Tuesday, January 28, 2020
The Pursuit of Happiness Essay Example for Free
The Pursuit of Happiness Essay The 2006 movie The Pursuit of Happyness, featuring will smith and real-life son Jaden Smith received significant financial success both during its original release and subsequent DVD edition. Inspired by the memoirs by self-made millionaire Chris Gardner together with Quincy Troupe, the film features the challenges of pursing the ââ¬Å"American dreamâ⬠, a challenge more easily associated with foreigners or immigrants to the country. The inspirational value of the movie is one of the reasons for its appeal. In the story, Gardner is portrayed as having employment is al subject to the social change faced by the unemployed. Though the premise of the story is not unique, the films approach illustrating how the collective impact of small social challenges can lead to homelessness highlights the concern of the spiraling social exclusion most middle class Americans have to deal with. à à à à à à à à à à à Gardnerââ¬â¢s joke to his son regarding the drowning man who turned down the rescue of two boats in favor of waiting for God himself to save him is a testimony to the philosophy that he believes was key to his success. Similar to the adage that God helps those who help themselves, Gardner points out that one should not be so proud as to accept the help of others even if they do not compare to oneââ¬â¢s expectation of the help that one needs. Moreover, Gardnerââ¬â¢s story to his son encourages him to see the hand of God behind the opportunities, good and bad that comes his way going beyond corporeal or mystical manifestations. à à à à à à à à à à à There are key moments in the film where this can be most apparent. One of the early moments where this is seen is when he asks a man going out of a Ferrari what he did for a living and how he did it. The encounter, in real life with then top stockbroker Bob Bridges, led to Gardnerââ¬â¢s introduction to a career in stock trading. Gardner again illustrates this idea in his interview with the internship position where he had to convince the panel to accept him though he came underdressed to the interview. Another example is portrayed in the daily rush father and son would always have to make at the end of the day to be able to get s a lot in the church shelter as well as the times when he sought ââ¬Å"creativeâ⬠ways of finding a place to spend the night in with his son which included railway station bathroom, subways and busses. The other scene that brings the deliver the same message was when the light of the bone density machine was being repaired by Gardner. But the most poignant illustrations of the philosophy behind Gardnerââ¬â¢s quip are delivered by the conversations between father and son such as in Gardnerââ¬â¢s lecture to his son regarding pursuing oneââ¬â¢s dream despite othersââ¬â¢ negative opinion viewing the city. à à à à à à à à à à à At many points in the picture, Gardner is portrayed as someone who is driven to the edge but is able to keep himself from totally falling into despair. His moments of self-pride in the movie are always resolved to have negative consequences such as having to run from a taxi driver and missing a slot in the shelter due to lending his boss cab fare. Often he is shown to have to swallow his pride to seek shelter or care but remains committed to alleviating his situation with his son as best he can and to not be dependent on welfare or the charity of others. Gardnerââ¬â¢s view of helping oneââ¬â¢s self emphasizes self-reliance but also self-realization. He points out that to be able to triumph from challenges: one has to be able to commit oneââ¬â¢s self on doing so and pursuing every opportunity that comes. This implies the need to actively seek ways to accomplish such an objective, improving oneââ¬â¢s self and learning from others and to persist regardless of failure. Work Cited The Pursuit of Happyness. Dir. Gabriele Muccino. Perf. Will Smith, Jaden Smith, Thandie Newton. Sony Pictures. 15 December 2006.
Monday, January 20, 2020
What The Human Genome Revolution Could Mean For Me And The Rio Grande V
What The Human Genome Revolution Could Mean For Me And The Rio Grande Valley The human genome revolution will have as big an impact on the average person as it does on the scientist researching it. Millions of people throughout the world will benefit from this experimentation. Understanding genetic material and the ability to pinpoint errors in genes, may lead to the prevention of many genetic diseases. The ultimate goal is to use research to develop new ways to treat, care, or even prevent the thousands of diseases that afflict humankind. Although the scientific community delivers many contributions to this scientific accomplishment, the road to a new age of disease free human life is long and rocky with struggles and disbelief. Whether inherited or resulting from the bodyââ¬â¢s response to environmental stresses, all diseases have a genetic component. The advances in this field hold an excellent future for treating and curing genetic diseases. Scientists can do this by using normal genes to supplement defective genes and to bolster immunity t o disease. In the Rio Grande Valley, an area dominated by Hispanic ancestry, many genetic diseases, such as diabetes, are common illnesses suffered by many people. According to the Mendelian Laws of Heredity, diabetes is an inherited disease, resulting from a recessive trait and affecting millions of people throughout the United States, especially people of Hispanic origins. When the body cannot make full use of some foods we eat, mainly carbohydrates of sugars and starches, a large gland under the stomach called the pancreas does not make available enough insulin to burn these foods as energy or sto... ...ent of most, if not all, human diseases.â⬠The human genome revolution affects the Rio Grande Valley and myself because it will help to treat and prevent genetic diseases that others and I may be afflicted by. This research is important, especially to couples, because every baby born deserves a chance in life in a disease free world. The research is also significant to those who suffer from diabetes; they too deserve a life free of physical illnesses and constant medical care. In my life, I personally know and love many people that have been affected by these genetic diseases and helping them receive treatment will be the greatest gift of love I could ever offer. I know there are also many people that feel the same, because everyone has a special person in their life, a family member, friend, peer or acquaintance that will benefit from this remarkable research.
Sunday, January 12, 2020
Titianââ¬â¢s Venus and the Lutenist
Titian, Venus and the Lutenist Titianââ¬â¢s Venus and the Lutenist depicts Venus laying in a courtly setting set on a larger pastoral landscape. The intertwining of both courtly and pastoral is common in the high Renaissance and appropriate for the painting as Venus is the queen of love, beauty, and nature. The painting was very possibly a wedding gift to a nobleman or ruler, and the theme of marriage is reflected in Venusââ¬â¢ ring and the wreath of flowers that Cupid places above her head. Trademarks of the courtly, such as jewelry and sumptuous clothing, are inscribed with pastoral features.Indeed, Venus is set upon a pastoral and natural landscape because ââ¬Å"there is none among [living things] which has not been derived from love as from its first and most reverend father. â⬠(Bembo, Gli Asolani) By setting her indoors, laying on luxurious fabrics, Titian glorifies and places a higher value on Venus. It seems to set a hierarchy where she is at the top, and nature a nd humanity are underneath. She lays beside a nobleman playing the lute, which is in itself a courtly instrument and he is gazing at her in admiration.By portraying the nobleman as young, Titian gives Venus an almost maternal quality, playing on the idea that she is the mother of all things (she is occasionally compared to Mary. ) She is also set apart from the scene in the background by the difference in the activities being performed by the figures. In the background can be seen nymphs and satyrs dancing freely, in contrast to the higher, more civilized Venus in the foreground. Titian resolves contradictory values of the sixteenth century by ennobling and glorifying a figure of great sexuality and underlining Venusââ¬â¢ influence on all of nature through the larger pastoral landscape.
Saturday, January 4, 2020
Siege of Paris in the Franco-Prussian War
The Siege of Paris was fought September 19, 1870 to January 28, 1871 and was a key battle of the Franco-Prussian War (1870-1871). With the beginning of the Franco-Prussian War in July 1870, French forces suffered a string of serious reverses at the hands of the Prussians. Following their decisive victory at the Battle of Sedan on September 1, the Prussians quickly advanced on Paris and encircled the city. Laying siege to city, the invaders were able to contain Paris garrison and defeated several attempted breakout attempts. Seeking to reach a decision, the Prussians began shelling the city in January 1871. Three days later the Paris surrendered. The Prussian triumph effectively ended the conflict and led to the unification of Germany. Background Following their triumph over the French at the Battle of Sedan on September 1, 1870, Prussian forces began marching on Paris. Moving swiftly, the Prussian 3rd Army along with the Army of Meuse encountered little resistance as they neared the city. Personally guided by King Wilhelm I and his chief of staff, Field Marshal Helmuth von Moltke, Prussian troops began encircling the city. Within Paris, the citys governor, General Louis Jules Trochu, had massed around 400,000 soldiers, half of which were untested National Guardsmen. Count Helmuth von Moltke. Photograph Source: Public Domain As the pincers closed, a French force under General Joseph Vinoy attacked Crown Prince Fredericks troops south of the city at Villeneuve Saint Georges on September 17. Attempting to save a supply dump in the area, Vinoys men were driven back by massed artillery fire. The following day the railroad to Orleans was cut and Versailles occupied by the 3rd Army. By the 19th, the Prussians had completely encircled the city beginning the siege. In the Prussian headquarters a debate was had over how best to take the city. Siege of Paris Conflict: Franco-Prussian War (1870-1871)Dates: September 19, 1870-January 28, 1871Armies Commanders:PrussiaField Marshal Helmuth von MoltkeField Marshal Leonhard Graf von Blumenthal240,000 menFranceGovernor Louis Jules TrochuGeneral Joseph Vinoyapprox. 200,000 regularsapprox. 200,000 militiaCasualties:Prussians: 24,000 dead and wounded, 146,000 captured, approximately 47,000 civilian casualtiesFrench: 12,000 killed and wounded The Siege Begins Prussian Chancellor Otto von Bismarck argued in favor of immediately shelling the city into submission. This was countered by the sieges commander, Field Marshal Leonhard Graf von Blumenthal who believed shelling the city to be inhumane and against the rules of war. He also argued that a quick victory would lead to peace before the remaining French field armies could be destroyed. With these in place, it was likely that the war would be renewed in a short time. After hearing arguments from both sides, William elected to allow Blumenthal to proceed with the siege as planned. Within the city, Trochu remained on the defensive. Lacking faith in his National Guardsmen, he hoped that the Prussians would attack allowing his men to fight from within the citys defenses. As it quickly became apparent that the Prussians were not going to attempt to storm the city, Trochu was forced to reconsider his plans. On September 30, he ordered Vinoy to demonstrate and test the Prussian lines west of the city at Chevilly. Striking the Prussian VI Corps with 20,000 men, Vinoy was easily repulsed. Two weeks later, on October 13, another attack was made at Chà ¢tillon. St-Cloud after the fighting at Chà ¢tillon, October 1870. Public Domainà French Efforts to Break the Siege Though French troops succeeded in taking the town from the Bavarian II Corps, they were eventually driven back by Prussian artillery. On October 27, General Carey de Bellemare, commander of the fort at Saint Denis, attacked the town of Le Bourget. Though he had no orders from Trochu to move forward, his attack was successful and French troops occupied the town. Though it was of little value, Crown Prince Albert ordered it retaken and Prussian forces drove the French out on the 30th. With morale in Paris low and made worse by news of the French defeat at Metz, Trochu planned a large sortie for November 30. Consisting of 80,000 men, led by General Auguste-Alexandre Ducrot, the attack struck at Champigny, Creteil and Villiers. In the resulting Battle of Villiers, Ducrot succeeded in driving back the Prussians and taking Champigny and Creteil. Pressing across the Marne River towards Villiers, Ducrot was unable to breakthrough the last lines of Prussian defenses. Having suffered over 9,000 casualties, he was forced to withdraw to Paris by December 3. With food supplies low and communication with the outside world reduced to sending letters by balloon, Trochu planned a final breakout attempt. Prussian troops outside of Paris, 1870. à Bundesarchiv, Bild 183-H26707 / CC-BY-SA 3.0 The City Falls On January 19, 1871, a day after William had been crowned kaiser (emperor) at Versailles, Trochu assaulted the Prussian positions at Buzenval. Though Trochu took the village of St. Cloud, his supporting attacks failed, leaving his position isolated. At the end of the day Trochu was forced to fall back having taken 4,000 casualties. As a result of the failure, he resigned as governor and turned command over to Vinoy. Though they had contained the French, many in the Prussian high command were becoming impatient with the siege and the increasing duration of the war. With the war adversely affecting the Prussian economy and disease beginning to break out on the siege lines, William ordered that a solution be found. On January 25, he directed von Moltke to consult with Bismarck on all military operations. After doing so, Bismarck immediately ordered that Paris be shelled with the armys heavy Krupp siege guns. Following three days of bombardment, and with the citys population starving, Vinoy surrendered the city. Aftermath In the fighting for Paris, the French suffered 24,000 dead and wounded, 146,000 captured, as well as approximately 47,000 civilian casualties. Prussian losses were around 12,000 dead and wounded. The fall of Paris effectively ended the Franco-Prussian War as French forces were ordered to cease fighting following the citys surrender. The Government of National Defense signed the Treaty of Frankfurt on May 10, 1871, officially ending the war. The war itself had completed the unification of Germany and resulted in the transfer of Alsace and Lorraine to Germany.
Friday, December 27, 2019
Leadership And Followership Assessment. Teaching Is A Complex
Leadership and Followership Assessment Teaching is a complex profession in which the individual is simultaneously a leader and a follower. They work independently and in teams with clear objectives that must be met to ensure not only personal success but that of their students and school. In recent years, more attention has been placed on followership in the field of education. Robert Darwin Nigel Ammon explained that, ââ¬Å"leadership provides the opportunity to influence the lives of each and every person that you may encounter, followership promotes collaboration and allows you to learn from others and in certain contexts to teach others, and service addresses the highest calling of all.â⬠(Annon, 2013) Robert Kelly, professor at theâ⬠¦show more contentâ⬠¦How can the teacher improve in followership? One way is through the guidance of a mentor. Many first-year teachers are assigned mentors with more teaching experience who can guide them through the struggles of classroom management and other tasks, including followership. However, even a teacher who has many years of experience can benefit from another teacherââ¬â¢s input. An area of weakness the teacher identified in her self-assessment is understanding the leaderââ¬â¢s needs, goals, and constraints. This area can be improved on through one on one communication and by asking specific questions of the leader to better understand what they need from her as a follower. She can also conduct further research about the teacher-principal relationship and discover the best ways to build a strong working relationship with the leader of the school. (Annon, 2013) School environments are highly interactive and the ability to developed positive relationships among the staff members has a significant effect on student and teacher performances. Continued efforts to improve interpersonal skills and communication is a great way to improve on followership skills like empathy and authenticity. The principal of a school communicates the district and state guidelines, as well as, academic requirements for all the students in a school. These directives must beShow MoreRelatedThe Leader Follower Relationship : Defining, Designing, And Biblical Truth1634 Words à |à 7 PagesIncorporating Biblical Truth to Global Leadership Introduction I was engaged in a dynamic conversation with a colleague in reference to subpar productivity of a particular office in which we work alongside. We went down the list of what the support staff (follower) were not doing, areas that lacked proficiency, and how to possibly address it. All of a sudden, my colleague stated, ââ¬Å"Leadership is everything!â⬠What is Leadership? What is Followership? Leadership is defined as ââ¬Å"a process whereby an individualRead MoreThe Career Of A Freelance Arts Educator1573 Words à |à 7 PagesIn a traditional, stagnant educational environment leadership relies heavily on power and control. In this context a primary administrator has the power to assign tasks and monitor progress while also controlling the distribution of positive or negative performance based incentives. When leadership is merely a series of transactions the primary administrator is able to stake claim to independently creating a school mission and appropriate action steps . After conducting my interview it is evidentRead MoreThe As A Freelance Arts Educator1622 Words à |à 7 PagesIn a traditional and stagnant educational environment leadership relies heavily on power and control. In this context a primary administrator has the power to assign tasks and monitor progress while also controlling the distribution of positive or negative performance based incentives. When leadership is merely a series of transactions the primary administrator is able to stake claim to independently creating a school mission and appropriate action steps. After conducting my interview it is evidentRead MoreA Better Understanding Of Leadership And Management2299 Words à |à 10 PagesLeadership and management are essential to any health care organization. Great nursing leadership depends on great nursing leaders. Nursing leaders motivate, influence, and communicate visions to create change within the organization. Although leadership and management are both important in nursing leaders, they are not the same, but are sometimes used interchangeably. The rationale for the selection of this topic is to have a better understanding of leadership and management roles in nursingRead MoreUnderstanding Change Management in Nursing Leaders Nursing Essay3020 Words à |à 13 PagesUnderstanding Change Management In Nursing Leaders Nursing Essay Leadership is defined as influencing people to achieve a purpose or set of goals, but differentiating it from management causes confusion in many instances (Tappen, Weiss and Whitehead, 2004; Senior and Fleming, 2006; Robbins, Judge and Sanghi, 2009). Leaders can be managers but not all managers can be effective leaders, making leadership an important aspect of effective management (Tappen, Weiss and Whitehead, 2004). Several attemptsRead MorePersonal Leadership Assessment and Development Plan4458 Words à |à 18 Pagesà Personalà Assessmentà andà Leadershipà Developmentà Planà Introductionà Theà focusà ofà myà personalà assessmentà andà leadershipà developmentà planà isà toà denoteà theà values,à beliefs,à thoughts,à andà actionsà thatà willà propelà meà intoà aà stateà ofà personalà fulfillmentà asà aà moreà completeà leaderà atà home,à inà theà workplace,à andà inà theà community.à à Theà preparationà ofà thisà documentà willà resultà inà theà creationà ofà aà deliverableà toà beà frequentlyà referencedà andà usedà asà aà reminderà ofà theà overallà directionà andà moreà specificà strategiesà toà achieveà myà personalà andà Read MoreNursing Manager Role Essay4395 Words à |à 18 PagesIntroduction Leadership is an integral part of nursing. Grossman and Valiga suggest that leadership is not necessarily tied to a position of authority (Grossman Valiga, 2005, p. 4). Also suggested by Grossman and Valiga, is that each professional nurse has the potential and the responsibility to provide leadership in each of our individual areas of practice, institutions, professional organizations, communities, and our profession as a whole (Grossman Valiga, 2005, p. 4). Leadership is a courseRead MoreStrategic Management and Leadership25577 Words à |à 103 PagesPostgraduate Diploma Level 7 in Strategic Management and Leadership The London Academy for Higher Education: Extended Diploma in Strategic Management and Leadership Course Manual 2011 / 2012 Contents How to use this Manual About the London Academy for Higher Education About the Extended Diploma in Strategic Management and Leadership Course Module Brief Entrance Requirements Core Units Unit 1: Developing Strategic Management and Leadership Skills Unit 2: Professional Development for StrategicRead MoreEssay about Phd Comprehensive Exam. in Leadership15004 Words à |à 61 PagesRequirements for the Degree Doctor of Philosophy by George E. Anderson III Leadership School of Business and Technology Capella University QUESTION 1 The mixed method has recently become a popular method of research. Analyze and compare the mixed method, qualitative and quantitative research methods. Evaluate the effectiveness of each as a valid method of research on models of military leadership. Introduction The sociological effects discussed by Kuhn (1996)Read MoreSociology and Group41984 Words à |à 168 Pagese. 8ââ¬â12 people Answer: c. 5ââ¬â7 people . According to your textbook, the most important factor separating successful groups from unsuccessful ones is a. having a minimum of 5 and a maximum of 12 members in a group. b. a clear goal. c. strong leadership. d. member independence and interdependence. e. group morale. Answer: b. a clear goal. . According to your textbook, a group s context refers to a. the type and size of the group. b. the group s physical and psychological setting. c
Wednesday, December 18, 2019
Essay about Chrysanthemums, A Review - 866 Words
The Chrysanthemums introduces us to Elisa Allen, a woman who knows she has a gift for things, but cant make more use of it than to grow her chrysanthemums. She is trapped in the Salinas Valley, where winters fog sits like a lid...and [makes] the great valley a closed pot. Her human nature has made her complacent in ordinary life, but the short glimmers of hope offered by her flowers and a passing stranger reveal that there is more to Elisa than her garden. Her environment may be keeping her inside her small garden, but inside her heart there is a longing for more. When we are first introduced to Elisa, she seems to look more like a man from afar than a woman who is gardening. She wears a mans hat, and her flowerâ⬠¦show more contentâ⬠¦She is no longer hiding behind her mans hat, but rather tears it off to reveal her pretty hair and asks him to step inside the garden. When she gives the man a pot with a chrysanthemum inside to carry with him, she begins to tell him of her planters hands. Elisa becomes very excited, as she begins to think this man has something to offer her; he is a traveling man and can help her understand what freedom feels like. While she is speaking to him, she begins to get overly excited and almost grabs a hold of him. Unfortunately, he is not the man who can help her out, and draws the conversation away by mentioning dinner. As soon as he does so, Elisa becomes ashamed at her own excitement, the same excitement she showed when she was working with her flowers. Elisas glimmer of hope is gone now, and her character begins to reveal how she is trapped inside that valley, much like the valley is trapped from the rest of the world by the overwhelming fog. She becomes defensive against the stranger once more, and wants to prove to him that even a woman can do what he is doing. Even a woman can travel and fix things for people, especially one who has such a gift with her hands. The mans discomfort with the situation brings him to leave Elisa alone, alone to the sounds of her own voice whispering goodbye. Here is where human nature gets the best of Elisa, as she creeps back into her habitualShow MoreRelatedThe Chrysanthemums By John Steinbeck982 Words à |à 4 Pagesââ¬Å"The Chrysanthemumsâ⬠is a short story written by John Steinbeck. The story was originally published in 1937 before later being released as a part of his The Long Valley collection. This is an important story as it expresses women in a way that is more realistic, showin g their true boredom, ambition, and capabilities. Some scholars interpreted this story differently, but C. Kenneth Pellow interprets it as ââ¬Å"radically feministic.â⬠The Great Depression was finally ending and womenââ¬â¢s rights were risingRead MoreAngel Estrada . Engl 2310 - 120. Dr. Mcgregor. April 11,1512 Words à |à 7 PagesAngel Estrada ENGL 2310 - 120 Dr. McGregor April 11, 2017 The Chrysanthemums The difference between men and women is a very controversial issue, while there are obviously physical differences. The problem would be on how the genders are treated. It is stereotypically thought that the men do all the hard work and bring the money to the table, while the women stay at home cooking, cleaning and taking care of the children which are your usual typical housewife. While this stereotype doesn t existRead More The Chrysanthemums Essay1649 Words à |à 7 PagesJohn Steinbeckââ¬â¢s, The Chrysanthemums, was published in 1938 in a book of short stories, entitled The Long Valley. The Chrysanthemums has been a rather powerful draw for scholars because of its wide gap for interpretations and analysis of its main protagonist character, Elisa Allen and also the unique descriptions used to portray the deeper meaning behind the setting of the story. Themes of sexuality, oppression of women, as well as other numerous types of conflict portrayed in this rather somberRead M ore Sexuality in John Steinbecks The Chrysanthemums Essay1173 Words à |à 5 PagesSexuality in Steinbecks The Chrysanthemums à Reading over this excellent story once more, I am again filled with the same emotion (if it can be called that) that I experienced when first reading it.à Steinbeck planned for that.à In a letter to George Albee in 1933, Steinbeck comments on this story and his interest in Albees opinion of it.à ...It is entirely different and is designed to strike without the readers knowledge.à I mean he reads it casually and after itRead More Odour of Chrysanthemums as a Classic Essay2430 Words à |à 10 PagesOdour of Chrysanthemums as a Classic à The claim that Odour of Chrysanthemums is a well-crafted story is hardly brave or risky, for many would agree. For instance, the man who in a sense discovered Lawrence, English Review editor F. M. Ford, said this about Odour of Chrysanthemums: The very title makes an impact on the mind. You get at once the knowledge that this is not, whatever else it may turn out, either a frivolous or even a gay springtime story. Chrysanthemums are not only flowersRead MoreThe Insecticidal Potential of Chili Pepper Leaf Extract Against Termites1572 Words à |à 7 Pageswill only test the leaves of the chili pepper for insecticidal properties. Only one concentration of the solution will be used for testing. The chemical contents of the extract will not be determined. The extract will only be tested on termites. REVIEW OF RELATED LITERATURE Insecticides are poisons used for chemical control. Insecticides often are used on a large scale. Low-flying airplanes and helicopters treat fields, forests, and swamps with insecticides. Large power- driven sprayers protectRead MoreBlumea Balsamifera (Sambong) Leaves Extract as an Alternative Mosquito Repellent2544 Words à |à 11 Pagesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦1 C. Statement of the Problem..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦1 D. Significance of the Studyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.....â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦1 E. Scope and Limitationâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.2 F. Definition of Key Termsâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..3 II. Review of Related Literature.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..4 III. Methodologyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦....â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.10 IV. Bibliographyâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...18 V. Appendicesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...13 A. Proposed Budgetâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦13Read MoreChemical Control Of The Colorado Potato Beetle1717 Words à |à 7 Pagesapplying this chemical warfare against pest in its endeavors to fulfill the demands of our species. Unfortunately, in the attempts to stop unwanted pests, many unintended-vital organisms become the target of these chemical control mechanisms. This paper reviews several studies and compares the benefits and downfalls of chemical control. DDT (dichlorodiphenyltrichloroethane) a chlorinated hydrocarbon compound was synthesized by Austrian chemist Othmar in 1874 and is probably one of the most infamous chemicalRead MoreAcademic Performance and Use of Electronic Gadgets Among Secondary Students2033 Words à |à 9 PagesLaboratory Schools. From Grade-7 to Fourth year students SY: 2012-2013. It focuses mainly on the perception of secondary students about the use of teenage magazine during vacant times. It comprises 8 sections namely; 7-Amethyst, 7-Pearl, II- Chrysanthemum, II-Daffodils, III- Platinum, III- Gold, IV- Einstein, IV- Galileo. The demographic characteristics included in this research are age, gender, year, and section, academic performance and monthly income. Definition of Terms * Gadget-Read MoreSolving The Financial Issues Of Watering Can Inc. Essay2597 Words à |à 11 Pagesgranted and do it again. Recommendation: Although trusting each other is an important issue, strictly regulating the companyââ¬â¢s money is an important duty as an owner. Melanie should not pay off the card bill immediately, but she should take time to review the statements. If Charlie gets caught for misusing the cooperate card to cover for his personal expense, Melanie should take a serious action and punish him by limiting his freedom while working as a development specialist. Also, the amount of frequency
Tuesday, December 10, 2019
Business Research Method Proposal Research-Samples for Students
Question: What challenges manifest in the quest for promoting information security management? How much is information security embedded in the goals, strategies, and culture of the Australian university scene? Answer: Introduction Understanding the risks that emerge in the name of cyber crimes and cyber threats is critical in the Australian universities scene, given the widespread usage of information communication technology systems in the sector. First, it is important to consider that in the present world of sharing information online, people work with information that is stored or shared via applications that are stored in the operating systems that computers have (Choo 2010, p. 1). The usage of information services that are available through computer applications continues to grow by the day thanks to the omnipresence of the internet and the standards therein, as established by Van Der Aalst, Ter Hofstede, and Weske (2003, p. 3). This is especially true in the cultures and economies that are deemed as being open, with the example of countries like Australia (Choo 2011, p. 719). Australia has been noted to thrive because of the presence of profound information and communication technologies (Choo 2011, p. 719). However, with the widespread usage of the internet, both positive and negative attributes evolve. When looking at the negativities that emerge from the rampant usage of internet, it is essential to look at the deprivation of privacy (National Research Council 2007, p. vii). Speaking of privacy, it is essential to note that one of the connotations of the concept that has been developed by the National Research Council (2007, p. 3) constitutes the essence of having control over information. The development of ICT systems in businesses as well as the governments has presented an apt environment for the promotion criminal activities under the bracket of cyber crimes and cyber attacks (Choo 2011, p. 719). In Australia for instance, cyber crimes cost businesses the tune of $600 million per annum (Saini, Rao Panda 2012, p. 204). The number of cyber crimes that occur in the business settings in Australia has been reported by the PwC (2015, p. 1) were noted to be the highest in the world, with the large business organizations reporting on the rising cases of the vice. The alarming rank promotes the need for research on the subject of cyber crimes in the Australian business world in particular. In the bid to identify the most suitable area for conducting research, the researcher opted for the Australian universities business scene because universities, as established by the Guardian (2015, p. 1), tend to make use of information systems in almost all of their operations and bus iness. The same can be said for American Universities, which use ICT systems in teaching, learning, administration, and research work (Lane 2007, p. 11). Given the fact that limited research has been present in the understanding of cyber crimes in the Australian universities, and the fact that the country has the largest cyber threat risk, clearly, it is about time that this study gap is filled. On that note, the proposal will seek to precipitate the need for gaining an in-depth understanding of the concept of the risks of cyber threats and cyber crimes in the Australian universities scene. Project Objectives The objectives of the project will be as presented below; To understand the widespread nature of information sharing in the university sector To draw the line between information sharing in universities and the promotion of cyber threat/crime risks by developing a conceptual framework To identify the value that is embedded in information system management To understand the role of the management systems in the Australian university in combating cyber incidents To propose evidence-based recommendations that universities in Australia should consider adopting as a means for promoting cyber protection Project Scope The scope of the project will seek to gain understanding into the concept of cyber security in the Australian business scene, with a bias to the universities. It is essential to note that the ICT systems in the universities contain a plethora of information, which range from financial details, medical data, student biodata, and expensive research as identified by Wagstaff and Sottile (2015, p. 1). The rich information that is available in universities makes them the ultimate targets for hackers (Wagstaff Sottile 2015, p. 1). On that note, the project will seek to dig deeper in the bid to capture the cognizance behind the occurrence of cyber incidents in the Australian universities business scene. Literature Review In the bid to understand the steps that have been made in research, as well as the gaps that are available on the subject of cyber security in the universities, a review of literature was conducted. The literature review section was organized in such a manner that it allowed the researcher to draw attention to certain subjects that are of interest to the topic at hand. On that note, the following themes were considered in the literature review section. Information in the Modern Society One theme that the researcher considers to be essential to the study is the understanding of the role that information plays in the modern society. A study by Lane (2007, p. 21) revealed the fact that there is a growing need for having information accessibility in the modern societies. The meaning is that in the present social structures, an increasing importance in information sharing is becoming fundamental. Information sharing in the current world is facilitated by the presence of electronic communities, and so organizational structures, as well as the foundations of their information systems, are imperative. There is a link that rests between the reliance that exists on information systems in the modern societies, and the information that is shared. This shows that there is a growing need for beefing up protection of ICT systems against the occurrence of threats and risks that may emerge in the form of cyber crimes. ICT in Universities and the Need for having Information Security Protection When looking at the sector for higher learning, it is essential to appreciate the fact that these institutions have developed a dependency in information sharing across online networks to support their core functions. The core functions that were referred to earlier that have prompted the widespread usage of ICT in universities take note of learning, research and teaching, where information is created and shared. Because of the above information regarding the significance of ICT systems in universities, it is imperative to consider the importance of securing information that is of importance to the institutions of higher learning. As established in the studies by Dhillon and Torkzadeh (2006, p. 304), maximizing control systems in the organizations was shown as being essential to the process of instigating the security of information systems. On a similar light, given that universities are considered to be business organizations, they should also consider acknowledging the role of inf ormation security, especially when looking at the business and research information that is available therein. It is essential that universities consider strategic information resource as being a critical asset for universities that has undoubted value. When information is considered as a strategic asset in the institutions of higher learning, automatically, it would mean that this kind of an asset would require protection that is deemed as being appropriate. The proper control would ensure that information availability, integrity and confidentiality are regulated. Challenges and Implementation of Information Security Control It is one thing to point out the need for setting up controls for the ICT systems in the universities as means of mitigating the possible risks that emerge in the form of cyber crimes and threats, and it is another to follow through with the systems that foster implementation of information security. In the universities, adopting the activities that foster ICT control that is effective is not quite clear, as established by Wood (2000). On that note, it is essential to note that awareness is vital to the universities, particularly when it comes to the erection of new positions of office such as Coordinators, and Information and Security Officers, which will play a fundamental role in beefing up information security. Information security should also be considered as being an organizational responsibility that has to be factored in the processes of the organization. This is a major concern given that the funding that is allocated to information security may not seem to match up to the s ecurity needs of the organization. Asides from poor budgetary allocations, other hurdles that impair with the process of promoting adequate information security take note of the lack of commitment, lack of knowledge, and guidance. Oblinger (2003, p. 1) identifies the fact that educators support the need for having information security systems, but differences in opinions occur when options are proposed. This maybe partly because of the absence of adequate risk analysis, which can reveal all the necessary information that is required in launching proposals for beefing information security. When looking at the challenges that emerge in the quest to boost effective information security, it is essential to mention the need to integrate the IS with the cultural values that are in existence in the universities. This idea of integrating IS with the strategies of a firm was propelled by Kotulic and Clark (2003, p. 597). When universities have effective systems that foster information security, it shows that the institutions have the top information structures that support the achievement of its goals. Having an understanding of the best system to adopt for the universities is also essential. Clearly, information security management in the varsities can be achieved with the appreciation of the increased dependency of the universities upon the electronic sharing of information as well as the emerging events that present a threat to the information that is deemed as being of high value in the universities. Research Design and Methodology In the bid to respond to the above research questions, as well as to meet the study objectives, a research study will be conducted. A quantitative research approach will be employed as noted below. Quantitative Research It is essential to note that quantitative research makes use of numerical analysis, where statistical features are classified, counted and conclusions drawn from causalities (University of Southern California 2017, p. 1). In the present research, a quantitative study design would be facilitated by the use of a structured questionnaire, which will function as the research instrument. The questionnaire will contain questions that will be related to the topic of cyber crimes in Australia's university sector. The design of the study will be a survey research. Survey research is critical in gaining the insight of the participants regarding a particular subject, and many respondents can participate (Alderman Salem 2010). In the survey research, an audience will be identified. The survey provider will then be identified, which will be Google forms. The survey will then be conducted, which will be followed by an evaluation in the form of data analysis. Data analysis will be facilitated by the preparation of a codebook, setting up of the structure of the data, data entry and screening of errors. The data will then be explored by the use of graphs and descriptive information. Finally, determination of relationships will be done in the bid to make a decision. Random sampling will be employed in the study, where the target respondents will be the staff members and management in the Australian universities. The selected sample size is 300 respondents. A pilot test will be done to promote validity and reliability of the study. Research Limitations At the end of the study, the researcher will identify whether the study was effective and if limitations were present in the research design i.e. sampling, research design instrument, data collection, data analysis, and decision-making. Time Schedule (Research Plan) The schedule of the study is as presented in the Gantt chart that is displayed in the Appendix section (Appendix A). Conclusion The problem of cyber crimes presents risks and threats to businesses including universities. The current research is essential to gaining understanding into the concept of cyber crimes in the Australian universities. The research findings will be a step in the direction towards finding evidence-based solutions to curb the adverse effects that would otherwise emanate from the acts of cyber criminals. References Alderman, A.K. and Salem, B., 2010. Survey research. Plastic and reconstructive surgery, 126(4), pp.1381-1389. Choo, K.K.R., 2010. Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, (400), p.1. Choo, K.K.R., 2011. The cyber threat landscape: Challenges and future research directions. Computers Security, 30(8), pp.719-731. Dhillon, G. and Torkzadeh, G., 2006. Value?focused assessment of information system security in organizations. Information Systems Journal, 16(3), pp.293-314. Kotulic, A.G. and Clark, J.G., 2004. Why there arent more information security research studies. Information Management, 41(5), pp.597-607. Lane, T. (2007). Information security management in Australian Universities: An exploratory analysis (Doctoral dissertation, Queensland University of Technology). National Research Council, 2007. Engaging privacy and information technology in a digital age. National Academies Press. Oblinger, D., 2003. IT security and academic values. Luker and Petersen, Computer Network Security in Higher Education, 4. PwC. (2015).Australia Tops Asian Region for Cyber Security Risks: Report. [online] Available at: https://www.pwc.com.au/press-room/2015/cyber-security-risks-oct15.html [Accessed 24 May. 2017]. Saini, H., Rao, Y.S., and Panda, T.C., 2012. Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), pp.202-9. The Guardian. (2015).Universities need to plug into threat of cyber-attacks. [online] Available at: https://www.theguardian.com/education/2015/mar/31/universities-cyber-attacks-research-criminals [Accessed 24 May. 2017]. The University of Southern California. 2017. Organizing Your Social Sciences Research Paper: Quantitative Methods. Available at: https://libguides.usc.edu/writingguide/quantitative [Accessed 24 May. 2017]. Van Der Aalst, W.M., Ter Hofstede, A.H. and Weske, M., 2003, June. Business process management: A survey. In International conference on business process management (pp. 1-12). Springer Berlin Heidelberg. Wagstaff, K. and Sottile, C. 2015. Cyberattack 101: Why Hackers Are Going After UniversitiesAvailable at https://www.nbcnews.com/tech/security/universities-become-targets-hackers-n429821 [Accessed 24 May. 2017]. Wood, C.C., 2000. An unappreciated reason why information security policies fail. Computer Fraud Security, 2000(10), pp.13-14.
Subscribe to:
Comments (Atom)