Monday, September 30, 2019

Disaster in Franklin County

Disaster in Franklin County Jennifer Wadsworth Western Governors University Disaster in Franklin County Role of Major Public Health Personnel The roles of major public health personnel must be delegated properly in a disaster situation in order to facilitate effective action. In the incident presented, a chain of command was established and assignments given to the appropriate personnel based on their skills and experience. As a whole, this group reports to the Incident Commander, an individual that is responsible for managing the entire disaster operation and various teams involved in every level of disaster management.In the first few hours following a disaster there are many things that need to be addressed. In the scenario presented, one of the initial messages that must be presented is water safety. Informing the public on the rationale of why their water is unsafe is important in helping them understand the necessity of boiling it before use to prevent illness. Also informing t hem of where they can obtain a safe water supply is crucial.The availability of temporary shelters and housing is also important in the first hours and days following the storm since many people may have had to leave their homes due to flooding, loss of power, or structural damage. Making sure citizens understand the dangers posed by downed power lines and the steps they should take when encountering them is a health issue as well. Proper food storage and handling is also critical when there is a lack of power in many homes. Knowing how long food will last in an inoperable refrigerator or freezer will help prevent foodborne illness.Other messages of importance in the weeks to follow include the topic of mold. While it may not be of the utmost importance initially, residents who have experienced flooding in their homes must be made aware of how to identify the source of the problem and how to treat and remove it in order to prevent any health risks associated with mold. Public health officials must assist in assessing shelter sites to ensure proper food handling, storage, and preparation. Ample and sanitary bathroom facilities must be assessed in order to arrange for additional portable services to be brought in if necessary. The living onditions that exist in the shelter must also be assessed in order to ensure individual privacy and personal safety. Tetanus was a concern for some citizens and the public health officials alerted area immunization clinics to who may be at risk for developing the illness as well as recommendations for vaccination by the Centers for Disease Control and Prevention (CDC). Safety of area restaurants and their ability to reopen came into question after the storm and public health officials, in cooperation with adjoining counties, worked to address the issue in a timely fashion in order to restore a sense of normalcy to the community.They must all be inspected to ensure that all public health guidelines are being followed and that the establishment is structurally sound. Providing culturally competent educational materials to members of the community, including those that may not speak English, is important and would potentially address the clean-up of hazardous materials, downed limbs, and trees as well as proper treatment of private wells. In the scenario members of the public health team joined other emergency workers in assisting those residents that may be cut off from supplies due to flooding in their area.Public health nurses assisted in door-to-door interview with those residents to address immediate health concerns or injuries that may have occurred as a result of the storm, as well as the availability of basic supplies. Basic physical assessments may be necessary in some situations. The nurse can address medication and medical equipment supplies, and the ability to use medical equipment such as nebulizers and oxygen concentrators.A lack of power would leave people with certain health conditions at risk of major health complications. Evacuation to temporary housing or shelters may be a better alternative for some, especially those requiring dialysis or chemotherapy, and the public health nurse could assist in arranging it. The public health nurse was able to help coordinate the delivery of necessary medications to those in short supply, enabling the patient to remain in their home for the time being.Safe food and water supplies would need to be addressed with homeowners. Information regarding the safe storage, handling, and preparation of food without power is a topic of concern. Inquiring as to any structural damage or flooding in people’s homes would allow the opportunity to provide helpful information pertaining to temporary housing, the need to boil water, and general personal safety. The public health nurse should also be available as residents return to their homes after flood waters have subsided.She can provide basic health information to those with questions or con cerns. In conjunction with other public health officials, the nurse can assist in providing information regarding proper clean up, disposal of hazardous waste, mold, and the safety of food that remained in the home while the residents were in shelters. Public health officials, including the public health nurse, should be present at any informational meetings held for the public.They would be excellent resources for citizens that have questions regarding matters of health and safety and could supply written information for a variety of concerns, such as water and food safety, disease outbreaks as a result of the storm, and general health information including immunizations. Mental health issues may also arise as a result of the disaster and proving information on resources, as well as referrals, may be necessary. The Chain of Command The Emergency Operations Center (EOC) Commander is the individual responsible for the entire disaster recovery.The Medical/Health Branch Director, in co njunction with the entire public health group, would report to the Commander and the EOC team regarding pertinent health issues that may arise. Those issues may require immediate action, or may be something that could arise during and after the clean-up from the storm. The public health group is a system unto itself known as the Incident Command System. The Deputy Director served as the Incident Commander and the remainder of the system was made up of individuals from the local health department.The lead role of Operations Section Chief is responsible for developing and implementing a plan, as well as ways in which to achieve the goals they establish. All other members of the Public Health Incident Command System will report to the Chief. The Operations Chief will also help to organize, assign, and supervise other outside resources necessary for the success of the plan. Other roles that the Operations Chief assigns to members of the department include: Public Information Officer, Fi nance/Administration Chief, Planning Chief, Liaison Officer, and Logistics Chief.The Public Information Officer is responsible for providing appropriate public health information pertinent to the disaster. They will be the media contact and will ensure that important information reaches the public in a timely manner to limit the risk of new health issues. They will also educate fellow public health staff so that they are able to act as a cohesive group with a consistent message. The Finance/Administration Chief will have an accounting background and will deal with any financial aspects that arise, such as payroll of employees and contracted workers brought on board specifically due to the storm.The Planning Chief will be the point of contact for all information that is released to the public regarding the disaster. The documentation they provide will be written in the languages necessary to ensure everyone affected by the disaster is informed. The Liaison Officer is the point of con tact for outside resources, providing information and answering any questions they may have regarding the disaster or services needed. The Logistics Chief acquires things that Operations needs to get the job done such as space, supplies and equipment.The Community Health Nurse would report to the Incident Commander and the members of the Incident Command System. Resources Available to the Community Health Nurse Throughout the disaster recovery, the community health nurse would certainly encounter situations that were beyond her scope of practice. There are many resources available to her and she would best serve her clients by utilizing the individuals from the Incident Command System. They would be able to put her in contact with people from mental health services to home repair.The Logistics Chief would be an excellent resource in obtaining help from outside sources for sites for shelters, equipment and supplies. The Planning Chief would be a helpful resource in gathering and dist ributing culturally appropriate information to people who may speak a different language. Should the nurse not know who to go to regarding a specific need, she could go to the Incident Commander who would provide her with the necessary contacts. Social Services, Environmental Health employees, and independent contractors are only a few of the outside sources the public health nurse may be able to utilize.Actions of the Community Health Nurse During door-to-door interviews following the storm, the community health nurse came across several situations that required immediate attention. In one instance, a homeowner had flooding in his basement and a chemical spill in his garage. The nurse had an environmental health specialist advise the homeowner on how to clean up the spill. She also made certain the homeowner was given information on mold and the best methods for cleaning his basement once the flood waters subsided. Another homeowner was overwhelmed with the entire situation.She was immediately responsible for her mother-in-law, her baby, and her household. The nurse would be able to utilize several services in this situation. Providing basic provisions would allow the family to stay in the home should they wish to do so, however, a stay in a shelter would benefit everyone in the immediate situation given that they had lost electrical service. A social services consult would be beneficial to the family in the coming weeks if the mother-in-law remained in the home. At another residence, the client did not speak English and the nurse did not speak Spanish.Therefore, she communicated through the son and was able to provide instruction on proper and safe use of a generator indoors. She also made certain to have information on proper food storage, handling, and preparation as well as generator use that was in English and Spanish, delivered back to the home with the accompaniment of an interpreter. At the home of another citizen the nurse discovered someone who was in need of blood pressure medication. The nurse assessed the man’s condition and, with the clients input, determined that the best solution was to arrange for evacuation to a shelter.Coping with the Aftermath The community health nurse utilized several techniques to calm the fears of the people interviewed following the disaster. One of the main things that she did was to listen to them. When people had very specific concerns it was reassuring that someone was there to help. The ability to utilize resources to address their needs was of great help in reducing the anxiety level of those involved. The nurse also included each client in the decision making process regarding their individual situation.Providing them with options and then discussing with them the benefits of choosing one over another allowed them to feel in control of their own situation. When disaster strikes, there is often a feeling of helplessness that overcomes people. The ability to choose for themselves giv es back a sense of control and self-confidence. The nurse also made certain that things that required follow-up were completed. She made certain that information regarding food safety, mold, and hazardous material clean-up was disseminated to those returning to their homes.She was also available to answer questions, on location as well as at community meetings. Techniques The community health nurse used several techniques to help calm the fears of her clients. She was calm and attentive to their needs. In situations of crisis, many people simply need someone to listen to their concerns. She made herself available to do so. She was informative and provided them with pertinent information to help them manage their day to day needs in the aftermath of the storm.She addressed issues that some of the people had not considered and assisted them in coming to their own conclusions regarding their situations. Preparation for Disasters Community health nurses could help prepare themselves for such a situation by participating in mock disaster drills. Many cities have such programs, and becoming even more involved and helping to organize such an event would be an excellent way of learning how to respond to the immediate needs of patients when faced with an emergency situation.The nurse is responsible for continuing education that includes emergency response and all public health nurses should be held accountable for maintaining those continuing education credits. Another way of preparing for such an emergency would be to research past situations to learn about the challenges that the health care professionals faced. Understanding what the needs are is the first step in preparing for a natural or man-made disaster.

Sunday, September 29, 2019

Human Factors and Cyber Policy Essay

Introduction Human factors can influence policy choices for both domestic and international cybersecurity issues. What will be discussed in this paper is how human factors can affect four selected cybersecurity issues. The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property. This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned. Copyright, threats and ownership of  intellectual property Important Security Issues With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs. There are six ways that intellectual property theft harms U.S. and global consumers and economies. Online piracy harms content as well as the trademark owners through lost sales and brand recognition through increased costs to protect intellectual property instead of investing in research and development (Growth of Internet Piracy, 2011). Secondly, the consumers are harmed when they receive lower quality, inauthentic products that may cause physical harm in the case of downloading and creating a 3-D printed model (Growth of Internet Piracy, 2011). Arguably the most prominent case against piracy, copyright infringement harms economies through lost tax revenues, higher costs of law enforcements and additional harm caused by the government’s usage of counterfeit products (Growth of Internet Piracy, 2011). This leads to the fourth issue, global economies lose their ability to partner with countries that have weaker intellectual property enforcement (Growth of Internet Piracy, 2011). Online copyright infringement reduces innovation due to the decrease of incentives to create and disseminate ideas – harming the First Amendment (Growth of Internet Piracy, 2011). Finally, supporting online piracy has been linked to supporting international crime syndicates posing a risk to U.S. national security (Growth of Internet Piracy, 2011). Recommended Policy Controls There is no set of policy controls that would be a one-size fits all when it comes to ownership of intellectual property concerning digital media or 3-D printing. The issue with copyright infringement concerning home 3-D printing boils down to the law. If a personal user directly prints a copyrighted 3-D model from a file-sharing site, then that user has committed a crime. The copyright owner should be compensated; a simple analogy is paying iTunes to be able to play a song from an artist. However, if the user is inspired to  create a very similar model than the copyright owner is not subject to compensation because a style cannot be copyrighted (Thompson, 2013). The first 3-D DMCA’s language is indicative of that; user Artur83 was hit with the first-ever DMCA surrounding 3-D printing after creating a Penrose triangle after being inspired by Dr. Ulrich Schwantz (Rideout, 2011). The argument was that Artur83 created an independent file after viewing a photo of the completed product – he did not modify an existing file – and that the complaint was unclear if Dr. Schwantz was trying to say the Penrose triangle, a concept published in 1958, was his intellectual property (Rideout, 2011). Ultimately, Dr. Schwantz dropped the DMCA, but it still serves as a precedence for the debate between original and similarity. If corporations are to crack down on copyright infringements, be it blatantly copying direct design or limiting creativity and inhibiting innovation, then they will need to lobby Congress to change laws. With respect to 3-D printing, however, the current laws are good enough. While the 3-D files are CAD files, categorized as pictorial, graphic, and scultptural works that can be protected by copyright, they are excluded from copyright if the file has an intrinsic utilitarian function other than portraying either appearance or conveying infor mation (Rideout, 2011). While each file can be independently reviewed to assess if an original file is copyrighted, it would be an arduous task that would not be fiscally responsible for a company to pursue every similar design. Additionally, current patent laws are applicable to complete and assembled products; creating replacement parts is currently legal and allowable (Thompson, 2012). If any of this is to change, then corporations will need to lobby. As for combating software piracy, a decent alternative to the growing use of software piracy is the use of open source software (OSS). Open source software completely eliminates the issue of software piracy by giving the end user free access to the software source code and the ability to install unlimited copies of the application without fear of copyright infringement. The reasons for using open source software as an alternative to piracy are numerous. Arguably the most important reason, OSS benefits the economy by reducing the rising costs of software development, global competition, and technological diffusion (OSS-Piracy, 2009, p. 168). By using OSS, end users can access larger and community supported market shares across a wide diversity of product ranges and  services. Due to lower levels of intellectual property laws in developing countries they tend to result in higher prices and limited availability (OSS-Piracy, 2009, p. 168). As it stands, the current weak laws will ultimately result in encouraging piracy. By using OSS, countries can access a rich ecosystem of different products that have growing market share and a diverse set of service and support. How/Why Human Factors Influence Policy The Internet has become a central actor in the world economy by delivering products and eliminating inefficient middlemen. In 2011, as much as 6 per-cent of the U.S. gross national product was generated by industries supported by intellectual property laws; nearly 24 per-cent of all Internet traffic is infringing on these intellectual properties (History of the Internet Piracy Debate, 2011). Software piracy is more rampant outside of the U.S. In countries with developing economies – third-world countries to be exact – demand for software is supplied by piracy instead of publishers due to legitimate publishers being unable to compete with counterfeit operations at cut-throat prices (Traphagan & Griffith, 1998). The issue with piracy is that it inhibits and prevents local developers from being paid for their property, stymieing growth and additional job opportunities (Traphagan & Griffith, 1998). Human factors that affect piracy include: Knowledge and fear of consequences; access; attitude towards piracy; and social norms (Nill, Schibrowsky & Peltier, 2010). With more negative attitudes, general knowledge and fear of consequences of piracy tend to reduce piracy, with greater access to content leads to increased piracy (Nill, Schibrowsky & Peltier, 2010). While a more economically developed nation will lose more money to piracy, strong legal protection for intellectual property as well as enforcement of the laws will reduce piracy (Traphagan & Griffith, 1998). As for developed nations who cannot enforce laws as well, the culture must see that software piracy is the same as stealing a car (Traphagan & Griffith, 1998). Ultimately, regardless of socio-economic status, all people must view piracy and copyright infringement in the same light: it is stealing and harmful to the global economy. Introduction Today, the world’s economy along with international security greatly depends on a secured Internet. Our society greatly depends on computer networks. Computer networks can be seen as the nerve system to critical infrastructures and also enterprise information systems in which our society has become increasingly dependent upon. Hackers are discovering new types of vulnerabilities in computer systems almost everyday, which could affect a nations critical infrastructure, military satellites, and more. One of the biggest threats seen today is known as the zero-day attack or exploit. Zero-Day Attack A zero-day attack according to Seltzer is â€Å"a virus or other exploit that takes advantage of a newly discovered hole in a program or operating system before the software developer has made a fix available or before they’re even aware the hole exists.† This is a very dangerous type of attack because the attack occurs first before it is even detected. In a sense, the zero-day attack is unpreventable since the virus or exploit occurs when there is no existing patch around to correct the attack. A zero-day attack takes a significant amount of time and money from well-trained cyber-criminals in order for the attack to be successful because it is a targeted attack that finds security vulnerabilities. One of the greatest zero-day exploit computer worms is known as Stuxnet. Stuxnet Stuxnet is a computer worm that was able to disrupt Iranian nuclear enrichment in 2010. Stuxnet was the first instance of a cyber attack that was able to cause physical damages across international boundaries and was considered to be a new type of warfare with the capabilities of threatening even the strongest of military powers. According to Symantec, which is an American security corporation, Stuxnet is one of the most complex threats that were analyzed. The purpose of Stuxnet was to target industrial control systems or similar systems that is used in gas pipelines and power plants and to reprogram the industrial control systems. This zero-day exploit was discovered in July of 2010 but did exist at least one year prior to its discovery. Stuxnet was ultimately sabotage Iran’s nuclear systems. Policy Controls One of the most effective ways to prevent a zero-day attack is to try and find any vulnerability before someone else does. Government agencies and public organizations are willing to hire and post rewards to individuals that are capable of finding exploits within a program or operating system. It takes skilled hackers to perform a zero-day exploit. They must have the time and resources to find a vulnerability that has no existing patch or fix for it. As mentioned before, one way to prevent a zero-day exploit is to find the vulnerability before the cybercriminals do. Organizations will hire ethical hackers to find vulnerabilities within their systems. One example is Google. Google has a reward system if somebody could find a exploit within Google Chrome. The company Google sponsors up to $1 million worth of rewards to those that can find exploits in Google Chrome. The United States government is willing to pay up to six figures for exclusive use of attacks to those who can create atta cks in vulnerable systems. Other countries such as China and Russia are willing to pay rewards to gain exclusive use of system attacks to people who come up with these attacks. A second policy to put in place to help prevent a zero-day exploit is to have both the private sector and public sector work together with limited restrictions when it comes to communication and information sharing. One of the main concerns about a zero-day exploit is an attack on a nations critical infrastructure. A critical infrastructure can be defined as â€Å"systems and assets, physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, nation public health and safety, or any combination of those matters† (Moteff, 2014, p. 2). Critical infrastructures are important for a nation’s health, wealth, and security. One of the problems between private and public sectors is communication. The public sector at times is unwilling to share information with the private sector in fear of handing out classified information and the private sector is unwilling to share information with the public sector in fear that the public sector competitions can gain information that can be used against them. A proposed strategy for this action by the Commission was to have the private sector and the appropriate government agencies have greater cooperation and communication by â€Å"Setting a top level policy-making office in the White House† establishing a council what would include  corporate executives, state and local government officials (Moteff, 2014, p. 3). A third method which can also be seen as one of the top methods is the greatly expand research and development in technologies. This can be achieved by expanding education so that new technologies can be developed that would allow for greater detection of intrusions thus limiting the amount of zero-day exploits. Military and Economic Advantages of Zero-day Exploit A zero-day exploit is considered a very dangerous cyber attack since the attack targets holes in programs or operating systems before a software fix is available or even when developers are even aware a hole even exists in that program or operating system. Since the world today is heavily reliant on the Internet along with computer networks, a zero-day exploit on the military can be very devastating. If a zero-day attack occurred on a nations critical infrastructure such as water systems, transportation, and communications, it could leave that nation defenseless and vulnerable to attacks that can destroy a nation along with its citizens. The zero-day attack known as Stuxnet was able to disrupt Iran’s nuclear enrichment and was the first ever recorded cyber attack to cause physical damages. Zero-day exploits can be seen as a new type of cyber attack that could ultimately be used for cyber warfare. Any zero-day attack on a nation’s critical infrastructure will cause mass havoc, which could even lead to human casualties. Meta-Data collected and used by the Private sector and Public sector Important Security Issues Met-Data collection is a major issue to all private and public sectors. The methods and approaches that are used to collection information is not 100% secure. There are always leaks and breakage points among any transmission of data that is traveling from one location to another. The way these vulnerability issue take place is by hackers being able to gain access to sensitive information and with this information their able to monitor and analyze the data that appears to be data that really in the consumer eyes is not a major concern nor precaution that needs any further action to take place. There are tools that can be used to successfully complete an attack of Meta-Data, and this tool works by gathering the data and by using a  document that has been created. According to Vulnerabilities/Threats (2009) â€Å"For example, Word Document metadata can be viewed within the Properties menu option in Microsoft Word, or by enabling the viewing of previous edits with the â€Å"Track Cha nges† option.† It has been reported that Adobe Acrobat can detect and display the metadata attack in PDF form. Some methods that are executed to collect data at a high level pace is called CeWL and MetaGooFil, which were designed to retrieved metadata information that may be available through the internet. The way these tools operate for instance CeWL works by developing a word list that uses brute-forcing for passwords involving websites. This tool can also extract any author, or email addresses that can be discovered from Microsoft Office files. CeWL is a file that can process files that may already be generated. MetaGooFil functions by using Google search engine to randomly lookup certain types of files. Once the downloading process has been conducted the metadata has already been place in HTML report the reveals the information that was retrieved. Another issue that involves metadata is that a great deal of organizations overlook this matter and it poses a lack of security and their defenses are vulnerable to serious attacks. Since organizations fail to take the seriousness of metadata attacks, and how their connected with Spear-phishing and Social Engineering and the relationship between one another. Spear-phishing can focus and target email addresses of individuals who works on certain documents. Having a vulnerable version of the Microsoft Office suites can be targeted for an attacker to create a file and send it to a client with the intent to steal information. Social Engineering is already having knowledge of individual names and using them to conduct phone call schemes and appear to be more believable than what they really are. Recommended Policy Controls Policies that could be administered as far as how the information is obtain by public or private sectors. Having policies in place that are firm and strict that involves need to know bases. Access to certain information needs to be minimize if a particular individual has no purpose or reason for obtaining or viewing certain information. Also policies can be changed in the way information is handle to better ensure the safety of sensitive data. On the job training and security awareness session that can educate people  of the severity of being victims to metadata attacks. Having Mechanisms in place would be a great approach to handling policy controls. There are mechanism that convey Metadata into Diffserv DSCP. According to Atarashi, R., Miyake, S., Baker, F., (2002) â€Å"The data and application need to be identified to the network, in order to gain service from the network appropriate to it.† The application gains access to the information that becomes available in its te rms, including owner, format, and etc. In this situation the network is worried about the type of service the applications are looking for. In this situation having a translator already in place with API. QoS is highly desirable in the controlling metadata and internet applications. According to metadata is going to important for not only structuring and discovery digital resource but also communication interaction. The lingo that is used in the industry of security is (threat, vulnerability, risk, control). Policy controls are implemented to reduce the possibilities of risk and one exactly happen. Having multiple security layers will be an ideal action to have in place for policy controls. According to Harris (1976) â€Å"The rule of thumb is the more sensitive the asset, the more layers of protection that must be put into place.† These layers should be merge and unifies as one but can be view as if you’re making a cake to put thing into perspective of how the multiple layers compensate one another. In this cake your have 1. Physical security 2. Virus scanners and Patch management 3. Rule-based access control and Account management 4. Secure architecture, Demilitarized zones (DMZ), Firewalls, 5. Virtual private networks (VPN) 6. Policies and proce dures. These six functions will definitely help control, minimize, and monitor any potential threats that metadata may pose. How/Why Human Factors Influence Policy The way human factors can influence the effectiveness of the recommended policy controls is by enforcing them on a daily bases. Understanding the threat and its capabilities and how an attack can cripple an organization. These policy controls can be successful as long as the people who are standing behind them believe in them and also having a strong foundation just in case one layer of security collapse another one is in place as support. Routinely awareness training is another way to ensure the effectiveness of policy controls that are in place for unexpected  occurrences. There’s an old saying (account for variable changes) meaning that there should always be plans for the unknown. A good human factors that will play a major role is a person with good morals and organizations. Not having these traits pose a lack of effectiveness when it comes to handling policy control. Individuals who value integrity will be a great asset to have in regards to honoring the standards and policies that are in place. Vulnerability assessments for Mobile Devices in the BYOD environment Important Security Issues In the 21st century cyber security is currently number one threat that will affect individuals all the way to corporate companies. Understanding the critical security issues dealing with vulnerability assessment of mobile devices in a BYOD environment. By bring BYOD into the work environment with increase access to web application cloud computing and software as a service (SaaS) offering, means the employees, business partners and customers are increasingly accessing information using web browsers on devices that are not managed by an organization opens the door to critical security and HIPPA violations if security issues aren’t addressed correctly. In an article from a network security magazine stated the â€Å" Harris survey determined the 47% of employees use personal desktop computers to access or store company information, while 41% do this with personal laptops, 24% with smart phones and 10% with tablets. However, with less than half of these devices being protected by basic security measures, some organizations may begin to worry that the security challenges associated with BYOD far outweigh the benefits.† (1) The challenges that come along with BYOD are the corporate Data being delivered to the devices not managed by the IT department, that have security applications for data leakage, Data theft and regulatory compliance which leaves the enterprise with fewer controls and visibility. Knowing that â€Å"key-loggers, malware and cyber–attacks have greatly increased the potential of unauthorized access to, and information theft from endpoints† the D in BYOD doesn’t stop at smart phones. The SANS institute has explained that handheld devices combined with laptops and removable storage (e.g. USB keys) introduce specific threats to corporate or an organization’s assets and that a security policy can establish rules for the proper use of handheld devices w ithin intranets (2) Employees can access  information from home from their personal computers and tablets which can be infected with malware or key-loggers which gives people access to your companies at work for future cyber-attacks. Corporate companies can start losing visibility into data access when â€Å"BYOD re bypassing inbound filters normally applied to standard corporate devices. They’re vulnerable to malware-a fast growing risk, particularly in regards to android devices†.(3) The security issues with bringing android devices into the BYOD other than Apple device is the Google Play store and fragmentation of devices an OS version. Google Play (formerly called the Android Market) has a higher percentage of apps that contain malware, or social engineering to connect to malware, than any other app store by another magnitude. (4) The store is not policed well leaving these factors continually creating friction or resistances towards greater adoption of Android devices in the enterpr ise environment. Recommended Policy Controls Understanding the changing environment with BYOD entering into the enterprise area, there should be some checks and balances with recommended policy controls. To protect users in the enterprise some good policies are needed to be implemented would be requiring all devices to be encrypted to protect intellectual property, and to â€Å"restrict the downloading of specific applications known to contain malware, and insufficient security protocols or other vulnerabilities. Combining some of these with a robust VPN solution, that any enterprises and their employees can enjoy the convenience, productivity and cost–savings of BYOD without placing critical data at risk†(5). Standing on the organization security policy should be categorized as followed starting with general policies– that and for security policies for enterprise-level use on mobile devices that restrict access to the hardware software, and management wireless network interfaces to text policy violations when they occur. Data communication and storage are highly recommended to be encrypted data communication and data storage be properly wiping the device before reissuing. Another policy control is dealing with user and devices, authentication before allowing access to the organizations resources. Applications need restriction from installing and updating application that is used to synchronization services, then verifying the digital signature on applications. In order for a BYOD program  to work in an enterprises environment is to start off with a mobile device management (MDM) to the intent I to fully optimize functionally and security of mobile equipment in the enterprises environment to simultaneously securing the corporate network. How/Why Human Factors Influence Policy In order for BYOD programs to work correctly the human factors need to be taken into perspective. When an enterprise owns their devices they can dictate the use and configuration. Having employees bring their own BYOD into the enterprise their device is configured to their own needs and priorities that are wildly different from the enterprise standard configuration. As a network grows and technology enhances individuals rely on the BYOD the network access policy will be at odds with their employees at accessing information, that they’ll look for ways to get around the system which in turns makes bad productivity. If we keep in mind that with growing consumerization of IT and rapid pace of new and developing technologies, many employees of companies are nearly as technically savvy as their IT department. The lowly employee of finding tools that enhances their job better than what the company issues, but uses the alternative programs under the radar. A big look at the human resource (HR) is having the concern of having proper legal framework in place and constructed to take into concentration on occasions when staff leave the company and take their own devices with them could have confidential information that holds the companies intellectual property that another company can use or a hacker take advantage of for future cyber attack. Conclusion As time goes on the human factors does have a great influences in policies that are created by organizations to deal with international cyber-security issues. The four cyber security issues that were presented in the paper from zero-day exploits, meta-data collected and used by private and public escorts, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property was identify that each topic was influence by human factors that developed rules and policies to decrease the rises of cyber security incidents that accuser around the world. As we consume more electronic devices their will be more adjustment to topics that were presented, with  new security issues which will bring new recommended control policies to balance the international cyber security threat at hand. Work Cited 1. Bill Morrow, BYOD security challenges: control and protect your most sensitive data, Network Security, Volume 2012, Issue 12, December 2012, Pages 5-8, ISSN 1353-4858, http://dx.doi.org/10.1016/S1353-4858(12)70111-3. 2. SANS Institute (2008) Security Policy for the use of handheld devices in corporate environments. Retrieved from http://www.sans.org/reading-room/whitepapers/pda/security-policy-handheld-devices-corporate-environments-32823?show=security-policy-handheld-devices-corporate-environments-32823&cat=pda 3. Pacific, Lisa. â€Å".† BYOD security strategies: Balancing BYOD risks and rewards. N.p., 28 Jan. 2013. Web. 24 Apr. 2014. . 4. †A clear-eyed guide to Android’s actual security risks.† InfoWorld. N.p., n.d. Web. 27 Apr. 2014. . 5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/ 6. Growth of Internet Piracy. Congressional Dig est, 90(9), 258-288. 7. History of the Internet Piracy Debate. (2011). Congressional Digest, 90(9), 258-288. 8. NILL, A., SCHIBROWSKY, J., & PELTIER, J. W. (2010). Factors That Influence Software Piracy: A View from Germany.Communications Of The ACM, 53(6), 131-134. doi:10.1145/1743546.1743581 8. OSS-Piracy. (2009). Alleviating piracy through open source strategy: An exploratory study of business software ï ¬ rms in China. Retrieved 4/18/2014 from http://infojustice.org/download/gcongress/open_business_models/yang%20article.pdf. 9. Rideout, B. (2011). Printing the Impossible Triangle: The Copyright Implications of Three-Dimensional Printing, Journal of Business, Entrepreneurship & Law. available at http://digitalcommons.pepperdine.edu/jbel/vol5/iss1/610. Thompson, C (2012) 3-D printing’s forthcoming legal morass. Wired.co.uk. Obtained from: http://www.wired.co.uk/news/archive/2012-05/31/3-D-printing-copyright11. Traphagan, M., & Griffith, A. (1998). Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review Of Law, Computers & Technology,12(3), 431-451. doi:10.1080/13600869855298 12. Vulnerabilities/Threats (2009). Tech Insight: How Attackers Use Your Metadata Against You. Retrieved from: http://www.darkreading.com/vulnerabilities—threats/tech-insight-how-attackers-use-your-metadata-against-you/d/d-id/1130395? 13. Atarashi, R., Miyake, S., Baker, F., (2002). Policy Control Nework Architecture using Metadata. Pro. Int. Conf. on Dublin Core and Metadata for e-Communities. Retreived from: http://www.bncf.net/dc2002/program/ft/poster1.pdf14. Harris, S., (1976). CISSP exam guide. ISBN 978-0-07-178174-9

Saturday, September 28, 2019

DQ 10 Essay Example | Topics and Well Written Essays - 250 words - 1

DQ 10 - Essay Example Procrastination simply refers putting things off to another time. Instead of someone doing what they know they are able to do at the moment, they prefer to leave it for another day. This leads to slow changes in our lives hence lack of personal development. Poor time management is another leading factor that inhibits proper personal growth and development. A person who is unable to manage his time is also a poor planner. Both time wastage and lack of planning means that a person has a schedule does not know how to manage his time. Disorganization and lack of goals also contributes to poor personal development as one has no specific goals that drive him. The lack of discipline to achieve the goals that a person has set for himself or those set at the work place leaves a person stuck in one place hence poor personal growth. As a professional journalist, I have learnt that it is important to conduct myself in a professional manner at all times. First, I have adapted the skill of always been up to date with the changing technology that is used to gather and disseminate information. Through this, I am sure that I will be up to date with the current events, not only in my country but also in the world. This also puts me in a better position to disseminate the information I have gathered to the people who need urgently. I have also acquired the art of confidentiality, especially when it comes to interviews. Most people do not wish to be known publicly yet they still give me very helpful information. For this reason, I have learned to maintain their anonymity at all costs. Professionally, I am able to relate to my colleagues without getting too personal or creating unnecessary conflicts amongst us. To improve my proficiencies, I know I can always refer to my bosses for help whenever the need arises. My colleagues are also in a position to help me in case i ask for their advice. I can also use the internet to improve my

Friday, September 27, 2019

Research Methods Essay Example | Topics and Well Written Essays - 1750 words

Research Methods - Essay Example And the trend has accelerated in the past year.† Deputy Chief Patrol Agent of the Border Patrol’s Rio Grande Valley Sector Reynold Garza (2005) said that criminals continue to cross the U.S. borders with Mexico and Canada. Several sources indicated the need for greater border security through a wide range of technological, legislative, and military interventions (Antal, 2010; Meyers, 2003), as well as global agreements (Taylor, 2005). Aside from the need of securing the borders, there are also calls for the consideration of ethical and human rights dimensions of border security (Arreolo, 2010). The U.S. government is called by the international community to consider the rights of poor workers and people searching for an asylum to migrate to the U.S. In addition, some sources argued for the weight of understanding cultural geography, when finding and evaluating solutions to border issues (Arreolo, 2010; Hemphill, 2009). This essay discusses the issue and arguments surroun ding border security. Furthermore, it explores the two most common research designs in criminal justices studies, which are considered in conducting the research for this issue. Finally, it explains the chosen research design and its possible problems and ethical solutions. Statement of the Issue The main issue is that border security measures that are currently employed by the U.S. government are insufficient in responding to the complex issues of legal and illegal migration. The U.S. already employs a wide range of technological, legislative, and military interventions (Antal, 2010; Meyers, 2003), as well as bilateral agreements (Taylor, 2005), but border security issues continue to persist (Antal, 2010; Barlett et al., 2004; Meyers, 2003; Wein, Liu, & Motskin, 2009, p.699). Discussion of the Issue It is important to understand how different parties perceive border security’s issues and the solutions to them. In general, two of the opposing arguments revolve around what the real problem is and how it should be properly resolved. On the one hand, some parties support greater military and physical/technological interventions to secure the borders. On the other hand, others argue that these interventions are not enough, because they do not reflect a deeper understanding of its causes and so they do not respond to the underlying issues of border migration. Supporters of enhanced military and physical/technological interventions argued that the real problem with border security is that it lacks visible and immediate impediments to illegal immigrants (Antal, 2010; Marek, 2007). Antal (2010) described physical barriers to immigrants to deter them from illegal immigration or to catch them, if ever they do successfully go through existing barriers. Marek (2007) reminded people of the criminal elements in Mexico, who can easily spillover to America’s border states and imperil the safety and security of the people in these states. These arguments undersco re that when there are more physical barriers established at the borders, illegal immigrants and people who help them will be less motivated to unlawfully enter the U.S. This thinking is similar to the situational ways of solving crimes, by putting up barriers that will increase the difficulty of conducting the crimes and also boost the chances of being caught. In addition, supporters of these means of border security asserted

Thursday, September 26, 2019

Atmospheric pollution and its affect on human health Essay

Atmospheric pollution and its affect on human health - Essay Example Accidental air comes from leakage and blasts in industrial furnaces, as well as through ample consumption of fuel alternatives, and smoking. On the other hand, industrial air pollution characterizes a type that pollutes the environment via the emissions caused by thermal plant operations, wide use of construction materials such as cement and steel, fertilizers, pesticides, atomic units, and industrial wastes. Green house effect derived from the contamination of several important gases and fossil fuel combustion in the air makes another foul contribution and this type is especially characteristic of green house gases namely carbon dioxide, methane, water vapor, nitrous oxide, and ozone which return to the lower atmospheric region after evolution against gravity. Transport related air pollution similarly originates from smoke brought about by petrol or diesel burnt in different vehicular engines which correspondingly emit noxious gases in mild to poisonous concentrations at worst. How does each of these types of air pollution affect human health and the environment? Smog is proven to have caused serious respiratory diseases as in the 1952 incident in London that resulted in the death of 4,000 people. Greenhouse gases equivalently pose threat on crops and livestock besides exhibiting potential harm on human skin which may be impacted by corrosion or cancer upon based on critical gas levels. As heat exceedingly builds up due to greenhouse effect, this further leads to climate change and global warming. By transport related air pollution, carbon monoxide for instance can drive oxygen out of the bloodstream, causing apathy, fatigue, headache, disorientation, and decreased muscular coordination and visual acuity. Industrial plants capable of releasing untreated wastes along with high levels of sulfuric or nitric acids make possible the precipitation of acid rain that gradually erodes building structures, contaminates vegetation, drinking water, and even the aquatic ha bitat. Birth defects, genetic mutations, and damage to neurological systems may also follow as consequences of long-term exposure to toxic materials with high percentages in air. What are some ways to control air pollution? Since human activities comprise either the primary or secondary sources of air pollution, control over these activities hence becomes essential in suppressing pollutants from building up in hazardous degrees of contact with the atmosphere. Car pool is one such means to arrive at this goal which takes to effect lower consumption of fossil fuels once fewer cars are used upon implementation. This way, fossil fuels are sustained and conserved for later applications. In the similar manner, taking advantage of the public transport may help regulate emissions properly besides being an act of support to augment public income. One may opt to walk or simply ride a bicycle to cover short distances as much as possible so that certain quantities of gas are saved while there w ould be a number of places which can be freed eventually of smoke and of the uncomfortably warmer temperatures due to sensible heat if most people heartily participate in this endeavor of minimizing the use of major emission source. Likewise, there is quite an immense worth in utilizing alternative sources of energy aside from the traditional fuels. If there emerges

Wednesday, September 25, 2019

Is increasing knowledge making life more worrying and uncertain in Essay

Is increasing knowledge making life more worrying and uncertain in contemporary society - Essay Example While knowledge has always existed, in the traditional society it was established knowledge. Knowledge society on the other hand refers to the change in knowledge in different fields like political, economical, social and cultural life. Knowledge is essential for every activity in life be it in the form of sophisticated academic knowledge in the form of text books like medical science to common sense like how to look after ourselves and our children. The speed at which knowledge is produced and disseminated across the globe has been the root cause of the change taking place in the society. Knowledge in the contemporary society takes different forms and it is created and disseminated through multiple sites. To conduct their daily lives, people seek knowledge on health, jobs and relationships. There are numerous advisers and counselors available apart from the myriad of information available on the internet. Experts are known by different high-sounding names like therapists and planners. Even in spiritualism and healthcare there is virtually knowledge explosion. In the field of technology, enormous changes in people’s lives can be seen. The personal computer externally looks the same and is made of the same metals that it was same say 5 years ago but is much more powerful. The input of human intelligence added to it ahs rendered it powerful. Technology is used to reduce costs in manufacturing sector, in marketing and distribution. Technology has led foreign firms to outsource their back-office operations to distant lands like India. Local firms now have global networks. Communication technologies have rendered distant and size of corporations insignificant. Economic changes have brought about changes in consumption pattern, increased purchasing power in the hands of the people and the markets have become consumer-driven. Despite all these changes and advancements, knowledge society has created a risk society which is associated with the growth of the

Tuesday, September 24, 2019

Discuss the nature of dyslexia and implication for identification and Essay

Discuss the nature of dyslexia and implication for identification and assesment - Essay Example It is to be remembered that this is just only one aspect of the working definition, and this disorder is elusive in the sense that there are many differing opinions about the definition of this disorder in the literature, as a result many other different definitions exist. What all workers in this area accept comes from The Department of Education and Skills in their Framework for Understanding Dyslexia inform on theories and approaches to dyslexia. In it they have presented a practical approach to define dyslexia. Although literally, this word means difficulty with words or language, this literal meaning does not totally apply to the disorder of dyslexia at all. It is true that there are many reasons for difficulty to learn, read, or write. For these individuals, these difficulties "do not seem so easily explainable (DfES, 2004, 5). It has thus been defined by them as "a specific difficulty, typically characterised by an unusual balance of skills. Dyslexia affects information proces sing" (DfES, 2004, 5) in all the forms, receiving, holding, retrieving and structuring the information and this speed of information processing becomes very sluggish (DfES, 2004, 5). Skills such as reading, writing, using symbols, and carrying out calculations are all dependent on information processing system of the human brain. ... So, it would be worthwhile to examine the definition that is practically utilized while administering special education to these people. The Special Educational Needs Code of Practice refers to specific learning difficulties in a section considering 'cognition and learning'. The Code states: 'Children who demonstrate features of . . . specific learning difficulties, such as dyslexia . . . require specific programmes to aid progress in cognition and learning. . . . Some of these children may have associated sensory, physical and behavioural difficulties that compound their needs' (DfES, 2001a, 7: 58). In this context it is of utmost importance to remember that it is not related to intelligence and may occur in different forms, mild, moderate, and severe. Consequently, their individual profiles vary from each other, with each having their unique strengths and weaknesses, and therefore uniqueness. In this assignment, the nature of dyslexia will be discussed in a greater detail in the fo llowing paragraphs so these attributes can be used for identification and assessment of this disorder. Nature With continuing research into the area, there has been considerable progress in identifying the causes of dyslexia so effective intervention could be designed to break into the cycle of failure (Fawcett, 2001, 25). This progress has been enormous since the usually grim outlook in such individuals is no longer hopeless. It has been noted that ""the stage is set for undertaking ambitious, multi-disciplinary, multi-perspective projects aimed at redefining the field of dyslexia and learning difficulties as the field of learning abilities"

Monday, September 23, 2019

Heat and Temperature Essay Example | Topics and Well Written Essays - 1000 words - 1

Heat and Temperature - Essay Example Whether the matter is in the form of solid, liquid or gas, it consists of molecules. These molecules are in constant movement bombarding each other like billiard balls. Such characteristic of motion is responsible for the production of heat. However, the amount of heat produce depends on the speed of collision produced by the molecules. The faster the motions of the particles are the higher the thermal energy is enough to change the state of the matter from solid to liquid or to gas. With this, it is inevitable not to relate heat with the kinetic theory of matter. Heat is defined as the transfer of energy from an object with higher temperature to an object with lower temperature (Freeman, 2005). For instance, if you touch a hot iron, you feel the heat as the thermal energy enters your hand because the iron is warmer than your hand. Consequently, if you touch a cold drink, the energy passes out of your hands and into the cold drink. The heat which passes from the hot iron to a colder hand originates in the internal energy of the hot object. The internal energy is the sum of the kinetic energy of the molecules called the molecular energy. The kinetic energy is called the thermal energy. Both kinetic and potential energies of the molecules provide the ultimate source of heat which is only appreciated when there is a difference in the temperature of objects coming in contact together until equilibrium is reached. With this, it is important to note that when one is exposed outside the cold winter, there is a need to wear a coat to slow down the fl ow of the heat from the body. Temperature is the state of coldness and hotness of an object measured with a device called thermometer. The expansion and contraction of the mercury within the thermometer is compared in a scale to measure how much thermal energy is present in certain molecules of an object.

Sunday, September 22, 2019

Critically evaluate, with recommendations, the contribution of Essay

Critically evaluate, with recommendations, the contribution of psychology to our understanding of judge and jury decision making - Essay Example nal justice system pays too much attention to psychology, it may result in excusing certain forms of criminal behaviour hence impeding the administration of justice. (Vidmar, 1989, p1-8) In relation to this, there are also certain factors that have to be considered when dealing with particular issues in the justice systems such as expert testimony. Details of psychology in the courtroom and in other aspects of the criminal and civil justice system will be examined in detail below. There are certain psychological factors that come into play when analysing the criminal and civil justice system. The first one to be considered is communication. Communication is the transmission of information. It can be divided into three main components. These are; verbal communication, vocal communication and non-verbal communication (Berger et al, 1972, p 241-255) Verbal communication involves the use of written or oral formats to convey specific messages to other parties. Vocal communication involves all the audible aspects of communication such as tone, pitch of voice, rate of speech, intonation and inflexion. In this form of communication, focus is kept on how the message is conveyed rather than the subject matter itself. Lastly, there is non-verbal communication; here, visible elements of communication are considered such as personal appearance, facial behaviours, body orientation, posture, touch, gestures, eye contact and even eye movement. Auditory cues are the main area of emphasis in this case. (Casper & Zeisel, 1992, p135-191) Psychologists assert that the most influential form of communication in the courtroom is the non-verbal form. Others have argued that in case jurors or judges are faced with situations where the statements presented to them are in contradiction with each other, then chances are that those jurors will rely on non-verbal forms of communication rather than the actual word spoken. Research has shown that many jurors have been convinced by some forms

Saturday, September 21, 2019

Costco Wholesale in 2012 Essay Example for Free

Costco Wholesale in 2012 Essay Costco is one of United States’ largest retailers, serving over 3600 variants of convenience products at excellent quality with competent prices. Founded in 1983, Costco quickly expanded in its operations to over 598 stores worldwide. One of the unique selling propositions of Costco is the fact that they offer very low prices as compared to their competitors without requiring to compromise quality. This paper will analyze Costco’s key success factors in terms of its strategic management. Business Model Costco’s business model is simple and straightforward; they offer high quality products at affordable rates. The centerpiece of Costco’s model entails high sales volume and rapid inventory turnover. Costco enjoys high inventory turnover which means that they don’t need to stock a particular good for long period of time. Also, before they need to pay the suppliers, they are able to sell it. Which means, they are able to pay suppliers with the cash derived from sales, leading to low working capital. This shows significance in financial health and good financial management. This kind of business model is appealing for several reasons; low prices can generate high number of customers, indicates healthy operations, encourage rapid turnover, decrease warehouse costs and many more. However, in order to keep up with this business model, Costco needs to continually maintain overhead costs, which will be discussed further into the paper. Strategy Costco’s low pricing strategy highly depends upon several factors. In terms of pricing, they offer bargain products at low prices. Their earnings highly come from membership fees, over which members can join in an annual subscription and enjoy promotional rates as members. Even though Costco enjoys less profit margins, they have high number of annual members and earn their profit by membership revenues. In terms of product, their Kirkland Signature is also of good quality as a representation of their brand. They are also ready to experience loss of sales by customers who do not want to purchase in larger quantities. Treasure-hunt merchandising is also a smart  method to continually renew their product lines to encourage members to purchase the item right away in fear of not having them available at the next visit. Jim Sinegal and Core Values as CEO Jim Sinegal shows good examples of leadership as a CEO. He conducts an open-door policy which makes him accessible to staff, thereby increasing employee motivation. Jim also conducts regular store visits as opposed to working at a desk, which shows his willingness to step down to the field to help improve the store. The business environment is made to be causal and unpretentious, so employees feel sense of belonging and are often committed to the organization, in benefit of themselves and the company. Low employee turnover shows the compatibility of the employees and the company, which means that the corporate culture can be maintained or enhanced. Financial Perspective We have come to understand that Costco achieves much of their revenue from membership renewals. Observing the financial data, we see that Costco’s membership fees if four times over from 2000 up to 2011. This signifies their proficiency in making member packages attractive. Their actions in prioritizing members have been successful as we see that members are continually signing up. Therefore, membership is encouraged to be sustained. However, we see that sales also increase significantly over the years, almost 3 times over. Therefore, we can conclude that despite having less marketing activities, Costco is able to attract customers by emphasizing on price efficiency. Their working capital ration (current assets minus current liabilities) is kept at a low level due to high inventory turnover. Competitive Advantage over Competitors A key competitive advantage owned by Costco over its competitors is, without a doubt, their low prices. Although they do not invest much in store layout, store ambiance, labor and marketing, they have low overhead costs which contributes to being able to keep prices low. Also, they offer a wide array of product categories from food products to gasoline, although within a product category, they offer less brands than usual retailers (Llopis, 2011). Strategic Weaknesses in Comparison to Competitors The fact that Costco carries only 3600 selections of merchandises could potentially be a major flaw in their strategy. Generally, other stores carry over 10.000 selections. Customers may initially feel the thrill of shopping at cheap prices at Costco but could eventually dislike the lack of choices in terms of brands and may choose to shop at stores with larger varieties. Secondly, Costco spend less for advertisements and rely on word-of-mouth and certain campaigns. However, their competitors, Sam’s Club and BJ’s Wholesale Club spend much more on advertisements. Presently, Costco’s financial conditions show steady results in sales but the power of marketing is such that customers may choose to shop elsewhere for various reasons. It is also important to note that customers’ switching costs (from Costco to another) is relatively low. Compensations Policies Costco offers attractive compensations as compared to their competitors. The employee benefits covers all aspects such as fixed wages, health benefits, medicinal discounts, eligibility for company profits, counseling services and many more. At a quick glance, we notice that Costco spends much on compensation, despite the comparatively lower amount of labor, due to the vast varieties of compensations. In my opinion, it shows good corporate culture to take care of employees. In most companies, CEOs are the first ones to be rewarded with sky-high numbers. It is different in the case with Costco, where CEOs are paid enough without failing to reward employees appropriately. Conclusions and Recommendations Although from a management and operation point of view, Costco is doing everything to a tee, there are several recommendations provided to further improve its performance: Increase product lines to above 3600 in order to compete in terms of product choice with their competitors, especially after understanding that customers’ switching costs are low. Costco already has a big advantage in terms of prices and can do wonders when they also hold product advantage. Prepare some funds for marketing. Branding and brand awareness are two of the most important factors for warehouses to remain sustainable in the market to be seen as reliant. With more marketing, Costco can retain top-of-mind positioning as the â€Å"place to shop† in customers’ mindsets. Maintain membership fees at a fair rate. Currently, Costco’s membership fees are higher compared to their competitors. They can maintain their fees at this level only if they can provide more attractive member benefits to their customers compared to their competitors. Reference: Llopis, G. (2011, January 31). The Costco Factor: To Win The Business Game, You Need to Change How You Think. Retrieved February 20, 2015, from Forbes: http://www.forbes.com/sites/glennllopis/2011/01/31/the-costco-factor-to-win-the-business-game-you-need-to-change-how-you-think/

Friday, September 20, 2019

Information Gathering for Geography Data Collection

Information Gathering for Geography Data Collection Introduction: During the last decade, there has been an increase of the integration of visual methodologies, with geographical research. This aspect has managed to gain an increased attention from geographic researchers. Currently, it is easy for Geographers to access the tools of visual reproduction and production. The society is heavily influenced by visual representations and images. It is easier to pass on information through visual and imagery representation, as opposed to the use of words and symbols. However, the interpretations of these visual images normally lack a critical awareness or analysis. This is because they are always interpreted on a face value. Cloke (2004) explains that visual communication normally occurs through the help of visual aids. It is described as a conveyance of information and ideas in forms that it is easy to read, understand, and look upon. Thrift and Kitchin (2009) further explains that visual communication greatly relies on vision. Furthermore, it is always expressed or presented with two dimensional images. This includes typography, signs, graphic design, drawings, animation, illustration, advertising, industrial design, etc. Visual communication, explores the concept that visual messages that are accompanied by words have great capability of educating, informing, or persuading the audience of the message under consideration (Rubenstein, 2009). Geographers mainly use visual methodology as part of qualitative method of gathering data. This paper gives a discussion on the different ways whereby geographers have managed to incorporate the various visual methods in their research. This is by using a range of examples. Some of the major visual techniques analyzed in this paper include auto-photography, and participatory video making. Auto-Photography and Geographic Research: Auto photography is an example of an ethnographic research methodology. It provides a tool used in qualitative research methods that help in understanding the qualities of an environment, and geographic locations. This tool is on most occasions used by human geographers for purposes of collecting information. This is mainly because of advances in photographic technology, it is easy to access it, and it is also affordable. Stockinger (2013) explains that auto-photography is directly related to film development, and it relies on the camera technology. In geography, the use of auto-photography is directly related to the invention of disposable cameras (Phoenix, 2010). This was a one-time user camera which could not operate without a film. These types of cameras were very popular in the 1990s, and this is because it was a new technology, and it was easy to use the cameras for purposes of taking images (Kitchin, 2009). For new researchers, and those without a substantial amount of research funds, this method of data collection was very expensive (Teese, 2008). However, with the emergence of digital cameras, it is now cheaper to use auto-photography for purposes of collecting geographic data. Furthermore, it is easy to take a large volume of photos, through the use of digital cameras (Rubenstein, 2009). Furthermore, because of a drop in the cost of equipments, geographic researchers have gained the capability of developing their own videos that consists of data collected. Under human geography, researchers have used auto-photography to study the geographic location and elements of children all over the world (Gomez and Jones, 2010). This technology is easy to use, when studying children. This is because it is easy to categorize these children into subject groups. These children might find it intimidating or difficult to understand the verbal language of research, hence the use of auto-photography. Stockinger (2013) explains that auto-photography is not restricted to the study of only children. It can be used to study and collect data on time-space geographies, human identity, and the interactions between human beings, and the environment. The early pioneers on the use of auto-photography in geography are Joan Wingate and Stuart Aitken (Stockinger, 2013). This is through their study on how the environment affects children, and how to use auto-photography to help adult researchers to understand the different views of children, regarding their environments. This work was able to incorporate the methodological approach in the children’s geographies which emphasized on the everyday and local lives of children. It further analyzed the impact of social differences like ethnicity, race and income, on the environmental mobility and experience of children (Reason, 2008). In concluding their research, the two authors denoted that children who suffered from cerebral palsy, and whose movements were restricted, engaged in taking photographs, as compared to their counter parts, who were normal (Rubenstein, 2009). Furthermore, watching other children playing was a way in which a disabled child was able to participate in the playing activity. Auto-Photography is not only used in the geographic study of children. It is also possible to use it in studying time and space. This is better depicted in a study by Johnson, May and Cloke (2008) on the geography of homelessness. Under this research, the researcher were analyzing the various strategies in which homeless people use for purposes of protecting themselves, and maintaining their areas of residence, i.e. space. This is because the homeless are always vulnerable to intimidations and exploitation, and when they are found in wrong places, people would chase them. Johnson, May and Cloke (2008) believes that aut o-photography is an important source of getting information. It is far much more useful that traditional sources of information such as books, and newspapers. It complements these sources of information. Furthermore, auto-photography has been used in accelerating the spatial development of Urbanization on Guangzhou (Phoenix, 2010). This is a province located in China. For example, in the year 2000, Guangzhou began a series of spatial expansion. This was after its merger with the districts of Huadu and Panyu. To effectively develop the province, there was a need of proper urban planning and development (Kochak, 2006). The use of auto-photography was essentially in this aspect. Urban planners of Guangzhou took a series of photographs, of various locations of the province. This was for purposes of studying them, and hence coming up with a better policy, on how to plan the province. Policy formulators were able to use these photos for purposes of planning to build an extensive road network that connected the province of Guangzhou and Foshan (Chiang, 2005). This is clearly depicted on the North Western border of the provinces of Guangzhou and Foshan. The construction land between the borders of these two provinces is directly connected with one another, and road network has approximately sixty intersections (Loo, 20 09). This is for future expansion. Participatory Video Making and Geographic Research: Participatory video is a process in which the participants work together for purposes of creating a video in regard to their common experiences. It is also a way of making an inquiry of the various challenges that affect the lives of the participants (Kitchin, 2009). This concept is widely used in the collection of data when studying human geography. Due to the immense benefits that participatory video making has, geographers have emphasized on its use in the collection of data. Under participatory video making, the participants and the researcher are joint owners of the data that emanates from the research (Rubenstein, 2009). This research emphasizes that social action is an important part of a research. Furthermore, social action is exploratory, relational, and unpredictable. Participatory video making is therefore seen as an opportunity for empowering geographers with social skills that can help them to efficiently interact with the participants of the research (Chiang, 2005). Don Snowden was the first person to engage in participatory video making (Kitchin, 2009). He pioneered the use of media for purposes of enabling the community to develop various solutions to their problems. In his research, Snowden was able to work Colin Low a film maker (Kitchin, 2009). He carried out a study of Fogo Island, which was a small fishing community in Canada. His main aim was to identify the various challenges and opportunities that are experienced by the residents of this community. In this research, Snowden managed to develop a film on different villages in the Island (Hueber and Alderman, 2011). These films illustrated various challenges that they were facing, and the ways of overcoming these challenges. By watching the videos of each village, the different villagers in the island were able to realize that they were facing similar problems (Bergman, 2010). On this basis, they had to come together for purposes of ensuring that they develop a solution to the problems that were facing them (Hueber and Alderman, 2011). Politicians were also able to view these videos. On most occasions, politicians were very busy, and unable to visit the Island, and learn on the different problems that the Islanders were facing. Furthermore, the Island was far away from the main land of Canada. As a result of the production of this video, the government was able to change its policies regarding the Fogo Island (Hueber and Alderman, 2011). This is by improving the welfare of the people of Fogo Island through education, and building of infrastructures that could enable them carry out their fishing practices in an efficient manner. Furthermore, people within the Island began collaborating with each other for purposes of finding a solution to the problems that affected them. This technique was so successful that other geographers began using participatory video making in collecting data. Hester Parr examines the use of participatory video making in a mental health institution. Parr (2007) believes that it is possible to use participative video making for purposes of helping to change the manner in which the society views people with mental problems or disability. Furthermore, she explains that video making is useful in helping to hold important data about the effects that arts has on the mental health of another person. Parr (2007) argues that participative video making is a collaborative process that requires the cooperation of all the parties involved in it. This would therefore make it possible for the participants to provide an in-depth data regarding the problems of the research. On this basis, Parr (2007) explains that participative video making is an important aspect that can help in solving the problems of a society. For instance, Parr (2007) explains that the use of a video referred to as Recovering Lives was successful in positively depicting the mentally ill people in Dundee. The filmmakers were able to collaborate with the mentally ill individuals in coming up with this video. They had an opportunity of telling their experiences and challenges that they face while living with this disability (Hay, 2010). On this basis, the filmmakers succeeded in explaining the different problems that mentally ill people face. Conclusion: Currently, most geographers are involved in gathering information through the use of visual methods of data collection. The most prominent of these methods are auto-photography, and the use of participative video making. Auto- Photography has been made possible because of the emergence of digital cameras. This makes it easier for geographers to take as many photos as possible. It is also a cheap method of collecting data, because digital carry are easy to afford. On the other hand, participative video making involves collection of data through film. Under this method, the geographer would collaborate with the population, while gathering data concerning a particular area of their research. These methods are used by geographers to solve a particular social problem. They are widely used in the area of human geography. Bibliography: Bergman, B. J. (2010). Making the Most of Your Video Collection: Trends in Patron Access and  Resource Sharing. Library Trends, 58(3), 335-348. Chiang, T. (2005). Historical geography in China. Progress in Human Geography, 29(2), 148-164. Cloke, P. J. (2004). Practising human geography. London: SAGE. Gomez, B., Jones, J. P. (2010). Research methods in geography: a critical introduction.  Chichester, West Sussex, U.K.: Wiley-Blackwell. Hay, I. (2010). Qualitative research methods in human geography (3rd ed.). Oxford: Oxford  University Press. Hueber, A. M., Alderman, D. H. (2011). Analyzing resident place satisfaction in a tourist  destination through auto-photography the case of Southern Shores, North Carolina.  Greenville, N.C.: East Carolina University. Johnsen, S., May, J., Cloke, P. (2008). Imag(in)ing ‘homeless places’: using auto-photography  to (re)examine the geographies of homelessness. Area, 40, 194-207. Kitchin, R. (2009). International encyclopedia of human geography. Amsterdam: Elsevier. Kochak, A. K. (2006). Development Indices: A Comparative Study of India and China. China  Report, 42(1), 57-68. Loo, B. P. (2009). An overview of transport geography in China. Journal of Transport  Geography, 17(5), 419-420. Parr, H. (2007). Collaborative film-making as process, method and text in mental health  research. Cultural Geography, 14, 114-138. Phoenix, C. (2010). Auto-photography In Aging Studies: Exploring Issues Of Identity  Construction In Mature Bodybuilders. Journal of Aging Studies, 24(3), 167-180. Reason, P. (2008). The SAGE handbook of action research: participative inquiry and practice  (2nd ed.). Los Angeles, Calif.: SAGE. Rubenstein, J. M. (2005). The cultural landscape: an introduction to human geography (8th ed.).  Upper Saddle River, N.J.: Pearson/Prentice Hall. Stockinger, P. (2013). Digital Audiovisual Archives. London: Wiley. Teese, B. (2008). Making Use of Video Interlacing. The Physics Teacher, 46(L1), L1. Thrift, N. J., Kitchin, R. (2009). International encyclopedia of human geography. Amterdam:  Elsevier.

Thursday, September 19, 2019

An Analysis of Matt Ridley’s The Origins of Virtue :: Philosophy Essays

An Analysis of Matt Ridley’s The Origins of Virtue Inwardly examining his own nature, man would prefer to see himself as a virtuously courageous being designed in the image of a divine supernatural force. Not to say that the true nature of man is a complete beast, he does posses, like many other creatures admirable traits. As author Matt Ridley examines the nature of man in his work The Origins of Virtue, both the selfish and altruistic sides of man are explored. Upon making an honest and accurate assessment of his character, it seems evident that man is not such a creature divinely set apart from the trappings of selfishness and immorality. Rather than put man at either extreme it seems more accurate to describe man as a creature whose tendency is to look out for himself first, as a means of survival. It is true that on many levels humans act in a cooperative way to benefit all-- but does that warrant a claim that man is genetically altruistic? Perhaps the reasoning behind his actions would lead to another view. As Ridley examines man's dependency upon others in his species, it becomes apparent that man is not necessarily a savage beast out to do everyone in, but rather a lone creature trying to ensure his survival. In comparing man as the lone hunter to the cooperative being he is today it is evident that his species has thrived and survived with much greater ease in a cooperative society as opposed to a lone hunter. Though it can be easily argued that this cooperation between man, is at some level a sort of mutual altruism, it may better be understood as a selfish means of survival. The saying goes that "there is safety in numbers, " this could not be more true for man's plight. Because alone man stands little chance of perpetuating his genes, he flocks to the community wher e he has the better chance of survival, as do his genes. So to better understand the reasoning behind man's need to be in the community it is imperative to look at nature. In the wild and brutal game of life the only measure of true success is whether genes are passed on. Like any other animal this measure of success measures man's success too. For all creatures, to survive is the chance at continuing a gene line, and it is this necessity to continue the line that is innately imbedded in man and all other creatures. An Analysis of Matt Ridley’s The Origins of Virtue :: Philosophy Essays An Analysis of Matt Ridley’s The Origins of Virtue Inwardly examining his own nature, man would prefer to see himself as a virtuously courageous being designed in the image of a divine supernatural force. Not to say that the true nature of man is a complete beast, he does posses, like many other creatures admirable traits. As author Matt Ridley examines the nature of man in his work The Origins of Virtue, both the selfish and altruistic sides of man are explored. Upon making an honest and accurate assessment of his character, it seems evident that man is not such a creature divinely set apart from the trappings of selfishness and immorality. Rather than put man at either extreme it seems more accurate to describe man as a creature whose tendency is to look out for himself first, as a means of survival. It is true that on many levels humans act in a cooperative way to benefit all-- but does that warrant a claim that man is genetically altruistic? Perhaps the reasoning behind his actions would lead to another view. As Ridley examines man's dependency upon others in his species, it becomes apparent that man is not necessarily a savage beast out to do everyone in, but rather a lone creature trying to ensure his survival. In comparing man as the lone hunter to the cooperative being he is today it is evident that his species has thrived and survived with much greater ease in a cooperative society as opposed to a lone hunter. Though it can be easily argued that this cooperation between man, is at some level a sort of mutual altruism, it may better be understood as a selfish means of survival. The saying goes that "there is safety in numbers, " this could not be more true for man's plight. Because alone man stands little chance of perpetuating his genes, he flocks to the community wher e he has the better chance of survival, as do his genes. So to better understand the reasoning behind man's need to be in the community it is imperative to look at nature. In the wild and brutal game of life the only measure of true success is whether genes are passed on. Like any other animal this measure of success measures man's success too. For all creatures, to survive is the chance at continuing a gene line, and it is this necessity to continue the line that is innately imbedded in man and all other creatures.

Wednesday, September 18, 2019

Black Hawk Down - Summary of the book as written by Mark Bowden :: American America History

Black Hawk Down - Summary of the book as written by Mark Bowden It was mid-afternoon on October 3, 1993. There were approximately 160 men eagerly awaiting the signal to proceed. Matt Eversmann sat waiting in Super Six Seven, a Black Hawk helicopter. He noticed that things were being done differently from the other setups, which had been false. This time they were packing more ammo and the commander had come out to see them off. The troops were being sent in because warlords were allowing their people to starve to death. The world had sent food, and the warlords hoarded it. The world had decided to stop this. Today's mission was to invade the Habr Gidr clan that was in Mogadishu Somalia. The clan was led by Mohamed Farrah Aidid, but that day's targets were two of his lieutenants. They were to be arrested and imprisoned with other clan members that had already been captured. At 3:32 P.M. the armada launched. They flew from the coastal airport into the city of Mogadishu. Above the city the men could see the destructions the city had experienced during civil war. Many buildings were demolished and the streets were crumbling. The Black Hawks were down low over the city, and the Little Birds were closing in on the target. Tires burning on the street near the target set alarm. It was a way Somalis signaled trouble and summoned militia. When the Little Birds came down people and cars began to scatter. Some people were gesturing eagerly. The Black Hawks would move in next. People began poring into the streets with weapons. Others were building barricades or lighting fires. The Rangers captured the two targets along with 22 other Somali men on the first floor of the target house. When the Rangers entered the second floor, shots started coming through a window. Rangers on the ground were shooting at their own men. The young Rangers were poorly trained and dangerous. In the streets fire was rapidly exchanging. The Somali men took advantage of the Americans decency and hid behind women and children. The Somalis moved in groups. The Rangers could not single out the ones with weapons. Things had gone pretty well. It was 3:50 P.M. The force would be one their way in ten minutes. The Humvees and trucks waited outside the main gates for the D-boys to wrap up. About this time

Tuesday, September 17, 2019

The Splendid Little War :: essays papers

The Splendid Little War February 15th, 1898, all is quiet in Havana Harbor. The crew of the USS Maine is sound asleep less a few solitary watchmen. The brackish sea air and the calm ocean breeze are soothing and peaceful. This would hardly suggest the terror about to erupt on this â€Å"peaceful† visit to the Spanish-controlled Cuban harbor. At 9:45PM, a violent explosion rips the Maine apart sending it plummeting down to the muddy sea floor and killing nearly all of her crew. All of the Spanish boats in the harbor rushed to the aid of the American vessel and its survivors: the commander, Captain Charles D. Sigsbee, and a few lucky crewmembers. Even though Captain Sigsbee, a favorite of the Naval Department, urged President McKinley not to react in an aggressive manner toward Spain, the media, namely New York newspaper editors Pulitzer and Hearst, already inflating current issues relating to the Cuban revolution, spin the incident out of control. The American public goes mad with suspicion of Spanish fowl play and the sinking of the USS Maine serves as the immediate catalyst to the Spanish-American war. This â€Å"Splendid Little War† is deeply rooted in Spain’s rule over Cuba as a colony infringing upon American interests in Cuban agriculture and goods. The first episodes of war-like acts between the U.S. and Spain began with the explosion of the USS Maine in 1898. After the catastrophe, many attempts to solve the mystery behind the explosion and withhold peace took place, including the ambassadors of England, Germany, France, Italy, Austria, Russia, and the Pope appealing to president McKinley for peace. Despite numerous efforts against it, McKinley asks congress for war April 11, 1898 and U.S. troops mobilized on April 16. The Teller amendment passes through Congress stating that the U.S. would not annex Cuba. Congress declares Cuba independent on April 19. Shortly after the United States Navy blockades Cuba the first Spanish ship was taken. By April 25, both Spain and the U.S. declare war. The Spanish-American War was an extremely quick war, highlighted in history by Theodore Roosevelt and his Rough Riders in the battle of San Juan Hill. Spain was completely stomped. On the way to capture the Philippine Islands, Spain’s most worthwhile colony U.S. Naval forces also capture Guam. Closer to home, the U.

Monday, September 16, 2019

Marketing of Financial Services †Georgia Supplemental

According to the case Florida seems to be a flourishing prospective market for supplemental insurance. The demographics of the state already show large migration trends resulting in influx of young families coming into the state which is offering them comfort and security with better jobs. According to the 10 year projection of Georgia Supplemental, of the activity in the Florida market, the demand for supplemental insurance is bound to increase. This is because of the increasing members in the household in the future years and the fact that most employers in Florida do not provide complete coverage of expenses through insurance. The case depicts the statistics that this particular segment of the market is to grow at 6-7 percent in the next 10 years. Another issue which makes Florida an attractive marked for supplemental insurance policies offered by Georgia is that sideline expenses are often not covered under medical insurance policies and Georgia supplemental has managed to tap onto this market by providing policies for large expenses which are not covered by traditional insurance selling companies. The research conducted n 2003 by Benefits Research Inc. stated that an average family spent just about $500 on dental expenses and only about 29 percent of these expenses was focused on preventive care. Similarly, it was found that only 17 percent of the employers’ n Florida were offering their employees with vision care which is a main product and service provided by the Georgia Supplement. This also shows room for a prospective market which can be captured by the company if it decides to expand into Florida. Conclusively, according to the information provided in the case it is a very prospective and fruitful venture for Georgia Supplemental to expand into Florida. The decision of the expansion may be somewhat biased as well as a costly one due to the CEO’s affiliations with the state but the statistics and records show that the market is ripe for the kind of products offered by Georgia and the company expansion would prove to be successful in the coming years. 1. What is your assessment of the proposed direct mail campaign and the promotional letter? Direct mail has already been a successful mode of promotion for financial services and products like credit cards. The assumption in this case is that by using direct mail technique to inform the employers in Florida about the products offered by Georgia the company would be able to promote its product to their future market. This is an appropriate strategy as it tends to drive traffic to the store, generate and increase sales for the company as well as help generate interest and promote the products by promoting brand recognition and cultivating long term relationships with the clients. However, more perseverance is required on the part of the company. It is mentioned in the case that the CEO has contacts in the Florida region. The company can use these contacts as well as the referrals of the satisfied customers in its other markets to build trust and awareness of the company and its products and services in the Florida market. This can be done by sending out promotional letters by direct mail as mentioned in the case. However another more personalized method would be to hold an event or a conference in Florida where the prospective employers and satisfied customers from other markets could be invited, a promotion pitch can be shown to them and the event would also enable the company to build long term business relationships with their prospective clients. This method of promotion would be more expensive than direct mail and likely to drive up the expenses for the company. This method can even support the direct mailing as it would help attract more customers while maintaining the current ones and helping retain them as well. Reference 1.Wolf, K., (1998), Planning a Successful Direct Marketing Campaign, WGSC Publications, available at: http://cpa.utk.edu/pdffiles/adc9.pdf      

Sunday, September 15, 2019

Epicurus

True happiness is state of being that each and every human has the ability to experience. It can either come from indulging desires or come from mental and or spiritual happiness in which two great philosophers have studied and mastered in great depth. Although Epicurus and Epictetus both had very strong opinions to this argument, Epictetus showed that it is necessary to have a knowledgeable understanding of what is giving you that satisfaction.With his idea we see that it is important to see the big picture in order to be happy rather than Epicurus' simple stand of satisfying your basic desires. In my personal opinion I believe that you should not go out of your way to make yourself happy if it consists of hurting others. To begin we must understand that there are many types of happiness. Happiness that come from pleasures such as eating tasty food or taking warms baths. Happiness that comes from engagement, for example trying something challenging and succeeding in doing so.Happine ss that comes from meaning, in other words being religious and belonging to a higher being. Last but not least happiness that comes from accomplishments, achieving a lifelong goal or dream. As you can see there are many different ways to be happy and if you are living happy then you are living a good life. Epicurus and Epictetus have some of the same view on the achievement of the good life. Epicurus believes that nothing is created out of nothing, in other words everything has a reason for existing.He believes that knowledge is the key to finding true pleasure and without pain there is no pleasure, so both pain and pleasure must coexist. He says people should not have fear in God because God does not interfere with their lives and people cannot control their destiny but they can control their happiness, so they should live their lives not with the fear of dying because the anticipation of it is considered to be painful, but rather they should pursue knowledge and pleasure and take appropriate measures that will make the most of pleasure and make light of pain.In Epictetus's view he believes that happiness is achieved only when people are able to get their wants or needs, so if someone desires something that is out of their power they will not be happy. He believes that in order to avoid unhappiness people should control their desires, that is with self discipline and self control which will help us change our view or attitude towards certain things. He believes that everyone has a obligation and a role towards others and God plays an important role in life.Certain times God will let us make the decisions but in other circumstances it is not within our power and is prearranged for us. So unlike Epicurus, Epictetus believes that God controls everything and he says that people are a â€Å"fragment of God† so we as a whole have to look out for each other. For Epictetus the good life comes in compliance with reason and truth and basically believes in the po wer to self. Where for Epicurus the good life is a healthy, comfortable, and controlled life and the way to achieve it is by disciplining oneself by the use of reason and secondly to study philosophy, which Epictetus believes too.Epictetus believes philosophy is the guide to achieving a peaceful mind, people have to control their desire. All displeasures is the result of a gap between our wills and the external world. People think that happiness is possible only when the external world comes up to their expectations, so in their minds they make up scenarios of their wants or needs. This builds up hope but will soon be a disappointment. So therefore people should only desire what is real. He says that the person who can master this can go on to doing what he set out to do.Epicurus contends that composure is a condition of the good life. He says in order to have a peace of mind you must have a peaceful environment, escape distress from the sense of right and wrong and not worry about the future. In order to do this Epicurus explains that people must develop a quality that is considered morally good or desirable in a person. He states that . â€Å"The man who does not possess the virtuous life cannot possibly live pleasantly†. Epicurus declared that prudence is a virtue which all other virtues are derived.