Monday, September 30, 2019
Itââ¬â¢s Also For Me Essay
Since I was in prep school, there is always a significant number of people who talk to me in English. And even if itââ¬â¢s not my prime vernacular, I try really hard to converse back. I have to admit that, most of the time, I have difficulties in understanding native English speakers as the use of slang is very popular here in the United States. I got the hang of it, though, by trying to learn the language on my own ââ¬â whenever my schedule permits. I scan the dictionary every once in a while, read English short stories often, and ask my friends to talk to me in English whenever possible. These are the few ways I dig to acquire competence in writing and speaking in English, not to mention the fact that I never have had an English subject back in elementary and high school. Now that I plan to enter college, I need to pass the University Writing Skills Requirement (UWSR) as a requisite for a baccalaureate degree in my prospect university. This requirement is to measure a studentââ¬â¢s competency in English writing. Itââ¬â¢s a tough thing for me ââ¬â thatââ¬â¢s a given. But with my determination and persistence to hone my English skills (writing in particular), I am certain that I will be able to go through it and be admitted. Why not? This could also be for me! I want to prove to myself that even if Iââ¬â¢m not a native English woman, I can put myself in a position where the natives are in ââ¬â level myself to them, so to speak. I started writing in English in grade school. Even if my phrasing is bad, and most of my sentences consist of grammatical errors, I never forwent my desire to write. To strike a balance, though, I also write in my native language which is . I kept a diary and wrote a number of poems both in English and in . Back then, I remember I had troubles with my subject-verb agreement. I werenââ¬â¢t able to differentiate phrases from sentences, nouns and verbs, the past and present tenses and all that jazz. And as to speaking, I seemed to suck at pronunciation; I used to pronounce mad, mud and mod in the same way! But as I said, that was before. I am now pretty complacent of my English skills, more importantly in writing. I considered challenge every single encounter I had with a native English speaker. I tried to talk back with all confidence; and true indeed, each experience 0effected to an improvement in my skills. I am positive about satisfying the UWSR by taking the Writing Skills Test (WST) which will demonstrate my critical thinking and good analysis. I answered a few English-written essays before, analyzed a few texts and answered tough personal questions from previous mentors. These have greatly helped me in enhancing whatever level of English I possess. With these all together, I am confident to take the WST. Young optimist I am, I believe that language should never ever curtail a childââ¬â¢s longing to be educated in a good school. Education for me is something to be literally fought for ââ¬â something a child, no matter how financially constrained, should not fail to have. Everyone is entitled to it. I AM ENTITLED TO IT. Source: Writing Skills Test. California State University-East Bay. Retrieved 06 March 2008 at http://www. testing. csueastbay. edu/uwsr/wst/wsthome. php
The Benefits of Team Working
3. 1:Assess the benefits of team working in my organisation. Team works means the process of working collaboratively with a group of people in order to achieve a goal. Teamwork is often a crucial part of a business organisation, as it is often necessary for colleagues to work well together, trying their best in any circumstance. Teamwork means that people will try to cooperate, using their individual skills and providing constructive feedback, despite any personal conflict between individuals. Now I am going to discuss the benefits of team working in my organisation. DiversityWhen a team works on problem-solving, organisation benefit from various ideas and perspectives. That variety often leads to creative solutions. Brainstorming sessions uncover ideas and answers that might not have occurred otherwise. Speed Another benefit of teamwork is the speed of project completion for an organisation. Duties can be shared and get done quicker. Very large tasks can be broken up among team memb ers and are less daunting. Quality Teamwork encourages a greater commitment to quality in the organisation. Team members have more sway encouraging each other than a single manager dictating the work.Morale When the employees of an organisation work on teams, they tend to feel like they're really part of the process and take ownership of it. Improved morale results, and that in turn leads to less turnover. Synergy Synergy occurs when forces combine and the result is greater than the sum of the individual parts. Teamwork enhances synergy, and the result is greater efficiency and a more positive end result. 3. 2: A conflict I faced when working in a team for achieving specific goals. I worked as a technician for a large firm.I worked in a team of seven people who prepared material for shipping. On the team were four women and two other men. The people came from three different countries. One of the men on the team feels I worked too slowly and was not doing my share of the work proper ly. He laughs with the other team members about me and talks about me in nasty ways. When I tried to talk about that problem, the rest of the team seemed to be against me. It was a very uncomfortable situation for me to work in; I was constantly made fun of and criticised. I was not understanding what to do.
Sunday, September 29, 2019
Dynamics San Andreas Reflection Essay
We just recently had a lesson in Science about earthquakes and talk about some stuff until we arrived on how about we will watch the new movie ââ¬Å"San Andreasâ⬠directed by Brad Peyton. So our teacher agreed to our suggestion and we felt excitement because we knew that we will be watching an action-packed movie. I watched the trailer at home again to know what I should expect from the movie. And I also felt curious about the San Andreas Fault which will be the main reason of destruction as what I have observed after watching the movie trailer. So the day came and we watched the movie. First scene in the movie and some of us were already thrilled as a girl and her dangling car were stuck between two cliffs because of the falling rocks from a mountain. And I also felt a little bit worried for the girl because I donââ¬â¢t want a cute girl to die right at the start of the movie :P. But then Dwayne Johnson as rescuer Ray came to rescue the girl with their helicopter and I felt excitement as they rescue the girl. It was an intense rescuing scene and some of us, especially the girls shouted while watching the scene. Also one of the intense and jaw-dropping scenes that made us go shouting is when the part where in the film, a previously unknown fault near the Hoover Dam in Nevada shakes and jiggles the San Andreas. The Southern California is rocked by a powerful magnitude-9.1 quake followed by an even stronger magnitude-9.6 in Northern California. As the movie goes, it never failed to entertain us. Also the stories of the characters featured in the movie were really interesting. If I were to put myself in the situation they were in, I might have a very low chance of surviving the disaster. I wouldnââ¬â¢t want to experience the type of catastrophe shown in the movie as well. Maybe the least thing I can do is to be prepared because I know we canââ¬â¢t predict or stop natural disasters and pray to God that He wonââ¬â¢t let it happen to us, mankind. The San Andreas has long been considered one of the most dangerous earthquake fault and the movie showed us that it really is.
The inadequacy of motivation Essay
Sixth, there are some individuals who are more successful than others because of their sicknesses and the discrimination that goes along with it. For example, there may be students who suffer from HIV/AIDS and they tend to drop out of school because of discrimination (Cape.. , 2006). Other students may feel and believe that they might catch the same virus if somebody carries it around the school, this consequently scares these students and will surely discriminate the student suffering from HIV/AIDS (Cape.., 2006). Of course the latter will feel alone and discriminated and will force himself or herself to just forget about his or her dreams and drop out of school instead (Cape.. , 2006). Comparing to students who do not carry any medical condition, they are more successful in college than those who are sick. Seventh is labeled as ââ¬Å"the inadequacy of balance between analytical, creative, as well as, critical thinkingâ⬠(Smith, 1923). A college student should learn the skills of thinking analytically, creatively and critically to be able to survive through the courses needed to be accomplished to finish college, for without the aforementioned skills, it would be fairly difficult to pass college courses, much less finish a degree (Smith, 1923). For some students who are not analytical, creative and critical thinkers, they are less successful as compared with those who are. Last but not least has something to do with the culture of the learnerââ¬â¢s environment: The first one that belongs to this category is technically referred to as ââ¬Å"the inadequacy of motivationâ⬠(Smith, 1923). The trick here is to know the reason for studying. The student should know what his or her goals and objectives are, otherwise, when difficulties emerge, the student will have no motivation or reason to move on (Smith, 1923). The second is known as ââ¬Å"the attitude of giving up easilyâ⬠(Smith, 1923). Everybody knows that it takes dedication, time, effort, patience, and a lot of mental energy to digest a new learning that if a student is bound to easily give up and get bored over repetition of things then most likely he will end up leaving college without graduating (Smith, 1923). Some students in college are more successful depending on their motivation and attitude. References Cape Gateway. (2006). Social Issues Affecting School. Retrieved November 13, 2007 from http://www.focusas.com/BehavioralDisorders.html
Saturday, September 28, 2019
The Youth in the Journey of Excellence
The Youth in the Journey of Excellence Every Filipino child has the talent to share and to be developed. This is the reason why we always go to school- to showcase our talents for us to succeed and achieve our goals in life. Our talent is our path for us to excel in the quest of excellence. Some children know how to sing and dance while some know how to paint. You see, children like us have different talents to share and to be showcased. All of us have the talent and skills to be proud of. This Valleygsahan event is one way to develop our learnings and knowledge.It is because we know that we can always excel in life if we have the passion and the hard work in every single thing that we do. It is also because we know that we can fulfil our ambitions in life. Although we may lose in some battles, it is just the challenge for us to excel to be a better person and to be an individual who perseveres in life. It is not enough that we only have the knowledge or talent for us to succeed but it must be coupled by hardwork and prestige.. But we, the youth, let us not forget to follow our dreams because our dream is the hope for us to excel in life. Education is the key to successâ⬠. Let this saying be our strength for us to study well in school because we all know that as a child, we have many ambitions that we want to come true. As the youth, we have many goals in life that we want to fulfil and achieve. We want to excel in our careers no matter what barriers would come because we wonââ¬â¢t ever give up our dreams and we also know that achievement and excellence come only to those who have the courage, strength, and perseverance to fulfil their goals in lifeâ⬠¦We will continue to fight and fight for us to excel without giving up. With the word ââ¬Å"educationâ⬠,we know that this powerful word can lead us into a better future for us to excel and for us to achieve excellence in our journey in life. Just like the other children, I also have many dreams a nd ambitions. For me, I want to become a writer someday because writing is my passion and no matter what, I will work hard to achieve my dreams because I want to have excellence in my life.In this society where I live, there are many well-known personalities here that serve as the inspiration for the youth because we know that those prominent individuals encountered hardships for them to achieve what they are right now. As the youth, we will follow their footstep and we will also be passionate in everything we do. Just like them, we will walk in the path of excellence for we know that in that path, excellence awaits. Let us always bear in mind that we should never give up even though we will encounter hardships and trials because it is just the challenge for us to be stronger.To my fellow Filipino children, do not be afraid to dream because those dreams and ambitions will lead us to excellence. Education will serve as our key to success. Hardwork and passion will be our path to achi eve our goals in life. Our dreams and ambitions will be the hope for us to excel . The youth will be the inspiration for our fellow Filipino children who want to achieve excellence in life. It has been proven, the Filipino youth had reached success, achievements and excellence in their journey of life.
Morality and Obligation Essay
1. Two preliminary steps taken, that may be necessary, before one can intui? vely appreciate the rightness of an ac? on are thinking fully about the consequences of an ac? on. In other words, think before you act. Also give thought (considera? on) to the persons involved in said ac? on or your rela? on(ship) with the persons involved. 2. An ac? on is considered morally good in addi? on to being right when it is the right thing to do, while also stemming from a good place. When the person or ââ¬Å"agentâ⬠performs said act because it is right, from a feeling of obliga? on, a morally good act is also right. 3. According to Prichard, an ac? on done from a sense of obliga? on, there is no purpose ââ¬Å"consis? ng either in the ac? on itself or in anything which it will produceâ⬠. A mo? ve, being something that moves one to act, can be the sense of obliga? on, an ac? on done from a sense of obliga? on can indeed have a mo? ve. 4. Avirtuous act is done from a desire that is intrinsically good. A moral act may be done from obliga? on. There canââ¬â¢t be an obliga? on to act virtuously, because we can only ââ¬Å"feel an obliga? on to actâ⬠or do something. We cannot, however, feel an obliga? on to act from a certain desire 5. It is a mistake to expect moral philosophy to prove through argumenta? on that we ought to ful+ll our obliga? ons, because moral rightness ââ¬Å"cannot be demonstrated, only apprehended directly by an act of moral thinkingâ⬠. The sense of obliga? on is a result of a moral thought or thoughts. Moral philosophy can provide re-ec? on on the ââ¬Å"immediacy of our knowledge of moral rightnessâ⬠and the intui? ve recogni? on of the goodness of the virtues.
Friday, September 27, 2019
Torture in Interrogation Essay Example | Topics and Well Written Essays - 1000 words
Torture in Interrogation - Essay Example This information is even used to guard against enemy tactics and propose counter measures for our own forces. The interrogation depends mainly on torture techniques. Which are against the human rights and this violation is made in the name of national security. There is a thin line between torturing and national security priorities. Both are important and it is crucial to remain in limits while interrogating any suspects, whether terrorists or local criminals. The issue came into spotlight with the release of torture pictures and videos of the Guantanamo Bay detention camp (Leigh et al. 1). Prisoners were kept in a miserable condition and suicide attempts were a routine. The detention facility was accused of extreme torturing and interrogation. There have been deaths in the prison and released detainees gave in detail account of torturing activities carried out by the US. These activities were clearly a human rights violation and more importantly violated the Geneva Convention for th e interrogation and captivity of prisoners of war. The paper will look into the matter and discuss the use of torture during interrogation. The Geneva Convention has set aside rules and principles for conduct with prisoners or war. Their captivity and the use of torture have all been explained in detail in the convention. The convention article rules against torture in interrogation by stating that no physical or mental torture can be used for interrogation of prisoners. Prisoners must also be given rights to medical facility, hygiene, food, clothing and quarters (Tomasevski 8). They must also be allowed for their religious practices and appropriate physical activity must also be planned. In simple, the laws lay basis for basic human rights. Torturing during interrogation is not allowed and simply a violation of the convention and basic human rights. To violate these standards is simply a violation against humanity. The US administrations have taken stance to legalize torturing tech niques and narrowly defined the parameters of interrogation. Legislation could not be passed even though with ninety to nine approval rates by senate, after being vetoed by President Bush at the time (Sullivan 1). Terrorists are considered as monsters and mass murderers and are not worthy of humane treatment. The debate was highlighted in 2005 by McCain. He presented exceptional scenarios like ticking time bomb and slow fuse cases (Krauthammer 2). The urgency of these exceptional cases required torture. In simple even his policy required use of torture. Torturing is against the very fundamentals of US and is the opposite of freedom. Prisoners are tortured and interrogated on the basis of National Security priorities. The logic that torturing is necessary to extract information is used as a stance against the issue. Though, torturing is a quick way to extract information, but it is something against humanity and also the Geneva Convention. There can be no basis as to torture a human being. It is to take into consideration that most prisoners do not possess valuable or critical information and are tortured without any solid base. This further complicates the issue and raises question of using torture techniques. Many of the prisoners are tortured to the breaking point where they develop psychological or physical disorders. This fact can be taken into account by the figures at Guantanamo Bay. Similarly, at Abu Ghraib Prison almost ninety percent of prisoners were not guilty and released after interrogation and torture (Sullivan 2). They did not possess any critical information. Terrorists are not termed as prisoners of war as per the US stance, but torture in any form on a human being is a violation of basic human rights and simply a crime against humanity.
Critically Assess The Difficulties Of Implementing Motivation Theories Essay
Critically Assess The Difficulties Of Implementing Motivation Theories In The Modern Workplace - Essay Example A consideration and approval of this is a precondition to effectual employee motivation in the workplace and consequently efficient leadership and management. My piece of writing on motivation theory and practice focus on different theories concerning human nature in common and motivation in particular. Fairly distant from the advantage and ethical worth of a selfless approach to treating colleagues as human beings and valuing human self-respect in all its types, study and observation prove that well motivated workers are more creative and prolific. A lot of psychologists over the years have made efforts to describe and categorise what motivates people. This became chiefly significant after the Second World War as the Western nations attempted to reconstruct their shattered industrial economies, and all through the '50s and '60s much was investigated and written regarding Human Relations. It was recognised that people who labored in organizations were more than just numbers and, if correctly handled, might not merely generate more, but also add extra. Frederick Herzberg searched and practiced clinical psychology in Pittsburgh, where he researched the work-related motivations of thousands of workers.He determined that there were two types of motivation: Hygiene Factors: that can de-motivate if they are not present - such as supervision, interpersonal relations, physical working conditions, and salary. Hygiene Factors influence the level of dissatisfaction, but are seldom referred as originators of job satisfaction (Herzberg, 2003, Pg 87-88). Motivation Factors: that will motivate if they are present - such as achievement, advancement, recognition and responsibility. Dissatisfaction isn't usually responsible on Motivation Factors, but they are quoted as the basis of job satisfaction. (Motivation Theories, Online, PG 1) Abraham Maslow's Hierarchy Of Needs Abraham Maslow was an American behavioural psychologist who worked both in academia and industry. He issued a number of Human Relations books until the early '70's, but it was his first book, "Motivation and Personality", published in 1943, that put out his thought of the hierarchy of human wants. The Hierarchy Of Needs Maslow disagreed that the factors that compel or motivate people to perform lie on an ascending scale. Once a group or order of needs is satisfied, the individual will not be motivated by more of the same, but will search to satisfy top order needs. What's more, a higher order need will not be a motivator if lower order needs stay unmet (Pintrich & Schunk, 2001, Pg 24-25). Maslow classified five orders of needs, listed in ascending significance: Physiological According to this order of need, the fundamental endurance necessities of affection, protection and food Security should be motivated. These comprise the requirements we have for oxygen, water, protein, salt, carbohydrates, calcium, and additional minerals and vitamins. They in additionally comprise the need to uphold a pH
Thursday, September 26, 2019
Did Women Enjoy a Higher Status in Early or Late Medieval Societies Essay
Did Women Enjoy a Higher Status in Early or Late Medieval Societies - Essay Example It is important to note from the onset that the family structure in the early Middle Ages was highly patriarchal in nature in that as much as women had rights; the rights of their male counterparts superseded theirs. Bennett (2000, p.142) while quoting the great feminist historian Eileen Power states that the overall status of women during the medieval periods was one characterized with serious problems rife with a culture of misogyny. This assumes female inferiority and a social structure that invests considerable power on the life of men over that of women (Power and Postan 2012, p.22). For example in some societies like Germany and the Roman empire during the medieval times women were of little significance and were seen as objects especially in marriage and family settings. Even in marriage, the man was seen as the head of the union that authoritatively shows that the freedom of the woman both in early and late medieval period was greatly curtailed. Although the women were consid ered inferior during the Middle Ages, some possessed extraordinary power and ability to perform some of the duties and privileges reserved for men. Some of the important and revered women of the middle ages include Hildegard of Bingen, Christine de Pizan and Eleanor of Aquitaine amongst others who were very successful in one aspect of the society or the other. While there is a common belief that women possessed no rights in the Middle Ages, there are situations that show that some societies treated women well especially with the introduction of chivalry that instilled respect for women. Womenââ¬â¢s Inheritance during the Medieval Ages Women could not administrate directly their patrimony and laws on hereditary could not favour them whatsoever due to the fact that it was assumed that the women belonged to their parents while they were nubile and to their husbands while in matrimony. Also, the women in medieval period could not divorce their husbands and were not allowed to own any property unless they were widows or inherit property from their parents if they had male siblings. As much as inheritance was greatly controlled by men in the medieval society, some women could make decisions as to the inheritance of property. Most women with vast resources chose to give their property to charities while others sponsored projects such as the construction of roads and bridges that was deemed as missionary in nature. In historical discussions, a woman by the name Frideborg a rich widow who decreed that her daughter should distribute her inheritance to the poor upon her death while in the pagan Germanic society and the Old Icelandic societies, widows had more control over their own finances other women (Wicker 2012, p. 262). The fact that women were buried with their earthly belongings combined with competitive displays of wealth and abundance the women in medieval society lived in. According to Herlihy (1975, pp.1-22), the more the hopes of the woman surviving improv ed and her number of relatives improved the more her social position deteriorated. Therefore, in the early medieval property systems, women had a control over their inheritance and a role in controlling their assets. They however lost this control as the wealth trickled down generations where the control of the inheritance withered (Herlihy 1985, pp.11-13). For those women who wielded wealth and status in the medieval ages, their most important
Gucci And Innovation Essay Example | Topics and Well Written Essays - 2500 words
Gucci And Innovation - Essay Example This paper intends to analyze the employee creativity and innovation as a key focus for most international organizations especially while trying to manage global economic crises in recession. Among other ways through which the multinationals remain strategic and influential in the international, market especially in terms of competition and market segmentation is through organizational processes and products/services differentiation. A key strategy that has been adopted in this regard is through adoption and focus on creativity and innovation. Employees have been very instrumental in ensuring relevance of the international organizations through creativity and innovation. However, the level of innovation and creativity by such employees has been dependent of institutional frameworks and thus organizational leadership becomes very instrumental in empowering the employees for such assignments as designing of products and services for the companies through innovation and creativity (OECD , 2009, p. 5-6). Discussion Innovation is a phenomenon that is socially acceptable, which brings together the ideas of different people and the implementation of the same. Moreover, through innovation, products and services are designed and made through the cooperation of people working together. The success of any organization especially in innovation and creativity requires the collaboration of efforts by the leadership as well as the subordinates. The management/leadership teams within organizations are usually tasked to propel the organization forward with implementation of policies meant for realization of goals and objectives carried on by the organization. In fact, many studies reveal that to many organizations, goals are just one and the same as the performance of the organization itself. However, it is more challenging to realize set goals and there must be some frameworks through which the realization of set goals; short term as well as the long-term goals (Ordonez et al, 2009, p.1-5). The process of driving the international organization towards realization of the set goals entails among other things proper planning and human resource management. International organizationsââ¬â¢ management such as is the case with Gucci undertakes the planning in terms of short-term vision as well as long-term vision. Whenever an organization adopts either short-term goals or the long-range vision, continuous improvement is vital in order to realize that long-term objective. Nevertheless, changes in management practices have seen a substantial shift of the management practices from long range planning to much simplified planning structures, which concentrate with very short-term goals that are easy to achieve and evaluate. In order for any business to remain relevant and objective, the periodical evaluation and analysis of performance is critical. Innovation and creativity is such a basic tool that is currently in use in order to realize such goals especially aimed at overcoming the effect o f economic recession that affects the global economy today (Sharma et al, 2010, p. 29-30). In the choice of management practice to adopt, any management team must therefore put profit consideration into perspective. Continuous
MDCM (B) Write Up Assignment Example | Topics and Well Written Essays - 2000 words
MDCM (B) Write Up - Assignment Example It was found out most of these systems do not communicate well with each other because they are legacy systems and had different protocols to begin with. The key to reversing its alarmingly poor financial performance is to have modern business information systems that will allow key people access to information at the right time when they need it the most to create advantages ((Thompson & Strickland 204). A number of options are presently being considered by top management such as earlier attempts to re-align its corporate strategy by a pre-planning activity to produce a good profile of the firm (Sherman, Rowley & Armandi 163) that will in turn be used to produce analysis. A key finding by the top management through the newly-formed interdisciplinary IT Portfolio Management (ITPM) executive committee was to identify and then prioritize the important IT initiatives that need to be undertaken in view of its available resources, the time involved and the degree of importance of an IT project to the firm. Obviously, it cannot hope to undertake everything at once and so a system of priority has to be formulated to guide its decisions on which projects to fund. In other words, the adoption of an appropriate IT strategy has to be based on a projects relevance and urgency to separate them for what are merely important. This paper examines the various ways by which the ITPM executive team had gone about its task of selecting the best IT projects to be pursued based on a set of criteria it had set for itself with regards to evaluating competing projects that need funding from the limited but available resources at MDCM, Inc. It simply means some projects are urgent, some important and some necessary with varying degrees of chances of success during implementation. Also, not all the IT projects have the same time frames, some are quick to do and other projects may take a bit longer due to their complexity. The fast-paced
Feminism and Female consciousness Essay Example | Topics and Well Written Essays - 3000 words
Feminism and Female consciousness - Essay Example The concept of women liberation was first in practiced in America which has a specific aim for women folk. Feminist movement in the initial stage had achieved some of their goals and they succeeded to survive from employment discrimination. They also won many issues such as reformation of low, equal status in media representation, equal representation in higher education sector, and financial freedom. Then the growth of feminist movement reflected in popular understanding of marriage and domestic life. The term feminism is not bounded in a philosophy or an ideology but it requires some specific motives or demands which is formed and nurtured by a group of people. If feminism related with some specific goals which is essential for the existence of women folk, female consciousness is related with some modifications which is essential for female society to maintain their status in a male dominating society.Feminists argue that a large number of discriminations formerly troubled by women in the field of working low and family low. In the initial stage women liberation movements demand healthy working atmosphere and a comfortable payment system. The book entitled Sourcebook on feminist jurisprudence by Hilaire Barnett gives relevant comments about the issue of low. The author remarks; ââ¬Å"In England, the law ââ¬âbeing the product of predominantly male legislators and male judges, has proven a stubborn subject: it was not until1990, for example, that husbandââ¬â¢s immunity from prosecution for rape was removedâ⬠.
Wednesday, September 25, 2019
Learning Language Essay Example | Topics and Well Written Essays - 2500 words
Learning Language - Essay Example When a child is born, either in a congested urban slum or in privileged ghettos, either in mountainous hilly villages or to a wealthy noble family. At that time a child is not concerned with any of the social interaction with each other through language, or that the concern about the production of grammatically well-formed sentences, but a means for acting in the world in order to establish relationships with others so that it might be easier for him to communicate information and to engage with them in joint activities. We can say that a child is thus born into a community of language users whose social interaction in the form of symbols, gestures and facial expressions makes him learn and his learning of language forms part of his socialization as a member of that community. To acquire complete control of the complex patterns of his native or mother language is, therefore, placed on the second account, which is mentioned above in the following words of ââ¬Ëlanguage as a resource ââ¬â¢. A child when interacts in whatever environment and in whatever circumstances, experience through interacting with his environment and acquires the resources of the language of his community and learns how to make use of those resources in order to achieve a variety of purposes in relation to different people in different situations. The language which children under 4 years use is easily recognizable as their mother tongue it is also readily apparent that it is very different from the language of most adults. But exactly in what ways and in what respect it differs from adult language depends on consideration of the various component skills and the different kinds of social and conceptual knowledge which underlie language. For example, two young children clearly after learning the meaning of a large number of words are able to string words together into
Reserch Disaster Bonds (also known as CAT bonds or catastrophe bonds) Research Paper
Reserch Disaster Bonds (also known as CAT bonds or catastrophe bonds) - Research Paper Example lves risk taking; investors acquire disaster bonds for a principal and then enjoy the high rate interest accumulation as long as the disaster does not occur. According to leading experts in risk management, ââ¬Å"Catastrophe bonds are fixed income securities, typically issues by insurance companies, which pay an attractive yield to investors, but with a provision that should a specific predetermined eventâ⬠¦..occur, bondholders suffer the loss of their income and potentially all their capitalâ⬠(197). Events may be due to natural damage or human induced disasters where the bond may cover either the whole or part of the damage preventing the buyer from reaching to unbalanced sheet. The risk is conveyed to the investors rather than the insurers. The structure of CAT bonds is expressed in CAT bonds demystified (See fig. 1). These bonds are now used widely as they may forego interest and principle either in part or whole as stated in the condition. They require investorsââ¬â¢ specialized knowledge and skills in judgment of where to invest. However, the jurisdiction of application affects the disaster bonds effect on parties involved. In the above structure, SPV or SPE are the established entities that insurance companies forward the reinsurance agreement to, which then relayââ¬â¢s the default provisions, as reflected in the agreement as a note; if the terms are approved, transactions are managed to generate money market returns where the SPV or SPE transfer back the principal and accumulated interests in cases of minimal risk involved (ââ¬Å"CAT Bonds Demystified,â⬠Rsm). The disaster bonds act like financial instruments; they were first issued in mid 1990s and most specific in 1997 in American history. American continent has had numerous attacks, U.S blizzard and tornadoes in 1993, Northridge earthquake in 1994 and especially the numerous hurricanes in Mexico, U.S, Caribbean, and Bahamas among others. Japan has also had its difficulty during the 1995 Hanshin earthquake
Tuesday, September 24, 2019
Comparison Between Traditional Education and Montessori Education in Research Paper
Comparison Between Traditional Education and Montessori Education in U.S - Research Paper Example This essay stresses that as opposed to traditional education where teachers select the learning pace on behaviour of the children, the Montessori education gives children an opportunity to identify their own learning pace. The selection of individual learning pace plays a vital role in improving the level of education in the United States learning institutions. Involving children in making decisions on matters such as their learning pace therefore ensure that children are responsible for their action in future. In addition, children are trained on the most effective means of making informative decisions that have a considerable level of impact on their future activities and development. This paper makes a conclusion that unlike traditional education where teachers enforce lesson plans on students, Montessori education allows children to be free in discovering and exploring their own lessons. An opportunity to select topics that meet their interest helps in improving children performance and in enhancing the selection of individual career choices. Granting students an opportunity to explore and discover their lessons also offers learners the required skills of conducting constructive researches and evaluations. As opposed to traditional education in the United States where children do not have control over their future career, Montessori education gives children an opportunity to make informed and constructive decisions on their future careers.... Granting students an opportunity to explore and discover their lessons also offers learners the required skills of conducting constructive researches and evaluations. As opposed to traditional education in the United States where children do not have control over their future career, Montessori education gives children an opportunity to make informed and constructive decisions on their future careers (Martin, 2012). Cons of Montessori education in U.S As opposed to traditional education where disorderly conducts are regarded as children faults, Montessori education holds the perception that misconduct in class is the fault of teachers. Under this system, teachers are expected to adjust their approaches to address children misconducts in class and in school environment. Although in this system teacher are denied an opportunity of making decision on behalf of their children, they are forced to take responsibility of the studentsââ¬â¢ unacceptable behaviours. The act of compelling te achers to take responsibility of children unacceptable behaviours therefore kills the morale of teachers in undertaking their core obligation. In addition, the system denies children an opportunity of taking the responsibility of the actions thus increasing the level of impunity among students. Contrary to traditional education, Montessori education is characterised by endless disturbance and conflicts between teachers and children. Through this method, there is no distinctive separation between the role and powers of the teachers and the responsibility of students, creating conflicts of interests in classroom settings. Due to their excessive control, children undermine the contribution and powers of teachers thus posing a serious in the managing
Book review Literature Example | Topics and Well Written Essays - 2000 words
Book - Literature review Example He cogently makes the analogy that forcing developing countries to participate in free trade before the country is ready is akin to forcing his six year old child to get a job ââ¬â it is a good short-term policy, in that money will be coming in, but a very poor long-term strategy, as the childââ¬â¢s growth will be stunted and he can never become a brain surgeon if he is forced to leave school at the age of six. His arguments are well-grounded, well-reasoned and difficult to refute. Chang begins by analyzing the developing countries in relationship to neo-liberal policies, and shows how the official history differs from the actual reality. According to Chang, the official history of neo-liberal policies is that these policies, which rely on laissez faire domestic policies, low barriers to the international flowing of goods, labour and capital; and ââ¬Å"macroeconomic stability, both nationally and internationally, guaranteed by principles of sound money and balanced budgetsâ⬠(Chang, 2008, p. 22) were adopted by developing and Third World countries in the 1980s, which led to the fall of communism in 1989, global economic integration, and a new ââ¬Å"golden age of liberalismâ⬠(Chang, 2008, p. 23). Not included in this official history of neo-liberalism is any hint of coercion, nor any suggestion that these policies were not good for these developing countries. Chang contrasts this official story with what he calls ââ¬Å"the real history of globalizationâ⬠(Chang, 2008, p. 24). According to Chang, the real history is far different from the official story of globalism. The real history involves considerable coercion on the part of the neo-liberal countries, who are led by Great Britain and the United States. For instance, Britain, in the 1840s, used its might around the world to force weaker countries to accept low tariffs, while they themselves set their own tariffs high (Chang, 2008, p. 25). The coercion on these countries continue as the World Bank lends
Monday, September 23, 2019
What would be political theorist Niccolo Machiavelli's position about Term Paper
What would be political theorist Niccolo Machiavelli's position about the Second Amendment in the contemporary United States - Term Paper Example He was one of the officials in the Florence Republican and was given a post to deal with military and diplomatic affairs. He was one of the most influential philosophers of the western politics. All other political theorist who came after him referred to him directly of indirectly in his or her work. His writings, like The Prince and The Discourses of the First Ten books of Titus Livius, are well remembered by many authors and politicians who came after him (Soll, 34). Through his creativity in politics, therefore it was possible to predict what he would have said on the second amendment on the United Statesââ¬â¢ constitution. This amendment was adopted in 1791 together with bill of rights. This amendment was to protect the United States citizens with the right of keeping and bearing firearms. However, Noccolo Machiavelli would have different opinions on this right to keep and bear arms. Machiavelli would support it and on the other hand, he would deny the rights giving different reasons. The second amendment grants the United States citizens to keep and bear firearms (Spitzer, 23). This right was given due to many reasons. Possession of the firearms was important in the following ways, it helps to repel dangerous invasions, grants one the right of personal defense, and it enables people in organizing militias. Machiavelli would have supported this amendment because in his writing, he said that before anything else, each person must be armed. He advised that military service should a responsibility to every citizen. Therefore, every citizen should have a possession of some firearms to ensure that the society is secured from any invasion. He supported possession of arms giving reasons that good men do not make war the only profession neither can a good government can allow its citizens to make war the only profession (Soll, 37). He advised that each government should practice the art on war during the time of peace but war should occur when it is necessary to acquire glory. He believed that every citizen is considered a good man when he uses those arms in a correct way that is meant for. In addition, a government is considered well government when it uses its military to serve that society in a wrong way. Therefore, he would support the second amendment of the constitution. Furthermore, Machiavelli would support the second amendment of the United Statesââ¬â¢ constitution, which grants citizens the right of possessing firearms by claiming that this right would show that the government thrusts its citizens. Failure to grant the citizens this right, it will show that the government lacks faith to the citizens. This would make the citizens hate the government. However, the citizens should not be disarmed to ensure that the relationship between them and the government is kept in touch. This shows that Machiavelli would support the second amendment of United States constitution. There are some reasons that would make Machiavelli oppose the second amendment of the United States constitution. As the constitution would give rights to the citizens to keep and bear firearms, Machiavelli will oppose it just in case the citizens will use the firearms in a wrong way. He would oppose it is saying that only good citizens would use the firearms during the necessary times to prevent invasion from other people. Those who will not follow this should be dealt accordingly. He said that not all people do good things all the time. This is because their minds change like tides and at times, they can cause arm without realizing what they are doing. Therefore, keeping and bearing of firearms should be abolished since it will cause a lot of harm if the citizens use them in a bad way. He would argue this idea that not everyone
Steve Millar's approach to the challenge of leading BRL Hardy in 1998 Essay
Steve Millar's approach to the challenge of leading BRL Hardy in 1998 - Essay Example The Australian industry was increasingly becoming competitive in the global markets with 27 percent of production being exported (Barlett & Beamish 2011). Steve Millar should continue protecting the share of bulk case business while committing resources to growth of bottled wine. Millar should first of all attain merger efficiencies in terms of scale of production and cost control. Millar is also keen at changing the leadership styles and culture of the new organisation. Barlett & Beamish (2011) assert that a decentralized approach is essential for local responsiveness in the global strategy since the regional management will be accountable for their decisions. For instance, Millar has delegated the small risks while keeping a close watch of the high risk decisions that affect the global strategic business. This is a good approach of global strategy since delegated authority will allow the regional management to challenge the authority and admit mistakes. This leadership approach wil l facilitate creativity and innovation in the fast changing global wine industry. Millar has ensured adequate delegation of authority and responsibility. For instance, he has appointed Stephen Davis, a seasoned strategic thinker as the group marketing and export manager tasked with establishing the international operations. Davies intended to build on the strengths of the company by proving quality wines and repositioning the superior brands in the global markets. At mass market prices, Nottage Hill and Stamps were essential while at the top end market points, Eileen Hardy brand was important (Barlett & Beamish 2011). The local responsiveness has in the global strategy yielded increasing profits for the company. For instance, Millar is critical in resolving disputes between Carson and Davies on the global strategy. For example, he is of the opinion that Carson should report directly to headquarters on profitability measures and work with Davies on the marketing and labeling issues o f the wine brands in UK market since Nottage Hill and Stamps are cash cows for the group company in terms of sales value of Hardy brands. Both Millar and Davies are of the idea that the headquarters should be the global brand owners, but local responsiveness is essential in meeting the local needs of the consumers (Barlett & Beamish 2011). The overseas should be not only responsible for promotional strategies, distribution channels and profitability, but should also take up other important decisions pertaining the labeling and branding. In the global strategy, Millar should ensure that important aspects of the wine brands such as labeling, pricing and branding are controlled by the regional managers through delegated authority. However, he will accept proposals on design from the regional management and ensure common decision making in evaluating the proposals (Barlett & Beamish 2011). On the part of suppliers, Millar should minimize the risks of supplier failure due to bad weather, grape disease and other factors that can negatively affect the quality of grape supplies. Millar should source the grapes from multiple reliable suppliers. The regional managers such as the UK based market should be allowed to select their own suppliers depending the expected product quality and taste. Millar should institute more delegation on the brand production. For instance, Carson
Sunday, September 22, 2019
Ethical Leadership and How to Create a Positive Work Environment Essay Example for Free
Ethical Leadership and How to Create a Positive Work Environment Essay Leadership nowadays has encountered various problems. One of the most common one and which is contaminating the main business environment is that individuals at work are not engaging as they should. We have to ask ourselves, why is this happening and how can we prevent it? Dr. Charmine Hartel commented in the seminar that almost 20% of all the active workers in every organization do not work in favor of it. Instead they engage against the organization in various ways. This is a really big issue, because this means that there is something happening inside the organization and its leadership that is making these counter-productive acts. Recent researches that have been made show us that there are 3 different things that usually happens in the organization that get the workers to engage in a bad way their work as they should. * Work Environment * Negative Work Environment * Stress When the brain is under stress chemicals are released that weakens functions of the brain that gives us a higher level of structure (this is called the prefrontal cortex). When stressed, we are likely to engage inappropriate actions and lack the ability to regulate our emotions. With this in mind, we are encountering serious problems for the organization, because if these workers donââ¬â¢t have the use of their brain area they are not going to be able to engage the work they can and should do. Ethical Leadership The fruits of ethical leadership are Positive Work Environments, also known as PWEââ¬â¢s. PWEà ´s exists when the workers see their places as positive, respectful, inclusive and psychologically safe, and when leaders and coworkers are trustworthy and there exist an open diversity characterized in just policies and decision making. The entire above are needed to complete and get a PWE. PWE provides the set of emotional experiences necessary for human flourishing. We know that on average the positive emotional experiences outweigh the negative emotional ones. So, with this in mind, when you see your environment is safeyou have the ability to start being more creative and start being yourself. We should always keep in mind that an emotion is a response of the person when they have a particular event. They can have Destructive or constructive consequences. Organizations are responsible for the work environment they create. This is called the organization culture. When people and how the people interpreted the environment around their workplace. This is about how the organization context shapes the meaning and actions of its members. People management have the need to build resilience, diversity openness and be able to create a support to people trough change. There always exists the need to belong and to be valued for our uniqueness. Servant Leadership Many leadership approaches think about other things and focus their attention on what the followers need and develop things around them. Its an approach around the about the energy and direct it to the best place. With that in mind looking at the person as a whole being, not just as one more worker. One of the key things is that they can understand the core value of the workers and respect them as they deserve. There exist the emotion focus coping and problem focused coping they both have constructive and destructive emotions and impulses. The Giving Voice of Values (GVV) is designed to help individuals learn to recognize, clarify, speak and act on themselves when those conflicts arise. The focus is on how a manager raises this issues in an effective way.
Ebay in China Essay Example for Free
Ebay in China Essay The joint venture with Tom Online will allow eBay to enter the Chinese rapidly growing market. In 2007, China experienced a technology boom in which more people were using the Internet than ever before. Besides the rocket increase of Internet usage in China, E-Commerce is growing as well. With the power and influence of Tom Online, eBay has a unique opportunity to grab the market share of a billion people in China. EBay can benefit a lot from the joint venture with Tom online. Tom Online will help eBay reach millions of people through Internet as well as the mobile Internet. Graph 1 shows that China experienced an exponentially growing in Internet usage. From 2005 to 2007, the Internet users in China doubled from 111million to 205 million. The big population of China almost guaranteed Internet usage growth. With the increase of Internet usage in China, the online shopping also grows rapidly. According to graph 2, online transaction value in China jumped from 3.9 billion RMB to 23.1 billon, representing an incredible growth rate of 253%. All the statistics above strongly prove that China is the perfect market for eBay to tap into. In addition to the great potentials of the market of China, the new marketplace will bring together the strengths of both companies. EBay EachNetââ¬â¢s global e-commerce knowledge and large and active trading community in China, and TOM Onlineââ¬â¢s local market knowledge and active wireless user base of more than 75 million. The new marketplace will bring enhanced online and mobile opportunities to buyers and sellers in China, evolving eBayââ¬â¢s participation in China and extending TOM Onlineââ¬â¢s wireless service portfolio into m-commerce. Upon the launch of the new marketplace, eBay EachNet users will be invited to transition to the new site, a nd TOM Online will work to deliver its user traffic to the site as well. Risks On the other hand, it is also risky for ebay to form the joint venture with Tom Online. EBay must pay close attention to Tom Online and their strategy in the market. Instead of eBay, it is Tom Online that has the majority share in Tom EachNet at 51%. EBay has injected over $40 million into Tom EachNet,à while Tom Online only contributed $20 million (along with knowledge, technology, and brand value). It is clear that eBay has more to lose in the deal, while Tom Online is simply negotiating their presence in China. EBay must work closely with Tom Online to ensure that their visions for Tom EachNet are similar, and a common strategy is taken to succeed. Chinaââ¬â¢s business culture is another obstacle that eBay must monitor closely. Tom Online does have extremely well connection with the Chinese government, and eBay must be sure to take advantage of the TOM Onlineââ¬â¢s political networks in China. .
Saturday, September 21, 2019
Nigerian Out Of Wedlock Births Health And Social Care Essay
Nigerian Out Of Wedlock Births Health And Social Care Essay The concept of childbearing, fertility and marriage house constantly been linked together in Nigeria. In the 1990s, out of wedlock birth was rapidly increasing despite Nigerians cultural influence on its population. Nigerians marry to have children, and marriage has meaning only when a child is born or in fact survives (Uche C. Isiugo-Abanihe, 1994). According to Olusanya(1982), marriage in Nigeria is so closely linked with childbearing that a change in the pattern of marriage necessarily influence birth rate and the rate of population growth. Data presented in this report are derived from the Demographic and Health Surveys conducted in Nigeria in 1990. This was done by Federal Office of Statistics, Nigeria, and IRD/Macro International, United States. This survey interviewed 8,781 women aged 15-49. All statistical data and sample in this project was obtained from this article. In this dissertation, we will focus on the high level of unwanted pregnancy and out of wedlock birth occurring in Nigeria as a result of low levels of contraceptive use among women in many parts of the country. This project will reveals wide variation in levels of contraceptive use among married and sexually active unmarried women. Both groups have a significant unmet need for family planning, but the reasons for their need differ. we will use old and previous data and surveys collected and conducted during the 1990s by the Nigerian federal office of statistics to explain and solve theoretically and statistically the purpose of this project which is to explain the out of wedlock birth per woman between 1950s and 1980s in Nigeria. All statistical element of this project will be done using sampling and standard error. Selection from the entire country to determine the fertility, determinants of fertility and fertility regulations that led to an increase in out of wedlock birth during t he 1970s to 1990s. Relatively, little empirical work has been conducted for out of wedlock birth in Nigeria. The statistical used in this project has been conducted by the NDHS(Nigerian Demographic Health Survey) mostly drawn from the National Master Sample for the 1987/1992 National Integrated Survey of Households (NISH) and the 1973 Nigerian census result. There is wide regional variation in the timing of marriage among Nigerian women. More than nine in 10 women aged 20-24 in the North East and North West had married by age 20, compared with half to three fourths of women in the three southern regions (The Alan Guttmacher Institute, 2005 series, No4). Nigeria is one of the largest countries in Africa and the most populated Black Country in the world with a population of over 100 million people, nearly twice the size of any other African country. The North East and North West regions are predominantly Muslim, the South East and South regions are mostly Christians, each with its own values and traditions regarding marriage, sexual behaviour, education and childbearing. There are major regional and educational differences in fertility. Women in the north have, on average, one child more than women in the south and women with no education have two children more than women who completed secondary or higher schooling. According to the NDHS survey, the fertility rate of a Nigerian woman between the ages of 15-49 from 1978-1990 moved from 5.9 to 6.0 significantly with an average of 6 children. Source: : Nigeria Demographic and Health Survey, 1990. Source: : Nigeria Demographic and Health Survey, 1990. The project reveals a big difference in levels of contraceptive use among married and sexually active unmarried women. Both groups have a significant unmet need for family planning, but the reasons for their need differ. The study directs attention toward far-reaching health policy and program responses that affect birth rate in Nigeria. The numerous ethnic groups found in Nigeria contribute considerable cultural diversity. In 1960s, Many article described the growth in Nigerias out of wedlock birth rate as a brief excitement amongst the Nigerian people that they had achieved independence finally, some presumed it to be illiteracy but a close study proved otherwise (study show that out of wedlock birth was more frequent among the most educated women (meekers, 1994b; Calves2000; Emina 2005), excitement of motherhood amongst teenage girls played a minor role, and also the brief civil war that began in 1967 and ended in 1970 played a bigger role in the whole analysis. The Nigerian ferti lity survey during 1981/82 put the average number of child birth per woman at 6.4 %( mostly out of wedlock). Although the data here suggest a slight decline from in the 1970s rate, the level is still relatively high.(www.onlinenigeria.com). During the civil war, many women were reluctant in getting married to prevent bearing the pain of being widows and war casualties. This effected their judgement and led to more pregnancies among women that are unmarried. According to some data analysed during that period by Donald Jonathan, Approximately 45% of children born among teenage women in Nigeria at that time were conceived outside of marriage; double the level recorded during the same period among women aged 18 and older (Donald 1979). This was a huge jump in the growth of the countries fast growing general population. The World Bank estimated Nigerias annual growth rate was rising during the 1950s. Although other sources differed on the exact figure, virtually all sources agreed that t he annual rate of population growth in the country had increased from the 1950s through most of the 1980s. The government estimated a 2% rate of population growth for most of the country between 1953 and 1962. For the period between 1965 and 1973, the World Bank estimated Nigerias growth rate at 2.5%, increasing to 2.7 percent between 1973 and 1983. Before 1970, the stigma of unwed motherhood was so great that few women were willing to bear children outside of marriage. Total fertility rate for the three years preceding the survey end mean number of children ever born to women age 40-49, by selected background characteristics, Nigeria 1990 Background characterises NDHS NFS Mean number Mean number of children of children Total ever born Total ever born Fertility to women fertility to women Rate age 15-49 rate age 15-49 Residence Urban 5.03 6.01 5.79 4.81 Rural 6.33 6.61 5.98 5.56 Region Northeast 6.53 5.75 5.95 4.34 Northwest 6.64 6.21 6.38 4.49 Southeast 5.57 6.99 5.72 6,53 Southwest 5.46 6.84 6.25 5.30 Education No education 6.50 6.41 6.14 5.45 Some primary 7.17 7,3 6.81 5,99 Completed primary 5.57 6.54 7.59 5.71 Some secondary 5.07 6.44 3.90 4.31 Completed 4.18 5.82 NA NA Total 6.01 6.49 5.94 5.41 Source: : Nigeria Demographic and Health Survey, 1990. Premarital sexual activity is most common among more educated women, who tend to postpone marriage the longest. In the southern regions, where educational levels are highest and the smallest proportions of young women are married, 41-69% of women aged 20-24 had had premarital intercourse by age 20. This compares with only 6-14% in the North West and North East, where educational levels are lowest and marriage before 20 is most common. The above diagram compares three-year total fertility rates as estimated by the NDHS and NFS. The two surveys, nearly a decade apart, yield almost the same total fertility rates (5.9 for the NFS and 6.0 for the NDHS. Both surveys do indicate that the fertility of uneducated women is fifty percent higher than the fertility of the most educated women. Reasons for increase in out of wedlock birth Three quarter of Nigerian women in the 1990s were married. Age at first marriage differed by region. In the north, women married early, at an average of 15 years of age. In the south, however, women are marrying later in life. Among younger women, the average age at first marriage is over 19 in the southeast and over 20 in the southwest. Women who marry later in life are more likely to have premarital sex which is a clear example of out of wedlock birth. Although the society does not approve of this behaviour, in regions where women stay in school longer and are, therefore, less likely to marry at a young age, premarital sexual behaviour is common. In the Southwest, where a great proportion of women aged 19-49 have completed secondary/ higher education and about one-fourth had not married by age 20, 69% had had premarital sex by this age. In contrast, in the less developed North West region, where only one in five women aged 19-49 have completed secondary/higher education, only a han d full said they had had premarital sex by age 20. These findings illustrate that in the northern regions, where most women in their early 20s have received no more than primary schooling, most sexual activity occurs within the context of marriage. In 1978-1982, Nigerias total fertility rate was 6.4 children per woman. By 1990, it had dropped to 6.0. The distribution of women by number of children ever born within the 1960s to 1980s is presented in the table below for all women and married women. This survey was conducted by the NDHS and documented statistically. The mean number of children ever born for all women increases rapidly with age, so that by the end of her childbearing years; a woman has given birth to almost seven children. The distribution of women by number of births indicates that almost one quarter of teens have already borne a child, and nearly one-third of women age 45 and over have borne nine or more children. Nationally and in all regions of the country, women aged 15-49 are having more children than he want. Source: Nigeria Demographic and Health Survey, 1990. Rural women have about one child more than their urban counterparts (6.1 vs. 4.9), and women in the less developed northern regions also have more children than women in the south. Yet women in the South South and South East regions have the largest gaps between their wanted and actual fertility rates, while women in the North West are nearly matching their fertility goals. Overall, women living in both rural and urban areas have more children than they want. Contraception Knowledge and Use: in the survey conducted by the NDHS, it indicates that less than half (46 percent) of all Nigerian women age 15-49 know of at least one method of family planning. This means that over half of the women reported that they did not know any method of family planning. Knowledge of methods was slightly lower among married women and higher among never-married. Although the level of contraceptive knowledge in Nigeria is low, there has been improvement over time. In the 1981/82 Nigerian Fertility Survey (NFS), only 34 percent of all women reported that they had heard of any method Thus, in the 10 years between the NFS and the NDHS, the level of contraceptive knowledge increased by 35 percent. There were also large increases in the proportion of women who knew and used specific methods. Contraceptive use among married and sexually active unmarried women aged 15-49 Married women sexually active Unmarried women % using % using a % using % using a An effective traditional an effective traditional Modern method modern method Method method Total 7 6 33 14 Region North Central 9 4 32 5 North East 2 2 10 3 North West 2 3 23 3 South East 12 10 20 27 South South 12 13 35 16 South West 21 11 53 13 Education â⠬à ¾7 years 16 11 38 17 Source: Nigeria Demographic and Health Survey, 2003.Contraceptive Use A small proportion of married women in Nigeria use a contraceptive method as seen on the above diagram. Contraceptive use in Nigeria is rare probably because of the preference for large families. In 2003, only 7% of married women aged 15-49 were using an effective modern method of contraception (implants, IUDs, the pill, the male condom, and female or male sterilization). Another 6% were relying on withdrawal, periodic abstinence, lactational amenorrhea or traditional folk methods. There are wide regional differences in overall levels of Contraceptive use: Only 2% of married women in the North East and North West regions are using effective modern methods, and 2-3% is using traditional methods. In the South West, in sharp contrast, 21% of married women are using effective modern methods, and an additional 11% are using traditional methods. In the remaining three regions, 9-12% of married women are using an effective modern method. It is noteworthy that overall contraceptive use is mo re than three times as high among married women with seven or more years of education as among those with less education (27% vs. 8%).(The Alan Guttmacher Institute, 2005 series, No4). Other case of ctraception Contraceptive use is much higher among sexually active unmarried women. In all regions of the country, probably because of widespread societal disapproval of out-of-wedlock pregnancies and births, sexually active unmarried women are more likely than married women to use a contraceptive method (47% vs. 13%-Table 2). In the South West region, 53% of sexually active unmarried women are using an effective modern method and 13% a traditional method, compared with 10% and 3%, respectively, in the North East region. And unmarried women with seven or more years of education are more than twice as likely to be practicing family planning as their less educated counterparts (55% vs. 22%). In addition, 46% of unmarried women who use contraceptives choose condoms, compared with only 15% of married users (not shown). Low awareness, disapproval and uncertain supply keep contraceptive use low. Various factors help explain the low level of contraceptive use among married Nigerian women. Foremost among these is that women generally want large families. Yet low awareness of family planning, conservative cultural attitudes and uncertain contraceptive supply are also important influences. More than 20% of women aged 15-49 have never heard of any method to prevent pregnancy, traditional or modern. The women who are most aware of contraception live in urban areas, have at least seven years of education, or listen to the radio or watch television regularly (about 90% of each group). Even if women have heard of family planning, many do not know where to obtain contraceptives: Of the 78% of women who are aware of any method, only half know where they can get it. In the North East and North West regions, only 28-36% of married women and 24 28% of sexually active unmarried women who are aware of family planning know where to go for contraceptive services. A much higher proportion of a ware women in the South West region know a possible source of methods-77% of married women and 82% of sexually active unmarried women. Low contraceptive use is also partly attributable to the fact that four in 10 married women disapprove of family planning. A data survey conducted by the NDHS shows the reasons for not using contraception given by women who do not intend to use a method. Of the 68 percent of married nonusers who say they do not intend to use family planning in the future, almost half say they do not intend to use because they want children (47 percent). Other reasons given are religion (12 percent), lack of knowledge (12 percent), and fatalism (6 percent), which encompasses responses that imply that there is nothing the woman can do about the number of children she will have. Women under age 30 are more likely to say that they do not intend to use because they want children, while those age 30 and over are more likely to cite reasons such as being menopausal or lack of knowledge. SAMPLE METHOD NDHS sample method used in this project is as a result of a two-stage stratified design, and, consequently, it was necessary to use more complex formulas. The computer package CLUSTERS, developed by the International Statistical Institute for the World Fertility Survey, was used to compute the sampling errors with the proper statistical methodology. The CLUSTERS treats any percentage or average as a ratio estimate, r = y/x, where y represents the total sample value for variable y, and x represents the total number of cases in the group or subgroup under consideration. The variance of r is computed using the formula given below, with the standard error being the square root of the variance: Sampling errors for the NDHS are calculated for selected variables considered to be of primary interest. The results are presented in this appendix for the country as a whole, for urban and rural areas, and for the four health zones: Northeast, Northwest, Southeast, and Southwest. For each variable, the type of statistic (mean or proportion) and the base population are given in Table B. 1. Tables B.2 to B.8 present the value of the statistic (R), its standard error (SE), the number of unweighted (N) and weighted (WN) cases, the design effect (DEFT), the relative standard error (SE/R), and the 95 percent confidence limits (R~SE), for each variable. In general, the relative standard errors of most estimates for the country as a whole are small, except for estimates of very small proportions. There are some differentials in the relative standard error for the estimates of sub-populations such as geographical areas. For example, for the variable EVBORN (children ever born to women aged 15-49), the relative standard error as a percent of the estimated mean for the whole country, fo r urban areas and for the Southeast zone is 1.5 percent, 2.3 percent, and 2.7 percent, respectively. The confidence interval (e.g., as calculated for EVBORN) can be interpreted as follows: the overall average from the national sample is 3.311 and its standard error is .051. Therefore, to obtain the 95 percent confidence limits, one adds and subtracts twice the standard error to the sample estimate, i.e., 3.311+.102. There is a high probability (95 percent) that the true average number of children ever born to all women aged 15 to 49 is between 3.209 and 3.413. 148 Conclusion: According to the NDHS, fertility remained high in Nigeria during the1980s. The total fertility rate may actually be higher than 6.0, due to underestimation of births. This is why out of wedlock birth has constant increased during these periods. In a 1981/82 survey, the total fertility rate was estimated to be 5.9 children per woman. One reason for the high level of fertility is that use of contraception is limited. Only 6 percent of married women currently use a contraceptive method (3.5 percent use a modem method, and 2.5 percent use a traditional method). Levels of fertility and contraceptive use are not likely to change until there is a drop in desired family size and until the idea of reproductive choice is more widely accepted. At present, the average ideal family size is essentially the same as the total fertility rate: six children per woman. Thus, the vast majority of births are wanted. The desire for childbearing is strong in Nigeria. Half of women with five chil dren say that they want to have another child. Another factor leading to high fertility is the early age at marriage and childbearing in Nigeria. Half of all women are married by age 17 and half have become mothers by age 20. More than a quarter of teenagers (women age 15-19 years) either are pregnant or already have children. National statistics mask dramatic variations in fertility and family planning between urban and rural areas, among different regions of the country, and by womens educational attainment. Women who are from urban areas or live in the South and those who are better educated want and have fewer children than other women and are more likely to know of and use modem contraception. For example, women in the South are likely to marry and begin childbearing several years later than women in the North. In the North, women continue to follow the traditional pattern and marry early, at a median age of 15, while in the South, women are marrying at a median age of 19 or 20 .Although fertility rates are declining as modernization is increasing, Many women are still experiencing unwanted and unplanned pregnancies, with consequences ranging from interruption of schooling to health risks and economic hardship, all of which hinder efforts to improve their socioeconomic status. By educating and empowering both married and sexually active unmarried women to make informed and responsible decisions about contraceptive use and their desired fertility, the Nigerian government can improve both the health and the economic productivity of its citizens. BIBLOGRAPHY REFERENCE: Federal Ministry of Health [Nigeria]. 1988. NationalPolicyonPopulationforDevelopment, Federal Office of Statistics [Nigeria]. 1963. Population Census of Nigeria, 1963 Combined National Figures. Lagos, Nigeria Frank Falkner and J.M. Tanner, Vol. 3, 241-262, New York: Plenum Press. NIGERIAN DEMOGRAPHIC AND HEALTH SURVEY 1990 -federal office of statistics. Lagos Nigeria Unity,Progressand Self-Reliance. Lagos, Nigeria: Department of Population Activities. London, Kathy A., Jeanne Cushing, Shea O. Rutstein, John Cleland, John E. Anderson, Leo Morris, and Sidney H. Moore. 1985. Fertility and Family Planning Surveys: An Update. Population Reports, Series M, No. 8. Baltimore, Maryland: Johns Hopkins University, Population Information Program. Martorell, R. and J.P. Habicht. 1986. Growth in Early Childhood in Developing Countries. In Human Growth: A Comprehensive Treatise, ed. by National Population Bureau [Nigeria] and World Fertility Survey. 1984. The Nigeria Fertility Survey 1981/82: Principal Report. Vol. 1: Methodology and Findings. Lagos, Nigeria: National Population Bureau. National Population Bureau [Nigeria[ and Institute for Resource Development/Westinghouse [1988]. National Demographic Sample Survey (NDSS) 1980: Nigeria National Report. Columbia, Maryland: IRD/Westinghouse. Ransome-Kuti, O., A.O.O. Sorungbe, K.S. Oyegbite, and A. Bamisalye, eds. [ 1989] Strengthening Primary Health Care at Local Government Level: The Nigerian Experience. Lagos, Nigeria: Academy Press Ltd. Rutstein, Shea Oscar and George T. Bicego. 1990. Assessment of the Quality of Data Used to Ascertain Eligibility and Age in the Demographic and Health Surveys. In An Assessment of DHS-I Data Quality, 3-37. Institute for Resource Development/Macro Systems. DHS Methodological Reports, No.1. Columbia, Maryland. REDUCING UNWANTED PREGNANCY IN NIGERIA BY the Alan Guttmacher Institute
Strategies to Protect Sensitive Corporate Data
Strategies to Protect Sensitive Corporate Data Jasjeet Singh What are the steps project managers must incorporate to uphold the security, privacy and disaster recovery policies to prevent Companies sensitive and vital corporate Data? Abstract Security, disasters and privacy are risks to a project and to a project manager. But project managers are trained to deal with risks. These risks are best addressed when the project manager fully understands them. In a nutshell, we can say its all about protection of vital data and its critical element CIA(confidentiality, integrity, and availability) including the machines and process that use, store, and transmit that data. Security is a risk to project managers for both implementing a project and perhaps the project itself if it is IT or telecom related. In this paper, I will include the data security risks facing a project manager, How to protect the CIA Triad using various security policies, standards, and procedures. And I will try to touch some more information security related aspects like Security Awareness and privacy protection, etc. Keywords-Project management; Project Manager; Data Security; Privacy; Security Policies; Confidentiality; Security Awareness. Almost every project generate or use, some form of information and information technology. Mostly, this information needs to be preserved or isolated by some form of security. Security planning and implementation is an integral part of the overall project life cycle which also include many different issues to be considered when planning a project. Whereas finally what is being safeguarded is the data produced by the machines, the information that data is used to create, and in some manner, the conclusions made based upon that vital data. A security threat is something that jeopardizes any of the CIA Triad (availability, confidentiality, and integrity) of a machines data. Security flaws and risks emerge from such threats. Solutions and planning to manage such items begins in the very initiation stages of a projects life with the identification of any of these security related flaws, risks, and threats. In parallel with each phase, efforts work towards constantly identifying new threats and reducing the identified security risks through the diligent planning and proper implementation of risk mitigation strategies specifically developed to resolve each unique threat specifically. Security of vital data and associated technology systems must be considered when planning projects, developing applications, implementing systems, or framework etc. So as to be effective and efficient, security must be organized for and embedded into the systems from the very starting, and monitored periodically throughout the life of the proje ct, and be maintained all along the life of the system. Thereby the result is planning as soon as possible in early stages and embedding security into all phases of a projects life cycle is usually considerably easier and much less cost consuming than waiting till the later project phases to consider it. On the moment when addressing the security for the majority of the data frameworks, it might be a chance to be decayed under three principal segments that are; communications, hardware, and software. Arranging how every from claiming these zones may be ensured includes not the main attention by the people, policy, practice etc. and also, financial considerations with furnish for those Audit from claiming the framework, asset procurement, execution of security solutions, progressing security maintenance and so on. Figure 1: CIA Triad The image shows the main goal of such efforts which are to maintain the availability, confidentiality, and integrity of vital information. All information system must maintain: Confidentiality disclosure or exposure to unauthorized individuals or systems is prevented Integrity data cannot be created, changed, or deleted without proper authorization. Availability information and the security controls used to protect it are functioning correctly when the information is needed. à à An ordinary Project Management technique doesnt incorporate subtle elements regarding guaranteeing integrity, confidentiality, Furthermore availability for the majority of the data or those protections about particular data. Background need to be demonstrated that mostly the information security or privacy experts would not consult regarding the undertaking until those test phase, alternately much more terrible The point when the project needs with be marked off or executed Also about to go live. These conditions will feel thick, as commonplace on the majority of the data security experts Also privacy officers indistinguishable. This cautiously might prompt postponements previously, sign-off Whats more go-live alternately significantly more repulsive another information skeleton being moved under preparing without expanding security Also security controls completed. This means exploitation of risks such as: Breaches of legal requirements, for example, the Privacy Act, Unauthorized access to systems and information, Disclosure of information Moreover bolting on security instruments controls alternately privacy controls toward those end of the development, for example, another provision or the usage of a new data framework is really unreasonable Furthermore drawn out. Data information and framework security Whats more security methods oughta chance to be inserted under the organizations venture administration procedure. This ensures that majority of the data security Also security dangers would identify, assessed, figured out how Whats more tended to ask and only an undertaking. This approach Might make associated for during whatever endeavor regardless to its character, e.g. an endeavor for focus profits of those business process, IT, office organization Moreover different supporting manifestations. Venture supervisors would continuously set under a considerable measure from claiming weight to guarantee they convey on time Whats more inside plan. On accomplish execution of a secure Also industry consistent legitimate a dministrative necessities data system, it may be vital to take part for the majority of the data security and security topic masters from those minute a feasible ticket may be recognized to Creating. The two main approaches to project management are: The waterfall approach (delivery is all-in-one-go, for example, Prince 2 and PMP); and A release-based iterative approach (delivery is in bursts of functionality spread over time, for example, Agile Scrum/Sprint methodology). Both methodologies need pros Furthermore cons Furthermore, we wont talk about whatever points of these two approaches, rather it takes a gander during the place whats more entryway data security Also privacy ought to a chance to be joined under those project management cycle, in any case about which methodology is picked. Process Steps Everyone dares organization methodologies to take after a tantamount high-cap convert starting with asserting 4 alternately 5 steps, in the passages underneath those steps to that Agile technique would previously, (brackets). Every for these steps needs their goal/objective, in addition, an arranged starting with guaranteeing deliverables to that step. For every to these steps, those one assignment director ought to should incorporate a security proficient. Incorporating security under exercises beginning with that start will Abstain starting with each moment abstain? In addition (often very) irrationally additions later on in the project. The individuals taking then afterward slug concentrates give to an Audit of the lions share of the information security Also privacy-related considerations for each phase. More details on this topic can be studied on the internet. Scope/Initiation/Discovery (Stage 1 Vision) Might be specific information included in this project alternately converted at that passed on information system? Assuming that something like that the individuals or security officers necessities around an opportunity to be contacted at this stage. What is the order alternately affect the ability of the data processed? Ensure that the Information Security Officer (or equivalent role such as ICT security, CISO, ITSM) is involved in communicating security requirements; these must be an important part of the business needs. Is there a requirement for compliance with legal or regulatory needs, national or international standards (ISO27001) or contractual security and privacy obligations? Business Case/Planning (Stage 2 Product Roadmap and stage 3 Release Planning) Indulge with the respective subject matter professionals to discuss in detail the security and privacy needs, so they can be implemented during the design of the project. Pre-define the acceptance methodology for all the business needs, including security and privacy protection. Identify security and privacy risks and perform risk and privacy impact assessments. Depending upon the results of these assessments, identify security and privacy countermeasures and techniques which need to be included in the design. Development/Execution (Stage 4 Sprint Planning and Stage 5 Daily Scrum) During the design implementation the identified security and privacy controls? Perform compliance checks and security reviews against requirements and selected controls, against existing policies and standards. communicate with external security experts such as penetration testers, code reviewers, and auditors, etc Plan for performing vulnerability scans (internally) and checking of the patch fixing status. Consider meeting the Operations team that will handle the solution from a security perspective after moving on to production. Test Evaluation/Control Validation (Stage 6 Sprint Review) Indulge with security and privacy subject concern experts to assist with communicating and understanding the resulting reports (test). Execute all security testing: penetration test, code review and/or ISO audit. Have Security operations team go through with the operational documentation? Regularly check the risk register and review all risks, based on the solution as it has been formulated. Launch/Close (Stage 7) Pass on the formulated security and privacy treatment plans, which have been accepted and agreed by the business owner. Start the business normally with security operations, monitoring of risks and compliance. Milestones or gated Approach The waterfall project management techniques discuss that for managing Also controlling the one project phases, An amount from claiming checkpoints, turning points or gateways ought further bolstering be presented. Figure 2: Gated approach The main motive of these gateways is to make sure that all criteria or needs are fulfilled or not, all required deliverables for that phase are done or not, and to review if the project is still on time/within budget. These gateways are the instances in time during a project where security and compliance milestones can be introduced to safeguard that the project in compliance with all agreed business needs, including security and privacy formulations. Underneath are some checks, decisions, and lists that should be implemented from an information security and privacy point of view: Scope gate High-level business, information security, and privacy needs identified. The seriousness of information assessed and considered. Business case sign-off gate By in-depth study on the risks assessment, note down all security and privacy controls and procedures. In-depth security and privacy requirements formulated and acceptance criteria accepted upon. Indulge with IT design architects and information security subject matter professionals to compose a Risk management Plan (which will include a resource plan/budget). Maintain a risk register that lists down all privacy risks, security risks, and initial level of risk (gross risk). Design sign-off gate Assessment of privacy, security and reviews and compliance points against agreed sign-off criteria. Go through the project risk register that lists down all security risks, privacy risks, and potential residual risk. Communicate with 3rd parties to agree on the scope of a penetration test, Certification Accreditation audits, code review or other security tests that are been outsourced. Communicate with the operational security team to put forward the solution and manage if the document set is complete, acceptable and up-to-date. Final business sign-off gate Check weather all formulated security and privacy controls and procedure implemented as designed? The job of Information Security is primarily to ensure CIA in place but there is a common misconception that only IT is responsible for it. But theyre not!! Then who is responsible for Information Security in your organization or say for the project youre managing? Lets think of below: Who is the information owner in the organization for this project? Its senior management or business heads (on behalf of the customer). Remember IT is the custodian of information while the owner will decide about classification and protection/access requirement. Who is to understand and conduct impact assessment? The owner should be the one who is gonna tell us how important ( or say risk level) the information is and assess what will happen if we fail to protect. How to secure information flow/process in your project? Once you understand customer or owners requirement and the impact, now Project Manager has to play the role. However, PMs are not expected to be security experts but be fully aware of it. PM is the one who: Should understand what are information risk concerning his/her project Interpret impact to senior management and customer for security issues Need to be able to decide on appropriate mitigating action Minimize the risk associated with information security threats/breaches. Include security considerations is integrated into every phase and process of a projectà à ¾ and Ensure adherence to policy and standard/compliance So need to include Information Security within the project process right from the Initiation. We can fit it in when developing Project Charter Business Case Ãâà Consider Impact Assessment on proposed product service from information risk perspective and also must include information security safeguard and issue during cost benefit analysis. Discuss and identify security features/requirements to be added. Project Statement of Work Ãâà Review product scope to identify info. sec requirement and incorporate any additional Customer requirement for specific infoÃâà sec standard compliance Organizational Process Asset Ãâà Internal Information Security Policy, Standard and Procedure and also security control and audit requirement for process systems including a stipulated in RFP. Enterprise Environmental Factors Ãâà In addition to Legal Regulatory requirement may need to consider industry standard practice on Information Security. Formulated security testing reviewing the results and make a decision if things are acceptable or not. Project Plan integrate information security Scope Management Collect Requirements Legislation, regulation and customer expectations on information security and make sure you know how you will be able to measure whether above requirements are met? Change Control process should always consider IS impact during approval/review. Data Classification should be approved by management and customer and also define control requirements in the system, 3rd party and operational process for the data type. Identify all requirements on data storage, record management and destruction for the internal and external party and then prepare data governance/ handling policy and procedure for your project based on the above. Figure 3: Threat Activity model Procurement Identify critical supplier who can have a significant impact on project deliverable and responsible for handling restricted data. Do we need sign NDA? Require Audit right to review their process and controls? Have to safeguard from relevant security flaws appropriately resolved in all your third party contracts. Quality Control Quality will include security compliance on process and record management. Quality Assurance will perform security audit and review privilege (system +operational) to review data disposal and backup process. For effective measurement, need to identify appropriate PI for security control. Next, integrate within your Project Plan. Cost Time Ensure budget and schedule covered security related activities and controls. Stakeholder Management Cross-border data transfer and data privacy issue applicable? Regulatory compliance and approval required? Engage early with concerned parties to properly plan ahead. Monitor change in regulatory and statutory policy. How to maintain requests for information from government agencies and those results from legal process? Example: Regulators response and deadline may challenge project outcome. Project Risk Management Information Risk Assessment Lets review the basics once again: Define Information Risk Ãâà Risk is a factor of the likelihood of a given threat sources exploiting a particular potential vulnerability and the resulting effect of that adverse event on the organization. Qualitative Risk Assessment A method can be Overall Risk Score = Likelihood X Impact. The likelihood is a chance of this event occurring in the scale of 1Ãâà 5 or Very Likely, Likely, Maybe, Unlikely, Highly Unlikely etc. For example, whats the chance vendor the system will compromise our data during the project? The impact is how much effect once the risk (no control in place) in the scale of 1Ãâà 5 or Critical, High, Medium, Low, Minimal. For example, what will happen to us once the data is compromised? Define overall rating for risk, For example, can be High if > 15, Medium for 10-Ãâà 15, and Low if When required should engage information owner, customer, and security function wherever possible and then assign monitoring responsibility and activities within a risk response plan. Quantitative Risk Assessment Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk being realized over a one year period. ALE = SLE * AROÃâà SLE (Single Loss Expectancy) is the value of a single event loss of the asset [impact]Ãâà SLE = Asset Value x Exposure factor. [EF is what % of the asset will be damaged]Ãâà ARO (Annualized Rate of Occurrence) is how often the incident can occur in a year [likelihood]. A risk occurring once in 5 years has an ARO of 0.05à à ¾ while if occurring 10 times in a year then ARO = 10 Could use average = (Worst + 4*Average + Best) / 6. The above is kept simple and not perfect but better than nothing. Risk Response Cost Benefit analysis of feasible Safeguard/Control Compare ALE considering with and without safeguard control in place. Value = ALE (with NO safeguard) (ALE after implementing safeguard) (annual the cost of safeguard). Select Mitigation, Transfer, Acceptance, and Avoidance based on above. Note: SIME: Security Information and Event Management Ãâà DLP: Data Leakage Protection Ãâà DRM: Digital Rights Management. HR/People Manage Security with People Security Skills Assessment What are the resources and skill requirement for information security in your project? Does your security function have sufficient trained resources? Assign security management and appropriate level of authority to carry out this role. Security Awareness Security is not police job, rather we are protecting corporate information to safeguard our customer, our business and to comply with statutory requirements. All team members know their responsibilities to help establish security and comply with the policy. Set up ground rules on acceptable and unacceptable activities, for example, usage of social media, official email monitoring etc as per organizational procedure. Clearly, understand data classification policy and how to handle each type of data. Figure 4: Security Awareness Training Promote awareness campaign to motivate team members to be the safeguard of corporate information. Security breach/issue reporting and handling procedure should be clearly communicated. Discuss why we focus on information security and clarify concern during team building. Project Communication Secure what you communicate Comply with the security policies Comply with the policy from both client organization and project organization. In cases where policies overlap, the more restrictive policy will apply. Check whether supplier/vendor/outsource Company meets the same standard. Checkpoint for data transfers and storage Consider using method in which password protect the meetings and/or use the roll call system of the conferencing. Prefer to encrypt data during the distribution of meeting proceedings and another project documents via email. Select Instant messaging, desktop or application sharing/video conferencing via secured provider or channel. Check what information is acceptable to be left in auto responders and in voice mailboxes. Establish administrative controls Prepare Guidelines for use of social media and how to share project information. There should be guidelines or ground rules regarding forwarding work related email to personal or transfer to smart phonesÃâà Consequence of a security breach and data leakage should be clearly communicated. Project Execution Implement effective control Direct and Manage Project Work Segregation of Duties execution, and supervision of any process should not be performed by a single person and establish dual control or Maker Checker process on activity involving risk. Strictly follow approval and authorization limit for layered control on requesting a change. Reviewed authority and access right upon during staff transfer or exit from the project. Ensure appropriate labeling and storage of documents resulted from project activities. Remind importance of security awareness and to notify breach/incidents immediately. Engage with the supplier to increase security awareness with their employee as per your standard. Data backup and restoration should be periodically tested for project related system(s). Manage Communication When information requested by the supplier, check against requirement and policy before sharing. Maintain the record of send and receipt when documents are shared/sent to the 3rd party. Figure 5: Communication Management Discuss information security issue in the regular review meeting and notify formally when appropriate. Monitor Control Pro-active check and act Control Scope Risks Ensure security verification upon milestone achievement. Reviewed system logs, alert and process audit output to identify the potential incident. Monitor change in regulatory and other critical factors that may force information risk reÃâà assessment. Security Incident Management Assess impact Internal, Financial, Legal, Regulatory, Customer, and Media/Reputation. Do NOT underestimate any impact often serious consequence happens from simple case. Invoke organizational incident management process and escalate to senior management if required. Manage 3rd Party Risk Conduct an audit to see how Vendor/Outsourced company process, store and destroy your information. Review what formal information ( and their type) are being shared with external parties. Check with the critical supplier for Business Continuity drill as it may impact your project during any disaster. Project Closure -Secure disposal Formal Sign Off Conduct security audit with supplier and customer (if required) and document formal sign off. Ensure all project documents and necessary records are properly achieved. Document lesson learned from security issue and incident handling. Operational Handover Document to enforce security controls as recommended for regular operation. Revoke access rights from the system before dissolving project team. Formal handover production system, customer/business documents, manual or other records including backup data and electronic equipment containing information. Data Disposal Formally confirm with all project team members on secure destruction either stored in electronic format or paper-based document which no longer required. Confirm destruction from a supplier who may retain information belong to your company/customer. Conclusion Information Security plays a very important role in the development of every project irrespective of projects magnitude. So the project manager has to be very much alert and attentive to check and to meet the protocols so as to preserve the vital corporate data of the organizations during each phase of the project development. Figure 6: Template for Questionnaire to review security of project The project manager must use various new techniques to embed the security into the project from the very initiation phase one of such technique is to use Questionnaire to review the security of the project. Project Managers can also look for a new secured Software development life cycle model which incorporates all major aspects of the data security, privacy, and recovery for a software development. Figure 7: Secure SDLC Model Those A large cost savvy approach to managing security under products or techniques is to actualize all the security Furthermore privacy controls and mechanisms under the configuration, Including them later alternately. After the project needs to be run live, will be significantly a greater amount exorbitant and might diminish those Return-on-Investment of the project altogether. References [1] Security Issues that Project Managers at CDC Need to Address, CDC Unified Process Project Management, vol. 2, no. 6, June 2008. [2] M. Dean, A riskà based approach to planning and implementing an information security program, in PMI, 2008. [3] B. Egeland, Learn 3 Ways to Ensure Your Project Data is Secure., Is Project Security that Important?, July 2, 2015. [4] R. J. Ellison, Security and Project Management, Security and Project Management | USà CERT, February 06, 2006. [5] D. E. Essex, government database project outsourcing, A matter of public record, August 2003. [6] S. Fister Gale, Safeguarding the data treasure, February 2011. [7] S. Hendershot, Security guardsà dataà security initiatives for Project Managers, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control), Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), September 2014. [8] C. Klingler, Security, privacy and disaster recovery for the project manager, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control) , Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), 2002. [9] Monique, Information Security Privacy as part of Project Management, 18 March, 2015. [10] M. Pruitt, Security Best Practices for IT Project Managers, SANS Institute, June 18, 2013. Table of Figures Figure 1: CIA Triad: https://www.checkmarx.com/wp-content/uploads/2016/06/Data-Securi
Subscribe to:
Posts (Atom)