryn Mawr College (Pennsylvania) California Lutheran University Chatham Day School (New Jersey) Echo Horizon School (California) Emory University (Georgia) Fairfield University (Connecticut) The Overlake School (Washington) Sarah Lawrence College (New York) Stuart Country Day School (New Jersey) University of Miami (Florida) The Woods Academy (Maryland) The Wesley School (California) How to Get Into SIG You can apply online or by mail for SIG. To apply, you'll need topay a $99 application fee and send in an application form. The application form is pretty straightforward - you give your personal and demographic info, say which program you want to attend, and list your course preferences. Finally, if it’s your first year, you must also submit eligibility info. You have to meet at least one of the following criteria: Score at the 95th percentile or higher in one of the major content areas of a nationally normed standardized test administered by your school (this includes a lot of state testing or the SAT/ACT). See a full list of tests here. Participate in an academic talent search. Be identified as gifted orparticipate in a local or school gifted program. Score at least two standard deviations above the mean, or at the 95th percentile level or higher, on any individual or group-administered, nationally normed standardized intelligence assessment. If none of the above are available for you (your district doesn't have a gifted program, you haven't taken any of the standardized tests listed by SIG, and there are no talent searches you can participate in), you can have two teachers at your school fill out letters of recommendation for you instead. You should apply early in the year as programs, especially the ones at Princeton and Yale, tend to fill up before summer.Admissions are rolling,so you need to apply to popular programs as early as possible. Less popular locations might still have open spaces through June. If you're interested in attending SIG in future years, try to apply as early as possible to maximize your chances of getting your first-choice location. Cost of SIG SIG costs between $3,000 and $5,800, depending on the location, for the three-week residential option. The day programs are cheaper: between $1,200 and $4,500. A chart of costs for the residential SIG camps, via the SIG Application Form. You can apply for financial assistance using this form. Try to apply early if you anticipate needing financial assistance, as funds for these types of programs tend to run out closer to the start dates. Is SIG Worth It? You can definitely get a challenging academic summer experience by doing SIG. Many former participants say good things about the experience on online forums and blogs. In particular, many participants say it can be rewarding for students to meet other academically gifted students and make friends from different parts of the country. That said, your time is very scheduled and the program is expensive, so you might want to consider other opportunities closer to home if you want more flexibility. You certainly won’t be penalized in the college admissions process for not doing a program like SIG. Especially if you live in a district where you have access to challenging classes or a gifted program, the benefits might not be that substantial. Other great summer options include participating in local music competitions, volunteering, doing research, or taking classes at local community colleges or universities. Explore both local options and programs like SIG before deciding what's right for you. The main goal is to use your time over the summer to dig deeper into an academic or extracurricular interest. SIG is one way to do that, but make sure you consider other possible options to get the most out of your summer! What’s Next? Curious about other summer programs? Learn about the programs at Johns Hopkins (CTY)and Stanford (EPGY). Read about a range of academic summer programs so you can decide which one might be right for you! Wondering when you should start studying for the ACT/SAT? Get a guide for both tests so you can maximize your score (click here for ACT and here for the SAT). Trying to decide which high school to attend? Learn about AP and IB programs to help you decide which is the best one for you. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Monday, October 21, 2019

William essays

William essays William Randolph Hearst was born on April 29, 1863, in San Francisco, California. He is the only child in his family. Hearsts father was a self-made multimillionaire in the mining industry. One day, Hearsts father asked him what he wanted to do. The young boy answered him and said he wanted to take over the San Francisco Examiner. His father was puzzled because Hearst could have anything in the family empire and he decided to take over the family paper business. The San Francisco Examiner, at the time was not doing too well. He had full control of the paper at the age of 23. William Randolph Hearst took over and changed the whole newspaper business. William Hearst was hungry for power. He controlled the lives of many celebrities. William Hearst was not a follower. He set his own rules and pioneered the way much newspaper is written today. His inspiration started at a very young age. A man named Joseph Pulitzer inspired Hearst. He wanted to monopolize the newspaper industry. The only way he could do this is to recruit the best journalists available. The list included Ambrose Bierce, Stephen Crane, Mark Twain, Jack London and Richard Harding. He knew that if he hired these men to work for him, he would have the greatest newspaper in the world. Hearst was not a very kind human being. There was a long time rumor that William Hearst was a very prejudice man. Unlike Henry Luce, he personally hated minorities. The newspaper was a powerful weapon to express his racial feelings towards many minorities. Luce wanted to help others by informing them of real news. William Hearst had many articles on how he thought Mexicans were lazy. He wanted to create an image that they were violent and used marijuana regularly. In his book, the author, David Nasaw states that Newspapers were his personal playthings, to be milked for money and to pound home to readers his brand of politics. Hearst uses his newspaper empire to get...

Sunday, October 20, 2019

William Shakespeare Essays

William Shakespeare Essays William Shakespeare Essay William Shakespeare Essay In the play, King Lear by William Shakespeare, King Learns character, actions and loss and regain of identity is reflected through his three daughters, General, Reagan and Cornelia. Both Reagan and General show material love. Goner mirrors Learns brutal, harsh side and beginning of his loss of identity. In the play, General will only accept a situation only if in her full command. This can be shown when, General tells that his solders are disordered, so debauched and bold, that the court, infected with their manners/Shows like a riotous inn (1. . 256) eventually asking him to lessen the amount of knights. Goner wants to gain control over Lear, by reducing his knights, but Lear does not want to because he believes he still has control, stating his knights as men of choice and rarest parts. Similar to Generals actions, Lear will only accept situation if in his full command. In Act 1 Scene 1, Lear asks all his daughters to flatter him, however he was rejected by Cornelia, eventually resulting in Cordilleras encashment and discontent. Goner, not only reflects Learns actions against Cornelia, she also reflects Learns loss of power and identity. When she asks Lear to lessen his amount, it is clear that General will gain full control over Lear, eventually causing Lear to question who he truly Is. As Lear begins to lose his identity, he can see his reflection of brutality and harshness through his daughters, when they begin to overpower him. And regain of Identity Is reflected through his three daughters, This biography seeks to highlight the various aspects of this great man’s life. Part of Shakespeare’s charm is probably the enigma attached to his personality. Even though his fame was noteworthy, many aspects of his life are under a cloud. There are basically two sources of information about his life- one of them is obviously his literature and the other are the various legal and Church documents that have been discovered. Shakespeare’s father John Shakespeare was an apprentice glover and tanner of leather and had migrated to Stratford from Snitterfield before 1532. He married Mary Arden, a landed local heiress, probably between 1556 to 1558. William Shakespeare was born to Mary and John Shakespeare probably on April 23, 1564 as he is known to have been baptized at the Holy Trinity Church at Stratford on April 25, 1564. However, his actual birth date is not known with certainty. He was the third child of the eight children that John and Mary sired, three of whom died in early childhood. No concrete records exist about Shakespeare’s childhood and education and the little knowledge that we have is based on conjecture. His father, John Shakespeare, held important official positions as alderman and high bailiff during William’s childhood and this lends support to the fact that William attended a free grammar school (in Stratford) which had a sterling reputation. In Shakespeare’s first biography (written in 1709, infamous for its inaccuracy), biographer Nicholas Rowe also agrees with the above fact. Of course, Shakespeare’s knowledge of Latin and Classical Greek as well as the high quality of his works points to the fact that he had a strong foundation in education at least at the school level. It is, however, known with certainty that Shakespeare did not attend university. On November 28, 1582, Shakespeare married a pregnant orphan called Anne Hathaway (from recordings in the Episcopal register at Worcester). There is a large amount of controversial data regarding this marriage and it is not known certainly whether Shakespeare married the woman he loved or not. However, it is known with certainty that Anne and William Shakespeare had three children – Susanne and the twins Hamnet and Judith.

Saturday, October 19, 2019

The Gift of the Magi Essay Example | Topics and Well Written Essays - 1000 words

The Gift of the Magi - Essay Example In the story, O. Henry uses a detailed, humorous, and well-meaning tone. The writer uses a detailed tone for the story by showing the Della’s, the main character, emotion, action, and her environment in detail. The author describes in-depth how Della worries about what to buy for her husband Jim’s at Christmas. The story describes Della’s emotion when he writes: â€Å"There was clearly nothing to do but to flop down on the shabby little couch and howl. So, Della did it. This instigates the moral reflection that life is made up of sobs, sniffles, and smiles, with sniffles predominating† (O. Henry 164). Della’s actions and emotions are explained in detail from the following passage. â€Å"After Della cut her hair, she got her curling irons, lit the gas, and went to work, repairing the ravages made by generosity. This is always a tremendous task, dear friends, a mammoth taskâ€Å"(O. Henry 166). A humorous tone is shown when the author explains about the main characters. This is evidenced in the story when Della says to herself, â€Å"If Jim does not kill me,† he will take a second look at me and say that I look like a Coney Island chorus girl. But, what could I do? Oh! What could I do with a dollar and eighty seven cents?† (O. Henry 166). ... Henry 166). The two main characters in â€Å"The Gift of the MAGI† are Della Young and James Dillingham Young. Della Young is a positive and honest person because she sells her long beautiful long hair in order to buy a gift for her husband at Christmas. This is shown in the following passage: â€Å"pennies saved one and two at a time by bulldozing the grocer and the vegetable man and the butcher until one’s cheek burned with the silent imputation of parsimony that such close dealing implied† (O. Henry 164). In the story, it is shown that Della is an honest person. James Dillingham Young is Della’s husband. He looks thin and very serious. He appears tired because of the burden of taking care of his family. As such, he needs a new overcoat and gloves (O. Henry 166). Also, he sells his gold watch, which was his grandfather’s, in order to buy a Christmas gift for his wife. â€Å"The Gift of the MAGI† addresses the true love between two people, e ven though they are very poor. The story states that â€Å"Della and Jim live at home. He is paid eight dollars per week. As such, they are poor. However, they love and cherish each other very much† (O. Henry 164). Also, the writer conveys a theme within the characters through evidence. Della and Jim think about what gift to buy for each other for Christmas. Della’s response is to â€Å"cut her hair, which ripples and shines like a cascade of brown water because she wants to buy a gift for Jim† (O. Henry 165). Also, â€Å"Jim wants sell his watch because he wants to give Della a luxury comb. Della especially liked the ones in a Broadway window. Beautiful combs are like pure tortoise shells with jeweled rims. The shade can be worn in beautiful varnished hair† (O. Henry

Friday, October 18, 2019

The London Economy Tourism Essay Example | Topics and Well Written Essays - 2250 words

The London Economy Tourism - Essay Example The success has also been attributed to the deregulation of the market and exchange controls. London remains a pre-eminent global city for doing business and attracts millions of tourists every year round, but this has come under threat not only from the economic upheavals but also from the emergence of new business and tourism hubs such as Dubai and Mumbai. London is ranked as the most popular city in the world and attracts millions of tourists every year who travel to London to see and admire the impressive monuments, exploring the vibrant and diverse culture of the inhabitants of the city or pay a visit to the historical sites in London (LDA 2009). Tourism is a key driver of the economy of London attracting 15 million visitors of overseas visitors who were staying and 11 million domestic visitors staying in the year 2008 alone. In addition, several surveys estimate that about two hundred million visits by tourists are made to London either within the capital or within the outskirt s for the numerous attractions, art exhibitions, historical sites and other tourist attractions. Tourism and related activities helped support 253, 000 employment opportunities and resulted in expenditure by visitors amounting to U. K. ? 22 billion which consisted of U.K. ? 8 billion is generated by staying overseas visitors. While much of the tourism takes place at the capital city at the inner sections, the significance is felt as a whole including the boroughs. The London’s visitor economy grew steadily in the leisure market in the period 2002 to 2007, making a quick recovery from the adverse effects of the terrorist act of September 11 characterized by a reduction in the number of staying tourists. Nevertheless, the number of visitors to London from overseas declined from 15.3 million to 14.7 million in the year 2007 while that of domestic visitor numbers rose from a figure of 10.1 million to 11.3 million. In terms of the economy, the revenue generated from tourism toward s the economy of London comprise about 10 percentages of the gross value added income of London and the projections is that the amount spent by tourists in London costs about U.K. ? 15 million per year. The statistics also show that about 13 per cent of the people who work or are employed in London are in the tourism sector alone and is predicted to rise dramatically due to the marketing strategies that have been put in place to position London as an ideal tourist destination (LDA 2009). Some of the famous tourist attractions in London include Buckingham palace that attracts about 15 million tourists per year, Green Park and St. James Park, the Victoria and Albert Museum the leading museum of its category globally, the British Museum, the Tower of London along River Thames, the Tower Bridge and the Big Ben. However, the cultural sector of London is the major contributor to its economy in terms of the income and the jobs it generates to the citizens as many tourists comprising 70% ci te it as the major reason for their visits. This is achieved from the high number of overseas visitors who flock into London to see and visit its numerous attractions and the central as well as the management of London has played a key role in the provision and support of the cultural heritage of London to ensure fair access. When viewed as a cultural metropolis, tourism contributes to the employment of about half a million

Carl Marx View on Human Freedom Essay Example | Topics and Well Written Essays - 500 words

Carl Marx View on Human Freedom - Essay Example Much more, freedom in education will be narrower if we wouldn't have access to quality education - this will somehow fall into privilege. The same thing goes with our freedom for the quality nourishment. We wouldn't be entirely free or privileged if stock of food will be limited, as we are under the restriction of immediate available means. Several factors also considered to be major hindrances of such freedom. Racial discrimination is one. It is apparent that it suppresses the rights and freedom of many colored-skin people, just because of their skin. There are cases that some housing privileges were not considered to the blacks because of their skin color. Undeniably there are still rights and privileges that some of the colored skin people cannot fully acquired. Faith or spiritual conviction can also limit the freedom of certain individual regarding beliefs and spiritual principles and practices. This also somehow affects the lifestyle of individual inevitably, when one put into application the beliefs and principles. Gender is also another factor that limits the freedom of certain individuals.

Interpersonal Communication in Relationships Research Paper

Interpersonal Communication in Relationships - Research Paper Example So far, the course has provided vast amounts of information that would assist in improving interpersonal relationships through the right application of communication theories and approaches. I would be structuring my advice in five sections: the principles and misconceptions in effective interpersonal communications; barriers to effective interpersonal interactions; the process of developing and maintaining self-concept; assessing your personal communications and improving communication competencies; and finally, developing strategies for active, critical and emphatic listening. I am sure that although this letter is lengthy, the information contained herein is validated from significant findings sources from researches on the subject by authoritative practitioners in the field. Principles and Misconceptions in Effective Interpersonal Communications Effective interpersonal communications must address issues that lead to misconceptions on communication. Remember John and Vivian how mi sunderstandings commonly results from misinterpreting the messages relayed by the sender of the communication to the recipient, or vise versa? A relevant article published in the Health Day News entitled â€Å"Close Relationships Sometimes Mask Poor Communication† (which I will likewise attach for your further reading on you available time), revealed that couples have tendencies to assume that since they have been together for a defined period in time, their close interpersonal relationship presumes that they understand all communications relayed or exchanged in all circumstances. This is a misconception. Experts reveal that one partner should not assume that the message expressed by the other is always understood (Thompson, n.d.). To address the dilemma, couples must repeat what one said to confirm it the message was correctly understood. Accordingly, the implicit rule is to double check with each other (Thompson, n.d.). The Health Day News article cited Nicholas Epley, a pr ofessor of behavioral science at the University of Chicago Booth School of Business, as explaining the rationale for the misconception, to wit: â€Å"our problem in communicating with friends and spouses is that we have an illusion of insight. Getting close to someone appears to create the illusion of understanding more than actual understanding" (Health Day News, 2011, p. 1). In this regard, to improve communication, John and Vivian, you need to pay closer attention not only on the verbal language that you exchanged, but also on nonverbal modes of communication, such as gesture, body language, tone of the voice, eye contact and even silence (Grohol, n.d.). Caution is likewise advised in the interpretation of nonverbal signals that could also be susceptible to be misinterpreted. The rule on double checking still applies. The website on Family Education provide relevant suggestions to improve communication skills by following the guidelines on steps in clear communication: to observ e undivided attention, figuring out what one really wants to say, and practicing being a good listener, among others (Family Education, n.d.). Now that issues of misconception are resolved, we now proceed to barriers to effective interpersonal interactions. Barriers to Effective Interpersonal Interactions There are diverse sources of barriers that deem to preclude the level of

Thursday, October 17, 2019

Assignment Essay Example | Topics and Well Written Essays - 500 words - 79

Assignment - Essay Example There are various procedures in which the court martial deals with cases especially those relating to criminal cases of a military officer. After an offense is committed by an officer, the case can be reported by anyone to the accused’s immediate commander as soon as possible. After one confinement, one is subjected to three types of pre-trial restrictions such as order of severity, confinement, and apprehension. The accused is then arrested or apprehended either through an order, orally or in written from by competent authority that also directs the accused to remain within certain specified limits. Service members in military, relish analogous rights secured by the statute and executive order, a military law gives the defendant, the right to counsel before a special or general court martial or an Art. 32 investigations. At the Supreme Court decision made was that there was no constitutional right to the counsel in summary courts-martial. Usually in special courts-martial, any accused has the right to; military counsel of his/her selection at government expense if available. Civilian counsel of his choosing, allotted military counsel at the Government expense. Article 38(b), 10 U.S.C. Â § 838(b). For multiple defendant cases, discrete counsel is appointed for each defendant to avoid any problem of conflicts of interest. Article 38(b)(4), 10 U.S.C. Â § 838(b)(4). For the accused who decides to choose a civilian counsel he/she is also entitled to appointed military associate counsel. Article 38(b)(4), 10 U.S.C. Â § 838(b)(4). The right to counsel does not only apply at trial, but also at pretrial investigations. This may also take place during depositions, and upon the appeal. Under article 70, the practice of appointing new counsel during appeal insures a renewed look at trial errors and competency of trial defense counsel. An appointed counsel must also meet the following competency; the counsel must be of typical competency in identifying legal

Where is Iwo Jima, and what is its significance Essay

Where is Iwo Jima, and what is its significance - Essay Example The little volcanic island of Iwo Jima is situated a little over 650 miles southeast of Japan, about halfway between Tokyo and the American airfields on Guam, Saipan and Tinian in the Mariana Islands. Guam, the biggest island, was a U.S. protectorate, before the Second World War, and the Navy had a communications station there. The neighboring Saipan and Tinian were Japanese colonies. American forces raided the Marianas in mid 1944 and instantly began construction of what came to be the world’s biggest aerodrome for the Super fortress bombers of the U.S. 20th Air Force. The Super fortress bombers were earlier stationed in mainland China, but providing them with enough fuel was a logistic nightmare (Rogers, 1). When Marines saw Iwo Jima for the first time, it was an ugly lump of volcanic sand and clay. It was different from any other island they had ever seen. They saw an ugly lump of volcanic sand and clay, which was treeless, craggy, and blistered with endless sand hummocks rather than palm trees and a white ribbon of beach, or the green cane fields of Saipan and Tinian. Mount Suribachi, at the southern tip, appeared like something out of an inferno; the plateau at the north was a series of hills and ridges. The beach was black instead of white, while the vegetation that grew sparsely was wilted, colorless and burned out (Bradley, 10). Luft adds that Suribachi Mountain was given this name because of its shape which looks like an upturned bowl. Joe Rosenthal captured the iconic photo of the raised Marine flag here on Feb. 23, 1945. Despite the last full-scale eruption occurring in 1727, looking into the center of the crater, steam can be seen rising from a vent while the smell of sulfur f ills every breath (38). Iwo Jima was the step to the Japanese heartland for the 70,000 Americans and to the end of a terrible war. However, for the 22,000 Japanese defenders, Iwo Jima

Wednesday, October 16, 2019

Interpersonal Communication in Relationships Research Paper

Interpersonal Communication in Relationships - Research Paper Example So far, the course has provided vast amounts of information that would assist in improving interpersonal relationships through the right application of communication theories and approaches. I would be structuring my advice in five sections: the principles and misconceptions in effective interpersonal communications; barriers to effective interpersonal interactions; the process of developing and maintaining self-concept; assessing your personal communications and improving communication competencies; and finally, developing strategies for active, critical and emphatic listening. I am sure that although this letter is lengthy, the information contained herein is validated from significant findings sources from researches on the subject by authoritative practitioners in the field. Principles and Misconceptions in Effective Interpersonal Communications Effective interpersonal communications must address issues that lead to misconceptions on communication. Remember John and Vivian how mi sunderstandings commonly results from misinterpreting the messages relayed by the sender of the communication to the recipient, or vise versa? A relevant article published in the Health Day News entitled â€Å"Close Relationships Sometimes Mask Poor Communication† (which I will likewise attach for your further reading on you available time), revealed that couples have tendencies to assume that since they have been together for a defined period in time, their close interpersonal relationship presumes that they understand all communications relayed or exchanged in all circumstances. This is a misconception. Experts reveal that one partner should not assume that the message expressed by the other is always understood (Thompson, n.d.). To address the dilemma, couples must repeat what one said to confirm it the message was correctly understood. Accordingly, the implicit rule is to double check with each other (Thompson, n.d.). The Health Day News article cited Nicholas Epley, a pr ofessor of behavioral science at the University of Chicago Booth School of Business, as explaining the rationale for the misconception, to wit: â€Å"our problem in communicating with friends and spouses is that we have an illusion of insight. Getting close to someone appears to create the illusion of understanding more than actual understanding" (Health Day News, 2011, p. 1). In this regard, to improve communication, John and Vivian, you need to pay closer attention not only on the verbal language that you exchanged, but also on nonverbal modes of communication, such as gesture, body language, tone of the voice, eye contact and even silence (Grohol, n.d.). Caution is likewise advised in the interpretation of nonverbal signals that could also be susceptible to be misinterpreted. The rule on double checking still applies. The website on Family Education provide relevant suggestions to improve communication skills by following the guidelines on steps in clear communication: to observ e undivided attention, figuring out what one really wants to say, and practicing being a good listener, among others (Family Education, n.d.). Now that issues of misconception are resolved, we now proceed to barriers to effective interpersonal interactions. Barriers to Effective Interpersonal Interactions There are diverse sources of barriers that deem to preclude the level of

Tuesday, October 15, 2019

Where is Iwo Jima, and what is its significance Essay

Where is Iwo Jima, and what is its significance - Essay Example The little volcanic island of Iwo Jima is situated a little over 650 miles southeast of Japan, about halfway between Tokyo and the American airfields on Guam, Saipan and Tinian in the Mariana Islands. Guam, the biggest island, was a U.S. protectorate, before the Second World War, and the Navy had a communications station there. The neighboring Saipan and Tinian were Japanese colonies. American forces raided the Marianas in mid 1944 and instantly began construction of what came to be the world’s biggest aerodrome for the Super fortress bombers of the U.S. 20th Air Force. The Super fortress bombers were earlier stationed in mainland China, but providing them with enough fuel was a logistic nightmare (Rogers, 1). When Marines saw Iwo Jima for the first time, it was an ugly lump of volcanic sand and clay. It was different from any other island they had ever seen. They saw an ugly lump of volcanic sand and clay, which was treeless, craggy, and blistered with endless sand hummocks rather than palm trees and a white ribbon of beach, or the green cane fields of Saipan and Tinian. Mount Suribachi, at the southern tip, appeared like something out of an inferno; the plateau at the north was a series of hills and ridges. The beach was black instead of white, while the vegetation that grew sparsely was wilted, colorless and burned out (Bradley, 10). Luft adds that Suribachi Mountain was given this name because of its shape which looks like an upturned bowl. Joe Rosenthal captured the iconic photo of the raised Marine flag here on Feb. 23, 1945. Despite the last full-scale eruption occurring in 1727, looking into the center of the crater, steam can be seen rising from a vent while the smell of sulfur f ills every breath (38). Iwo Jima was the step to the Japanese heartland for the 70,000 Americans and to the end of a terrible war. However, for the 22,000 Japanese defenders, Iwo Jima

Great Gatsby Novel vs Film Essay Example for Free

Great Gatsby Novel vs Film Essay The Great Gatsby by F. Scott Fitzgerald is an iconic novel of American literature. It is seen as a definitive novel that highlights aspects of life and thinking in 1920s America. Due to its cultural significance and popularity, numerous attempts have been made to translate The Great Gatsby from novel to film. The most notable presence of the film portrayed on screen, was the 1974 film, The Great Gatsby. The film starred big name celebrities such as Robert Redford as Gatsby, Mia Farrow as Daisy, and Sam Waterston as Nick. The movie also featured a script written by Francis Ford Coppola. While overall being considered a good film which stayed true to the novel, many thought it lacked heart and emotion. While Baz Luhrmanns The Great Gatsby is the fifth time, the novel has been filmed, it is only the second time a film adaptation of the novel will see a widespread general release. The Great Gatsby (2013) comes from Australian director Baz Luhrmann, and stars Leonardo DiCaprio as Gatsby and Tobey Maguire as Nick Carraway. The film like the book, is told through the narration of Nick Carraway. Carraway lives next to the mysterious Gatsby who has numerous large and extravagant parties. Gatsby is rarely seen by the public, and it is unknown to people how Gatsby became wealthy. The film follows Nick’s interactions with Gatsby and most notably the relationships between Gatsby, and the girl he loves Daisy Buchanan, as well as Daisy’s husband Tom. Much of the tension in the film stems from the class differences between New Money, and Old Money. People who belong to the class of Old Money are generally old aristocratic families, specifically highlighted by Tom and Daisy Buchanan. People who belong to the class of New Money are people who have recently acquired there fortune through various entrepreneurial ventures and jobs such as stock brokers. The main characters in the film who are part of New Money are Gatsby and Nick. The film is set against the backdrop of the wealthy society during the roaring twenties in and around New York and Long Island. Baz Luhrmann’s The Great Gatsby tries to express the same themes as are found in the book. One of the main themes is the differences in the various classes in the United States. Gatsby has a very different outlook on life compared to that of Tom Buchanan. Gatsby is considered new money meaning his fortune is recent and self-made, while Tom is from old money, where legacy and familiarity with the wealthy lifestyle are more apparent. Tom tends to believe in class and education and finds Gatsby essentially a crude bootlegger. Gatsby while not having the sophistication or education of Tom believes he can win over Daisy’s heart with extravagant parties and money. The film also demonstrates the apparent dismissal of the new money as equals. Tom is seen as a bully and someone with less morals than that of Gatsby, highlighted through Tom’s affair with another woman. The film also highlights the recklessness of the 1920’s. The 1920’s are shown as a period where money was plentiful and people were not afraid to spend it. People were frequently spending money they did not have on things they did not need. Gatsby is shown to be a very flashy person with a pink suit and expensive cars. Historically speaking it is now known compared to when the book was written the consequences of the recklessness. (i. e. the great depression) It is clear that the main relationship that Luhrmann wanted to emphasize was the relationship between Gatsby and Nick. Throughout the course of the film there are various differences from the novel that highlight the emotional relationship that Gatsby and Nick share with one another. For example the film has Nick telling the story to a doctor at a centre for rehabilitation, while the novel does not specify who Nick is narrating the story too. Nick is apparently here for Alcoholism which demonstrates that his experiences with Gatsby and ultimately Gatsby’s death took a more traumatic toll on Nick’s life. Also in the film Nick’s relationship with other women, specifically Jordan in the novel, is virtually non-existent. In the film there is no evidence to show that Nick maintains or has a romantic relationship with anyone. This once again highlights the strength of his relationship with Gatsby. Perhaps the most interesting difference is the lack of anyone who shows up for Gatsby’s funeral in the film. Nick is the only one who attends the funeral and he is seen as heartbroken. In the novel however, people do attend Gatsby’s funeral specifically Gatsby’s father. The special relationship that Luhrmann creates for Gatsby and Nick may be suggesting that Nick is in fact in love with Gatsby. Being directed by Baz Luhrmann, anyone familiar with his previous work will know what to expect from The Great Gatsby. People who enjoyed the general story of the book will enjoy this particular film version, but as for getting a point across or inciting emotion the film tends to be very shallow. While Luhrmann likes to create a visual spectacle, one can only be distracted by pretty colours and lights for so long. The actors in the film, while all good, are clearly not the directors primary focus. Luhrmann is able to bring the spectacular parties and beautiful landscapes to life, he is not able to really create distinct relationships between the characters and actors of the film. The two most standout performances are that of Tobey Maguire and Leonardo DiCaprio, the relationship between Gatsby and Carraway is by far the most interesting part of the film. Carraway’s obsession and defence of Gatsby may lead one to believe that he wants to be more than just friends with Gatsby.

Monday, October 14, 2019

User authentication

User authentication Introduction I was appointed as the new Network Manager for Philadelphia Inc. It is a large multinational organisation which has an extensive network of PCs comprising more than 1000 systems. This organisation relies heavily on its vast network for its day to day operation. Any potential risks need to be identified and minimised as far as possible. Recently a large number of PCs were affected by a virus, causing a work stoppage among the administration and accounting department. Following this incident of large scale virus infection, the company management has decided to completely review all the computer security precautions and procedures in use within the organisation. So, I have been designed to ensure that I can identify potential threats to the security of the organisation’s network and formulate appropriate action plans and security policies to minimise the risks. Research and document the various aspects of network security that need to be addressed including each of the following topics: Access control User authentication Firewalls Virus protection Accessing the Internet (15 Marks) I’m research and document the various aspects of network security that need to be addressed. Access control Access control is the methods for imposing controls that allow or deny user access to network resources, usually based on a user’s account or a group to which the user belongs. Access control is security features that determine which resources users are permitted to access, what type of access they are allowed, and how many simultaneous users can access a resource at the same time. They ensure data privacy and protection and help maintain a productive computing environment. User authentication User authentication is a security feature that allows an administrator to control who has access to the network and what users can do after they are logged on to the network. This might involve confirming the identity of a person, the origins of an object, or assuring that a computer program is a trusted one. Authentication is the process of determining the identity of a network user by verifying a set of user credentials, typically a user ID and password. Firewalls A firewall is a combination of hardware and software components that provide a protective barrier between networks with different security levels. Rules for transmitting and receiving information to and from the other network can be established for the firewall so that specific types of items or addresses are not allowed to pass between the networks. It sits between the computer and the rest of the network, and according to some criteria, it decides which communication to allow, and which communication to block. Firewalls protect a computer or network from unauthorised access and attacks designed to cripple network or computer performance. Moreover, it is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Virus protection Virus protection means securing data from viruses that is designed to destroy data or make the computer or network operate inefficiently. Computer viruses are the programs that must be triggered or executed before they can infect the computer system and spread to others. Viruses can then be spread by sharing infected files on a network drive, portable drive, or other media, by exchanging infected files over the internet via e-mail attachments, or by downloading debatable files from the internet. Accessing the internet Accessing the internet is the telephone communication system that also covers the world linking telephones together. As with the telephone system, each device attached to the network can be reached through a unique code that represents that device’s location. The telephone system access and services are supplied to phone users by an array of competing local, long-distance, and wireless telephone companies, access to the internet is also supplied through a number of access and hosting companies using an array of different connectivity methods. A user in your company calls to report that she’s unable to log on to email. You respond with a couple of quick questions. Because you know that no one else is using the network right now, you cannot determine if the problem is unique to her machine or if the problem affects the entire network. Probing further, you also learn that she’s unable to print. You decide this problem is probably easier to troubleshoot from the user’s computer. Using the structured troubleshooting method, outline the things you must check and the questions you must ask when you arrive at the user’s office. Based on the possible responses to your questions, describe the actions you will take to correct the potential causes. (10 Marks) One of the users in our company reports me that she’s unable to log on to her email account. So, I asked her some questions- How long the duration of your user account? Do you sure the log on user name and password is correct. When it starts to unable to log on to your email? After I arrive at the user department, I check her computer and network. I also learn that she’s unable to print to a network printer. Probing some of the check, other users of this department can able to log on to their email account and can able to print. Therefore, I ask her a couple of quick questions again- What has changed since the last time you worked? Have you installed anything on your own? Are there applications on your computer that arent on other computers? Firstly, I check the power is plugged in, the Caps lock is on, all the cables are attached and network permissions for her computer. Then I check that she can get a connection online or not by browsing Google website and I see there is no connection online. So, I check the Ethernet cable and connection setting. In checking her problem, I document that what I do, so I can undo it if I need to. I use Ping to check the computer can contact an IP address of another PC or not. (Ping is the simplest and most useful diagnostic tool to become familiar with and well worth a few minutes experimentation.) The reply message is â€Å"Request timed out†. It is because of the connection or routing error. Then I restart the computer because 90% of all problems disappear when the computer is restart. To check the router, I Ping the local router, and it fails. So, the problem of the local LAN or the router is sure. Then, I find the router and switch to check the LED display. And I think they ar e not normal, so I switch the unit OFF, remove and immediately replace the power connection, then switch the unit ON. After it has done, I go back to the computer and retry to Ping the local router. I have successfully sent a message to the local router and receive a response. Then, I check the computer can get a connection online or not, and can able to browse the website or not. Then I see the computer successfully get a connection online. So, I check the email account can be able to log on or not and the printer can be able to print or not. Then I see the problems of the user are successfully solved. Task 3 Produce a Security Review report, which details the specific threats to network security for ALL of the topics identified in Task 1, namely Access Control, User Authentication, Firewalls, Virus Protection, and Accessing the Internet, along with your proposed solutions aimed at reducing the risks associated with each threat. (35 Marks) Access Control Access control can identify the users, and verify their identity through an authentication process so they can be held responsible for their actions. Good access control systems record and timestamp all communications and transactions so that access to systems and information can be audited later. The primary objective of access control is to preserve and protect the confidentiality, integrity, and availability of information, systems, and resources. I use role-based access control and rule-based access control to identify the user. Role-based access control systems allow users to access systems and information based on their role within the organisation. It allows end-users access to information and resources based on their role within the organisation. Roles based access can be applied to groups of people or individuals. Rule-based access control systems allow users to access systems and information based on pre-determined and configured rules. Rules can be established that allow access to all end-users coming from a particular domain, host, network, or IP addresses. User Authentication User authentication is an important aspect of network computer security. For network computer, harm can be caused by hacking, malicious messages, viruses, malwares, adwares, email attachments, downloading illegal materials and many other types of activity. Moreover, the secret information of the company can be stolen by the attacker using spywares and Trojan horses. User authentication will reduce this harm by limiting individual’s access to a few systems, rather than the whole Internet. Network operating systems include tools that enable administrators to specify a number of options and restrictions on how and when users can log on to the network. There are options for password complexity requirements, logon hours, logon locations, and remote logons, among others. After a user is logged on, file system access controls and user permission settings determine what a user can access on a network and what actions a user can perform on the network. So I specify the numbers of options and policies for user authentication. I specify that the password is required for all users of the company, to use the company’s computer. The user password length must be typically a minimum of five to eight characters and user passwords must have three of these four characteristics: lowercase letters (such as abc), uppercase letters (such as ABC), numbers (such as 123), and special characters (such as [emailprotected]#). And I specify the policy that can lock the user account to prevent from logging on, when a user enters an incorrect password five times. According to the user account and password, I control which user can access to the network and what he/she can do on the network. Firewalls Firewalls protect against outside attempts to access unauthorized resources, and they protect against malicious network packets intended to disable or cripple a corporate network and its resources. Second use of firewalls placed between the internet and the corporate network is to restrict corporate user access to internet resources. Firewalls can identify and block remote access Trojans (Trojan horse). Trojan horse is a program that purports to be a useful software tool, but it actually performs unintended (and often unauthorized) actions or installs malicious or damaging software behind the scenes when launched. Sometimes get some program via ICQ or via IRC and believe this program to be something good, while in fact running it will do something less nice to the computer. Such program is called Trojan horses. The difference of a Trojan and a virus is that a virus has the ability to self-replicate and to distribute itself, while a Trojan lacks this ability. A special type of Trojan is Remote Access Trojans (RAT). These Trojans once executed in the victim’s computer, start to listen to incoming communication from a remote matching program that the attacker uses. When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the v ictim’s computer. Firewalls can identify and block remote communication efforts to the more common RAT and by thus blocking the attacker, and identifying the RAT. There are many other types of Trojan horses which may try to communicate with the outside from the computer. Whether they are e-mail worms trying to distribute themselves using their own SMTP engine, or they might be password stealers, or anything else. Many of them can be identified and blocked by a firewall. So, I run the firewall on the server and all the desktop computers to protect Trojans, malware, and to prevent users from accessing offensive Websites or bandwidth-intensive content that might not be the best use of an employee’s time or the network’s bandwidth. Firewall devices from different vendors vary quite a bit in configuration details, but they are all based on one premise: Rules are created to determine what type of traffic is allowed to enter and exit the network. To configure a firewall, I build rules that allow only certain packets to enter or exit the network. The firewall can examine all incoming packets and discard packets with a destination address of the network’s restricted segment. Virus Protection In internet-connected networks, virus attacks are a regular threat. Users download programs, bring disks from home, memory sticks, and open e-mail attachments are normal computing activities, but they can also bring viruses into the network. A virus is a program that spreads by copying itself into other programs or documents. Computer virus can attack computer systems and perform a variety of functions ranging from annoying to dangerous. Its individual purpose is to disrupt computer or network operation by deleting or corrupting files, formatting disks, or using large amounts of computer resources. If a server file accessed by other users on the network is infected, the virus can spread through the network in a matter of seconds. To protect the spread of viruses, one of the most effective ways is to buy virus-protection software from a reputable source. Antivirus software is program that can scan and remove known viruses which have contracted. Most antivirus software is also designed to detect and prevent worms and viruses. The software can also be set to automatically scan disks when inserted into the disk drive, scan files when downloaded from the Internet, or scan e-mail when received. However antivirus software is available in many commercial and open source versions, the license-version of the antivirus software from reputable source is more secure and reliable than others. So, I run the standard antivirus software from reputable source in server and every desktop computer, and turn-on the scanning features. But by running antivirus software can only protect against viruses that it knows about. Therefore, virus definition files (update files) for antivirus software are needed to download from the internet daily or weekly. To get the maximum protection against viruses on the computer, make sure to keep antivirus definition files current. Another way to protect the data from virus infection is â€Å"backup the files† which helps to recover the data if the original files infected by the virus. Accessing the Internet The internet access is the essential thing to communicate between internal or external organisation for many purposes. Thousands of companies have discovered the pervasive power of the Web in distributing information, selling products, supporting customer service, and staying in touch with clients and customers. By using the internet, we can get important business information which is necessary for competition and improvement of the company. However the internet is useful for us, but also the internet attack can harm the business. The internet attacks are organised and designed to steal information and resources from the customers and the organisation. Input validation attacks using the Common Gateway Interface (CGI), Active Server Pages (ASP), and Cold Fusion Markup Language (CFML) programs stem from either a web developer or vendor failure. The basic problem happens from the lack of sanitizing the input to a particular script. Without input validation and sanitizing, it is possible for attackers to submit a particular character, along with a local command, as a parameter and have the web server execute it locally. Sometimes, the virtual website of the attackers steals user information and user’s credit card details. If all kinds user can get permission to access the network, the private information of the organisation can be stolen by the attacker using the internet. So that I control the user access to the network resources by using access control and identifying the user account to verify the network permission for the user. Task 4 Create a set of Acceptable Use Policies for each of the following: Accessing the WWW Email Usage Instant Messengers and chat rooms Each of these documents should provide a set of guidelines for users which will minimise any associated security threats. (30 Marks) To minimise any potential risks and associated security threats of the organisation’s network, all the staff of the company should agree the following policies for accessing the World Wide Web, email usage, instant messengers, and chat rooms. All the staff has responsibility to use the resources in an efficient, effective, ethical and lawful manner. In our organisation, access to the internet is available for the staffs to support informational, educational and communicable. So, staffs should agree the following internet access policies. Policies for accessing the WWW The use of Internet is strongly restricted to official company business†. Personal use or time spent for personal gain is strictly prohibited. Authorisation for Internet access must be obtained through your supervisor. Once authorisation is approved you are responsible for the security of your account password and you will be held responsible for all use or misuse of your account. You must maintain secure passwords and never use an account assigned to another user. Staffs are strongly prohibited to accessing internet websites that contain obscene, hateful, pornographic, politics or otherwise illegal material. Never copy or transfer electronic files without permission. Prohibit copying and sending any confidential or proprietary information, or software that is protected by copyright and other laws protecting intellectual property. Downloading a file or application from the Internet can bring viruses with it. Should be scan all downloaded files with standard virus prevention software before being saved on the company’s network. All downloaded applications must be accepted by the company’s IT administrator or company owner before being installed on the company’s network. Hacking into unauthorised areas and other employee’s computers are strictly prohibited. Confidential information is not to be transmitted over the internet without proper encryption. Introducing any form of computer virus or malicious software into the corporate network is strictly prohibited. Email usage policy Email is to be used for company business only. Company confidential information must not be shared outside of the Company without authorisation, at any time. When conducting company’s business, only use the company’s official email account for staff such as [emailprotected] Staffs are not to conduct personal business using the Company computer or email. All messages must show the genuine sender information (from where and from whom the message originated). The representation of yourself as someone else, real or fictional, or a message sent anonymously is prohibited. Emails for the purposes that violate company status or regulations, or for an illegal or criminal purpose may not be sent or forwarded through a company’s network. Management has the right to access all e-mail files created, received, or stored on company systems and such files can be accessed without prior notification. Email attachments can bring viruses, you should scan for virus after and before downloading the attachments with standard virus prevention software. Do not open any e-mail attachments if you do not recognize the sender. Forwarding of company confidential messages to external locations is strongly prohibited. Introducing any form of computer virus or malicious software into the corporate network is strictly prohibited. Policies for instant messengers and chat rooms Chats, also known as Internet Relay Chat (IRC), as well as Instant Messaging (IM), are very popular modes of quickly communicating with others. In using these IRC and IM, staffs should agree the following policies. These policies provide staffs with effective and consistent instant messaging (IM) use and content standards. Staffs are prohibited from downloading and using personal instant messenger software such as MSN or Yahoo to transmit messages via the public internet. All IM communications and information transmitted, received, or archived in the companys IM system belong to the company. The instant messaging and chatting system is intended for business use only. Staffs are prohibited from wasting computer resources, colleague’s time, or their own time by sending personal instant messages or engaging in unnecessary chat related to business. Treat messages as business records that may be retained and used as evidence in litigation, audits, and investigations. Always use professional and appropriate language in all instant messages. Staffs are prohibited from sending abusive, harassing, threatening, menacing, discriminatory, disrespectful, or otherwise offensive instant messages. Staffs may not use instant messengers and chat rooms to transmit confidential, proprietary, personal, or potentially embarrassing information about the company, employees, clients, business associates, or other third parties. Introducing any form of computer virus or malicious software into the corporate network is strictly prohibited. Task 5 Prepare and deliver a short presentation to your tutor using a presentation package like Power Point which summarises the major points in your Security Report and your proposed Acceptable Usage policies. (10 Marks) I prepare and deliver a short presentation to the tutor using a Power Point presentation which summarises the major points in my Security Report and my proposed Acceptable Usage policies. Network computerised system can contain various potential threats. To minise that risks, network security is required. In this presentation, I want to talk about five topics to configure network security Access Control User Authentication Firewalls Virus Protection Accessing the Internet Access control can control the user account and identify the user. It can verify user identity through an authentication process so users can be held responsible for their actions. Primary objective of access control is to preserve and protect the confidentiality, integrity, and availability of information, systems, and resources. I use role-based access control and rule-based access control to identify the user. Role-based access control systems allow users to access systems and information based on their role within the organisation. Roles based access can be applied to groups of people or individuals. Rule-based access control systems allow users to access systems and information based on pre-determined and configured rules. Rules can be established that allow access to all end-users coming from a particular domain, host, network, or IP addresses. User authentication can determine the identity of a network user. For network computer, harm can be caused by hacking, malicious messages, viruses, malwares, adwares, email attachments, downloading illegal materials and many other types of activity. User authentication can reduce this harm by limiting individual’s access to a few systems, rather than the whole internet. Network administrator can control user log on and specify user permission on the network. So, I configure some options and policies for user authentication. I specify that the password is required for all users of the company, to use the company’s computer. The user password length must be typically a minimum of five to eight characters and user passwords must have three of these four characteristics: lowercase letters (such as abc), uppercase letters (such as ABC), numbers (such as 123), and special characters (such as [emailprotected]#). And I specify the policy that can lock the user account to prevent from logging on, when a user enters an incorrect password five times. According to the user account and password, I control which user can access to the network and what he/she can do on the network. Firewalls protect against outside attempts to access unauthorised resources, and they protect against malicious network packets intended to disable or cripple a corporate network and its resources. And also use to restrict corporate user access to inter resources. Firewalls can identify and block remote access Trojans (Trojan horse). Network administrator can configure the rules for what type of traffic is allowed to enter and exit the network. The firewall can examine all incoming packets and discard packets. In internet-connected networks, virus attacks are a regular threat. Users download programs, bring disks from home, memory sticks, and open e-mail attachments are normal computing activities, but they can also bring viruses into the network. To protect the spread of viruses, one of the most effective ways is to buy virus-protection software from a reputable source. Antivirus software is program that can scan and remove known viruses which have contracted. Most antivirus software is also designed to detect and prevent worms and viruses. The software can also be set to automatically scan disks when inserted into the disk drive, scan files when downloaded from the Internet, or scan e-mail when received. But by running antivirus software can only protect against viruses that it knows about. Therefore, virus definition files (update files) for antivirus software are needed to download from the internet daily or weekly. To get the maximum protection against viruses on the computer, make su re to keep antivirus definition files current. Another way to protect the data from virus infection is â€Å"backup the files† which helps to recover the data if the original files infected by the virus. Accessing the internet is the essential thing to communicate between internal or external organisation. However the internet is useful for us, the internet attack can harm the business. The internet attacks are organised and designed to steal information and resources from the customers and the organisation. If all kinds user can get permission to access the network, the private information of the organisation can be stolen by the attacker using the internet. So that I control the user access to the network resources by using access control and identifying the user account to verify the network permission for the user. To minimise any potential risks and associated security threats of the organisation’s network, all the staff of the company should agree the policies for accessing the World Wide Web, email usage, instant messengers, and chat rooms. All the staff has responsibility to use the resources in an efficient, effective, ethical and lawful manner. Reference Web Reference www.en.wikepedia.org www.businesslink.gov.uk www.3w.net www.answer.com www.procompgroup.com http://humanresources.about.com http://netsecurity.about.com http://answers.yahoo.com www.zytrax.com www.windowsnetworking.com www.cryer.co.uk Book Reference Title: Guide to Networking Essentials (Fifth Edition) Author Name: Greg Tomsho, Ed Tittel, David Johnson Access date time: 13 July 2009, 6:30 pm Title: Fundamentals of Hardware and Operating Systems (Operating System Technologies) A+ Fifth Edition Author Name: Charles J.Brooks Access date time: 15 July 2009, 5:00 pm Title: Fundamentals of Hardware and Operating Systems (Software Service Technicians) A+ Fifth Edition Author Name: Charles J.Brooks Access date time: 16 July 2009, 7:00 pm

Sunday, October 13, 2019

The Dynamic and Ever-changing Hansel and Gretel Essay -- Exploratory E

The Dynamic and Ever-changing Hansel and Gretel Most fairy-tale aficionados have a static view of their favorite stories. That is, indeed, part of the glory which these tales hold†¦the fact that they are timeless, forever remaining fond memories of unforgettable stories that had been repeated to them from a young age. In both the oral and written traditions, these stories perpetuated themselves and became fixtures upon the cultures of which they have taken hold. For most people, the idea of these classics ever having been different not only seems odd, but also shakes the foundations of their childhood memories. However, stories are dynamic and ever-changing. What a follower of the aforementioned school-of-though fails to think about is why these stories would have been changed. Sometimes fairy tales change because the person recalling the story has a bad memory, while other times they are deliberately altered by a rewriter. Often times with rewrites, the story is changed so that it is relevant to both the modern times and the life history of the new author. Hansel and Gretel, the classic German fairy tale, is certainly no exception to this trend of changing fairy tales. One of the most famous written versions of Hansel and Gretel (although not the original) is from the early 19th century. This edition was written by Jacob and Wilhelm Grimm, the German fairy-tale-writing duo more commonly known as â€Å"Brothers Grimm† (Ashliman). The story is about a young boy and girl, brother and sister, named Hansel and Gretel respectively. They lived at the edge of a great forest under the supervision of their father (a poor woodcutter) and their stepmother. The family was very poor and running low on food†¦soo... ... by a common plot, slight changes changed the entire idea the story was trying to portray. The two different versions created two different images in the minds of readers/opera fans. Hansel and Gretel, like many other tales, has evolved and changed over time. Whether for reasons rooted in principle or simply out of practicality, fairy tales such as Hansel and Gretel will be changed by new writers or orators. This, however, in no way detracts from their timelessness. Works Cited Ashliman, D.L. Grimm Brothers’ Home Page. 02 Sep. 2002. University of Pittsburgh Website. 21 Jan. 2004. . Brothers Grimm. â€Å"Hansel and Gretel.† The Classic Fairy Tales. Ed. Maria Tatar. New York: W.W. Norton, 1999. 179-90. Engelbert Humperdinck. n.d. First Coast Opera. 21 Jan. 2004 .

Saturday, October 12, 2019

My Values and God Essay example -- Religion, Gods Values

Values in life are something that are extremely important to have in my life. A value is something that a person considers to be important to themselves. Financial values vary from person to person. Not everybody wants the same lifestyle. Some people dream of having expensive cars, spacious homes and many possessions. Others search for the simple life, uncluttered by material goods. Our values influence the way we earn, spend, save, invest and spend money. Personal values are influenced by family and friends, by television and movies, and by what attracts us in the marketplace. For example, you may want to go to college, yet you want to earn money to buy a new car. If you cannot afford both, you must make a choice. A goal is a preferred future condition. It is more than a hope.Goals help you to get more of what you want out of life. They represent the ideal state to which you aspire, guiding all your actions towards this aspired state. What do you need to set goals? You need to know who you are (identity), your values, goals that you want to achieve, an action plan to achieve these goals, what motivates you, flexibility and self-discipline. Knowing who you are will keep you focused as you set priorities and accomplish challenges in your personal and professional lives. When you engage in self-reflection, it is helpful to avoid defining yourself in terms of external trappings, others' expectations or stereotypes. Establishing your values will help you to set goals in priority. Without values, all goals will be important, making it difficult for you to decide which should take precedence. Goals need to be specific. They should have a defined objective and deadline that allow you to asses... ..., then my life does not have meaning, and there is no explanation as to why I am alive. If He does not exist, then I have based my life on a false theory, however, there is no definitive proof that He is real or not. My interpretation of God is solely individualistic and therefore, I can not impose my beliefs on other people. I am not certain that there is concrete evidence that God really exists. However, I do know that He plays an important role in my life. I have my own view of who God is and what He has done for me. For some people, my opinion may not hold enough substantial evidence and whether this is true or not is not for me to decide. Instead, I have come to an understanding that at this stage in my life, someone else may not accept my beliefs. However, I can be happy with this and move on. I can only testify to the beliefs and faith that I hold in God.

Friday, October 11, 2019

Business Case Essay

This business case outlines how the e-Saman project will address current business concerns, the benefits of the project, and alternative of the project. The business case also discusses detailed project goals, project’s MOV and alternative options. 1 Problem or Opportunity Currently, when students are summoned by the auxiliary police, they need to come to auxiliary police headquarters to check the status and pay their summons. If students do not know that they are being summoned, the summons would deferred and students must pay before graduate in order to get the certificate. In order to effectively manage summons in auxiliary police headquarters and reduce time consuming, auxiliary police headquarters must move to a web-based application as outlined in this business case for the e-Saman project. By doing so, it will easier to students to check and pay their summons and auxiliary police can manage all summons payment efficiently. 2 Organization’s Goal and Strategy Auxiliary police UiTM ‘s goals are: 1. Security policy makers in all UiTM campus. 2. Implementing security controls in a systematic and continuous. 3. Enforce laws and regulations on the safety of the university community in a prudent and proactive. 4. Providing security services affairs in an efficient and effectively 5. Manage the auxiliary police headquarters to be the professional security, integrity and accountability 1.3. Project’s Measurable Organizational Value 1. To inform the student about the summons that they got. 2. Student can pay online without have to go to the auxiliary police station. 3. To increase the efficiency in managing payment of the summons. 4. To inform the student about the latest news or announcement for example discount rate offer. 1.4. Option or Alternative Analyzed To develop an online system where: i. Students can check whether they got a summon or not. ii. Students can pay the summon through online using this system. iii. Students can get the information about the UiTM rules. iv. Students can get the latest news from UiTM. v. The e-Saman system is also provides an announcement. vi. The e-Saman system contains the rules and guidelines for students. vii. Students can know who the officer on due. 1.5. Alternative Explanation Recommended alternative is to develop an online system where student can check and pay bill online because: i. The only place that student can check the summons is at the police station. ii. Technology evolvement. In the new technology era, people nowadays cannot leave without using the internet. Therefore it is practical to use online system especially to student. iii. Time consuming for student to go pay manually. 2. Introduction 2.1. Background Organization The history of Security Department was initially started in 1974 when MARA University of Technology was fully established. Before that, the security control for the MARA University of Technology was entirely handled by the SafeGuard Security Company at the Jalan Othman, Petaling Jaya. The main purpose of the development of this department is to obtain some responsibility that concerning of the security, peaceful threatening and matters that relating to the Institute and the name of institute. The duties of this department are to enforce rules and regulations for UiTM is one of the â€Å"Executive Function† and status are given for ensuring UiTM image as a whole and the efficiency and effectiveness of towards campus society do not affecting at all. Generally, function of this unit are been divided into several group according form of tasks such as logistic and administration division, operation, special tasks and discipline. These forms of tasks are including:- †¢ Security Control †¢ Traffic Control †¢ Controlling the staffs and students discipline †¢ To avoid fire fighting †¢ Investigation †¢ Logistic and Administration †¢ Training Security Department was upgraded to UiTM Auxiliary Police on 18 April 2011. In the early years of the establishment of UiTM Auxiliary Police, it’s have been known as UiTM Help Security Unit later upgraded to the Security Department. Administrative structure varies according to the current development of universities either placed under the supervision of the Office of the Director, Office of the Registrar and the Office of the Chancellery. Beginning August 1, 2011, the Administration of Auxiliary Police is put under the Vice-Chancellor and known by the name of UiTM Auxiliary Police Headquarters. For state campuses, they were placed under the administration of the Campus Rector and known as the Office of Auxiliary Police. Function and role of Auxiliary Police still the same but the scope of duties and jurisdiction has been expanded to have police powers. System e-Saman is a system of integrated programs designed to make it easier for a user to discover information in a convenient way and become a vital to our life rather than Manual System. For these proposed, the development of e-Saman for Security Department of UiTM is being build up to determine the staff acceptance level of the e-Saman system and also to develop a solution replacing the existing conventional system with a web-based computerized system. Mainly, this project proposed to make information management more organized and effectives. The e-Saman is the new concept of system management where the entire organized summons will be supervised by on-line system. This new concept of system management will helped the Security Department of UiTM to control the students summon so that it will be more effective and efficient. Employees of Security Department of UiTM can easily updating and checking students summons. Besides that, they can storing and retrieve the summons’s records. For the students, they can pay online without have to go to the auxiliary police station. 2.2. Current Situation The current situation that happens in UiTM Auxiliary Police is the organization is still using the manual system in handling the student’s summons. The students have to go to the Office of UiTM Auxiliary Police to pay for the summons. Besides that, their staffs also need to find the summons’s records by manually that spend a lot of time. 2.3. Description of Problem or Opportunity UiTM Auxiliary Police is currently using the manual system in handling the student’s summons. Thus, the usage of the current system is less effectives where the employee in the department has to recheck the students summons manually. According to Security Officer of UiTM Auxiliary Police, their staffs have to spend a lot of time to recheck thousands of students’ summonses. This situation, involves high costs in paying staffs’ overtime-working hours. Besides that, it creates difficulties to the staff during the university’s convocation season. Almost thousands of summonses need to be rechecking and after that, they have to send notices to student directly to their permanent address. Because of that reason, this project is proposed to ensure all the problems relating to students summon can be solved and indirectly can help the UiTM by gearing its processes to the computerized system. 2.4. Project’s Measurable Organizational Value (zie buat ni salah, tapi hok betol tu jat try tengok dalam buku, dia bagi instruction untuk buat yang ni) The development of this system gives a lot of benefits both for the Security Department UiTM itself and the students. They are: †¢ The Security Department itself can increase the effectiveness of storing and retrieve data. †¢ All students in the Faculty of Information Technology and Quantitative Science can easily to check their summons without having to come to Security Centre. †¢ Reduce time to get the student summons status. †¢ Students are easy to access through the Internet. Students are able to interactively search for information and checking their summons. †¢ Employees of Security Department can easily updating and checking students summons. †¢ The entire students’ summonses are stored at the vulnerable place. Its more secure if compare to conventional system. 2.5. Project’s Measurable Organizational Value Supporting Details (ini pon samo) Reach for a higher measure of success, an information technology project can be on time and within budget, but that doesn’t mean it will be successful. The real measure of success is the value that the project delivers to the organization. A project MOV must be agreed upon. All project stakeholders should agree upon the MOV of a project before the project starts. This requirement includes making business stakeholders as well as technology stakeholders, such as analysts and developers; agree to the MOV before a project begins as a later measurement of project success. This is a difficult task as it is in one group of stakeholders’ interest to make the MOV high while it is in the interest of the technology stakeholders to make it low. This is especially difficult as it benefits the business side to trick or take advantage of the lack of business acumen from the technology side and requires the technologist to allow them to be judges of something that they neither understand nor ultimately control. Verifiability of the MOV is the key. Since the project’s MOV is measurable by definition it must then be verifiable. After the project has been completed the MOV is to be verified to determine if the project was successful or if it was not. 2.6. Objectives of Business Case †¢ Why a project should be undertaken? †¢ Identifying a problem to be solved or an opportunity to be pursued †¢ Providing recommend solutions and plans of action and the benefits of performing them. †¢ Adequately and competently request resources and explain why they are needed in order to succeed, as well as describe the likely benefits, primarily in increased revenue or reduced losses.