Tuesday, April 30, 2019

The Controversial Approach of the Bank of England Essay

The Controversial Approach of the Bank of England - endeavor ExampleThis report presents a critical overview of the approaches adopted by the Bank for the sake of economic recuperation in the country. Considering the devastating effects of the recent financial crisis, the Bank of England considered it essential to improve liquidity countersink through initiating liquidity support operations (Joyce). The intention behind these operations was to facilitate interbank market with more readily available funds. The Bank, in this regard, outstretched its normal operations by way of enabling moneymaking(prenominal) banks to obtain funds more easily. In addition to these initiatives, the Bank also considered other measures, such as, the access of Special Liquidity Scheme which enabled banks to exchange their assets with T-bills, which otherwise could not be materialized on short notice. This induction later was referred to as the Discount Window Facility (Joyce). However, these polici es were brought into action after the Bank loosened the monetary policy by way of lowering down interest rates significantly. Although, the purchase of public and backstage assets was termed as a policy measure by the Bank, but in fact, these actions were forced to be interpreted by the Bank since the earlier shitting of monetary policy came out to be ineffective in achieving the 2 percent rate of inflation (Joyce, Tong and Woods). ... The growth trends in the UK deliverance from the first quarter nominate all been recorded in negative, i.e. 0.1 percent, - 1.2 percent, 0 percent, - 1.4 percent, - 0.5 percent and 1.3 percent. On the other hand, like other sectors of economy, the takings of the construction sector of the UK declined significantly by 5.2 percent during the second quarter of the current fiscal division (Richards). According to the critics, the public and private assets purchasing policy of the bank proved to be detrimental itself for the economy as the Bank of England swapped financial assets with the commercial banks so as to increase the backup reserves of the banks, which could be used to further increase their loaning operations in the market. But on the other side, the loosening of monetary policy and decline in interest rates meant that the deposits made by public in the bank were valueless. Moreover, the lowering down of interest rates also decreased the targets for businesses in the UK which were set in relation to the returns expected on equity and capital of the firms. At the same time, it was also expected that the change magnitude inflation rates would turn into increased rent and thus such increase in demand would lead to economic revival in the UK and would also improve lending operations in the UK financial market (Auerback). However, things went opposite to what was expected as reported in the recent publication of the British Bankers Association, the owe lending for the month of June came out to be ? 7.2 billion, which if compared with the latest semi-annual averages was less than by ? 0.8 billion. Further, forecasting of mortgage lending shows that this declining trend

Monday, April 29, 2019

Why is Cost Accounting So Important to the Success of the Firm Research Paper

Why is greet Accounting So Important to the Success of the Firm - Research newspaper publisher ExampleCost accounting is in truth important because it provides relevant information that plunder be employ by the managerial staff to urinate decisions. The information provided by price accounting is mainly use internally by corporations. The purpose of this paper is to describe the importance of cost accounting for a firm. Cost accounting provides relevant information that digest be used by both managers and financial accountants. It can be used to measure and report financial and non-financial information that relates to the cost of acquiring or eat resources by an organization (Horngren & Foster & Datar, 2000). Accountants can be flexible in their applications of cost accounting overdue to the fact that cost accounting does not have to comply with the generally accepted accounting principles (GAAP). Accountants also use cost accounting to describe the future activities of an organization. The information compiled by cost accounting can be useful both in the short and long term. The homework function of an organization benefits a lot from cost accounting. Another important benefit of cost accounting is that it allows companies to compute the cost of a product. There are different techniques and methods in cost accounting that are used by companies to make better decisions. Cost accounting can help a company establish the correct determine for its products. A technique that can be used to set the price of a product is mark-up price. Mark-up pricing sets a price taking into consideration the cost of a product. For instance if the company determines that mark-up price is 50% and the cost of a product is $100, then the price of the product is $150. Another method in cost accounting that can be very valuable to make operating decisions is cost- sight-profit relationships (CVP). CVP analysis is one of the closely powerful tools managers have at their comma nd (Garrison & Noreen, 2003). The use of CVP analysis helps managers understand the relationship between cost, volume and profit. One of the most popular and useful CVP applications is breakeven analysis. The breakeven analysis is an analysis to determine the point at which revenues receive equals the costs associated with receiving the revenue (Investopedia, 2011). The net profit of a company at the breakeven point is exactly cero. The saying to calculate break even in units sold is fixed expenses divided by unit parcel margin. The use of break-even analysis can be used to determine the viability of a new project. A very important cost accounting method that is used by accountants and managers in all industries is figureing. Budgeting is a planning function that displays in quantitative form a proposed plan of action by management for a future period of time and is an aid to the coordination and implementation of the plan (Horngren, et al., 2000). The preparation of computeed financial statements is referred too as pro forma statements. Three advantages of the use of work outs are planning, creation of performance criteria, and promotion of coordination and communication. The most comprehensive figure prepared by organizations is the master budget. The master budget is composed of a series of interrelated budgets. some(prenominal) of the subcomponents of the master budget are Revenue budget Production budget Direct materials budget remainder inventory budget Manufacturing overhead budget R&D costs budget Marketing budget Distribution costs budget Customer service costs budget Administrative costs budget Capital budget Cash budget A technique that is used to evaluate the results of a budget or pro forma financial statemen

Sunday, April 28, 2019

Performance Measurement System in Julphar Company Term Paper

Performance Measurement System in Julphar Company - edge Paper ExampleRAK Ceramics is a company based in United Arab Emirates (UAE). The company was established in 1989 by Abdallah Massaad. The Company has been able to establish itself as the worlds largest ceramic manufacturing companies in a span of 20 years. The factory is however situated in the Arabian dessert. The products that RAK Ceramics has been offering consist of tableware, porcelain tiles, strong ware, bath ware, fittings, adhesive and faucets (Attwood Racking up Miles for Tiles). The Company operates in several countries of Asia as easy as Middle-East such as, Bangladesh, Iran, India, Sudan, China, etc. In this study the cognitive process of this company would be measured and analysed with respect to its node satisfaction ability, improvement activities, native process, employee satisfaction, competition handling, and innovation (Company Profile). Problem Statement It not necessary that every research study is dev eloped to discuss problems and challenges. Sometimes regular they are even designed to evaluate and analyse situation, such as performance of a company. As in this case, the performance management system of the ceramic manufacturing company, RAK Ceramic would be analysed through statistical tools. ... Internal Process The internal process of RAKCeramics is mainly based on its technology integrated business model. The strength lies in the zip of improvement that the company manages and supplies the product to the market as soon as customers demand. The company owns 10 factories, which is well equipped with the most modern machineries. 8000 bath wares are manufactures every day in three plants in the similar location. Production and distribution is well-managed through IT based supply chain (Corporate Profile). designing RAK Ceramics core competency is offering innovative products and unique designs to its customers using technology. The strategy of the company is to innovate and premiss new designs for the customers is a strategy for improving performance. They are also utilising scan coding system for allowing customers to hold their smart phones for scanning the QR code in the advertisement and directly visit the website of the company. They are also development a mobile tool called iDesign, where customers can design their incorporate their own designs for customisation (Hankir RAK Ceramics CEO Sees No deceleration in U.A.E Plans India IPO to Build Plant). Improvement activities The demand for RAK Ceramics is continuously rising, so the company is look forward to improve their manufacturing capacity by augmenting its power infrastructure. Several new power plants is planned to be launched in emirates in order to utilise sustainable sources of energy to respect the environmental concerns and maintain efficiency. The extremity for more power capacity was also identified in summers by the company

Saturday, April 27, 2019

Qualitative Educational Research in Theory and Practice Essay

Qualitative Educational enquiry in Theory and Pr make upice - Essay ExampleThere are sundry(a) oriental approaches utilize for understanding the different phenomena in life. One such way of viewing the world is positivism. Positivism is philosophic science based information derived from mathematical and logical source of knowledge (Cohen, Manion & Morrison 2011, pp. 12). Auguste Comte developed the range of a function in the 19th century with an objective viewpoint on stability of reality while basing different arguments on historical perspectives. Positivism is withal the act of manipulating independent variables while maintaining others constant, in a bid, to identify the descent between various elements of the world. The predictions in positivism may rely on past, or previous realities explained in the historical tradition. Notably, positivism discredits the existence of human knowledge in the society. It remains based on this regards that various discussions have arisen to counter the paradigm of positivism. The paradigms relationship with natural and physical sciences for instance, as remained a point of controversy. The paradigm reiterates that action within the society is similar to reactions that the physical world remits towards the absolute laws such as gloominess (Cohen, Manion & Morrison 2011, pp. 24). Positivism has generated an argument between poetry and philosophy hence creating a rift in the instruction systems. For instance, there has been a widening gap between humanities and sciences a factor brought misunderstanding in the education. Positivism advocates for superiority of sciences over the human mind thoughts for the reasons that the human mind provides non-inward knowledge. It furthermore promotes the use of scientific knowledge in judgmental decisions while disregarding other disciplines. Positivism believes reality exists however, it is composed of various discrete elements (Cohen, Manion & Morrison 2011, pp. 28). This means th at reality in positivism is any phenomena with a single objective reiterating a solitary world. This has greatly influenced the education system considering the rift generated by the explanation. For instance, positivism regards social sciences as fallacious. This is the act of treating an abstract concept as having a real existence (May 2001, pp 44). This leads to causal efficacy between the ii disciplines that fight over the impartial treatment of abstraction. Realism is the most common philosophical perspective, which holds the thought of a relationship and trust in non-observable concepts. Apart from causing confusion in education systems, positivism in like manner promotes reification. Marxist philosophers like berger and Pullberg 1966 demise social sciences, while giving attention to reification (Cohen, Manion & Morrison 2011, pp. 36). The Marxist theory, on the other hand, associates social sciences to capitalism a factor, which further complicates the education system. Acc ording to the theory, societal institutions have changed their fibre influencing existence of people. Use of positivism in the current education systems, therefore, not only causes confusion, but it also violates the integrity of history. It arouses negative feelings, creating biases towards various occurrences in life. It suggests elements of dishonesty in the process of creating various systems (May 2001, pp 67). Positivism does not derive conclusions on a subjective approach. Consequently, positivism does not give priority to emotion or feelings to interfere with the process of judgment. The basis of this argument is the fact that these aspects get

Friday, April 26, 2019

In the Communist Manifesto, Marx and Engels Essay

In the Communist Manifesto, Marx and Engels - Essay ExampleConsidering that presently, europium has been maintaining a low salary system for workers, it appears that the statements made by Marx and Engels do not reflect a truthful and realistic understanding of the economic system as a whole. Despite the failure of the workers nowadays to uplift the salary standards of the working class, the European businesses continue to emerge and win in the international trade. Thus, it put forward be interpreted as contradictory to the adverse effects to the capitalists as pronounced by Marx and Engels. Otherwise, to endlessly take advantage of the working class would mean defeat to the capitalists. Both Marx and Engels failed to see the power behindhand the capitalists and the latters influence to suppress the possible violent reactions by the working class.The statements however of Marx and Engels did not just go to naught. The European economy could not keep up survived without the idea s of the two closely-known pro-working class theoreticians. Knowing fully well that the proletariat, or the working class for this matter, has the potential capability to rise and change the events in their favor if constantly suppressed, the European capitalists, through the government provided for some incentives that would somehow satisfy the workers and hinder them from fighting back their employers ascribable to urges for more economic reforms. The employers unrelenting resistance to revolutionary actions in favor of the working class be to be successful. Thus, the government freely allowed the labor sector to represent themselves in the government thru participation therein. Thru this, the sermon of the numerous demands of the working class would be limited in the parliament and not to revolutions that could overthrow the government, as predicted by Karl Marx.In general, Marx and Engels failed to give proper and due recognition to the capitalists as a relevant mover in th e production. They should have considered the fact that labor will be of no use if there argon no raw materials to start with and who then has the capability to provide the raw materials but the capitalists Marx and Engels appeared to be one-sided, clinging on to the proletariat without reflecting on the need for economic balance of the society. The prophesies made by them are too extreme. They have not realized the fact that any sector that is put into power has this tendency to ill-use the others. In a purely capitalist system, the capitalists abuse the proletariat for their benefit. However, the proletariat, once put into power, has this tendency also to abuse the capitalists because each sector fails to acknowledge the relevant role being played by the other. It is the extreme ideas of isolation that leads the members of the society to abuse their power.Emphasis should be made that the statements of Marx and Engels are not totally wrong solitary(prenominal) then, it should be made more pragmatic, if one has to apply the ideas today. The urge of the capitalists to continue with production which by the mode is the stub of the modern day industry, is not actually paving the expression to their own graves. It is more tough to say that this urge to produce through the use of the labor sector could be a way to the capitalists graves if they will continuously abuse the rights of the working class and refuse to give them what is due to them. The essence of production is

Thursday, April 25, 2019

Business Innovation Essay Example | Topics and Well Written Essays - 1500 words

telephone line Innovation - Essay ExampleThe caller-outs goals and cultivation are embedded into the actual design and management of its facilities (Fitzgerald, 2001). For instance, the federations buildings have large windows, warm colors and fabrics, open floor plans, recreation areas and fitness centers. This enables the company to connect indirectly with its employees sequence providing an environment that allows for a more productive and interactive workforce. The companys catch say too, Connecting multitude, is symbolic of the culture, which helps define the purpose of its physical facilities.Their culture encourages employee participation through open discussions and debates. Nokias culture promotes good communications, which is integrated into every day interaction with and between employees (Nokia, 2006). They have performance-management system, called Investing in People (IIP) involves discussions between employees and their managers, twice a year. They have flexible working hours, study leave and health-care services and amateur activities (HRM Digest).Another company having innovative culture is Procter & Gamble (P&G), Americas biggest maker of household products. in that respect is a shift in P&Gs culture from a conservative, slow-moving, bureaucratic stance to a modern, fast-moving, internet-savvy organization (CorporateWatch, 2006). They have introduced a new system of attracting the right talents in its fold with a view to make faster and better decisions, cut red tape, reduce costs of systems and procedure while setting more aggressive sales goals.Go, Give and Grow is a scheme that has struck fit in with the youth. This scheme gives the graduates the opportunity to make their personal contribution to humanitarian projects before they start their career with P&G (HRMID, 2006). The new graduates selected for employment with P&G get a chance to work for 12 months in a developing country with the World Health Organization (WHO) or Unicef.

The Panama Canal and Its Expansion Research Paper

The sailor Canal and Its Expansion - Research Paper ExamplePanama groove was before under the Colombian management, then came the French and America before the panamian management took over in 1999. The canal had been faced by various challenges including ships traffic jam as the number rose from 1,000 in 1914 when it was opened to 14,702 in 2008. By the year 2008, more than 815,000 ships had used the panama canal most of them bigger than the initial plans that had been made (ACP, 2009). Panamax is the biggest ships that rifle through the canal at the present time. The canal was named by the American society of civil engineers as among the seven worlds wonders.Due to the increased rate of international maritime flip, increase in volumes in trade and takes of containerization, there has been a keener plan of investment of more funds in canals and the ports by the shipping lines in order to curb the growing rate of demand and needs. Since the Panama Canal does not have the poten tiality to accommodate all this pressure, it has been faced by several issues mostly relating to traffic congestion of the ships.The canal is cognize to hold a great record in the maritime trade but at the equivalent time it has been known to lose its market shares to Suez canal,which is another route used in the same suit of trade, and this is because the panama canal cannot accommodate ships more than 5,000 TEUs. The canal has also been hit by several problems,which take a decrease in demand of transit, an old model and structure of the canal, the saturation point is reached early, overlook of potential to redirect traffic congestion to other potential alternatives with longer routes, their development is unsustainable and also their level of trade in the maritime industry has been low. These problems led to the proposal for the expansion of the panama canal by the panama canal authority as it was the best solution for the business of shipping,rather than ignoring,so that,by 2014, the capacity would be bivalent allowing more ships to somersaulting through the canal. The components that make up the programme of the expansion of the Panama Canal allow in 1. Widening and making the Atlantic entrance deep. 2. Construction of the panama locks of the Atlantic post. 3. Increasing the working conditions of Lake Gatum to a maximum level. 4. Widening and making the steering telephone circuits of Culebra Cut and Lake Gatun deep. 5. Digging up the access channel of the post panamax locks. 6. Constructing locks on the pacific post panamax. 7. Widening and making the entrance of the pacific deep. Panama canal expansion will double its capacity come 2014 as it will allow larger ships to pass through. The plan for the canal expansion was presented on 24th April, 2006 by martin torrijos who was then the president of panama. The proposal was approved by the citizens of panama through a national referendum that was carried out in October 2006, and it was voted in by 76.8% of the commonwealth (ACP, 2009). The citizens of panama approved the expansion of the canal as it would allow larger vessels to transit and increase the level of maritime trade. The offer has started to be executed by the Panama Canal authority, and it will take at least eight years to be fully implemented as they are following a well illustrated plan and it will cost them 5.25 billion US dollars. As much as this project is of much assistance to the citizens and the republic of panama, there will be a direct benefit to the maritime industry internationally through

Wednesday, April 24, 2019

Othello, the Moor of Venice Essay Example | Topics and Well Written Essays - 250 words

Othello, the Moor of Venice - Essay ExampleDue to his fill in trust of Iago, he failed to examine the situation and preferred to be moved by the intensity of his emotions, anticipate a full thought of betrayal he didnt attempt to seek basis on. On this note, one may find having momentary empathy over Othellos condition in which he finds it actually painful to discover infidelity which he supposed had come so abruptly from the side of Desdemona. His impassioned love for her brings to revelation the weakness of a character who has had so much to prove in ground of his skills as a Moorish general in the Venetian army and several other aspects which genuinely place him as a novels protagonist.Iago has been capable of executing his cunning, manipulative strategies to get into magnate without getting caught due to his intelligence and expertise as a high-ranking soldier that he managed to master in secret the marriage between Othello and Desdemona. This makes Othello keep a conside rable amount of confidence with Iago on with the other incidences in which the former was aided by him so it could never be in Othellos mind to suspect Iago of deception turned against him.On the other hand, Othello instantly lacks trust and faith with his consanguinity with his love and has allowed desperation to ruin any wisdom in his reservation. He could have acted and moved with thought, considering his rate and character, that there are sides to be heard, justice, and faith of a loved one who, by him, was unjustly fated. His unjustified reaction could have been suspended had he employed a meditative trait of a impertinent

Tuesday, April 23, 2019

Commonplace Book Assignment Example | Topics and Well Written Essays - 750 words

Commonplace Book - Assignment ExampleThe recite is grave to my life because it enables me to be strategic in my activities and always reveal my plans when the time is ripe, because doing so enables me to avoid any hurdles that my competitors might put in my way to stop me from achieving my goals in life.This quotation means it is heavy to have details of the foeman including their strength and weaknesses, their holdouts, and their thoughts before starting a war against them. Tzu emphasizes the need to watch as much intelligence as possible about the enemy forces in order to deploy the right responses or preemptive interventions when it is necessary. In business, this quote stresses the need to carry out proper market research focuses on the rivals in order to mount a successful challenge against them. In my life, this quote enables me to understand my neighbors, the community, and the society in general in order to achieve a person-environment fit. Failure to make love my en vironment including the existing rules and regulations, the opportunities and other utility services will only result in my failure. commendation 3 If you accredit the enemy and know yourself, you need not fear the result of a one hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know uncomplete the enemy nor yourself, you will succumb in every battle. Sun Tzu, The Art of War p.234.This quote means one who knows their capability and that of their enemy will be sure of the right strategies to employ in order to eliminate the enemy in warfare, regardless of the length of the confrontation. But if an army knows its capabilities and not the enemy, the enemy would be obliged to employ a different strategy, which would be successful because the other side neither knows it nor can it counter the move. In modern business, a company that neither knows its strengths nor the rivals would most probably twig or face heavy losses for failure to

Monday, April 22, 2019

A Rose for Emily Essay Example | Topics and Well Written Essays - 500 words - 2

A Rose for Emily - Essay ExampleThe story brings paired side of an individual different from the real life situation. This is seen in the character of Emily in the story. Emily is not satisfactory to grip death idea and instead suffers denial. When Emilys father passed away, peck in the town judge that she will be in a state of grief, only this was the contrary. Emily claimed that her father was not dead as volume in town thought. Emily did not accept the fate of death and she held her father as if he was still alive. Emily did not accept death and as a result she killed Homer Barron to prevent him from leaving. Emily refused people to enter in her house because she kept the body of Homer Barron inside (Faulkner 2). Emily had a bad source towards Homer Barron that resulted in murder. From the beginning of the story, Emily was not affected by the death, but this could not have make her act badly against Barron. Emily actions were as a result of supernatural forces. When Emilys father died, Emily did not care but held her father as if he was still alive. Emily remained stubborn and prevented changes brought about by the death or otherwise means from taking place in town. She was also afraid of change and refused to allow the city people to include a number for mail in her house (Faulkner 22).After Emilys funeral people were unexpended to know what she had been hiding from the house. The town people rushed and broke the house in which Emily lived in order of battle to find out what she was hiding. People were surprised to find Homer Barron corpse decomposed on the bed together with a thread of Emilys grey hair. Emilys characters and belief in death made her live an general life.

Sunday, April 21, 2019

Analysis of Global Governance Essay Example | Topics and Well Written Essays - 3000 words

Analysis of Global Governance - Essay ExampleOn the other hand, it has been proved that the decisions of governments on crucial political, social and economic issues may present similarities in countries internationally a phenomenon observed especially in countries with common social or cultural characteristics. In this way, local anaesthetic political choices may influence the forms of international policies a trend well developed in areas such(prenominal) as security and political science. The current paper focuses on the critical examination and comparison of two studies instruction on global governance the study of Held & McGrew (2002) and that of Wilkinson & Hughes (2002) both of these studies refer to the criteria, the characteristics and the implications of global governance. The interpretation of global governance as condition by the above writers is critically discussed by referring to the actual political and social conditions in the international community. Moreover , the examination of their diddle led to the assumption that global governance can have a long-term impact on various aspects of international political and social framework. In this study, an emphasis is given on the implications of global governance for security as these implications can be identified in the work of Held et al. (2002) and Wilkinson et al. (2002). It is concluded that the above studies indicate a relationship between global governance and security however, the train at which this relationship is developed is depended on the grade of acceptance of the relevant schemes by the authorities of distributively country which are asked to adopt a specific global governance or security scheme.In order to evaluate the potential differences in the interpretation of global governance as developed by Held et al. (2002) and Wilkinson et al. (2002), it would be necessary to refer primarily to the criteria on which these two studies have been based.

Saturday, April 20, 2019

Seminar Unit 6 Research Paper Example | Topics and Well Written Essays - 250 words

Seminar Unit 6 - Research Paper Exampleof accessing and safekeeping an idea yet to be manifested and have the familiarity of the inventive process, discipline, strength of will and enthusiasm to sustain that mint via the entire creative course and at the same time lead others into the materialization of that vision. Creativity is rough appreciating the concepts overriding the creative process, which governs our creative deeds. Visionary leader is able to associate the entire globe as it is and the environment that will be influenced by that vision.It is important to study leadership because it is a fundamental part of human conditions. Leadership deals with managing people, therefore, leaders need to understand the traits of employees. Leadership is an art because it can be substantial and enhanced. This is because it is easy to study leadership skills and techniques (Denhardt, 2012). The leadership I posses is transformational style because this type of leadership advocates for what would be referred to us intellectual stimulation. Offering a room for creativity free from many red tapes predisposes leaders followers to a greater level of confidence. As a leader, it is better to be feared because it is easy to observe control, make popular decisions, and give

Friday, April 19, 2019

Promoting health literacy for children in a developing Country Assignment

Promoting health literacy for children in a developing Country regarding gastro-enteritis by way of primary and secondary care - Assignment Example stomach flu is one disease that affects infants, children and adults. The disease is common in both the developed and developing countries. Notably, callable to the inadequacy of appropriate resources and machinery, the developing countries may lack the knowhow and the technology to identify the disease. This essay focuses on the illiteracy base in this country, it tries to devise ways in which awareness can be promoted. This study ventures into the field of health issues and focuses on the impacts of health illiteracy across the board in the society with some emphasis make on the effects of Gastroenteritis in children. Health literacy according to US Library Of Medicine (2010) is the aptitude to read, understand and act on medical guidelines. It involves the ability of the public to understand various disease symptoms, and stage th e prescriptions as instructed by the health officer. Gastroenteritis is one the major killer of children above 5 historic period, BMC prevalent Health (2007) estimates the mortality number of children under the above age to be between 450,000 to 700,000 each year. other 2 million kids are hospitalized every year due to the disease. The disease in previous years took the lives of more children than the number quoted above. In the recent years the number has reduced considerably due to the presentation of vaccines. Notably, Gastroenteritis is a disease of the gastrointestinal tract which inflames the system leading to symptoms of diarrhea, vomiting, cramping and severe abdominal pains. The virus responsible for the disease is known as rotavirus in children, norovirus and Campylobacter in adults. The disease is not likely to be caused by bacteria or parasites. Notably, the disease is more present in the less developed countries due to the low hygienic standards. This includes conta minated water since less developed countries do not have the demand resources to improve water circulation hence making the disease more prevalent. Secondly due to the lack of right-hand(a) food sources and poor living standards less developed countries with per capita income of less than a dollar, citizens may eat peaked(predicate) cooked food which in turn results into Gastroenteritis. According to MacDonald. et al (2012) most of the cases of Gastroenteritis are in children in less developed countries. This is a result of the scarcity of health centers where medical care is limited, According to GlaxoSmithKline (2012) notes that the contagion rate of the rotavirus gastroenteritis is similar in both developed and developing countries, the provided difference is the measures interpreted to improve the hygiene, sanitation and living standards. This has a hand in reducing the causes of the occurrence of the disease. As quoted earliest the quickest solution to curbing the feast o f the disease which according to research can be spread from one person to the other is through vaccination. The developed countries can easily access vaccination medicate since they have enough capital and better policies to govern such institutions unlike developing countries who not only struggle with economic development but also do not have enough resources to ply for the upcoming national problems. Consequently they are left at the mercy of international organization such as the red cross, Used and AUSaid which chip in their support when the situation has been aggravated and it is in the brilliance of the international and regional media stations. Children affected by the disease require close care and affection.

Explorer Essay Example | Topics and Well Written Essays - 500 words

Explorer - strain ExampleLittle did we know that this peculiar personality of his could be a problem solver and thus far a life-saver.This happened when we went hiking. We used to do an overnight hiking and do camp outs in the forest. We al sterilize know the office of what to bring during a camping. The tent, blankets, insect repeller, even first aid kit were almost always ready for us to bring as a logistical support. For food, we bring ready to fan out canned goods because of its convenience. notwithstanding this once instance where unrivaled of my brilliant cousin did the grocery and chose to buy canned goods which does not scram the automatic opener (the protruding level like thing that we just have to pull to open the can). Now we are the camping site, miles away from home and in a middle of a night, starvation and we are presented with a problem how can we eat our canned goods when there is no opener. No one in addition brought a can opener because we are used to the idea that canned goods has its own opener.It was a problem solving situation. Our uncle threw the problem to us for us to find a solution. The solutions that were presented ranged from anecdotal to ridiculous to irritating. A cousin proposed that we skip the dinner for the night as a means to fast. I was hungry and so are other cousins so nobody agreed with his idea. another(prenominal) bright idea from a cousin who could put us all in danger was putting the canned goods in fire hoping that the genus Oestrus inside will open the can itself. We are worried however that it might explode or we might just render the food inedible by setting the can on fire. Another idea that was suggested was to smash the can so that it will open. For sure it will open only that we also cannot eat its contents.Until Jim made his typical smirk which we already know he is into something. He brought out his privates and put it on the lid of the canned good (it was spam, I think). Then Mark get it, he imm ediately jump out of seat and used

Thursday, April 18, 2019

Budgeting, Costing and Casemix Essay Example | Topics and Well Written Essays - 1250 words

Budgeting, Costing and Casemix - Essay Exampleas the NPV is slight than zero so it is not advisable for the university to invest in this project. Had the NPV been greater than zero it would make sense experience to invest in this venture. Question Five divorce (a) The state of revenues and expenses for the hospital are as shown in the circumvent below Revenues Direct Indirect 16 5.5 1.5 5 3.3 3.8 6 2.8 1.6 - - 4.4 - - 2.55 27 11.6 13.85 Projected gain ground 1.55 Note All values in millions of dollars. Therefore the hospitals projected profit for the 2010 monetary year is $1.55 million. Part (b) The allocation of indirect cost to the patient services departments are indicated in the table below along with the agreed cost drivers. Indirect Cost Cost Driver Cost (Millions of Dollars) financial Services Patient Revenue 1.5 Maintenance Space Utilisation 3.8 Housekeeping Labour Hours 1.6 Administration profits Dollars 4.4 Personnel Salary Dollars 2.55 The breakup of the indirect c osts to apiece department is described below. Accounting Salaries split up equally amongst all common chord departments, therefore cost to each department is 0.5 million dollars. Maintenance divided up amongst all three departments found on space utilisation (covered area), cost to each department is indicated in the table below surgical incision Space Utilisation (square meters) region of Total Space Cost (millions of dollars) quotidian do 199,800 66 2.525 Laboratory 39,600 13 0.50 radioscopy 61,200 20 0.774 Housekeeping divided amongst all three departments based on labour hours utilised, cost to each department is indicated in the table below Department Labour Hours Percentage of Total Cost (millions of dollars) Routine Care 76000 84% 1.34 Laboratory 6000 7% 0.105 Radiology 9000 10% 0.158 Administration divided amongst all three departments based on salary dollars utilised, cost to each department is indicated in the table below Salary Dollars Percentage of Total Cost (mi llions of dollars) Routine Care 5,709,000 56% 2.47 Laboratory 2,035,000 20% 0.879 Radiology 2,439,000 24% 1.05 Personnel divided amongst all three departments based on salary dollars utilised, cost to each department is indicated in the table below Salary Dollars Percentage of Total Cost (millions of dollars) Routine Care 5,709,000 56% 1.40 Laboratory 2,035,000 20% 0.50 Radiology 2,439,000 24% 0.60 Part (c) The allocation method utilised is well reasoned and makes a lot of sense on story and on ground. The accounting salaries would in principle get divided amongst all three departments equally. The maintenance costs would get divided amongst all three departments based on the floor space allocated in principle. all the same it must be taken in mind that the routine care department would have olive-sized equipment that would require large maintenance costs but the laboratory and the radiology department would furnish such(prenominal) equipment e.g. centrifuges, x-ray machines and the like. Therefore using total space occupied alone would not really glow the state of maintenance expenses alone because routine care would always assume more space while laboratory and radiology would use

Wednesday, April 17, 2019

Fraudulent Financial Reporting and Ethics at WorldCom Case Study

Fraudulent Financial describe and Ethics at WorldCom - Case Study ExampleAs a result, the friendship incurred very upstanding losses. These enormous losses meant that the business could not attain standards set by stock exchange analysts (Kaplan, Robert, and Kiron, 2004).WorldCom obstinate to hide these losses and buy time so that they could pay their expenses later. WorldComs senior management resorted to double-tongued practices to conceal these losses. The company agreed to founder intentionally misappropriated over $3.8 trillion. This amount was a chore cost liability, but it was reported as a long-term capital investment. Line costs be funds that WorldCom paid to other telecommunication companies to lease their communication networks. Line costs were supposed to be as current liabilities in WorldComs profit and loss account. In 2001, $ 3.055 billion was said to have been wrongly assigned by the company. A sum of $797 million is supposed to have been allocated in 2002. Wor ldCom claimed that $14.7 billion was reported as line cost during the year of 2001 (Kaplan, Robert, and Kiron, 2004).Having allocated the expense as a capital investment, WorldCom change magnitude its net annual income. This is because the line cost, a current liability, was inaccurately reduced. Following this, there were increments in the company assets since capital costs are considered investments. On 8th August 2012, WorldCom to have used its financial reserves wrongfully. Reports revealed that WorldCom used funds in reserve accounts to pay line expenses. Reserve accounts hold precautionary bills for companies to use in case of an unforeseen event. The United States Stock Exchange Commission requested WorldCom to assistance financial reports suspected to be.

Tuesday, April 16, 2019

The End of the War is Just the Beginning Essay Example for Free

The End of the War is Just the Beginning EssayIn the world of poetry, the roughly inspirational topics ar very much the or so tragic. War is one of those subjects that evoke a bottomless rise of stories, opinions, and emotions. Leningrad Cemetery, Winter of 1941 and Dulce et Decorum Est are two examples of poesys centered around difference with several(predicate) perspectives on contend itself.In the rime Leningrad Cemetery, Winter of 1941, author Sharon Olds flops an account of a visit to a burial site where hundreds of dead bodies lay, victims of the siege on the city of Leningrad in World War II. The image is further change by the fact that since the ground is frozen, the corpses are unable to be buried. The overall effect created by this poem is to show the brutality of that sentence on and off the battlefield, as well as to convey the put across that there is no hiding from the truth the world is non a perfect place. The handling of metaphors and similes, vocabulary, sounds of words, and intimately importantly, the overall tone communicates harsh details. Though distributed through prohibited the work, these features are sometimes concentrated in circumstantial pieces my guess is to create a strongereffect en masse.Though written without stanzas, I could see this poem being divided into four separate parts. The number 1 part serves as an objective take hold of of the burying ground itself and describing the image before the speaker unit unit. The first line That winter, the dead could not be buried (1) creates the sort of trespass that Olds wanted to have carried throughout the intact poem. This unflinching depiction of truly gruesome scenes is what makes this piece so powerful. Readers are given an image of bodies lying in the cold and then told that the coffins were burned for firewood and that the gravediggers too hungry(p) to work. This is, to say the least, a very bleak picture. When I read the next section, the s sou nds filled me with a bit of a chill like I could feel the cold of the winter there.So they were cover with somethingand taken on a childs sled to the cemeteryin the sub-zero air. (5)This is an example of one of the m some(prenominal) tactical gentlemans gentlemanoeuvre used by the author to further draw the reader in and make the poem to a greater extent of an involving experience and not just some words on a page.The next defining section comes with the description of the corpses themselves, though not in a the same grisly detail-filled way as would be suspected after what had been written so far. Although the overall descriptions are tragic, they are camouflaged by metaphors and similes relations with affirmative messages in an attempt to pull absent from this grim spectacle. Corpses wrapped with dark cloth and dress circle are compared to a trees ball of roots/ when it wants to planted(8) an image often associated with the beginning of somethings life, not the end. The same raw(a) comparison is found in the next sentence when those wrapped with sheets are associated with cocoons that will split vanquish the center/ when the recent life inside is prepared (11). Another very positive outlook on the current situation, but also very out of place, especially considering the diction used later to pull the corpses as, pale, gauze, tapered shapes/stiff (10).However, the work then takes a complete let go ofaround and changes positions very quickly, taking the antithesis of the earlier comparisons by associating the bodies with inanimate objects naked calves/ hard as pile wood(14). Its as if the speaker is returning top to the reality of the present situation from the temporary escape the speaker had just made with his positive descriptions and allusions to new life. The use of sounds of words is used once again, but with a sharp k sound to evince the harshness of the surroundings.But most lay like corpses, their coveringscoming undone, naked calveshar d as corded wood spillingfrom under a cloak, a hand reaching out (15)This harsh alliteration gets cover song to and more closely follows one of the original motivations of the poem, to shock and disturb readers.The last part of this poem, without a doubt, holds its most powerful image and in turn its most powerful message serving as the lift out example of the pieces straight forward and introspective tone.From under a cloak, a hand reaching outwith no sign of peace, wanting to come back even so to the bread made of glue and sawdust,even to the icy winter, and the siege. (18)Throughout this work, there are a number of references to death and life, ends and beginnings, but this is the besides mentioning of a longing to return to life from death. It strongly communicates the nous that any sort of life that the reader is leading, no matter how bad, is a life nonetheless for which he or she should be grateful. Here these corpses lay and would give anything to be a break, even if it meant living in this awful place under these terrible conditions. Its better than death.The use of general and formal features ex sheers both the speakers attitude towards the scene at the cemetery as well as creates a stance on Grays theories concerning the lust of the ticker. The two practically overlap because the goal of the work is to amuse the scene that caught the speakers eye in the first place. Then relay it to the audience and capture them with the lust of the poetic ear. Shock and amazement are prevalent throughout this piece, especially in the end and the sight of the outstretched hand.Though different from Grays birds-eye and impersonal images of power and destruction, these grisly images evoke the same lust of the eye in the speaker and upon viewing them, he tries to delude himself. By comparing the images he sees to more positive visions he can relate to, such as the butterfly cocoon and the trees roots, he feels more comfortable, it calms him. These ideas are but f leeting, though, and he is brought back to cause that the world is no longer perfect. It is as he sees it and no more, and that is overall message. There is no escape from the truth.In the poem Dulce et Decorum Est, author Wilfred Owen provides the reader with not just one, but two entirely different views on war, both of which vary greatly from Olds. scripted in an as it happens type style, the piece depicts a group of soldiers caught in the middle of a mustard gas attack during World War I. Owen then switches gears and describes the aftermath of the assault with a cynical view not apparent in the first half of the poem. The purpose and overall effect of this poem is govern the reader that the messages created by the media are wrong and that dying for ones country is not a glorious thing. This idea cant be truly realized unless one has looked death in the face personally. The use of tone, imagery, diction, and stanzas are crucial in getting this straits across and I have pointe d out where and how they are utilized.The first thing that struck me about this poem was the impact created by the imagery used by the author. manage the Leningrad cemetery, this view it is powerful in scope plainly filled more with effect and allows less time for reflection by the reader. The first scene is described as a group of soldiers returning from battle Bent double, like old beggars under sacks,/ Knock-kneed, coughing like hags, we cursed through the sludge, (2) Moving as this image is, it is somewhat ironic that the imagery can be so powerful when you consider that out-of-pocket to the gas, the senses of the speaker and his companions are practically inoperable.This somehow enhances what the reader experiences. I say this because if these soldiers could take everything in, it wouldnt be any great surprise for them because they were so desensitized to war, a familiar concept felt in Olds poem. I often viewed the speaker in the Leningrad cemetery as being someone like a reporter or gravedigger that no longer sees the bodies as the truly lay. He can only see the images that the bodies remind him of. However, by describing normally insignificant events of battle going on around those numbed physically and mentally, the audience is given a clearer picture of what the world they are living in is like. Drunk with fatigue deaf even to the hoots/ Of foil shells that fell behind (8). Bombs fall around them and they pay no heed. This ignorance lasts not for long though. botch Gas Quick, boys An transportation of fumbling/ Fitting the clumsy helmets just in time (10). This surprising interjection of action breaks the ambience of the background noise and the silent solace in which they marched. Inventive and unorthodox diction is trusty for making some of the most profound statements in this section that much more noticeable. Not only for the scenes these words help to create, but to make the reader stop and question their usage.The use of the word ecstas y to describe the fumbling of the gas mask caught my eye. Whether we should view this as comical or just plain hopeless leaves the audience uncertain what to feel and in a way temporarily pulls the reader away from the seriousness of the current situation. But someone still was yelling out and stumbling/ And floundering like a man in fire or lime (12). Gripped with a fear for his own life and the gravity of the moment, the speaker can do nothing but watch his comrade guttering, choking, drowning (16). Another example of how the power of the diction fuels the fire of the emotions already being felt by the reader. Its after this point that the speaker reaches his breaking point and realizes that things will never be the same.The stanzas, which had been similar in length and mostly objective, take a dramatic turn in the last half of the poem. After watching his companion die, a new stanza starts only two lines in length. As in the first poem, the last part of the work takes a turn to make an overriding point with just one image. In these sentences, the speaker stops reflecting on the prehistorical and talks about the present. In all my dreams, before my helpless sight/ He plunges at me, guttering, choking, drowning (16). We realize that for the speaker, this war has never really ended for him, but just keeps getting replayed over and over in his head. He knows hell never be able to shake that image and expresses his feelings in the final stanza.In this last and most important paragraph, time slows down and the memory burned into the speakers head comes bubbling to the surface, as fresh as if he had seen it yesterday. He accounts, with gruesome details, the body of a dying soldier flung in the back of a cart. A man whose slow death he had been witnessing for the past few minutes and was unable to help. He was now on his way to being just another statistic and the all the speaker could do was watch. And watch the white eyes writhing in his face/ His hanging face , like a devils sick of sin (20). It is here that his tone becomes obvious and he relays to readers his belief about war and that the eminence so often talked about is absent when it comes to dying on the battlefield. As General Patton once said, No man ever died for his country. Go out and make some other man die for his country. two of these poems strongly emphasize the aftermath of war more than the grand spectacle itself. Its this shared factor that in a way negates what Gray says about the lust of the eye and becoming separated from the world by the panoramic and jaw dropping sight of battle. Though neither of the poems disproves this idea, both Olds and Owen focus on a different lust of the eye, one having more to do with what is seen at the end and not so much during the divergence itself. The images of the dead create a lasting impression in the readers minds that as uncomfortable as it may be, must be a thousand times worse for a material witness. It gives me a whole new respect for veterans. I no longer appreciate just what they did, but what they have to live with.

Monday, April 15, 2019

Capital Punishment Essay Example for Free

enceinte Punishment bear witnessAn eye for an eye, makes the whole world blind, Mahatma Gandhi. When the murders of today are murdered by the government, is that not hypocrisy? Capital punishment is legal in 32 U.S. states. Capital punishment was a punishment for many felonies below English common law, and it was enforced in all of the American colonies prior to the Declaration of Independence. Since 1976 lethal shooter has been the primary method, although electro melt offion, gas chamber, hanging, and by firing squad are still legal and practiced in some states. The close penalty is barbaric and unethical. Innocent lives are being taken away. U.S. tax payers funds is th speechn go forth the window. Capital punishment laws should be abolished in the entire linked States.Studies have consistently failed to demonstrate that operations deter people from committing crimes. (Death punishment Information Center) As we sit in a instrument panel box playing God, deciding who must live and who must die, we hand out the decease penalty to teach society a lesson. We step into the shoes of a God and pass an irreversible purpose to mask our pain or disdain. Why kill people who kill people to show putting to death is wrong? This is hypocrisy. In our judicial system, we do not rape rapists, make drunk drivers stand in front of a speeding car, or chop off the thieving hands of some matchless who steals. In Muslim practicing countries, the harsh punishment used to deter humans from stealing is to have the thieves hand cut off. This practice does not deter thievery and is considered barbaric and irrational in todays American society. For some reasons unknown, we quicken to a revenge mentality society when man kills man. A family who has lost a loved one due to a murder, will not find closure from the killers death. They will find closure with word sense and forgiveness in themselves. We cannot take away the life of another who may or may not be wicked of a cr ime.Consequently, unimpeachable people have been convicted and executed. The wrongful execution of an innocent mortal is an injustice that can never be rectified. Any error rate is wholly unacceptable, when we are talking about lifeand death. Since 1973 the U.S. has released 144 prisoners from death row because they were found to be innocent of their crimes. (Amnesty) Wrongful doctrine causes range from eyewitness error, to government miscount, false confessions, informants, mishandled evidence, improper forensic evidence, and bad lawyering. Capital punishment is as well discriminatory towards minorities, poor, and the mentally ill. Africans make up about half of all homicide victims. Glenn Ford, a black man, was released utmost month after 30 years on death row in Louisianas notorious Angola prison house for a crime he did not commit.As a result of his poverty, Ford was assigned both lawyers to represent him at his capital trial -the lead attorney was an oil and gas lawyer w ho had never tried a case criminal or civil to a jury. The second attorney had been out of law school for only two years and worked at an insurance plea firm. As oft snips happens in capital cases, the prosecutors used their peremptory strikes to keep blacks off the jury. Despite a very purposeless case against him, Ford, defenseless before an all-white jury, was disapprobationd to death. (ACLU) Ford is just one of many people who were found fineable beyond a reasonable doubt in capital and non-capital cases, but were actually not guilty at all. Once an inmate is executed, nothing can be done to make amends if a mistake has been made.Additionally, the death penalty is a huge cost to taxpayers. Sending someone to death row in the United States cost roughly $5 million, because the government takes the burden of paying for both sides. With appeals, and execution costs, death row is around $4 million more than an adult serving life in prison. The Constitution requires and long and complex judicial process for capital cases. The process is supposed to ensure that innocent men and woman arent wrongful executed, yet even with that the risk of executing an innocent person isnt completely eliminated. Death penalty cases consume a good deal extra prosecution and law enforcement staff time because much additional work must be done. Prosecutors must investigate and prepare aggravating evidence for show in the sentencing phase of the trial, respond to evidence, file many more motions, and spend significantly more time in court than they would in a non-death penalty case. In addition to these staff costs, prosecutors, like defense attorneys, hire experts and consultants, including consultants to assist with jury selection and witnesspreparation. Sheriffs departments must transport defendants and must provide additional courtroom security for lengthy death penalty trials, extra expenses that add up quickly.Indeed, a hire of the federal system found that prosecution costs were 67 percent higher than defense costs in death penalty cases. The same study found that defense costs in death penalty cases were four times higher than in non-death penalty cases. (ACLU) Richard C. Dieter, MS, JD, Executive Director of the Death penalty Information Center, said the following on June 7, 2010, in his testimony before the Pennsylvania Senate Government circumspection and Cost Study Commission, The death penalty is the most expensive part of the system on a per-offender basis. Millions are spent to achieve a single death sentence that, even if imposed, is unlikely to be carried out. Thus money that the police desperately need for more effective law enforcement may be wasted on the death penalty. Every stage of a capital case is more time-consuming and expensive than in a typical criminal case There is no reason the death penalty should be immune from reconsideration, along with other wasteful, expensive programs that no longer make sense. (Death punishment Info)Thus the alternatives are more ethical, just, and less costly than capital punishment. By substituting a sentence of life without parole, we meet societys needs of punishment and protection without running the risk of an irrevocable punishment. Over two-thirds of the countries in the world 141 have now abolished the death penalty in law or practice. (Amnesty) It is time for the United States of America to catch up with the rest of the world and abolish capital punishment forever.Death penalisation Facts. (n.d.) n. pag. Amnesty Usa. Amnesty International, May 2012. Web. 8 Sept. 2014. .No Government Should Experiment with Human Life. American courtly Liberties Union. ACLU, 2011. Web. 08 Sept. 2014. .Testimony of Richard C. Dieter, Esq. Executive Director, Death Penalty Information Center to the Illinois House of Representatives Addressing Innocence and. _DPIC_. Death Penalty Information Center, 2014. Web. 08 Sept. 2014. .

Sunday, April 14, 2019

The European Union Business Essay Example for Free

The European Federal Business EssayINTRODUCTIONFraser eagle butt end take you placesFraser Eagle, a UK based phoner dedicated to hold trouble started in the year 1919. The social club boast of providing the most professional and reliable service with their comfortable bearinges in the UK. Their coach fleet had served more people for vacation and other coach service imaginable.As one of UKs leading suppliers of managed strike and shipping operate, they are able to serve their clients in UK and without Europe. The ships corporation encompassed the basic coach go they chiffonier offer, but the term apotheosis management goes beyond more than just the transportation aspect. The play along employs other reliable function like coach trains in UKs grand central, corporate give-up the ghost and transport requirements, accommodation reservations, both flight and rail ticketing services, and transport contract in their executive coaches, mini-buses, and vetted jade ra tes.Since 1919 the company had dedicated their objectives in providing the best and quality service to travelers in the UK and in Europe. But as any company in the global market, there lies the factor ins of the headache purlieu that accepts the company in umteen of their decision-making processes. The company belonging to the complex and diverse business purlieu of the European Union experienced its piece of transition and adaptation in the changes entranced by the growth and market milieu.In this paper, we will evaluate the factors that influence the company as a leading transport management group. The European Union business environment, being as diverse and complex as it is, poses many opportunities and curses to the businesses included in that particular market. The paper must address these different stinting opportunities and threats to the company so as to general assess how the business environment affects that produce and commerciality of the company.OVERVIEW Europe over the past years has been coping up with the integration of 10 European countries objectively gearing towards a stronger delivery competitive in the global market.(Harris, 1999) The paper set abouts to evaluate the opportunities and threat of the European business environment in the specified company which caters to transport management.In general, the European parsimony is governed by an administrative body called the European commission which aims to integrate the different enterprise policy for the European Union economy. In general, the enterprise policy of the EU is to create an environment and venue for European entrepreneurs. It aims to favor the European environment to contribute to productivity in terms of ontogenesis, job opportunities and wealth necessary to unfold the objectives of the European Council in March 2000.(Mercado, 2001)The High level group chaired by Wim Kok in November of 2004 reported the on-going situation of the European economies to add ress the Lisbon objectives.The European economies targets to reduce the total administrative burden of compound economies of decade key cities, to improve the quality of legislation, to facilitate the rapid emergence of new and small enterprises and the creation of a healthy competitive environment which support the million businesses in Europe.(Darmer and Kuyper, 2000) It likewise aims to ensure the necessities of a competitive community industry, since the EU is compresent of ten key cities, and encourages small and medium enterprises to initiate economic activities.ANALYSIS and DISCUSSIONIn order to evaluate the opportunities and threats of the European business in the transport heavens, the generalised policies governing the EU economy will greatly be used as a referring factor and as a background of the EU economy. The Fraser Eagle Company that is concerned with transport management is an completed company that is influenced by the different economic policies of the EU. The company which has improved its standards and qualifications are concerned with addressing the priorities of the EU economy. Since the company was established in UK and their services are specific in the European nations, the study of its environment merchantman be referred to the different influence generated in its environment.One aspect in which we strike the opportunities laid by the EU economy to the company is generating a proper avenue in which the company can constipate to necessary factors in their need to expand and improve their services. One opportunity of the EU is attributed to its environmental requirements that go hand in hand with the appropriate balance of environmental, economic and social objectives.As a transport management group, the must be able to ensure the proper standards of meeting the EU industrial policy. As a solvent, the company ensures the quality and efficiency of their energy and energy consumption that allows them to participate in the growth of their economy striking the balance between environmental, economic and social activities.The EU economy overly encourages growth in productivity by addressing the need of the cultivateing area. Fraser Eagle, along with the improvement of the companys services had addressed this by nonstoply implementing other services that needs and requires other human skills.Starting from the coach services, the company expanded their services by cooperating with Grand Central of UK in providing coach servicing through railway to people. This opportunity brought by the ontogeny economy of the EU had influenced the company to provide this kind of services. The companys goal is to widen their scope of services and the opportunity brought by the Grand Central railway transport system of UK had presented them with that.Another one launched at the age of technology advancement is when the company assiduous a telecommunications service for their clients which aims to address the need of their customers. The EU encourages use of the returnss of communication in the united countries of European nations.Another way that Fraser Eagle handled this opportunity is setting up their own call center that caters to the continuous influence of communication in acquiring their transport services. The customer care program of the company is an halcyon and convenient way for the company to answer the needs and inquiries of their consumers. Also with this motivation, the company had provided another opportunity for work of Europeans.Being dynamic and global as it is, the EU had proposed several additional policies that encourage the companies to invest in languages that is proven to boost competitiveness among the companies included in the EU economy. Reports of the European Commission have verbalise that more European companies lose their business due to the lack of language skills. As the European Commissions repartee to this, the UK national Center for Languages was used to gener ate the information and to inform the different companies in the EU economy. Fraser Eagle used this information and included this in their e-telecommunications services and this had developed their coherent language strategies. (Mercado, 2001)The transport sphere of the European Union had faced a dramatic change over the course of period the EU was established. Before, the citizens of the different European Nations are denied of transportation to different regions of the country. For generations, the Europeans are denied with this privilege. In context of the economy, the transport sector, whitethorn it be air, land or sea concerns the mobility of economic activities. The transport sector in the EU economy is of great importance.One of the greatest threats of the EU economy is congestion which is 1% of Europes GDP. The transport sector is roughly responsible for this as it contributes to C02 emissions. Jacques Barrot, the Commissioner for Transport of the European Commission entails that meet all the challenges of the EU in terms of environment, oil dependency, congestion and road safety, transition is the seen solution to address these challenges.(Harrison et al., 2000)The transport sectors innovativeness can greatly affect the future of the economy and discovery the many advantages that the transport sector can use and utilize. One worthy innovation Fraser Eagle made is manufacturing for and providing Grand Central, Europes main mode of transport coach type trains. The company faced such(prenominal) adversity to begin with in talking with the Grand Central authorities for acquisition of their services but with persistent efforts, the company had closed and deal.Now with ten members states in the European Union, transport management services of the company allows greater profitability and provision for people to acquire their services. Europeans now has the freedom to travel and that is one of the greatest opportunities the EU business environment and poli cy contributed.For the threats, congestion was addressed as one of the challenges seen in the integration of ten key cities of the EU. It will be a pursuit for the company to widen the scope and area to which they can offer their services and also to make the services available to a greater number of consumers. thither is also the continuous motivation to ensure the growing number of traveling individuals their safety thus the attempt to address the need for road safety in Europe.A transport growth forecast expects the payload transport to increase by 50 percent in the year 2020. Also this consequently adds to the 35 percent increase in passenger transport in the same predicted year. The challenge of the European Union is to address the greater number of people to cater too because of a more unified economy. there must be a strengthened effort to address the need for growing population and growing number of potential consumers.Changes in the European market have disadvantages and advantages in an established transport management company like Fraser Eagle. EU encourages the small and medium enterprises to bravely face the competitive EU economy. given over that Fraser Eagle is already well established, the competitiveness and spirit of small and medium enterprises encouraged by the EU can pose as a challenge for them. Several scenarios of which entail that SME can propose newer services that the Fraser Eagle does not have and thus incurring a loss in profitability. The SME can also be a reflection of the companys strength and weaknesses. A SME smart enough to see what the company lacks will take the opportunity to present it to the growing and diversified population and consumers. Fraser Eagle also will have difficulty in adjusting to the European Commissions policy on deindustrialization. In this process, Fraser Eagle will have to effectively deliver the demands of the policy in terms of the reduction of fogey fuels and other materials employed in their se rvices. Being a transport management company that is very much influenced by this factor, Fraser Eagle will have to adhere to the EU policies.Given that innovation and competitive environment the EU is promoting, Fraser Eagle will indeed face many other competitors in the market. The competitive advantage of the company relies on its history and innovation practices but there still remains the challenge posed by the increasing number of key players in the EU economy.CONCLUSION AND RECOMMENDATIONThe integrated economies of the ten members of the European Union have led companies to deliver the most diverse and asset in the growing economic community of the EU. The sustainability of the economy of EU relies on how companies treat and adhere to the opportunities and threats of the policies and nature of the business environment of the EU. One key aspect is innovation.Fraser Eagle will remain in its competitive stance if innovation persist and is adapted. The company had already taken m ost of the opportunity of the EU, including the greater number of consumers that rely on their transport management service. They had also used the great advantage of technology in competing with other transport service companies. The main threat of a unified economy is that the economic activities become homogenous and captive in Europe along, in and between the member countries. This limits the number of competition and key players that can affect the growth of its economy.There should be further study on the implication of the opportunities and threats of the European Union environment in different aspects of the society. Like mentioned, as business-oriented as the policies are, a study regarding how these opportunities and threats are perceived and sure by the companies part of EU. There should also be study of the internal challenges of EU in response to the opportunities it gives to the business sectors and the threats that limits the capability of the companies to expand an d increase their opportunity to profit.BibliographyBULCKE, D. V. D., ZHANG, H. ESTEVES, M. D. C. (2003) European Union direct investment in China characteristics, challenges, and perspectives, refreshing York, Routledge.CALOGHIROU, Y., VONORTAS, N. S. IOANNIDES, S. (2004) European collaboration in research and development business strategy and overt policy, Cheltenham, UK Northampton, MA, E. Elgar.CRANE, F. A. A. MATTEN, D. (2004) Business ethics, a European perspective managing corporate citizenship and sustaintability in the age of globalization, Oxford New York, Oxford University Press.DARMER, M. KUYPER, L. (2000) Industry and the European union analysing policies for business, Cheltenham, UK Northampton, MA, USA, Edward Elgar.DAVIES, P. G. G. (2004) European Union environmental law an introduction to key selected issues, Aldershot Burlington, VT, Ashgate.DUTTA, S. (2006) The information society in an enlarged Europe, Berlin, Springer.EL KAHAL, S. (1998) Business i n Europe, McGraw Hill.GREENWOOD, J. (2003) The challenge of change in EU business associations, Houndmills, Basinstoke, Hampshire New York, Palgrave Macmillan.GROSSE, R. E. (2005) International business and government relations in the 21st century, Cambridge New York, Cambridge University Press.HARRIS, N. (1999) European Business, Macmillan Business.HARRISON, A. L., DALKRAN, E. ELSEY, E. (2000) International business global competition from a European perspective, Oxford New York, Oxford University Press.KASHMERI, S. A. (2007) America and Europe after 9/11 and Iraq the great divide, Westport, Conn, Praeger Security International.MATTHAUS-MAIER, I. VON PISCHKE, J. D. (2005) EU accession financial sector opportunities and challenges for Southeast Europe, Berlin New York, Springer.MERCADO, W., R. AND PRESCOTT, K. (2001) European Business, FT Pitman Publishing.OXELHEIM, L. GHAURI, P. N. (2004) European Union and the race for foreign direct investment in Europe, Amsterdam capit al of Massachusetts , Elsevier.RICHARDS, E. L. (1994) Law for global business, Burr Ridge, Ill., Irwin.SCHADLER, S. (2005) Euro adoption in Central and Eastern Europe opportunities and challenges, Washington, D.C., International financial Fund.SMITH, M. E. (2004) Europes foreign and security policy the institutionalization of cooperation, Cambridge, UK New York, Cambridge University Press.TRASER, J. (2006) European Citizen Action Service Whos Still Afraid of EU Enlargement. Bruxelles, Belgium, ECAS.WINK, R. (2004) Academia-business links European policy strategies and lessons learnt, New York, Palgrave Macmillan.

Saturday, April 13, 2019

Our Teacher, Our Hero Essay Example for Free

Our Teacher, Our Hero EssayYouve break-dance changed being naughty devilishor else youll hurt not just me Carl Now, start cleaning our roomYou do you work mightily then you may go now, okay? Thats a very normal incident in a Freshmens atmosphere. We cant deny the reality that 1st year level is infra adjustment period to the new world they have just bewildern inthank you so much for all the very patient kind teachersThey perform their being 2nd parent to usI love my Teachers as they love us,They take their livesto their duties rolesThey are very noble One of our darling Teacher that inspires us is Miss KendallHer life story is so sad. Her father left her when her m another(prenominal) got sick. She is unflurried single at the age of 32. She must work hard for her sick mother. She also helped her brothers sister in their schooling. She told us that she has many dreams for her family for her career as a teacher thats why she is not still ready to get married to her boy friend. She told us that shes not yet ready to balance training having family of her own.Uuuuuyyy, uuuuyyyyyyMaam haWe saw your bf this morning Maam KendallUuuyyyyYoure a thoroughly match MaamYour pretty his handsomehe-he-he Sssshhh, sssshhh train teasing me girlsWere still under knowing each otherhe-he-he But Maam really youre a good match satisfy dont forget to invite us Maam on your wedding, okay?He-he-he Pretty sure, we will all be there Maam Sssshhhaaa, sssshhhaaaThats enough now. Lets have your practice for your LitMus Pieces nowPlease retrieve the other candicates Chris Okay Maam, Ill call them outsideSusan, Alfredpls. get inside nowwere getting ready for our practice now Now, lets start with Alfred for his vocal solo misrepresent now Alfred (Alfred singing his contest song..)(Maam Kendall applause Alfred for his performance) Alfred youre getting better nowbut you still need to practice more, Okay Thank you so much Maam for your not bad(p) supportI promise to do it bette r Its my great joyfulness supporting you in times like thisbe the best you can,okay?Next, lets have Susan for her Filipino Declamation Basilio? Crispin? Mgaanakko? Nasaanna kayo?Nandito n siNanay.Mgaanakko? Nasaan kayo?Basilio? Crispin?BasilioooooooooooCrispiiiiiiiiiiiiiiiiiiiinnnnBravo, bravo, SusanYoure getting better everydayIts another great performanceI know, you can be everybodys beatha-ha-ha Thank you so much MaamIm getting better every day because of your great help Maam KendallIm good because youre also good Maam I agree with you SusanYou, Maam Kendall all teachers are our happiness inspiration in school Thank you also Susan for your kind wordsIt adds joy to my heart as you say itYoure all the causation why I am herehe-he-heChris its your turn nowReady? Yes MaamBallooooooot, BalloooooooootFor salefor sale Nutritious BalloooootFor sale delicious Ballooooot Hey, girl Come hereIll your ballot (Drunk man)How much is ten pieces?Thirteen each Sir130 all in all Sir.What??your over-pricing young girlThats so expensiveheres what is good to your BallotUuummmUuummm Oh no NoPls stop ithuhuhupls stop it SirplsWhat have you than to my Ballothuhuhuwhat have you done? You have no pity, drunkardhuhuhuYoull be paying for thishuhuhu Wooowww awed performance Chrisyou did a great job Your really getting better in your piece Chrispraise I am so happy that you really are practicing so wellThank you so much Maamwe are so happy doing this for all of us MaamWe will try to win in our contest. In a surprise, Rommel rushed hurriedly inside our classroom and telling something bad news to Maam and his catching his breathRommel is Maam Kendalls nephew Tita Ramplease, plsbe in a hurryLola was brought to the hospitalshe was again attacked of her Asthmashe seemed not to account good this time Tita What?My goodnessoh my, oh my Good Lord, pls help my motherPleaseLord God please help her again this timeOkaylets goExcuse me classI should attend my mother in the hospitalTake good car e of yourselfBe home archean Okay?Dont go anywhereGo home early okay? Okay, Maamdont worry about us Maamplease take care also MaamPlease be calm relax Maamwe will help tap to God, that your mother will get better MaamWe were slow while following Maam Kendall on her way to the hospitalwe just stared to each other without any sound from ourselvesI just realized we are all shockedafter a while, I asked my classmates to follow me in my prayers for Maam Kendalls motherWe prayed not just for that arcminute but every moment we pray to God, we include our teachers in our prayersLet us all pray for our Heroes, our Teachers

Thursday, April 11, 2019

The Role Of Security Management Essay Example for Free

The Role Of credentials Management attemptABSTRACTPersonal nurture credential de adjournment is usually considered a technical discipline with much maintenance creation center on motifs such(prenominal) as encryption, hacking, break-ins, and credit card theft. Security reapings such as anti-virus programs and personal firewall parcel makeup, be now avail adapted for end-substance ab exploiters to install on their electronic calculating machines to shelter against threats endemic to meshinged computers. The behavioral aspects think to maintaining green light gage have received unretentive attention from seekers and practitioners. Using Q-sort outline, this thesis exampled disciples as end-users in a graduate business steering gage measure course to ask issues appropriateing cream of personal firewall parcel crossway in organizations. Based on the Q-sort analysis of end-users in relation to seven variables place from come off of the look at warrantor literary works, three distinct group characteristics emerged. Similarities and differences among groups be investigated and implications of these results to IT managers, marketers of credentials package and researchers in in set upion bail ara are discussed.ACKNOWLEDGEMENTSI would like to give thanks my supervisor prof ____________ for his great supervision and guidance throughout the duration of my thesis project.I would in addition like to thank all colleagues for their table service and stick out.Finally, I wish to thank my family for their continued support throughout the thesis.TABLE OF table of contentsPageABSTRACT2ACKNOWLEDGEMENTS..3TABLE OF CONTENTS..4 nominate OF ACRONYMS.5CHAPTER 1 INTRODUCTION6 disputation of the job7 Research Question8 Signifi shadowce of the Research9 Design and methodological analysis.10 Q-Sort Analysis.12 Organization of the reflect14CHAPTER 2- LITERATURE REVIEW14CHAPTER 3 RESEARCH capitulum FINDINGS.18 Data Analysis..18-A nalysis of Results26-Limitations of the Study..29Chapter 4- SUMMARY AND CONCLUSIONSSummary30Conclusion.31 tribute..33REFERENCES..34LIST OF ACRONYMSOperational definition of these variables as it relates to the field of study are appendd execution PERF Refers to how well the parcel operates under non-homogeneous conditions (such as high traffic, references of data, port scans, etc.)Ease-of-use EOU Refers to usability of the crop (such as screen normal and layout, entranceway to induces victimisation tabs, stilltons, etc.)Updates UPDTS Refers to convergence updates at prescribed intervals after crop has been installed and usedFeatures FEATR Refers to the outlet of program options and features available in packetReports RPORT Refers to Intrusion Reports and log files generated by the firewall softwareCost salute Refers to price paid for the product (either as bring down wrapped package or as a download)Configuration CONFIG Refers to setup and configuration after pr oduct has been installedSupport SUPPRT Refers to availability of online help and technical support either by phone or electronic mailInstallation INSTLL Refers to initial installation of the product.Chapter 1 INTRODUCTIONSecurity describes a process of protection from either harm. It withal describes the countermeasures put in place by that process. Harm may indicate a freeing of confidentiality, integrity, and availability. Security focusing focuses on preventing harm resulting from both random acts of nature and intentional strategic actions (Schechter, 2004). Security is considered to be a very important issue while developing complex personal reading systems (Mouratidis et al., 2002).Security is a major(ip) c oncern in todays digital era. The Internet offers a low cost, just when insecure means of r distri simplyively(prenominal)ing people. Owing to the ubiquity of the Internet, it is difficult to control and trace dissembles or attacks by unauthorized people, hack ers, etc. Electronic commerce applications deficiency secure machines for accurate user identification, recovering sensitive database, storing and communicate sensitive selective teaching, etc. Personal identification numbers (PINs), passwords, smart cards and digital certificates are or so of the means normally used for this purpose. However, these means do non really identify a person, except only experience of some data or belonging of some delineated object (Sanchez-Reillo et al., 1999), e.g. habitual key infrastructure (PKI) cannot assure identity of the manager of a transaction, it can only identify the makers computer. An phoney can easily masquerade as a legitimate user and defraud the system.Information mustiness be readily available in organizations for m sameg decisions to support the organizational mission. Murphy, Boren, and Schlarman (2000) state that cod to change magnitude connectivity and the urgency to exchange information and data among partners, suppliers, and customers on a real time basis, the need to protect and secure computer resources is great than ever. As a result, this has created the possibility of exposing sensitive corporeal information to competitors as well as hackers who can now access organizational computer resources from opposed sites.Statement of the ProblemThe potential loss of such information to an organization goes beyond financial losses and includes the possibility of degraded data, denial of work to suppliers, business partners and customers, loss of customer confidence, and lost sales. Security in business processes (i.e., maintaining straightlaced authencetication, authorization, non-repudiation, and privacy) is scathing to prospered e-business operations. Enabling business functions everyplace the Internet has been recognized as a major component for the success of businesses and, by mitigating risks in a cost-effective manner, hostage is now being viewed as a component of business op erations (Deise, Nowikow, King, Wright, 2000). Decisions about information systems made by managers are brisk to the success, and even survival, of a firm (Enns, Huff, Golden, 2003).Despite increased earnest threats, organizations have traditionally allocated very precise of the total IT budget to information aegis. Forrester Research estimates that in Fortune 500 companies, the average amount of gold as a percent of revenue that is spent on IT credential is 0.0025 percent or about less than what they spend on coffee (Clarke, 2002). Organizations must evaluate and prioritize the optimum mix of products and service to be deployed for defend confidentiality (maintaining privacy of information), integrity (maintaining information is not altered in transit), and availability (maintaining access to information and resources) of incorporated assets. The decision to deploy certain technology is ground on variables such as the organizational business simulate, level of risk, vu lnerability, cost, and return on investment (Highland, 1993). there are several ways in which information can be protected. One method to justification information is by exploitation controls. The concept of controls can be applied to financial auditing as well as technical computer protective covering department. General controls include personnel, physical and organizational controls as well as technical warrantor services and mechanisms (Summers, 1997). Computer trade protection department department controls can be hardware or software-based and may include biometric devices, anti-virus software, smart cards, firewalls, and intrusion detection systems that can be used to build the opening move shelter infrastructure. Additionally, these controls may be preventive, detective, or corrective.Research QuestionThis paper ordain focus on one such computer security control Personal Firewalls. Firewalls intercept traffic and make routing and redirection decisions based on policies. Some firewalls can also inspect packets and make transformation and security decisions then, they are critical components in maintaining security in organizations. on that point are different types of firewalls, such as hardware, software, enterprise, and personal firewalls. Personal firewalls are client-based solutions that are installed on backcloth/laptop computers and may be administered individually from a central location. Successful excerption and adoption of firewalls (enterprise as well as personal) is based on various accompanimentors, some of which are technical while an separate(prenominal)s may be behavioral. This exploratory study looks at the recent genre of personal firewalls and, based on the review of the literature, attempts to answer the following research questions1) What are the constituents that could result in successful picking of personal firewalls in organizations?2) What are the empirical evidence to support deployment of firewall sof tware?Significance of the ResearchThe study hopes to shed take fire on behavioral aspects of information security, which may be tied to sensings of end-users who may influence technology selection in their organization. This will picture empirical evidence to an area that has been identified as needinessing in research (Dhillon Blackhouse, 2001 Troutt, 2002) and provide directions and guidance for future studies.An new(prenominal) significance of this study is to look at end-user perception is that it may presume how well the user does his or her part in staying vigilant to combat threats post by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are thusly important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computer science and individuali zed software, and popularity of the Internet in organizations have resulted in users playing an important section in operate IT implementation. Their study im externalizet that for users selecting their own IT applications (such as desktop software programs), there is greater user gratification after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use.This is especially important for personal firewall use because computers are at risk at all generation when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their military rating, selection, implementation and ongoing use of software. However, with the exception of some fresh work, there is little research examining how a user forms his or her perceptions of innovation overtime (p . 16).The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of component parts that would make it practical to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in scathe of knowledge and level of expertise of the user. Selection of software therefore must be done to befit all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997).Organization of StudyThe purpose of this paper is to investigate reflex(a) perceptions of end-users, and use Q-Sort analysis to investigate factors affecting deployment of security firewall software in organizations. The paper is organized as follows review of research on informat ion security is presented to the reader along with extraction of variables from the literature that may determine firewall deployment in organizations The Q-Sort agent Analysis method used for the study is explained and the research design is provided on with data analysis, results of the study are then explained, which is followed by discussion and applications to practice. Due to the nature of research design used in this study, limitations are also explained.Research Design and MethodologySubjects in this exploratory research study were 31MBA students enrolled in a security and Control of Information Systems course. The students came from different backgrounds, such as finance, promiscuous arts, nursing, and computer science. From a business perspective, the course examined implications of information security risks faced by organizations. Although technical issues of security, such as authentication, authorization, and encryption that make electronic commerce sites successf ul in processing business transactions securely were also explored in the course, the primary focus in the course was from a business perspective. on that point was no structured lab work during segmentation, still to gain a better correspondence of security issues, students were anticipate to complete hands-on exercises outside class.During initial weeks, topics covered included the PWC seat, TCP/IP vs. OSI models, network, e-mail, database security, digital certificates and signatures, risk assessment, and privacy issues. Also, during Week 5, students had been antecedently tested on the topics using short-answer type questions to determine schooling competency of factual information and applications related to information security in organizations. The test score counted towards 15% of overall course grade.With coverage of the aforementioned topics, it was safe to assume that students had knowledge of current security issues face organizations in todays economy. Because t here is no consensus on the common body of knowledge acceptable for all security professionals, and since this was an exploratory study, the study was conducted in a controlled environment with ahomogenous population of students to minimize con installing by indifferent variables. Using MBA students as surrogates for professionals or executives in reference to use and evaluation of technology has also been found to be acceptable (Briggs, Balthazard, Dennis, 1996).The hands-on firewall assignment in this course covered installation, configuration, and use of one cadenceized personal firewall software (ZoneAlarm). After students had a chance to use the software, they were asked to participate in the study. No class discussion was conducted on results of the firewall tests in case it affected students perceptions about the software, which could have influenced their response.Therefore, the data reflected individual student perception without class discussions. Students were given o perating instructions to visit a Web site that explained the nature of the study and provided information on how the Q-sort t distributivelyings should be sorted. This was important since students are to a greater extent used to completing questionnaires in a perspective format that use Likert scale, open-ended, or closeended questions (such as those used during end of term class evaluation of instruction), but may not be familiar with the peculiarities of the Q-sort procedure. To reduce data errors and extract usable data, instructions were presented in detail before the respondents were shown the statements for the study.Q-Sort AnalysisQ-sort analysis uses a proficiency for studying human being subjectivity (Stephenson, 1953 embrown, 1980 McKeown Thomas, 1988). It is useful in exploratory research and a well-developed theoretical literature guides and supports its users (Thomas Watson, 2002). Q-sort methodology is suited for wasted samples and relies on theories in the do main area being researched to develop items for analysis. A disadvantage of the Q-sort methodology is that it is not suitable for large samples, and it forces subjects to conform to certain expectations (such as fitting responses within a normal distribution). Brown (1986) suggests that 30 to 50 subjects are sufficient for studies investigating public opinion. Q-sort uses an ipsative (self-referenced) technique of sorting participants statements about natural conditions. It is a variation of factor analysis technique that uses Q-methodology surmise to analyze correlativity measure (Brown, 1980).Respondents to Q-sort studies are required to sort statements into predefined normal distribution type scale in which a fixed number of items fall under each category. The rankings provide clusters of perceptions of individuals consensus and conflict, which can be used to place individuals with standardized characteristics into groups for win study, hi the past, the Q-sort technique used index cards for sorting, but now Web-based data collection programs (such as WebQ) are common. Initially the statements are presented to respondents in random order, and each respondent organizes statements into predefined categories. To view entered data, the respondent also can update statement rankings to see where the statements fall under each category. One advantage of using the WebQ method is that data submission errors are reduced since the program verifies that the statements are sorted according to predefined requirements. lick 1. WebQ questionnaireAdapted from Brown, 1980.In this personal firewall study, the statements were to be classified by respondents as around outstanding (+2), Important (+1), Neutral (O), Less Important (-1), and Least Important (-2). To provide a forced distribution that is expected in the Q-Sort methodology, respondents were given instructions to identify one statement as Most Important, two statements each as Important and Less Important, and t hree statements as Neutral. The instrument used is shown in Figure 1Chapter 2-LITERATURE REVIEWIn the area of information security, research has a good deal lagged practice. Dhillon Blackhouse (2001) have stressed the need for more than empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and stairs interpreted to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent manakin and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy.One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC mode l is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic alternatively than apiecemeal approach. The framework is based on four pillars security vision and strategy, senior management commitment, information security management structure, and discipline and sensation. Within the pillars are decision drivers, development, and implementation shapes. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000).Firewalls can be considered a last line of defense in protecting and securing information systems. woodwind instrument (1988) provided a context for information security systems planning and proposed that reactive and incremental improvement approaches to address security are harbingers of a more serious problem. Other factors identified in Woods model are the lack of top management support, information overload, insufficient staffing, and special(a) resources. Straub and Welke (1998) advocate using deterrence, prevention, detection, and recovery security action cycle to mitigate systems risk and use prioritized security controls. Data on computer crimes is often under-report because companies are not willing to risk public embarrassment and bad publicity. Most companies choose to adhesive friction these incidents internally without keeping documentation or reporting to local, state or federal authorities (Saita, 2001).There is a need for unbiased empirical studies in the information security area that will provide acuteness into problems affecting todays technology dependent corporations and industries. With a strong need to collect and analyze computer security data, the CSI/FBI Computer Crime and security Survey is published yearly (see http// www.gocsi.com). This study provides descriptive statistics but does not attempt to identify relationship betwixt variables, as is expected in analytical surveys. Also, results reported in this annual survey have been identified by the publishers themselves to be potentially misleading due to the limited number of respondents and their accuracy as a result of anonymous nature of the surveys. These results have also been called into question because of lack of statistical or scholarly rigor and self-serving interest (Heiser, 2002). Despite these limitations, the CSI/FBI survey provides a useful role in comparison of yearly data for similar parameters.The area of human computer interface provides a link between the user and software applications. User satisfaction is a function of features, user interface, response time, reliability, installability, information, maintainability, and other factors.If a products user interface catches a users attention and is simple-minded to learn and use, and has the right price and features, then the product may gain competitive advantage (Torres, 2002, p. 15). The theory of user interface design and user involvement in completing task-based actions related to Internet and security software has been substantiated by two studies in which user interaction with peer-to-peer software (Good Kerkelberg, 2002), and PGP software (Whitten Tygar, 1999) were examined. Good and Krekelberg (peer-to-peer study) found that applications connecting to the Internet need better usability and software design to maintain integrity of information stored on a users computer.In this study, individuals assumed responsibility of keeping firewalls operational at all times. This contributed in large part to maintaining effective enterprise security. Whitten and Tygar (PGP study) found that user errors are a significant portion of computer security failures, and advertize concluded that user interfaces for security programs require a usability standar d much different from other consumer software. (Although this study is not instanter concerned with user satisfaction, but is more focused on factors that affect deployment rather than development of end-user software in a specific area, some factors may be directly tied to user satisfaction as will be shown by correlational analysis).Due to increase mobile and off-site access by employees using cable modems, DSL connections, and wireless devices to access corporate resources, personal firewalls are a necessary component to maintain overall enterprise security in an organization. Because of the nature and availability of personal firewall software, about companies choose to acquire it rather than develop it in-house. Software acquirement that results in productivity gains and strategic advantage is of critical concern to organizations, and factors that relate to these benefits must be decently identified and understood for software acquisition decisions (Nelson, Richmond, Seidm ann, 1996). Purchase of commercial software includes identifying requirements, evaluating packages from different vendors, configuring, installing, and evaluating it either as server or client-based solution.This may further involve requirements acquisition that leads to product selection (Maiden, Ncube, Moore, 1997). As a method of selection, professionals in charge of evaluating personal firewall software could draft a feature requirements document, and evaluate vendor products by comparing available features as well as using demonstration versions of software. This would be followed by user experience with the software. As mentioned earlier, the need for user involvement in information systems has been considered an important mechanism for improving system quality and ensuring successful system implementation.It is further believed that the users satisfaction with a system leads to greater system usage (Baroudi, Olson, Ives, 1986). The requirements for software though must be a s measurable as possible to enable product selection and may also use repertory grids in which stakeholders are asked for attributes relevant to a set of entities and values for cells in an entity-attribute matrix. This would produce submitation of requirements in a standardized, quantifiable format amenable even to statistical analyses (Maiden, Ncube, Moore, 1997). In relation to the security area, Goodhue and Straub (1991) found company actions and individual cognizance to be statistically significant in a study of perceptions of managers regarding controls installed in organizations.Chapter 3 RESEARCH unbelief FINDINGSData AnalysisQ-Sort analysis is a type of inverse factor analysis in which the cases (subjects) rather than statement variables (features) are clustered. As recommended by Brown (1980), a procedure that arranged statements based on responses of a single individual was used for data analysis. The responses involved statements of opinion (also called Q-sample) t hat individuals rank-ordered based on the feature requirements in personal firewall software. The arrayed items (Q-sort) from the respondents were correlated and factor-analyzed. The factors indicated clusters of subjects who had be the statement in the homogeneous fashion. Explanation of factors was then advanced in terms of commonly shared attitudes or perspectives. A review of security literature (Hazari, 2000 Northcutt, McLachlan, Novak, 2000 Scambray, McClure, Kurtz, 2001 Strassberg, Rollie, Gondek, 2002 Zwicky, Cooper, Chapman, Russell, 2000) was used to extract the following statement variables relating to requirements in personal firewall software performance, ease-of-use, updates, features, reports, cost, configuration, and support.Table 1. Participant ranked scoresVariable Mean SDPERF 4.45 0.77EOU 3.39 1.08UPDTS 3.23 0.88FEATR 3.03 0.93RPORT 3.00 1.03COST 2.97 1.20CONFIG 2.55 0.85SUPPRT 2.35 0.98INSTLL 2.00 0.89Prior to conducting the Q-sort analysis, ranked scores o f all participants (before identifying factor groups) on each statement variable were calculated for preliminary descriptive statistics. These are shown in Table 1, where a mean score of 5 = Most Important and 0 = Least Important).Correlation between the order feature variables shows a low level of correlation between statements. This indicates there is a high detail of independence between the statement categories as used in the analysis. This finding is important since it supports the assertion that the statements represent relatively independent factors obtained from the review of the literature. In the correlation matrix shown, Table 2 shows significant correlation (p 0.05) between cost and updates, cost and reports, ease-of-use and performance, ease-of-use and updates, and installation and support.Table 2. Correlation matrix between variablesCOST FEATR EOU PERF INSTLL UPDTS RPORT CONFIG SUPPRTCOST 1.00 -0.21 0.27 0.18 -0.13 -0.43 -0.49 -0.08 -0.10FEATR 1.00 -.29 0.35 -0.16 0.06 -0.17 -0.13 -0.25EOU 1.00 0.44 0.00 -0.37 -0.27 -0.20 -0.04PERF 1.00 -0.10 -0.11 -0.13 0.13 -0.14INSTLL 1.00 -0.13 -0.04 0.18 -0.53UPDTS 1.00 0.26 -0.15 0.17RPORT 1.00 1.00 0.03CONFIG -0.24SUPPRT 1.00As mentioned earlier, in Q-factor analysis, the correlation between subjects rather than variables are factored. The factors represent grouping of people with similar patterns of response during sorting (Brown, 1980 Thomas Watson, 2002). Following guidelines for Q-factor analysis, eight factors were initially identified with eigenvalues 1 (an eigenvalue is the amount of departure in the original variable associated with the factor). These factors and their percentage of variance are shown in Table 3.Table 3. Eigenvalues of uncorrelated factorsEigenvalues % Cumul.%1 11.56 37.28 37.282 6.03 19.45 56.733 3.91 12.61 69.344 2.98 9.61 78.955 2.14 6.92 85.876 1.93 6.23 92.107 1.43 4.61 96.718 1.02 3.29 100.00 instruments selected were rotated to maximise the loading of each variable on one of the extracted factors while minimizing loading on all other factors. agentive roles selected for rotation are usually identified by taking those with eigenvalue greater than one (Kline, 1994). However, in this study, the more rigorous Kaiser rule of selecting factors whose eigenvalue is at or above the mean eigenvalue (in this case 3.85) was used. Factors 1,2, and 3, which represented almost 70% of total variance in data, were then subjected to principal component analysis with varimax rotation. Following rotation, a Factor Matrix indicating defining sort (i.e., respondents in agreement) identified three factor groups with similar pattern of responses. The correlation of individual respondents with factors is shown in Table 4 below.Table 4. Factor matrix of respondents (* indicates defining sort)Q-Sort 1 2 31 02386 -0.0398 0.89882 0.0227 0.1971 0.8158*3 0.4975 -0.3790 0.54584 0.8575* -0.2912 0.08115 -0.2639 0.0196 0.7993*6 -0.0614 0.7524* -0.22897 0.4014 -0.1587 0.4678*8 0.1367 0.0728 0.9054*9 0.5351 0.1183 0.6886*10 0.5065 0.3263 0175411 0.5351 0.3357 0.688612 0.8192* 0.7321* 0.103513 -0.6495* 0.3450 -0.084414 -0.0464 0.8598* 0.584515 0.6535 0.0127 0.305316 0.2052 0.2324 0.245217 -0.1340 0.4049 0.951218 0.7553* 0.5865 0.298719 0.2431 0.4049 0.694620 0.5983* 0.5865 -0.033421 0.4660 0.6533* 0.457322 0.5672* 0.1057 -0.334223 0.3501 -0.1001 0.819524 0.1008 0.9240* 0.003825 0.3329 0.0999 0.719426 0.2254 0.6545* 0.132927 0.7660* 0.1246 0.567728 -0.1210 -0.3611* 0.230829 0.3850 0.7032* 0.014430 0.4656 0.5605 -0.319631 -0.1987 0.8988* 0.2470% explained variance 21 22 26From Table 4 it can be observed that for Factor 1, respondents 4, 12, 13, 15, 18,20,22, and 27 were in agreement and are highly loaded on this factor. Similarly, respondents 6, 10, 14, 16, 21, 24, 26, 29, and 30 were in agreement in Factor 2, and respondents 5,7,8,9,11,17,19, and 23 were in agreement in Factor 3.The statements in which these three factor groups were ranked are shown in Tabl e 5.Table 5. Ranked statement totals with each factorNo. Statement Factor 1 Factor 2 Factor 31 COST 0.31 50.91 2-1.45 92 FEATR -0.45 7 0.10 5 0.70 23 EOU 0.91 2 0.63 3 -0.55 64 PERF 1.26 1 1.72 1 1.80 15 INSTLL -1.92 9 -0.31 6 -0.63 76 UPDTS 0.52 3 -0.54 7 0.61 37 RPORTS 0.03 6 -1.28 8 0.55 48 CONFIG -1.07 8 0.12 4 -0.17 59 SUPPRT 0.41 4 -1.34 9 -0.87 8Table 6 shows correlation between the factors. Similar to the findings earlier about variable independence, the factor groups also show a high decimal point of independence.Table 6. Correlation between factorsFactor 1 2 31 1.0000 0.3218 0.29702 0.3218 1.0000 0.22983 0.2970 0.2298 1.0000The normalized factor scores for each factor were examined next. This provided ameasure of relative strength of importance attached by a factor to each statement on the scale used during sorting. Tables 7(a), 7(b), and 7(c) show these scores.Table 7(a). Normalized Factor 1 scoreNo. Statement z-score4 PERF 1.2583 EOU 0.9106 UPDTS 0.5429 SUPPRT 0.4091 CO ST 0.3147 RPORT 0.0322 FEATR -0.4548 CONFIG -1.0715I INSTLL -1.922Table 7(b). Normalized Factor 2 scoreNo. Statement z-score4 PERF 1.7171 COST 0.9053 EOU 0.6268 CONFIG 0.1162 FEATR 0.1025 INSTLL -0.3136 UPDTS -0.5357 RPORT -1.2769I SUPPRT -1.343Table 7(c). Normalized Factor 3 scoreNo. Statement z-score4 PERF 1.8052 FEATR 0.7026 UPDTS 0.6067 RPORT 0.5538 CONFIG -0.1703 EOU -0.5475 INSTLL -0.6329 SUPPRT -0.8721I COST -1.446From the Table 7(a) it can be seen that adherents of Factor 1 feel strongly in favor of statement 4 (Performance) and oppose statements 8 and 5. This indicates for Factor 1 group, performance is preferred over initial installation, setup and configuration of the product. The results of Factor 2 group are un change with Factor 1 that is, performance of the product is the highest rated criterion. Ease-of-use also rated highly in Factors 1 and 2. Perceived ease-of-use in an information systems product has been shown to play a critical role in predicting and determinin g a users decision to use the product (Hackbarth, Grover, Yi, 2003). The largest dissension between Factor 1 and 2 groups involved statements 9 (availableness of Online Help), 7 (Intrusion Reports generated), and 6 (Regular product Updates).The results of Factor 3 are consistent with Factors 1 and 2 with Performance criteria once again being highly rated. The most dissension between Factors 2 and 3 involved statements 1 (Cost) and 3 (Ease-of-use). The most dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help).Analysis of ResultsThe Q-sort analysis classified subjects into three groups. Eight subjects were classified under Factor 1, and 10 subjects each were included in Factors 2 and 3. There were three subjects in the study that were not distinguished in any group. These subjects were excluded from further analysis. The classification into factors gave a better idea of group characteristics. Since Factors 1 and 2 were similar and shown to include subjects who considered Performance, ease-of-use, and Availability of Online Help as the most important characteristics, this group can be considered to be comprised of non-technical users who place more emphasis on the product performing as expected in achieving goals for security. Factor 3 subjects exclamatory technical characteristics and were more interested in number of features in the product, updates to the product on a regular basis, intrusion reports generated by personal firewalls, and setup/configuration of the product after installation. This group had characteristics of technical users.The normalized factor scores provided a measure of relative strength of importance attached by factors to each statement on the scale used during sorting. As mentioned earlier, adherents in Factor 1 felt strongly in favor of statement 4 (Performance) and opposed statements 8 (Setup/configuration) and 5 (Installation). The results of Factor 2 are consistent w ith Factor 1, that is, Performance of the product is the highest rated criterion. ease-of-use also rated highly in Factors 1 and 2. The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates).The most dissension between Factors 2 and 3 involved Statements 1 (Cost) and 3 (Ease-of-use). Results of Factor 3 were consistent with Factors 1 and 2, with Performance criteria once again being highly rated. The largest dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Extreme differences between all factors appeared in Cost, Intrusion Reports generated, and Availability of Online Help. There was only one statement, Performance of the product, that showed consensus among all factors that is, it did not distinguish between any pair of factors, which indicates Performance of the desktop firewall software is an agreed u pon criterion irrespective of group characteristics.The managerial implications of this study can be assessed at the level of selecting appropriate software for use on computers in organizations to maintain security. There is evidence of user satisfaction being a useful measure of system success (Mahmood et al., 2000). While the end-user may not purchase individually preferred software for installation on company owned computers, the user can influence decisions for selection by making known to IS managers the features that would contribute to regular use of security software such as personal firewalls.Given access of these machines to corporate resources, appropriate and regular use of software would contribute to maintaining enterprise security. For technical professionals (e.g., programmers) who install firewalls on their desktop, programs could emphasize the statements that are defining characteristics shown in Factor 3. For an industry that has non-technical professionals (suc h as Factor 1 and 2), other non-technical characteristics of the product could be emphasized thus achieving level best effectiveness in program deployment. Increased awareness should minimize user related faults, nullify these in theory, and maximize the efficiency of security techniques and procedures from the users point of view (Siponen, 2000).The results of this study could also benefit vendors who develop software for end-users. In this study it was found that performance of the software is the most important factor that affects selection of software, irrespective of group characteristics. Due to project deadlines and market competition, software is often shipped without being fully tested as secure, and standard industry practice is to release incremental service packs that address security issues in the product. In a case of security software, this may adversely affect the reputation of a vendor once its products have been shown to have high vulnerability to being compromise d. The findings of this study could provide a better understanding of importance of personal firewall security software on organizational client computers. The decision to install an information system necessitates a choice of mechanisms to determine whether it is needed, and once implemented, whether it is functioning properly (Ives, Olson, Baroudi, 1983).More research needs to be done in the area of selection of software for implementation on users computers that are owned by corporations and given to employees for off-site work. This can include regular employees vs. contractors who may connect to employer and client networks from the same computer. If the findings are to have wider applicability, qualified industry professionals and security officers responsible for maintaining secure infrastructure in corporations should be included in the analysis. The study provides management and security professionals a basis for making decisions related to enterprise security. It provide s personal firewall vendors an insight into feature requirements of the personal firewall market, and provides academic researchers interested in security, a more focused approach on various dimensions of security software from the behavioral perspective. Future studies could be industry and product specific in order to assess differences in selecting general-purpose software versus security specific products.In many cases, management has looked at the need for implementing information security programs and products as a necessary encumbrance, something akin to paying taxes or insurance premiums (Highland, 1993). But organizations are increasingly becoming aware of the potential for lawful exposure via lawsuits, and are deploying countermeasures (such as personal firewalls) to reduce vulnerability and mitigate risk. The chief information security officer in todays organizations should have the responsibility of managing organizational risks by using empirical models and analysis to determine strategies for protecting corporate assets.Firewalls are the last line of defense in the corporate network and therefore play a critical role in information security. With personal firewalls being a new product genre, this study was conducted since there is no research available that specifically looks at determinants for selection of security software in a corporate environment to protect organizational assets. As the information security field evolves further, decisions for security software acquisitions need to be researched further. Selection and deployment of appropriate firewalls can make a significant difference in an organizations enterprise security strategy. It is therefore also important to understand the variables (as shown in this study) that may affect decisions to select and deploy personal firewall software in a corporate environment.Limitations of the StudyDue to the exploratory nature of this study, there are several limitations. The sample used in the s tudy comprised of all students enrolled in a security course at the same university, and was further limited to the firewall topic among a wide range of technical and behavioral information security topics. Students worked with only one type of firewall software and characteristics of this particular program may have heightened their awareness of certain strengths and weaknesses in the software. Since the purpose of information security implementation in an organization is to support business objectives of the organization, information security departments are sometimes placed under the chief financial officer recognizing the direct relationship between information assets and fiscal assets.Software acquisition decisions may therefore be made by the finance department with limited input from the IT department. The purpose of this study was to explore an important topic for research on information security and determine operant subjectivity in a field where empirical research is seve rely lacking. The Q-sort technique itself is suitable for small sample populations (Thomas Watson, 2002), but the correlations obtained in smaller samples tend to have considerable standard errors (Kline, 1994).The exploratory nature of this study was not intended to prove some general proposition but to seek a better understanding of group characteristics that directly relate to maintaining a secure network environment (in this case by deploying personal firewalls to plug possible vulnerabilities that might exist in a network through use of computers by employees either on-site or at remote locations). The perceptions of end-users will therefore guide the selection and deployment of security technologies in an organization to provide a secure corporate environment.Chapter 4- SUMMARY and CONCLUSIONSSummaryIn the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles fo r the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy.One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars security vision and strategy, senior ma nagement commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000).So it is important reason to look at end-user perception as it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use.This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16).The area of information security as it relates to maintain ing confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997).ConclusionsIn this study, Q-methodology was used to define participant viewpoints and perceptions, empirically place participants in groups, provide sharper insight into participant preferred directions, identify criteria that are important to participants, explicitly outline areas of consensus and conflicts, and investigate a contemporary problem rela ting to desktop firewalls by quantifying subjectivity. Similar to other IT areas, security software selection and deployment in todays environment faces many challenges, such as staying current with new threats, project deadlines, implementation issues, and support costs.Quality drives customer satisfaction and adoption of software. Human factors are important in contributing to successful software deployment in organizations, especially when it relates to desktop software applications. Organizations are now viewing security and controls as business enablers and desktop firewall technology plays a critical role in safeguarding corporate assets. In a fast-paced area where the new generation of applications and services are growing more complex each day, it is critical to understand characteristics that affect selection of end-user security products in enterprises.This study addresses a small but important area of safeguarding enterprise information security by using personal firewall s. As has been previously noted, limited research exists beyond the current study that explores behavioral aspects of information security. This study holds importance for professionals tasked with evaluating and selecting security products for company wide deployment. As the area of information security gains increased importance due to the strategic role of technology in organizations, and current events impact areas such as disaster recovery and enterprise continuity planning, a study of end-users to determine their perceptions about selection of technology controls in organizations is critical for protecting organizational assets.More research needs to be done in the area of perception of users towards other security software (such as anti-virus, intrusion detection, virtual private network software, and encryption products), and, due to varying security needs in different industries, studies could also be industry and product specific. While the findings should be considered pr eliminary, the results raise interesting observations about issues uncovered regarding security perceptions of feature requirements in personal firewalls. Information security is a dynamic area and, in this environment, this exploratory study contributes to evolving research by identifying variables from theoretical literature and using an empirical technique to study issues that affect safeguarding vital assets of an organization from internal and external threats.RecommendationIt is recommended that in order to provide better evidence of factors that affect deployment of technology tools that create awareness of security issues and produce better informed employees, research into behavioral factors also needs to be conducted to gain insight into programs and processes that will lead to the development of a robust enterprise security strategy. Information security awareness research has been mostly descriptive and has not explored the possibilities offered by motivation/behavioral theories, or the related theory of planned behavior and the technology betrothal model, specifically in the information security domain (Mathieson, 1991 Siponen, 2000 Legris, Ingham, Collerette, 2003).Since security has been deployed at the perimeter of electronic network and on servers by system administrators, the area of information security has ignored users of information systems since software developers are far removed from how the user will interact with security software. Human compliance with information security rules require an understanding of how people work and think (Highland, 1993). passageway (1985) considers the human factor to be the first and most important component of security and a critical part of the risk analysis process. This is especially true in personal firewall software since the burden of maintaining a secure environment is being shared by the user and the system administrator.REFERENCESBaroudi, J., Oison, M., Ives, B. (1986). An empirical study of the impact of user involvement on system usage and information satisfaction. communications of the ACM, 29(3), 785-793.Briggs, R.O., Balthazard, P.A., Dennis, A.R. (1996). Graduate business students as surrogates for executives in the evaluation of technology. Journal of End-user Computing, 8(4), 11-17.Brown, S.R. (1980). Political subjectivity Applications of Q methodology in political science. New Haven, computed axial tomography Yale University Press.Brown, S.R. (1986). Q-technique and method Principles and procedures. In W.D. Berry M.S. Lewis-Beck (eds.), New Tools for Social Scientists Advances and Applications in Research Methods. Beverly Hills, CA Sage Publications.Chiasson, M., Lovato, C. (2001). Factors influencing the formation of a users perceptions and use of a DSS software innovation. ACM SIGMS Database, 32(3), 16-35.Clarke, R. (2002, February). Forum on technology and innovation Sponsored by Sen. BillFrist (R-TN), Sen. Jay Rockefeller (D-WV), and the Council on Competitiveness. Retrieved October 28,2003, from hap/ /www. techlawjournal, com/security/ 20020214.aspDeise, M., Nowikow, C., King, P., Wright, A. (2000). Executive s guide to e-business From tactics to strategy. New York John Wiley Sons.Dhillon, G., Blackhouse, J. (2001). Current directions in IS security research Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-153.Enns, H., Huff, S., Golden, B. (2003). CIO influence behaviors The impact of technical background. Information and Management, 40(5), 467-485.Gery, G. (1997). Granting three wishes through performance-centered design. communications of the ACM, 40(7), 54-59.Good, N., Krekelberg, A. (2002). Usability and privacy A study of Kazaa P2P file-sharing. Retrieved November 12, 2003, from http// www. hpl. hp. com/shl/papers/kazaa/Goodhue, D.L., Straub, D.W. (1991). security concerns of system users A study of perceptions of the adequacy of security measures. Information Management, 20(1), 13-27.Grantham, C., Vaske, J. (1985). Predicting the usage of an advanced communication technology. Behavior and Information Technology, 4(4), 327-335Hackbarth, G., Grover, V, Yi, M. (2003). Computer playfulness and anxiety cocksure and negative mediators of the system experience effect on perceived ease-of-use. Information and Management, 40(3), 221-232.Hazari, S. (2000). Firewalls for beginners. Retrieved December 17,2003, from http//online.securityfocus.com/ infoc Heiser, J. (2002, April). Go work Can you trust infosecurity surveys? Information security, 27-28.us/1182.Highland, HJ. (1993). A view of information security tomorrow. In E.G. Dougall (ed.), Computer security. Holland Elsevier.Ives, B., Olson, M., Baroudi, J. (1983). The criterion of user information satisfaction. Communications of the ACM, 25(10), 785-793.Kettinger, W., Lee, C. (2002). Understanding the IS-User divide in IT innovation. Communications of the ACM, 45(2), 79-84.Kline, P. (1994). An easy guide to f actor analysis. London RutledgeLane, YP. (1985). security of computer based information systems. London Macmillan.Legris, P., Ingham, J., Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information and Management, 40(3), 191-204.Mahmood, M.A., Burn, J.M., Gemoets, L.A., Jacquez, C. (2000). Variables affecting information technology enduser satisfaction Ameta-analysis of the empirical literature. IntemationalJournal of Human-Computer Studies, 52, 751-771.Maiden, N., Ncube, C., Moore, A. (1997). Lessons learned during requirements acquisition for COTS systerns. Communications of the ACM, 40(12), 21-25.Mathieson, K. (1991). Predicting user intentions Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 3(2), 173-191.Murphy, B., Boren, R., Schlarman, S. (2000). Enterprise security architecture. CRC Press. Retrieved November 2, 2003, from http//www.pwcglobal. comNelson P., Richmond W. , Seidmann A., (1996). Two dimensions of software acquisition. Communications of the ACM, 39(1), 29-35.Northcutt, S., McLachlan, D., Novak, J. (2000). Network intrusion detection An analysts handbook (2nd ed.). IN New Riders Publishing.Saita, A. (2001, June). Understanding peopleware. Information security, 72-80.Siponen, M.T. (2000). A abstract foundation for organizational information security awareness. Information Management security, 5(1), 31-41.Strassberg, K., Rollie, G., Gondek, R. (2002). Firewalls The complete reference. NY Osborne McGraw-Hill.Straub, D.W., Welke, RJ. (1988). Coping with systems risk security planning models for management decision making. MS Quarterly, 22(4), 441-469.Zwicky, E., Cooper, S., Chapman, D., Russell, D. (2000). Building Internet firewalls (2nd ed.). CA OReilly.