Saturday, November 30, 2019

Information security in Small Scale Enterprises

Introduction Scientific innovations and inventions have led to technological advances; the technology has increasingly been adopted in businesses in different areas/processes; however, there are numerous threats brought by the use of technology.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The affordability of computer and computer software has facilitated the use of technology in small-scale business; some of the most used technological advancements within an organization are information sharing systems, enterprise reporting programs, the Internet, and e-commerce. Employing technology in small-scale businesses opens them to myriad of problems; information security is the greatest threat (Wallace, Lin Cefaratti, 2011). This paper discusses how to secure small-scale business from technology related threats. Best information security syst em To have an elaborate information security within an organization, the management needs to develop a security policy; a security policy defines the use and accessibility of information in a company. When making a security policy, it should not be seen as an end user policy, however it should be ongoing and protection adhered to at every stage. An effective security policy provides five important services to the organizations, the services are: Access It offers the users a chance to receive and transmit data within the system while adhering to proper machine and data handling. Confidentiality The policy should respect privacy of information whether individual privacy or corporate privacy. Authentication The system should be efficient in transmitting of information that messages can be traced back with certainty.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Integrity The system should ensure tha t the message sent has not been changed or modified when in transit. No- repudiation The system should ensure that it keeps proper records of the sender and receiver of message, the time of the transmission and the information kept cannot be altered (Yayla Hu, 2011). The process should have a five working principle that the organization should look into, they are: Physical security and lock down all the technological assets When a small-scale business has embarked on securing its information, the initial stage is to regulate physical access of computer hardware like server, personal computers, and other networking and telecommunications equipment. The prevention is from human resources of the company and external users; access should be limited to those people with permission to access the machines. Some of the most common methods of physical security include lock and key, the use of passwords when opening the security rooms, use of fingerprints to limit the access to the computer systems rooms and the use of alarm systems to alert incase of trespass (Hulitt Vaughn, 2010). Physical security is not adequate in itself since the machines will have to be used at one point, a policy that elaborates on the best ,machine and data handling best practices should be implemented and staffs trained accordingly; such a training will assist the staffs have a clear understanding of why they need to protect information within their organization. Process and procedures security setups With the physical security set-up, the management should now focus on technological aspects of the security plan, this are the process and procedures security maintenance to ensure that the information of a company is secure regardless of who has an access to the system.Advertising We will write a custom research paper sample on Information security in Small Scale Enterprises specifically for you for only $16.05 $11/page Learn More The control of the Internet and i ntranet should be prioritized; creating firewalls that limit incoming and outgoing traffic will assist in monitoring and controlling the use of the tools. Fireworks is one of the most known effective methods of controlling internet and internet system, it is able to keep off unwanted messages within the system; however the system does not protect a system form virus and spywares. Since firewalls allow viruses and spywares to operate in the system, then a company should have an effective antivirus and antispyware software; the software should be up-to date and updated through the system without offering some dangers to the system. People with a certain negative intention develop viruses and thus strong anti-virus software should be maintained; the system adopted should be strong enough that can detect virus programs and block them from accessing the system. Small-scale businesses should not shy off from investing in expensive but effective security systems, since the market has some ant viruses that cannot be fully relied upon. Website management and protection One area that small-scale businesses communicate with the outside world is through their websites. It is through the sites that they offer some information and access right of outsiders to their company information. To ensure that data is secure a company must establish ways to protect information that is contained in its website; the approach is seen as an internal and external approach. Internal in the fact that the information offered should be limited and the one meant for public consumption and external in that it protects external users from accessing some information about the company. The kind of data that it posts over the internet should be vetted; information has many users for various reasons, any information posted should target a certain user and the behavior as a result should be speculated. If information is likely to hurt the organization, then it is better not offered, some users of inf ormation for the loss of a company include competitors and people will ill motives. There should be a specific class of people mandated with the role of uploading information in the website; the power to upload information should not be vested in one person, however a team of web-managers should be developed.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More The web master should have the exclusive rights to upload information only after the team has deliberated and seen the move as appropriate. This will require restriction to servers and main computer room (the approach to restriction has been discussed earlier). Another important yet ignored task of web management team is withdraw of information and alteration of information posted in the website. The same staff should be mandated with the task of withdrawing any information that may have gotten to their website either through malice or through mistake before it has tarnished the name of a company (Wibowo Batra, 2010). Using genuine and up-to date software and hardware Technological advancement has made it possible to have some systems that are secure and those that can handle some basic information threats. For example having software that have timeouts when not used can assist a company to secure information that could be accessed when a system is running. In the market, there is the option of buying software/hardware then install security measures and other systems that come with an inbuilt security system. Systems that come with security set-ups are referred to as managed security services or software-as-a-service (SaaS); they come with a warranty that they will secure information for a certain period if used effectively. Small-scale businesses should use such systems since they offer more security and fallback in case they collapse. Alternatively, the developers of the systems are mostly large companies with the resources of developing an effective system; this small-scale business will relatively pay low for quality service (Veiga Eloff, 2007). Upgrading company’s software is another thing that can assist a company keeps away people from accessing some crucial information; for example, an operating system like Windows keeps updating its software to offer better services and protection against some threats. Technology is changing day by day and th us a company should maintain a strong information and technology team that can keep the company with the pace of computer world (CAIN, 2010). Hacking can be prevented by ensuring that software’s adopted by a company are complex in their design but user friendly; hackers have use other software that run parallel to the original software to get information about a company; however using genuine and well developed software can keep them away. This will assist a company to keep away hackers. Many are the times that a system is hacked by information and technology people who have worked with the system and thus know how it operates. To prevent this there should be a responsibility oath enforceable in court taken by information and technology experts leaving and getting into an organization. Secondly, there should be not one center of power; no one should fully understand a system in operation. Checks and balances should be set (Aggeliki, Spyros, Costas Stefanos, 2010). Have data back-up systems To the extremes, information can be lost due to some unavoidable situation; small-scale businesses should have backup systems that will assist them retrieve back information that has been lost. The backup systems are kept in a different station other than the place of operation. Incase data as lost, and then they are used as a fallback. Technology has today reached to a level that lost data can be recovered by use of data recovery tools, though they would require a prior registration; a company should invest in such kind of technologies (Batra, 2007). Employee’s awareness and internal processes control One of the potential areas that information security issues can emerge from is staffs with malice or some who are innocent or ignorant. Managers should ensure that they have programs that train their staffs on the need to have high information security. Other than training, the management should have policies that facilitate the adherence of security of informat ion (Puhakainen Siponen, 2010).. Some of the operations that employees put in the system may be dangerous to the system; there are times that flash disks have been used to transfer information form the company to other places, or employees downloading software’s or installing some software in company computers. This leads to threat of information. To prevent employees from using external gadgets to get information, the management should block the use of USB cable networks, or if they must be used, the crucial information may be formatted to be read-only such that employees will not be able to get the information. Some systems that can be used to manage the access and transfer of information from computer within an organization; they include Windows Registry software which limits the access and transfer of information without authentication (Peltier, 2002). When an employee want to download or install some programs in the system; there should be proper approval and the need f or the proposed software be defined. When the system has been installed, the management should vet and scrutinize it for any threats it is likely to bring to the company. The Information and technology department should be guided by integrity and have the capacity that it can make the system work with optimal security. They have the expertise of creating security policies like the use of passwords and limiting access to computers at individual level. Alternatively, they should register computers under the name of the user thus incase of anything done using the computer, they can trace back. This approach is a psychological or threatening approach where employees will shy off from misusing their computers in the fear that they will be detected and punished if there is a leakage of information via their computers. This increases reliability and employees fee more accountable of the information they have (Asai Hakizabera, 2010). When a small-scale company has decided to implement a se curity policy, some procedure and processes that it must consider are: Know your attackers Before the best strategy has been rolled out, the most important issue to realize is to know the possible sources of information threats; when the attackers are known, as well as they operated, then the company can be in a better position be able to maintain high security system. The approach to security that the company should take is dictated by the tread of the approach and the intent that the information hackers have (Kantardzic, 2002). Determine the pain thresholds With the nature and the tread of the attackers, the system that will be used should be there to frustrate the attackers; determining how long the attackers can go is of importance since the company will develop the strategy that frustrates attackers and probably limits their attempt in the future (Hennie, Lynette Tjaart, 2010). Research of the best method With an understanding of the situation and the attackers to burr from th e system, a company needs to develop alternatives available for the task. The alternatives may be commercial software or sometimes need to restructure the internal controls within the organization. In whichever the situation, a company should aim at implementing the best security approach at its disposal. Some of the potential areas that need to be looked into are Social engineering, internal information control policies, and the vulnerability of the system and the integrity of a company’s employees (Hill, 2009). Rolling out, controlling, monitoring and reinforcing When the best approach has been recognized, then the company should come-up with a rolling out plan, it should be appreciated that developing security systems is like any other change within an organization that need to be strategically planned. The involvement of management in controlling and monitoring is called for (Dhillon, 2007). Conclusion Technology has brought numerous advantages in small-scale businesses; however, it exposes them to information security threats. Data and information held by a company is an intangible asset, thus should be secured and protected; however, some companies have had their private information lost or accessed by unauthorized users. Information management team has the role of establishing an effective information security strategy that looks into internal and external information threats. References Aggeliki T., Spyros, K., Costas, L. Stefanos, G. (2010). A security standards’ framework to facilitate best practices’ awareness and conformity. Information Management Computer Security, 18(5), 350-365. Asai, T. Hakizabera, A. (2010). Human-related problems of information security in East African cross-cultural environments. Information Management Computer Security, 18(5), 328-338. Batra, M. (2007). The dark side of international business. Competition Forum, 5, 306-314. CAIN, A. A. (2010). Information Security a Top Priority. Internal Auditor, 6 7(1), 17. Dhillon, G. (2007). Principles of Information Systems Security: text and cases. NY: John Wiley Sons. Hennie, K., Lynette, D. Tjaart, S. (2010). A vocabulary test to assess information security awareness. Information Management Computer Security, 18(5), 316-327. Hill, C.W. (2009). Global business today. New York, NY: McGraw-Hill. Hulitt, E., Vaughn, R. (2010). Information system security compliance to FISMA standard: a quantitative measure. Telecommunication Systems, 45(2-3), 139-152. Kantardzic, M. (2002). Data mining: Concepts, models, methods and algorithms. New York: J. Wiley. Peltier, R. (2002). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL: Auerbach publications. Puhakainen, P., Siponen, M. (2010). Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 767-A4. Wallace, L., Lin, H., Cefaratti, M. (2011 ). Information Security and Sarbanes-Oxley Compliance: An Exploratory Study. Journal of Information Systems, 25(1), 185-211. Wibowo, K., Batra, M.(2010). Information Insecurity in the Globalization Era: Threats, Governance, and Survivability. Competition Forum, 8(1), 111-120. Veiga, A.D. Eloff, J.H. (2007). An information security governance framework. Information Systems Management, 24, 361 – 372. Yayla, A., Hu, Q. (2011). The impact of information security events on the stock value of firms: the effect of contingency factors. Journal of Information Technology, 26(1), 60-77. This research paper on Information security in Small Scale Enterprises was written and submitted by user Lady Deathstrike to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Free Essays on Animal Cruelty

Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killed† [Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ... Free Essays on Animal Cruelty Free Essays on Animal Cruelty Rabbits immobilized in wooden stocks with ulcers in their eyes; baby seals being clubbed over the head, and the infamous shock treatment. Broach the subject with an individual and odds are that they have witnessed footage of one or all of the aforementioned practices and are appalled by the cruelty. Appalled yes, willing to stand up and voice their thoughts... not often. There is one significant reason for this unwillingness by some to stand up for the rights of our fellow inhabitants of this planet, personal convenience. We are systematically cutting down the last forest that provides their shelter to farm cattle; we dump toxic chemicals and sewage into the waters in which they live; we wear the tusks of the last few of their species on our arms, and we pour cosmetic products into their eyes, rectums or vaginas to determine the harmful effects they might cause on humans, even though the physiological differentiation between humans and the animals they use is durastic. On a daily bas is most people do not see their own degree of unintentional support towards this global dilemma, but when compiled on paper one must question how mankind can, with conscience, commit these acts which shame us as human beings. Animals possess the same kinds of feelings and emotions as human beings, and without anesthesia, they are subjected to the pain as well. Mankind often fails to give animals the respect and rights they deserve, they are treated as lifeless, unfeeling scientific specimens and items that we may manipulate at our own convenience and for vanity's sake. Laboratory research involving animals is cruel and merciless treatment of helpless creatures. No law requires that cosmetics and household products be tested on animals. Nevertheless, by six o'clock this evening, hundreds of animals will have had their eyes, skin or gastrointestinal systems unnecessarily burned or destroyed (Sequoia, 27). Two of the most famous animal tests are the Draize, or ... Free Essays on Animal Cruelty Animal Cruelty Having a household pet can be both rewarding and inspiring. Because household pets are domesticated, they depend on their owner to provide a safe haven for them. When one decides to have a household pet, a great deal of responsibility needs to be taken to provide food, water, shelter and medical attention for the animal. Pets are voiceless and defenseless. They share the world with us, and it is our responsibility to care for the them. Regrettably, some animals become victim to human violence and abuse. Cruelty or abuse is when a person knowingly or intentionally deprives an animal of food, water or medical care, and maliciously tortures, mutilates, or kills the animal [HSUS 1]. Greater awareness is needed in order to help prevent the unnecessary abuse of animals. The majority of the American household family has at least one pet. Under normal circumstances, these loyal and loving animals are often treated as a member of the family. On the flip side, if the pet lives within a violent household like domestic abuse and drug and alcohol abuse, chances are that the animal too has become victim to human abuse. Animals that are living in this type of violent environment are in great danger because they are powerless. Situations like this often go unreported because animals cannot speak up for themselves. According to Dr. John New, "Each year four million women are abused by a husband or boyfriend. Approximately half of those women have animals, (and) half of those with animals say that the animals are abused or killed† [Covington]. Recently, a great awareness has surfaced between the link of domestic human violence and animal cruelty. The Humane Society of the U.S. (HSUS) is one of the largest organizations fighting for the humane treatment of animals and raising awareness in defense of animals that are victims of domestic abuse. Every year, the HSUS releases a report of animal cruelty cases. The most recent ...

Friday, November 22, 2019

Cover Critique #1 with Mark Ecob

Cover Critique #1 with Mark Ecob Cover Critique #1 with Mark Ecob We are very excited to bring you the highlights from our first  Reedsy Live Chat, which as promised will be a regular feature in the coming months.  Every live chat features one professional from the Reedsy marketplace hosting an interactive session that includes among other things free advice on topics like editing, book design, and marketing.We started things off with our first Cover Critique, a big thanks to the terrific Mark Ecob for an informative session.Mark runs his own design studio  and specialises in book cover design. He has worked with large publishing houses like  Penguin, Little, Brown and Amazon, as well as independents such as Faber and Icon. Since 2012 he has been Associate Art Director for Unbound, the London based crowd-funding publisher.  His work has been recognised three times by the Design Art Directors Association (DAD), and exhibited at the Hay Literary Festival 2012.For those of you who missed it, we've compiled a brief recap. However, we strongl y recommend you watch the videos. And if you want to take part in our next Cover Critique, with Jake Clark, remember to send your covers in advance to covers@reedsy.com.Cover Critique  with Mark Ecob - Part 1Just click on the image below to watch the video!

Thursday, November 21, 2019

Ethically Bound and Legally Speaking -Discussion Essay

Ethically Bound and Legally Speaking -Discussion - Essay Example The medical team did what they could to save the life of the patient. The patient emerged from surgery alive but was clearly going to have a very low quality of life if he lived long. Hours after the surgery, the patient developed complications and was clearly experiencing excruciating pain in different parts of his body. I realized that the patient was not going to live long. His condition deteriorated by the minute in spite of the efforts that the medical team were applying. Meanwhile the costs associated with his care continued to soar even as his quality of life dwindled and level of pain increased. The temptation to turn off the life support machines was high if not to save the patient from the pain he was suffering then to save his family from incurring additional costs for his care. He was going to die shortly; within a few days or weeks at the most anyway. I was torn between applying the principles of beneficence and nonmaleficence. The principle of nonmaleficence dictates that clinicians should do no harm to their patients (Aveyard, 2004). On the other hand, the principle of beneficence dictates that clinicians act in the best interest of the patient such as by taking action to prevent physical harm or pain (Aveyard, 2004). By switching off the life support machines, I would save the patient the agony he was going through as a result of his injuries and low quality of life. On the other hand, I would seem to have done the patient harm by switching off the machines. In the end, I decided to go by the latter. We opted to do the best we could to make the patient feel less pain even as he approached his death naturally. I believe the stand that I took was appropriate especially considering my strong belief in the sanctity of life. The alternative action would have been to switch off the machines and save the patient from having to endure so much pain. This perhaps

Tuesday, November 19, 2019

Area studies 2 Essay Example | Topics and Well Written Essays - 1000 words

Area studies 2 - Essay Example 3). As such, different countries impose disparate legal ramifications for people caught in drug trafficking. For a lot of countries in the Asian pacific region, the ultimate sanction of imposing the death penalty for drug-related crimes has been revealed. Amnesty International reported that capital punishment is the legal recourse for drug-trafficking and drug-related crimes, in sixteen Asian Pacific countries, to wit: â€Å"Bangladesh, Brunei, China, India, Indonesia, North Korea, South Korea, Laos, Malaysia, Myanmar, Pakistan, Singapore, Sri Lanka, Taiwan, Thailand, and Viet Nam† (Asia-Pacific: Death sentences for drug-related crimes rise in region 1). The current discourse aims to explore drug trafficking in China, by examining relevant statistics, its impact on the people, and any further proposed recommendations resulting from the findings. trafficked in China is in Myanmar (Yong-An). As disclosed, â€Å"the Myanmar-Yunnan-Guangdong route is a traditional and preferred drug trafficking route. Some of the drugs that come into Southern China are consumed directly there, or may be trafficked onward to interior provinces† (Yong-An 4). The alarming fact is that despite the wide-known fact that drug-related crimes would be punishable by death in the country, statistics still revealed rampant increases in abusers as reported by the National Narcotics Control Commission, from 150,000 in 1991 to 1,545,000 in 2010, or a 930% increase (Yong-An). Likewise, the number of deaths or executions in China could not be effectively monitored or accurately determined due to the secrecy stance maintained by the state (Gallahue, Gunawan and Rahman). The authors revealed that â€Å"China continues to execute more people than any other country. According to the China Law Yearbook, as reported by the Anti-Death Penalty Asia Network (ADPAN), China has a nearly 100 per cent

Saturday, November 16, 2019

Control Mechanisms - the Disney Company Essay Example for Free

Control Mechanisms the Disney Company Essay Control Mechanisms The Disney Company Bonita Johnson, Christi Cavanaugh, Gloria Aguilar, Hillary McCabe, Jeffrey Harriman MGT 330 January 9, 2012 Susan Mills Control Mechanisms The Disney Company In more than eight decades The Disney Company continues to be one of the largest media and entertainment corporations in the world. Founded on October 16, 1923 by brothers Walt and Roy Disney as a small animation studio, today The Walt Disney Company is one the largest Hollywood studios and owns 11 theme parks, two water parks, and several television networks including the American Broadcasting Company (ABC). The name Walt Disney has and always will be preeminent in the realm of family entertainment. Additionally, The Disney Company continues proudly to provide quality entertainment for all family members across American and around the world. The Walt Disney Company did not become one of the largest entertainment corporations in world without developing secure control mechanisms. The Disney Company has earned its reputation by tight control and although control pervades the company, Disney’s control mechanisms are not considered heavy-handed or condescending. This paper will examine that although The Disney Company enforces strict control mechanisms within its organization, it is also an organization independent in its thinking and approaches. The Walt Disney Company has always, and continues to use control mechanisms to help regulate policy and procedures which contribute toward effectively achieving organizational goals (The Walt Disney Company, 2008). The Disney Company has been widely successful both nationally and internationally for over 70 years primarily through successful implementation of control mechanisms throughout all aspects of the organization (The Walt Disney Company, 2008). The four types of control mechanisms that best serve The Disney Company would be budgetary, financial, management audit, and bureaucratic. The bureaucratic control function is the lifeline of Disney’s corporate structure because it provides the company’s ethical standards, mission statement, and organizational structure. Moreover, bureaucratic control is a constructive system used to influence subordinates and structure reward systems. Budgetary control is a method used by The Disney Company to bring their vision to life. Budgetary control is detailed, step-by-step documentation of a company’s accomplishments or deficiencies by contrasting data. The Disney Company has implemented many ways of using budgetary control before building or acquiring any new real estate. Management audit controls are equally important to The Disney Company particularly if expansion is in their future. The Disney Company uses both an internal and external audit system. Through management audits The Disney Company has a set checks and balances system to ensure all assets are properly maintain and nothing is compromised (The Walt Disney Company, 2008). Financial controls are just as vital as budgetary controls with a company such as Disney. The marketing strategies that Disney employs help to produce revenue for the company thereby stabilizing assets and liabilities. Financial controls also help to make it possible for Disney to build more parks and resorts in the future. These four control mechanisms enforced by The Disney Company helps provide the company with a format in sustaining the company in a profitable direction. Equally important, these four components of Disney’s control mechanisms are the key in keeping the organization focused, and diverting away from any unethical misconduct from their employees.

Thursday, November 14, 2019

Gummo: A Review :: essays research papers

Gummo: A Review   Ã‚  Ã‚  Ã‚  Ã‚  Pieces of a puzzle slowly fitting together, to reveal a picture. This is an accurate description of how the film, Gummo by Harmony Korine pans out. Through a series of quite disturbing yet visually stimulating vignettes, Korine somehow relays a tragic story. Essentially, the film is a collection of random events that are assimilated into a larger scheme of things. For the most part, the film emphasizes on showing us things that we know are very real and actually happen, but are terribly hard for the average person to confront.   Ã‚  Ã‚  Ã‚  Ã‚  The tone is unveiled from the very beginning, while a dim and dark outlook are forecast. As it is set in the dilapidated, small town of Xenia, Ohio, the severity of the living conditions there is visible from start to finish. A few of the senseless, haphazard events that are captured, consist of - countless, brutal feline slayings, teens euthanizing the helpless, bed-ridden elderly, and drunken, redneck furniture wrestling. Somehow, in a twisted pattern, these scenes converge to depict the pure horror of living in this place.   Ã‚  Ã‚  Ã‚  Ã‚  In respect to the cast of this film, Chloe Sevigny is reasonably the only name that people are likely to recognize. There are a handful of other obscure actors as well as some non-actors that appear in the film, for various reasons. In the process of being introduced to each person through certain circumstances, it is difficult to determine which ones are the actors and which are not. From some of the sequences presented, it seems tough to draw the line between harsh reality and exploitation.   Ã‚  Ã‚  Ã‚  Ã‚  Contrary to the town that this film takes place in (Xenia, Ohio), it was shot on location in Nashville, Tennesee. Nashville provides an appropriate backdrop for the setting that was trying to be portrayed. Korine shoots the film with raw textures, giving it a real, almost too real deliverance. The camera work at times is almost hard to watch. Throughout the film - the images have a natural, gritty appearance.

Monday, November 11, 2019

Sir Robert Peel and American Policing

Sir Robert Peel and American Policing Kristi Pursley CJA/214 August 15, 2011 Don Redden Sir Robert Peel and American Policing The history of policing dates back several thousand years ago when there was no order or peace and inhumane acts upon citizens was the norm with religious, political, or military police acting as the law. Policing was unstable and unorganized. Citizens took the law into their own hands and served as judge, jury, and executioner. There was not such a thing as being â€Å"innocent until proven guilty. If the community believed an individual was guilty of a crime then the community would handle the offense themselves. American policing stems from the English heritage; crime prevention and control, preventive patrol, and the quasi-military organizational method became the policing structure. The English colonists brought a criminal justice system as part of their cultural baggage (Walker & Katz,  2008,  p. 24). In addition, American policing also used other f eatures from the British system. A member of England’s elite social and political class fought to improve the structure of the law enforcement for more than 30 years. History expresses itself and acknowledges this member as the â€Å"father† of modern policing, otherwise known as Sir Robert Peel (Walker & Katz, 2008, p. 25). After the collapse of the England law enforcement in the early nineteenth century, Sir Robert Peel took a stand to control order and organization in the law enforcement system. He fought for many years for this and finally convinced the English Parliament to create the London Metropolitan Police in 1829. The officers became known as â€Å"Bobbies† in honor of Sir Robert Peel. The London Police Department set in motion three new elements that became the structure for modern policing; mission, strategy, and organizational structure. The mission was to prevent crime before it started rather than to respond after the crime has already taken place, known as crime prevention. The strategy was to have officers continually patrolling the fixed â€Å"beats† and allow them to be noticed to deter crime, also known as preventive patrol. The organizational structure came from the London military introducing, uniforms, rank designations, and the authorian system of command and discipline, otherwise known as Quasi-military style. Although Sir Robert Peel was not an officer of the law, he directed London’s police department with â€Å"Peel’s Nine Principals. † These principals were to act as the basis to control the police force in England and help to restore peace to the citizens. Peel believed it was better to try to prevent crimes and reform criminals. Peel’s Nine Principals read as follows: 1) The basic mission for which the  police  exist is to prevent crime and disorder. 2) The ability of  the police  to perform their duties is dependent upon public approval of police actions. ) Police must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. 4) The degree of co-operation of the public that can be secured diminishes proportionately to the necessity of the use of physical force. 5) Police seek and preserve public favor not by catering to public opinion but by constantly demonstratin g absolute impartial service to the law. 6) Police use physical force to the extent necessary to secure observance of the law or to restore order only when the exercise of persuasion, advice and warning is found to be insufficient. ) Police, at all times, should maintain a relationship with the public that gives reality to the historic tradition that the police are the public and the public are the police; the police being only members of the public who are paid to give full-time attention to duties which are incumbent on every citizen in the interests of community welfare and existence. 8) Police should always direct their action strictly towards their functions and never appear to usurp the powers of the judiciary. ) The test of police efficiency is the absence of crime and disorder, not the visible evidence of police action in dealing with it (Bloy, 2011). The United States admired Sir Robert Peel’s principals of policing and therefore adopted it to incorporate into their legal justice system of law enforcement. The government tried to incorporate Sir Robert Peel’s Principals into different cities with no luck or gratitude. In 1838, Boston became the first city to incorporate these principals and have the first organized policing in the United States. In 1845, New York City followed suit. Soon thereafter, Philadelphia followed suit but it did not follow the principals, destroying different forms of policing. Finally, Philadelphia collaborated their policing style to be organized and uphold order by way of Sir Robert Peel’s Nine Principals. Sir Robert Peel, known as the ‘father’ of modern policing, set the foundation for organization and structure in modern day policing in London. The United States followed behind shortly thereafter to enlist a police force for order, organization, and service. Peel set up â€Å"Peel’s Nine Principals† which the United States still abides by to this day. The ‘father’ of policing has helped our government to overcome harsh judgment, corruption, and harsh actions, and has made it possible for citizens of this society to bond with local law enforcement. This has allowed our law enforcement to handle situations appropriately and incorporate bigger agencies to handle more diverse problems throughout the country. References Dr. Bloy, M. (2011, January 6). The Peel Web. Retrieved August 9, 2011 from www. historyhome. co. uk. Walker, S. , & Katz, C. M. (2008). The Police in America  (6th Ed. ). New York, New York: McGraw-Hill.

Saturday, November 9, 2019

A Brief Comparison of Psychoanalytic and Person-Centered Therapy

Within the field of counseling and therapy there are endless theoretical stances, each of which develop different perspectives on humanity and establish varying counselor roles. Consideration of the implications of these various orientations is essential in the process of choosing the appropriate therapy for an individual. As an illustration, examine the stark contrast between psychoanalytic therapy and person-centered therapy. The core of any theoretical approach in psychology lies in the unique interpretation of human nature.Sigmund Freud; founder of the psychoanalytic movement, had an extremely deterministic view of the human experience (Corey, 2009). According to Freud; a combination of unconscious, irrational motivations and instinctual drives that lie outside of one’s conscious control serve as the basis for one’s personality (Corey, 2009). These irrational forces include Eros; the innate â€Å"life instinct† responsible for sexual energy and our desire to survive, and Thatanos; the innate â€Å"death instinct† responsible for aggression (Burger, 2008).In addition, Freud placed a heavy emphasis on the role of childhood experiences and sexuality in personality development. Psychoanalytic theory asserts that most of the conflict experienced in adulthood is a result of repressed unconscious material from childhood (Burger, 2008). The psychoanalytic view of human nature is quite contrary to the humanistic outlook. Carl Rogers; founder of the humanistic psychology movement, developed a more optimistic view of human nature.This approach asserts that at the core of each individual lies a â€Å"positive center†, which is composed of trustworthiness and capability (Corey, 2009). Person-centered therapy is centered on the belief that people have an innate â€Å"actualizing tendency† which drives an individual to strive for growth and personal fulfillment (Corey, 2009). Although past experiences are not ignored in therapy; t he emphasis on growth, development, and competence proposes that traumatic past experiences can be overcome by finding meaning and purpose in one’s life (Corey, 2009).Given their varying interpretations of human nature and psyche, person-centered therapists and psychoanalytic therapists establish very different roles in their practice. Because the goal of psychoanalytic therapy is to bring repressed unconscious material to light, the therapist utilizes a â€Å"blank-screen approach† (Corey, 2009). Although they initially establish some rapport with the client; psychoanalytic therapists assume an anonymous stance for the majority of therapy by behaving in a neutral, impersonal manner (Corey, 2009).The goal of this approach is to foster transference; in which clients project repressed emotions onto the impartial therapist (Corey, 2009). The main role of a psychoanalytic therapist is that of an interpreter. Therapy employs various techniques intended to evoke unconscious memories such as transference, dream-analysis, projection tests, and free association (Burger, 2008). These repressed memories are often ambiguous and puzzling to the client; thus therapists provide guidance in understanding and confronting the meaning of this material (Burger, 2008).In contrast, the goal of person-centered therapy is to create a nurturing environment which fosters the client’s actualizing tendencies and growth (Corey, 2009). The relationship between therapist and client is equal, meaning that the therapist can hold no dominant role (Corey, 2009). Rather than advising and interpreting, the therapist simply serves as a model for the patient. In order to be appropriate models, three characteristics are required of person-centered therapists (Corey, 2009).Firstly, they must have congruency in their own lives by being genuine and honest with themselves. Person-centered therapists must also accept their clients with â€Å"unconditional positive regard† (Cor ey, 2009). This vital concept assumes that therapists can accept their clients without any judgment, and deeply care for people beyond the obligations of their occupation. Lastly, therapists must have a true empathetic understanding of their clients. Person-centered therapists should be able to relate to their client’s feelings and experiences as if they were their own (Corey, 2009).Cumulatively these three qualities create an open relationship in which the client is free to express themselves and grow as an individual. Due to the intrinsic differences between psychoanalytic and person-centered therapy, it is necessary to examine their strengths and weaknesses in application. Freudian psychoanalytic therapy has been modified greatly over time due to many flaws in the therapeutic process. The most notable of these shortcomings is the intense emphasis on childhood experience in personality development (Burger, 2008).Critics claim that psychoanalytic therapy ignores the signific ant role of post-developmental and current life circumstances on mental health. In addition, the therapeutic process in lengthy and costly; limiting its application to those in well-off socioeconomic standing (Corey, 2009). There are however many beneficial uses of contemporary psychoanalytic therapy. Some argue that because all people are affected by childhood experiences, therapy can be applicable cross culturally; assuming therapists possess a multicultural awareness (Corey, 2009).In addition, brief psychoanalytic therapy is a promising new therapeutic approach that aims to limit the time and cost of psychoanalytic therapy while maintaining the focus on the inner psyche; thereby broadening its availability (Corey, 2009). Person-centered therapy is currently a more widely utilized form of therapy, but it is not without weaknesses. Critics argue that from a multicultural perspective, the internal locus of evaluation stressed in therapy may not be fitting for some collectivist cultu res; who value the opinions and standards of other group members over their own (Corey, 2009).Others contend that the non-directive stance of the therapist may not be sufficient for those seeking guidance from therapy. Although some aspects of therapy may be flawed, humanistic psychology has been responsible for some major breakthroughs in the field of human resources internationally. Humanistic psychologists have traveled to over 30 countries worldwide in order to assist different cultures in their adoption and modification of humanistic theory and therapy; in hopes of promoting global communication and understanding (Corey, 2009).Those who promote person-centered therapy also assert that the key therapeutic conditions of empathy, understanding, and honest caring are essential in promoting growth universally (Corey, 2009). References Burger, J. M. (2008). Personality. (8th ed. ). Belmont, CA: Wadsworth, Cengage Learning. Corey, G. (2013). Theory and Practice of Counseling and Psych otherapy. (9th ed. ). Belmont, CA: Brooks/Cole, Cengage Learning.

Thursday, November 7, 2019

The Health and Pollution Risks of Charcoal Grilling

The Health and Pollution Risks of Charcoal Grilling Cooking with grills can be problematic for two reasons. First, both charcoal and wood burn â€Å"dirty,† producing not only hydrocarbons but also tiny soot particles that pollute the air and can aggravate heart and lung problems. Secondly, the grilling of meat can form two kinds of potentially carcinogenic compounds in the cooked meat: polycyclic aromatic hydrocarbons (PAHs) and heterocyclic amines (HCAs). Charcoal Grilling May Pose Cancer Risks According to the American Cancer Society, PAHs form when fat from meat drips onto the charcoal. They then rise with the smoke and can get deposited on the food. They can also form directly on the food as it is charred. The hotter the temperature and the longer the meat cooks, the more HCAs are formed. HCAs can also form on broiled and pan-fried beef, pork, fowl, and fish. In fact, National Cancer Institute researchers have identified 17 different HCAs that result from cooking â€Å"muscle meats,† HCAs that may pose human cancer risks. Studies have also shown an increased risk of colorectal, pancreatic, and breast cancers associated with high intakes of well done, fried, or barbequed meats. Cooking With Charcoal Grills Adds to Air Pollution According to the Texas Commission on Environmental Air Quality, Texans who like to say that they â€Å"live and breathe barbecue† may be doing just that to the detriment of their health. A 2003 study by scientists from Rice University found that microscopic bits of polyunsaturated fatty acids released into the atmosphere from cooking meat on backyard barbecues were helping to pollute the air in Houston. The city at times registers air quality levels that rank it one of the more polluted urban areas in the United State. Emissions from barbecues, however, are certainly dwarfed by those generated by motor vehicles and industry. Both briquettes and lump charcoal create air pollution. The production of lump charcoal, made from charred wood to add flavor, creates other environmental hazards. Their production contributes to deforestation and adds to the greenhouse gases in the atmosphere. Charcoal briquettes do have the benefit of being made partly from sawdust, which is a good use of waste wood. Popular brands, however, may also contain coal dust, starch, sodium nitrate, limestone, and borax. Canada Considers Charcoal Hazardous In Canada, charcoal is now a restricted product under the Hazardous Products Act. According to the Canadian Department of Justice, charcoal briquettes in bags that are advertised, imported to, or sold in Canada must display a label warning of the potential hazards of the product. No such requirements presently exist in the United States. Avoid Health Risks by Using Natural Charcoal Consumers can avoid exposure to these potentially harmful additives by sticking with so-called natural charcoal brands. Look for charcoal made of 100 percent hardwood and containing no coal, oil, limestone, or petroleum products. Third-party certification programs, like the Forest Stewardship Council, can help choose products that are harvested in a sustainable fashion. Edited by Frederic Beaudry.

Tuesday, November 5, 2019

Members of the House of Representatives

Members of the House of Representatives There are 435 members of the House of Representatives. Federal law, passed on Aug. 8, 1911, determines how many members are in the House of Representatives. That measure raised the number of representatives to 435 from 391 because of population growth in the United States.   The first House of Representatives in 1789 had only 65 members. The number of seats in the House was expanded to 105 members after the 1790 Census, and then to 142 members after the 1800 headcount. The law that set the current number of seats at 435 took effect in 1913. But it isnt the reason the number of representatives has been stuck there. Why There Are 435 Members   Theres really nothing special about that number. Congress regularly increased the number of seats in the House based on the nations population growth from 1790 to 1913, and 435 is the most recent count. The number of seats in the House has not been increased in more than a century, though, even though every 10 years the census shows the population of the United States grows. Why the Number of House Members Hasnt Changed Since 1913 There are still 435 members of the House of Representatives a century later because of the  Permanent Apportionment Act of 1929, which set that number in stone. The Permanent Apportionment Act of 1929 was the result of a battle between rural and urban areas of the United States following the 1920 Census. The formula for distributing seats in the House based on population favored urbanized states and penalized smaller rural states at the time, and Congress could not agree on a reapportionment plan. After the 1910 census, when the House grew from 391 members to 433 (two more were added later when Arizona and New Mexico became states), the growth stopped. That’s because the 1920 census indicated that the majority of Americans were concentrating in cities, and nativists, worried about of the power of foreigners, blocked efforts to give them more representatives, wrote Dalton Conley, a professor of sociology, medicine and public policy at New York University, and Jacqueline Stevens, a professor of political science at Northwestern University. So, instead, Congress passed the Permanent Apportionment Act of 1929 and sealed the number of House members at the level established after the 1910 census, 435. Number of House Members Per State Unlike the U.S. Senate, which consists of two members from each state, the geographic makeup of the House is determined by the population of each state. The only stipulation spelled out in the U.S. Constitution comes in Article I, Section 2, which guarantees each state, territory or district at least one representative. The Constitution also states that there can be no more than one representative in the House for every 30,000 citizens. The number of representatives each state gets in the House of Representatives is based on population. That process, known as reapportionment, occurs every 10 years after the decennial population count conducted by the U.S. Census Bureau. U.S. Rep. William B. Bankhead of Alabama, an opponent of the legislation, called the Permanent Apportionment Act of 1929 an abdication and surrender of vital fundamental powers. One of the functions of Congress, which created the census, was to adjust the number of seats in Congress to reflect the number of people living in the United States, he said. Arguments for Expanding the Number of House Members Advocates  for increasing the number of seats in the House say such a move would increase the quality of representation by reducing the number of constituents each lawmaker represents. Each House member now represents about 700,000 people. The group ThirtyThousand.org argues that the framers of the Constitution and the Bill of Rights never intended for the population of each congressional district to exceed 50,000 or 60,000. The principle of proportionally equitable representation has been abandoned, the group argues. Another argument for increasing the size of the House is that is would diminish the influence of lobbyists. That line of reasoning assumes that lawmakers would be more closely connected to their constituents and therefore less likely to listen to special interests. Arguments Against Expanding the Number of House Members Advocates for shrinking the size of the House of Representatives often argue that the quality of legislating improves because House members would get to know each other on a more personal level. They also cite the cost of paying for salaries, benefits, and travel for not only the lawmakers but their staffs.

Saturday, November 2, 2019

Health Information Systems Research Paper Example | Topics and Well Written Essays - 1250 words

Health Information Systems - Research Paper Example fore is on the fact that despite the proliferation of information system retrieval technologies such as memory chips and CDs, It is still unclear as to whether Physicians use such data retroviral technologies objectively or not. Thus a framework was developed based on certain criteria and all the earlier studies were thane evaluated according to the criteria set into the framework developed by the authors. Some of the criteria include frequency of use, purpose of use, user satisfaction, searching utility, searching failure etc. A total sample of 47 articles was chosen from which further classification was made in order to develop the framework under study. This study basically therefore attempted to develop a framework by performing the review of the already performed studies on the subject. Authors searched the data relating to the medical informatics from 1996 to 1998 with special emphasis on those studies which involved the Physicians. The most obvious rational for the study was therefore to review the earlier studies and compare them according to the set criteria for further exploration and as to how earlier studies actually contributed towards the development of comprehensive set of knowledge and understanding regarding the use of information retrieval technologies by the Physicians. As discussed, that this study is based on the review of already published studies to formulate a framework for assessment purposes. Authors checked the citations of the studies as well as the bibliographies of 49 studies. Most of the material has been taken from the earlier published material and studies from databases such as MEDLINE and LISA. The basic criteria for selection of the articles was based on the fact that whether any such study presented the classification of the information retrieval technologies or whether such technologies were used by the Physicians as well as students. Based on the designed framework, authors looked for the defined criteria in these studies