Saturday, August 31, 2019

Theories of a Leader

This essay will approach types of power such as; to utilize and influence others, to either reward or punish, to confirm by role of an organization, and to identify with a leader such as rock or film personality. This essay will cover six categories of power and these interlink with each other and brings a better focus on theories of power. The functions of leadership are many and varied, depending upon the basic problem with a group must deal with, and the type of leadership style in action, which is dependent on the leaders basis of power. Power, in the case of leadership, is divided into six categories, however, each can be linked with another, as they are inter-related. Expert and Informational power are concerned with skills, knowledge and information, of which the holders of such abilities, are able to utilize, to influence others ie technicians and computer personnel. Reward and Coercive power, differ from the previously mentioned, as they involve the ability to either reward or punish persons being influenced, in order to gain compliance. Legitimate power, is power which has been confirmed by the very role structure of the group or organization itself, and is accepted by all as correct and without dispute, such as in the case of the armed forces or the police force. Referent power, on the other hand, involves those being influenced, identifying with the leader, ie. rock or film personalities using their image to enter the political arena. Most leaders make use of a combination of these six types of power, depending on the leadership style used. Authoritarian leaders, for example, use a mixture of legitimate, coercive and reward powers, to dictate the policies, plans and activities of a group. In comparison, a democratic or participative leader would use mainly referent power, involving all members of the group in the decision-making process. In my research I have found that by the use of meta-analysis uncovers an approach beyond the general focus of theories of leadership. However within the central study of the term theory, I explore this article to expand this essay in more detail. According to Hunter and Hirsh (1987), most discoveries and advances in cumulative knowledge are no longer being made by those who conduct primary research studies, but by those who use meta-analysis to uncover the latent meaning of existing literature. In addition, meta-analysis provides the empirical building blocks for theory since results derived from such analyses indicate what needs to be explained by theory. Although meta-analysis has been criticized for not directly generating theory (Guzzo, Jackson &mKatzell, 1987), the results of meta-analyses are indispensable for theory construction, keeping in mind that theory development is a creative process distinct from cumulating results across studies. Nevertheless, there is no reason that meta-analysis cannot deal with theory and explanation as well as with description. In fact, efforts sponsored by the Russell Sage Foundation's meta-analysis project are designed to move meta-analytic techniques beyond the descriptive into the theory development domain (Russell Sage Foundation, 1991). Leadership itself, has been accompanied throughout time, by numerous theories, all claiming to answer the question, Are leaders born or made? Those who accept the verdict, that leaders are born and not made, maintain, â€Å"†¦ that there are certain inborn qualities such as initiative, courage, intelligence and humour, which altogether pre-destine a man to be a leader †¦ the essential pattern is given at birth† (Adler, 1991, p. 4) Two leadership theories which concentrate on this point, are the Great man/great woman and theTrait theories. The great man/great woman theory, accordingly to Wrightsman, involves its followers believing that major events, both nationally and internationally, are influenced by those persons in power. â€Å"A sudden act by a great man could, according to this theory, change the fate of the nation† (Wrightsman, 1977, p. 638) The trait theory expands further on this conjecture, by concentrating on the personal characteristics of the leader. The theory, which until the mid-1940s formed the basis of most leadership research, cited traits believed to be characteristic of leaders, the list of which grew in length over the years, to include all manner of physical, personality and cognitive factors, including height, intelligence and communication skills. However, few traits emerged to conclusively differentiate leaders from non-leaders. The traits an individual has may, increase the probability that a person will become a leader, though whether such leadership is guaranteed, is uncertain. Nevertheless, it can be seen to be true that some people are more likely than others to assume leadership positions. â€Å"The research on trait theories of leadership has shown that many other factors are important in determining leader success, and that not everyone who possesses these traits will be a leader† (Adler, 1991, p. 267) As interest in the trait approach to leadership declined, researchers focused their attention on the leader's actions rather than their attributes, which led to the emergence of the behaviourist theories. The most widely publicized exponent of this approach was Robert Blake and Jane Mouton's Managerial Grid, which attempted to explain that there was one best style of leadership, by various combinations of two factors regarding a concern for production and people. Due to the disillusionment with the fore-mentioned trait theory, the situational approach suggested that the traits required of a leader differed, according to varying situations. The situational approach, which predominated in the 1950s, held that whether a given person became a leader of a group, had nothing to do with his/her personality, but had everything to do with such factors as the flow of events and circumstances surrounding a group. To put it simply, the leader was a person who was in the right place at the right time. â€Å"Rather than a great man causing a great event to happen, the situational approach claims that great events are the product of historical forces that are gong to happen hether specific leaders are present or not † (Adair, 1984, p. 8) Unfortunately, this theory still didn't answer, why one member of a group emerged as the leader, rather than another, or why one particular leader proved to be a better leader in some situations than another. The emergence of a related theory, the interactionist approach, attempted to explain the existing anomalies. The interactionist theory proposed that both the characteristics of the individual, and the situation in which the group found itself, accounted for whom would become the leader. Resulting from this theory, was the view that leaders are both born and made, due to the leader requiring certain abilities and skill, but as the situation and the needs of the group changed, so to the person acceptable as leader changed. Developing such abilities and skills requires no position of authority but does require commitment to self, commitment to the organization and its employees, action, and thoughtful, on-going self-assessment. Such a program of personal development, ideally begun as a part of the formal education process, can assist significantly in learning how to influence others, up, down, and across the organization. Thus, one can learn how to become what Cohen (1990) has called an â€Å"uncrowned leader,† a person who exerts influence over others but lacks positional authority. It takes many hours of research to provide a strong research paper however this essay touches only the surface. The functions of a Leader are many and varied. It's hard to say the one theory is better than the other because as my research shows, it takes more than one approach to accomplish a task with overall proficiency. From upper management to the first line supervisor, each situation, each environment, and each group of people requires a different approach. In some circumstances a leader is considered to be a leader only if he/she knows the organizational structure well and knows how to execute a plan. By reviewing the theories of the previously mentioned theories, the term leader doesn't necessarily mean he/she is a leader. Therefore a leader can have more than one meaning and the theories of leadership may need to be more refined. However this essay focuses more on the standard process of identification of a leader and the theories that identify such. If a leader is trainable to understand that different approaches are needed for different situations, then a leader can succeed. However if a born leader hasn't had the exposure to an array of situations, then he/she will not be effective. It stands to reason regarding a leader is born is that a leader may be born but if that person isn't exposed to an array to various situations and factors, then that born leader will become a failure. However I agree a leader may be born and a follower is a follower but a follower can influence other followers especially if that person has charisma such as wiser experience, cultured education, and mature personality. So a leader may be born but a follower by my own experience I've seen followers who are leaders and assist leaders to perform their best. Therefore sometimes a leader and follower can complement each other thus strengthening the environment and or situation. Therefore my own observations show that there are ranks of leaders and ranks of followers. Each side of the line can have leadership. Theories are many but now that we have all these theories, it may appear that we need more research to better recognize the leaders not recognized by the standard approach.

Friday, August 30, 2019

How Sports Can Improve Team Relations

Team sports are a great fun way to instil strong teamwork values in staff that have to work effectively together off the field. Team Sport Spirit As a sports team functions in much a similar way to a workplace team – with members cooperating with one another to achieve a common goal, sport participation is a good way of further instilling the important principles of teamwork in a group. A lot of the same rules of the workplace team can be played out on the field or court. For example, if one person fails to pull their weight then the whole team performance will suffer. And conversely if one individual dominates then the performance of others will be adversely affected. Feeling undervalued and second best, their morale and motivation will droop. In both arenas the only way to achieve a victory is with a team working in harmony and on equal terms with one another. As with sport, a team may comprise of the most brilliant individual talents but if they don’t work well together then the team will be worthless. The Mechanics of a Good Team It’s easy to accept that the key lessons of team sport are the same as those in the workplace, but beyond that what can sport teach employees about teams that they can’t pick up in the workplace? For starters, the benefit of taking team relations out onto the field is in providing a more direct and boiled down display of how a team should function. On the field success is made or broken based on the effort – or lack of – of the competing players. If there are any weak links on the field, for example, then the upshot will be swift and decisive. It’s not so clear cut in the workplace where success and failure is not judged in super fast one hours bursts. Lazy individual members can generally drag the team down for a long time before the negative effects become apparent. Therefore by participating in sports, team members learn the effectiveness of ‘pulling together’ in achieving a goal and hopefully apply the same principles to their work. Team Bonding and Communication Team sports not only instil a belief in the power of effective teamwork but also they help improve team bonding and the relationships between team members, so that they can better achieve that goal. Encouraging staff to participate in team sports together on a regular basis is an excellent way to allow team members to get to know one another better and build up stronger and more productive relationships both on the field and in the workplace. Sport promotes a numbers of qualities that are valuable in the office, such as trust, respect, effective communication and good old fashioned comradeship. If team members find success together on the football field or badminton court, for example, then the bond they form with one another will hold strong in the workplace context. Often it doesn’t even matter whether certain people don’t get on in the workplace. On the sports field there is no room for frosty relations – for the sake of the team players must put their differences aside and cooperate. Hopefully success together can help people to put their petty differences aside off the field too.

Marketing Management – Toyota

Toyota Motors Marketing Plan for Hybrid Vehicles by geographic location (Europe) 1. 0 Executive Summary The Toyota Motor Company continues to strive to be the global market leader in the automobile manufacturing industry. Over the years, Toyota has managed to remain the leader of this industry through its management structure, fuel efficient vehicle design and competitive pricing based on global market knowledge. Toyota has realized that environmentally conscious products were needed to ensure continued company (and sales) growth in the future.Toyota has been actively reducing its carbon footprint since 1998. Annually, Toyota has been publishing its Environmental and Social Sustainability report in order to enhance disclosure of information regarding environmental actions carried out in conjunction with its corporate activities. Through more efficient and â€Å"cleaner† production lines it has reduced its environmental impact. Toyota also seeks to be the market leader for so c alled â€Å"clean (or green) vehicles† such as Electric Vehicles, Hybrid Vehicles and Plug-In Hybrid Vehicles.This marketing plan will discuss Toyota's strategy with regards to green vehicles, with particular reference to one geographical location, Europe. This Marketing plan will have a closer look at how the European Branch operates within Toyota's global structure and how it reflects Toyota's overall vision of a cleaner, more sustainable future. 1. 1 Vision Toyota realizes that its future lies in the production of environmentally conscious cars. Toyota's vision of a cleaner future revolves around two main points. Firstly, the production of vehicles that have a smaller impact on the environment.Along with â€Å"cleaner† versions of its gasoline powered cars, Toyota believes that the company's success in the present and future lies in its line of Electric, Hybrid and Plug-In Hybrid Vehicles. Through this line of vehicles Toyota will be actively reducing environmental impact by producing cleaner cars for consumers to use. Secondly, Toyota believes that to achieve its goals towards a cleaner future, it must continuously strive to make its production lines even cleaner. In fact, since 2002 Toyota has managed to reduce the energy used or the production of vehicles by 40%, waste products by 50% and water consumption by 70% (Toyota Motors Europe: Sustainability Report 2011). Both of the above points fall under a global philosophy called â€Å"The Toyota Way†. As analysed by Liker (Liker J. , 2004) this holistic philosophy maintains fourteen key principles which Toyota has adopted to give its customers what they want, when they want it, in the most efficient way possible whilst leaving the smallest possible carbon footprint. Toyota also believes that continual growth can be achieved by exceeding its customers' expectations.In fact the Toyota Global website(2012) states â€Å"our attitude is to anticipate and deliver to the needs of those we ser ve† 1. 2 Objectives Toyota's main objectives are stated clearly in its Sustainability Report (2011). The said report outlines a global vision, to be attained by the year 2020. Toyota's new Global Vision 2020 comprises of three main pillars: * Lead the way to the future of mobility, which is our core business. * Commit to quality, innovation, environmental protection and by doing so, make cars that people love. Engage our people's energy and passion to â€Å"Always Find a Better Way† (Toyota Motors Europe: Sustainability Report 2011) 2. 0 Current Market Summary Traditionally, Toyota's primarily focused on the US and Japanese markets. The European market is a fairly new addition to Toyota's Sales portfolio. Although the European market for cars has seen a steady decline in recent years, Toyota currently holds a 4. 2% share of the total car market. In 2011 total sales in Europe amounted to 822,386, 10% of which were Hybrid vehicles. 2. 1 Market NeedsThrough Customer Relati onship Management and market research, Toyota has established a new set of characteristics it's vehicles need to satisfy in order to reach the Global Vision 2020. Toyota has determined it's cars need to be: * Of high quality and reliability thus requiring infrequent maintenance. * Widely affordable, including increased affordability of Hybrid and Plug-in Hybrid vehicles. * Silent in a world which is increasingly aware of noise pollution. * Easy to use, with particular reference to simplified user interfacing on new Hybrid and Plug-in Hybrid vehicles * Clean.Even if in a traditional gasoline engine model emissions need to be kept to an absolute minimum. Whilst identifying the need for â€Å"cleaner† cars, Toyota has also launched the Plug-in Hybrid Electric Vehicle (PHEV) demo project in 18 European countries. This project involves a limited production line of 200 PHEV vehicles which are being road tested by customers in 18 European countries till 2013. So far the project has already increased awareness of PHEV cars and provided crucial data with regards to technical performance and customer satisfaction.This data will be used in the near future to launch a large scale PHEV production line. Toyota realises the importance of its customers time. The increasing use of the internet, especially in the early stages of a purchase, has made the company's website an important asset. Therefore an updated website will all models, colours, specifications and options is of vital importance. 2. 2 Market Growth Despite the afore mentioned drop in car sales in Europe, Toyota has managed to sustain a positive growth within this market. Toyota aims to increase its European market share from 4. % to 4. 5% ( 835,000 vehicles sold) in 2012. In 2011 its Hybrid sales amounted to 10% of the total sales figure. Toyota seeks to increase this to 14% in 2012 and up to as much as 20% in 2013/14 (Reuters: 5th March 2012). To do so, Toyota has re-designed some of its more popular mode ls (Yaris and Auris) and has offered them in both traditional gasoline engines and Hybrid configuration. To further maximise growth in the Hybrid and Plug-In sector, many of Toyota's European distributors have started offering very advantageous finance schemes on these models.This means that a customer no longer needs to go through the bank to purchase a new car. 2. 3 Market Segmentations Toyota's European Market is vastly diverse and requires heavy segmentation. Each market segment requires separate market research, a separate marketing strategy and a separate product offering all together. When segmenting the European market one has to take the following considerations: * Age of the target consumer * Social Standing * Occupation and thus purchasing power * Educational background * Other cultural and socio-economic factorsFor the purposes of this plan we shall conduct a socio-demographic segmentation. Market segments may include : * Young ,trendy people who opt for small, inexpensi ve, cheap to run vehicles. this segment is also very environmentally conscious. * Young adults with higher spending power who opt for small saloon, small SUV's/mini-vans and 4Ãâ€"4 vehicles. This segment is also very environmentally conscious but less so than the young trendy people * Middle aged adults who are better off and can afford higher end vehicles such as large saloons and high end 4Ãâ€"4 vehicles.This segment is less environmentally conscious and therefore less likely to invest in a Hybrid or PHEW vehicle unless these become trendy to own. * Mature adults who are about to retire or have retired from work. This segment looking for comfort and practicality while still maintaining style. Depending on their occupation and ability to save(throughout their career), their spending power will vary. This segment is the least environmentally conscious. Other market segments include small, medium and large business organisations for which Toyota has developed a range of trucks and vans of various sizes and payload capacity. . 4 SWOT Analysis Strengths * Toyota has firmly placed itself as one of the leading car manufacturers in the world and is also steadily gaining ground in Europe. Toyota's reputation for quality and reliability has help to breach and gain a foothold in the European automobile market. * Toyota is on the forefront of cutting edge technology and is the leading manufacturer for Hybrid vehicles in Europe and aims to further increase sales of Hybrids and PHEV in the next 2 years. * The Toyota Way of management continues to advocate efficiency in the production, distribution and sales of Toyota vehicles.Toyota's continues drive towards efficiency has led to a reduction in cost of production/distribution/sales * Toyota's Sustainability Report informs partners, distributors, employees and customers of the company's commitment to a cleaner future. This further reinforces Toyota's Corporate Social Responsibility in the minds of all third parties. * Th e company has a highly skilled workforce * Wide distribution network through clearly marked Toyota stores and other authorised distributors allowing potential customers easy access to the company's vehicles Weaknesses * Toyota's size as an organisation is in itself a weakness.The scale of the company presents different sets of challenges. The decision making process may be slower than in other organisations due to the sheer size of the management structure. * A wide distribution network requires a large workforce dedicated to logistics and distribution which can be quite expensive. * A weakness can also be identified in the supply chain for hybrid vehicles in Europe. Even though hybrid Yaris and Auris models are produced in Britain (and as of April 2012, also in France) almost all of the parts used to make these vehicles have to be imported.This will increase the overall cost per unit, therefore reducing competitiveness. (Reuters 5th March 2012) * Toyota owns and runs 8 manufacturin g plants, 14 parts centres and 9 vehicle logistic centres in Europe. These plants and centres have high fixed costs. With an expected 5% decrease in the demand for cars in Europe, these plants' fixed costs may become a long term burden on Toyota Europe and may decrease profitability. Opportunities * Being on the forefront of hybrid and PHEV technology, Toyota is an ideal position to strengthen its hold on this market segment and increase overall sales in Europe.In fact sales targets for 2013/14 for hybrid vehicles are initially set at 14% and 20% at a later stage. Various governments are imposing lower licensing fees on hybrid vehicles thus providing the perfect incentive for consumers to opt for a Toyota hybrid model * Soaring fuel prices are driving consumers to look for alternative modes of transport. Toyota's hybrid and PHEV vehicles are very fuel efficient thus providing Toyota with the perfect opportunity to increase its market share. * Toyota plans to start manufacturing part s for hybrid and PHEV in Europe once sales reach 150,000 hybrid vehicles per year.At present, these parts are imported from Asia and the US. The production of parts in Europe would bring significant savings in transport and logistical costs which would bring a lower cost per unit and in term allow Toyota to be even more competitive with its prices. This would also put Toyota in a position to offer maintenance services to its customers at a lower price. Threats * In recent years Toyota has had to recall millions of vehicles due to defective brakes, suspensions and accelerator units. Recalls have cost Toyota millions of dollars in the past and they continue to be a costly problem in the present and foreseeable future.Recalls can also have a negative effect on brand equity and effect sales growth in the long term. * New brands could increase competition and erode Toyota's sales. New entrants from Korea, China and India are providing various market offerings, at different levels of qual ity and at increasingly competitive prices. * Soaring fuel prices and raw material prices could have a negative impact on costs of production and distribution therefore further reducing profitability. * Economic factors such as the global recession in the last 3/4 years and the lack of consumer confidence in banking institutions will have a negative effect on sales.In recent years, unemployment rates have risen in Europe making selling expensive commodities, such as cars, even harder. 2. 5 Competition The Automobile industry is in itself a fiercely competitive industry. Even more so in the European market place due to the numerous European car manufacturers. Toyota faces stiff competition from most European car makers as they market and sell the bulk of their products in Europe. Therefore when it comes to purchasing a car, the European consumer has many more product offerings to chose from. Most of the European car makers have developed entire fleets of cars to suite different budge ts, demographics and astes. In Europe, specifications such as miles per gallon, design features and retail price, have become battle grounds for car manufacturers. Toyota also faces a socio-cultural challenge: European car manufacturers take pride in the fact that their cars are designed and built in Europe for Europeans. This, in a way, can prove to be an advantage for brands such as BMW, Mercedes-Benz and Volkswagen. These brands can give the perception of being able to understand the European consumer's needs better than their Asian and American counterparts. Toyota also faces stiff competition from other Asian manufacturers such as Kia, Hyundai and Honda.These manufacturers have also realised the importance of maximising fuel efficiency (with particular emphasis to small urban/city cars). Asia manufacturers have also been able to compete when it comes to retail price. Labour is relatively cheap in certain parts of Asia, thus allowing Asian manufacturers to keep costs of producti on low and passing on the savings to its customers. Competition has also risen due to new entrants into the European market. American giant General Motors launched Chevrolet Europe in 2005. Chevrolet have redesigned product offerings and created new product offerings to suit the European market.

Thursday, August 29, 2019

Environmental Impact Analysis Assignment Example | Topics and Well Written Essays - 1250 words

Environmental Impact Analysis - Assignment Example Every meeting that is regularly done, the topics include all the environmental concerns that relates to every project. The recent meetings for 2015 is summarized below with highlights on the project proposal description, major key players, environmental issues related to the project, actions done, and fairness of the project. The project proposes construction of a three levels open parking garage with dimensions 91, 800 square foot, having 304 spaces with project location at the Century Centre Office Complex. The scope of works includes removal of the already existing 143 parking spaces and the current landscaping. The addition of 161 new spaces for parking with the 143 existing spaces would sum up to 304 spaces per level. In totality of the construction, there will be 1,013 parking spaces that would be created. The project with title â€Å"Century Centre Parking Structure† with Project Number PA 14-083, is a project of the Executive Office of the Planning division of the City of San Mateo. The proposed project will be located in 1400 and 1450 Fashion Island Boulevard, San Mateo, California. The planning is headed by Tricia Schimpp, with Senio Partner, Tom Wagner of the Harvest Properties. The project will provide more parking space for the workers, residents, and to all the people in the nearby vicinity. The proposed project site is at the Century Centre Office Complex with two towering office building at the middle of the parking lot. The site is surrounded with low to high multi-family at the north and south end, respectively. An executive office and the Marina Lagoon are located at the east and west side respectively. The location of the proposed project is at the Century Centre Parking Structure with address at 1400 and 1450 Fashion Island Boulevard with Parcel No. 035-440-690 and 035-440-700. A location map has been provided showing the project site location highlighted with yellow for emphasis The proposed parking lot

Wednesday, August 28, 2019

Gambling From a Utilitarian and Deontology Point of View Essay

Gambling From a Utilitarian and Deontology Point of View - Essay Example According to the study deontological and Utilitarian theories do not essentially forbid the involvement of gambling as a moral wrong but they show a moral basis which one should consider when deciding whether to dive into gambling or not. The moral status of actions relies on the character of God i.e. what is right and wrong in the eyes of God contrary to Utilitarianism that reflects the will and desires of man. Deontology may adjudicate gambling as honorably wrong. This is the case even in occurrences where nobody is hurt as a result of the act and actually successful results were achieved. Deontology submits that being honest is always right and mainly checks the action. Utilitarian school of thought on the other hand is seen as a hunt of one’s interests where one avoids pain and runs after that which makes them happy. Sometimes Utilitarian thinking cannot be avoided, but there are instances where consideration for other people should be taken up as a boundary so as to avoid purposely stepping on other’s toes to obtain one’s pleasure. Happiness is always a good thing and people consider it before they partake in an action or make the decision on whether to act or not. If there is something wrong in doing a certain act such as gambling, then this cannot be the purpose of pleasure as it should result into happiness. Therefore, gambling cannot be viewed as moral on the mere ground that people enjoy it. This is in accordance to Utilitarian views but there is the aftermath of gambling where a gambler becomes addicted. The Utilitarian proponent pursues the experience of the moment when the act is being done as it brings pleasure but they do not take into account what the gambler shall go through especially if they become hooked to gambling. Petrenko and McArthur in their work, High Stakes Gambling with Unknown Outcomes: Justifying the Precautionary Principle submit that, when actions done by people may lead to moral danger that should not be ac cepted, actions must be taken to avoid such harm. Gambling affects people of all walks of life, be they old or young, and this is irrespective of what their gambling is about. The problem is not the act of gambling that brings pleasure at the time but mainly its consequences afterwards. Gambling is tied with addiction and even violent scenarios that rarely end well. In the game of gambling, there is also trickery involved and this goes against deontological values that view for truth pointing out that one should keep their promise. The case of gambling is one against honesty and morality on one hand and pleasure on the other hand. As a common weakness of human nature, many people tend to go more for pleasure and towards the easy way out as opposed to that which is moral. Deontology propagates an array of competing theories on what decides the moral status of an action, whether the action is right or wrong.

Tuesday, August 27, 2019

Facebook. What is the real true of founding Facebook Essay

Facebook. What is the real true of founding Facebook - Essay Example Facebook is one of the biggest web sites in the world and is visited by 400 million people a month.It made Mark Zuckerberg,its founder,one of the richest young men in the world.In the book â€Å"The Accidental Billionaires† and the movie â€Å"Social Network†,the story of how Zuckerberg gained five hundred million friends through Facebook but lost his best friend Edurado Saverin is portrayed. The story has many ups and downs, but is a truly fascinating one. Facebook has revolutionized the way that people communicate and interact in a social manner. In many ways, it has brought the world closer together. The fact that it destroyed so many friendships among those who created it is a very ironic fact. A great deal of attention has been paid to this issue, and for good reason: it is a highly dramatic one. In both the â€Å"Accidental Billionaires† and the â€Å"Social Network† the story is dramatized and presented for all to see. The reader and viewer comes to see how money got between friends and how ruthless business practices destroyed relationships. As Facebook got bigger, things became more complicated. Eduardo began trying to implement new business ideas without telling Mark. In one email exchange that has become public Mark wrote to Eduardo as follows: â€Å"You developed Joboozle knowing that at some point Facebook would probably want to do something with jobs. This was pretty surprising to us, because you basically made something on the side that will end up competing with Facebook and that's pretty bad by itself.

Monday, August 26, 2019

Describe the social structure of a chiefdom. What were the specific Essay

Describe the social structure of a chiefdom. What were the specific social rankings and how were these determined - Essay Example There is a variance of simplicity and complexity in different chiefdoms occasioned by reasons such as scale of development, financial capability and the orientation to a person or groups. An example of a chiefdom with a simple scale of development is one with low population rate that is led by a single level of hierarchy. This kind of a chiefdom is usually group-oriented while its source of finance being staple finance. On the other hand, a complex chiefdom has a high population rate under a minimum of two levels of hierarchy (Scupin, 2012). According to the societal structure of chiefdoms, they mainly comprise of clans, lineages, and other important groups. The ranking is principally in strata and it depends on the relationship to a chiefly family unit. In the stratification of clans, the hereditary status of a person and their relationship with other people in a clan stratifies their status (Scupin, 2012). The marriages in these clans are usually infused in endogamy within a specific stratum and they are based on patriarchy. This implies that senior men often are in dominance in chiefdoms. Importantly, there is an upper and a lower stratum, where the upper one is usually polygynous and most respected. Moreover, chiefdoms maintain primogeniture, implying that the firstborn children of the chiefs inherit the leadership upon the chief’s death (Scupin, 2012). In the matter of tribes, chiefdom is attained by predominantly by checking into a person’s achievements. This implies that a chief in a particular tribe is chosen on the merit of primogeniture but after analyzing his achievements. Chiefdoms remain the most complex of political systems occasioned by the different groups in an individual community. However, in clans, a chief is chosen basing on a person’s relationship to a chiefly family; whereas in a tribe, a chief is chosen based on their personal achievements. The constant factor for the attainment of the chief

Sunday, August 25, 2019

Nursing as a Profession Research Paper Example | Topics and Well Written Essays - 1250 words - 2

Nursing as a Profession - Research Paper Example Nowadays, there are several professions which an individual can select according to his skill and knowledge. According to Michael Plaut, PhD, the assistant Dean for Student Affairs Associate Professor of Psychiatry University of Maryland School of Medicine, a professional is person, with a specialized body of knowledge, set of skills, who beholds certain group mission or identity and maintains a set of standards of behavior and practice (Plaut, n.d.). From this, it transpires that a nurse, whose job involves all these factors and more, is a professional. Thus, it can be argued that nursing is a profession and not merely job or work. A profession is characterized by its traits. Some traits are common to all professionals. The main thing, which is required, is the diligence in one’s own duty. A person, to be called a true professional, needs to conscientiously be aware of her duties as a professional and follow the ethical principles that guide such a profession. He or she should also be highly competent and well-versed with the requirements of the profession and possess the relevant skill sets. Besides, he or she should also be able to understand the feelings of others and have effective communication skills. A professional should be confident in the work and have the quality of integrity. Moreover, a positive attitude along with the willingness to serve the public, are the qualities that are distinct traits of a professional. If one examines the job of a nurse, it can be seen that a nurse needs to possess all these traits, especially in terms of serving others. The American Nurses Association considers t hat â€Å"the depth and breadth of the nursing profession is meeting different health care needs of the population† (Considering Nursing, 2004). Thus, nursing can, unequivocally, be construed as a profession and not a mere job or call. To explain it further, the term nursing needs to

Saturday, August 24, 2019

Is there an association between Chronic obstructive Pulmonary disease Research Paper

Is there an association between Chronic obstructive Pulmonary disease and acquisition of Pulmonary Tuberculosis - Research Paper Example This review of literature will discuss about the possible correlation of COPD to the acquisition of pulmonary tuberculosis. COPD is often diagnosed with middle-aged adults. Unlike tuberculosis, this disease isn’t transmissible. Experts opined that there is no available cure yet to the lungs and airway’s damage caused by COPD but treatments and change of lifestyle can slow down the advancement of the disease to help a person get a better health and sustain his active life (Blanc, Flazon, Fitzpatrick, Floyd, Garcia, 2010, p. 1). Medical experts explicated that an infected person will often have difficulties in breathing because the airways and air sacs could drop its elastic ability; the air sacs walls are destroyed; the airways thickened and are inflamed; or the airways produce more mucus than what it’s normally producing (Caballero, Torres-Duque, Jaramillo, Bolivar, Sanabria, 2012, p. 1) Often, COPD disease is prevalent among cigarette smokers and those predispos ed to getting lung infections. Aside from difficulty of breathing, they cough a lot and produce deep wheezing and excessive amount of mucus, thus, tightened the chest and other symptoms (NIH, 2012; Crothers, Butt, Gibert, Rodriuez-Barradas, Crystal, & Justice, 2006, p. 1326). Family members who live with smokers are likely to get second-hand smoke and may acquire COPD or emphysema or chronic bronchitis. Chronic bronchitis is a situation where the lining of the airways is always irritated and inflamed and the lining begins to thicken because of the irritation and subsequent coughing. In emphysema, air sacs, which are found at the end of bronchial tubes, lose their elasticity and the walls where the oxygen and gas exchanges occur, break down and are destroyed. Airways can also get clogged over time, creating a very dangerous situation in breathing for people. In essence, at its worst example, people are suffocating to death (NIH 2012). As COPD affect the lungs, so its tuberculosis. Un like COPD, tuberculosis is a contagious disease and the transmission could be airborne. Like COPD, if not cured, could lead to the early demise of patient. In similar context as that of COPD, the country is also plagued with numerous cases of tuberculosis that is estimated to have reached the population of 10 to 15 million people of infection. At a global scale, TB has already killed an estimated 1. 9 million people annually. Health experts reported that nearly a third of the global population is affected with pulmonary TB. Both COPD and tuberculosis affect the lungs and offer similar threats to the life of the person affected with it. Both are deadly, if not cured. As it paralyzes a person from taking an active lifestyle if not medicated, victims or those who choose to become victims of this illness will seriously impact their economic well-being and consequently become a social burden too. The stigma embed in tuberculosis could only be dealt when the family and the patient underst ood the need to undergo six months medication to mitigate the advancement of this disease. Health advocates professed that the only way to resolve this health concern is early detection and treatment to gain tuberculosis control. Based on statistical data of the World Health Organization, one-third of the world’s population is infected with Mycobacterium Tuberculosis. The pandemic has reached an alarming figure of 8.7 million people under new cases of TB

Friday, August 23, 2019

The theme of resistance to social norms Essay Example | Topics and Well Written Essays - 1000 words

The theme of resistance to social norms - Essay Example By examining how she wrote about the theme of female subjugation behind a male-dominated conception, Charlotte Perkins Gilman demonstrated how the non-conforming female character has no choice but to fail. The woman protagonist, who never provides her name, is instructed to remain isolated in an upper room of a remote country house, which she does although reluctantly. As she confides to the reader, she actually felt that another room might be better for her, but this idea was overruled by her solicitous and educated husband and doctor as he continues to put his own desires first. â€Å"I wanted one downstairs that opened on the piazza and had roses all over the window, and such pretty old-fashioned chintz hangings! but John would not hear of it. He said there was only one window and not room for two beds, and no near room for him if he took another.† The room she is placed in is thought to have originally been a nursery, with bars on the windows and old faded yellow wallpaper attached to the walls. This association only serves to highlight her helpless position within the house, particularly as she mentions, even very early in the story, â€Å"He [John] is very careful and lo ving, and hardly lets me stir without special direction. I have a schedule prescription for each hour in the day; he takes all care from me.† Through the course of the story, the woman transforms from an individual who adores the outside and green growing things expressing thoughts and feelings of her own to the horrifying and creeping artificial creation of man as he has shaped her. The idea of the perfect woman is reinforced in The Yellow Wallpaper in the characters of Mary and Jenny, who collectively replace the narrator in her own home, indicating the easy interchangeability of women within this society. â€Å"It is fortunate Mary is so good with the baby† is the only information we’re given of this ideal of

Thursday, August 22, 2019

Emerging Technology Term Paper Example | Topics and Well Written Essays - 2000 words

Emerging Technology - Term Paper Example This paper talks about the meaning, history, application, and limitations among other aspects of nanotechnology. Definition, Meaning and History of Nanotechnology Nanotechnology is basically defined as engineering that deals with functional systems at a molecular scale. It can also be defined as the ability of the engineers to make new attributes by controlling features at a nanometre scale (Davies 1). This is the technology that has been used to manufacture the microsystems which have reduced voluminous devices into modern day small devices. Nanotechnology is not only able to produce small devices but also devices which produce minimal waste (Davies 1). Although nanotechnology has gained momentum in the second half of the 20th century, it was James Clerk Maxwell who first toyed with the idea in 1967 (Knol 3). He had called for an experiment of small entities with an aim of handling person molecules. Richard Adolf Zsigmondy became the first person to use nanometer to characterize par ticle sizes in 1914. Modern nanotechnology was suggested by Richard Feynman in 1959 (Knol 2). He brought forth the notion of constructing devices and machines in molecular scale. Gordon Moore went ahead to predict how modern day circuitry would look like in 1965. He did this through his rule which has been practical for 50 years. The nanotechnology applied today was defined by Tokyo Science University lecturer, Norio Taniguchi in 1974 (Knol 3). He defined nanotechnology as the process involving separation, consolidation, and deformation of supplies by use of one molecule or atom. This was followed by discoveries such as the Finns’ atomic layering process. Recognition of this process by the entire scientific community put nanotechnology on the map. Application of nanotechnology was first done by Eric Drexler, a famous nanotechnological scientist, using the idea of molecular manufacturing (Knol 4). He argued that molecules would be a tight collection of marbles if atoms were ta ken to be marbles as represented in figure 1. This saw the molecules become standard scaled tools. These nanoscale tools worked in the same way as their significant counterparts irrespective of their size. The bonds between atoms could hold them together to form parts of nano machines. Drexler had visualized that these nano bots would be used as assemblers so as to place atoms into any desired shape. Drexler went ahead to argue that coal could be modified to diamond and computer chips could be formed from sand. He also explained that the process of manufacturing goods would be quickened by reorganizing the atoms that make them. This ignited the minds of many scientist who consequently devoted their time to develop nanotechnology and its applications we they are seen today. Fig. 1: Tight collection of marbles/atoms Courtesy of hplusmagazine.com Recent Business Applications of Nanotechnology Nanotechnology has had widespread applications in all sectors of the economy. Due to its prove d success in the manufacture of nanometer scale products, it has attracted all industries. Currently, it is the leading in production and application of

Why did the 1905 Russian Revolution break out Essay Example for Free

Why did the 1905 Russian Revolution break out Essay The 1905 Russian Revolution was the first of the revolutions that took place in attempt to overthrow Russias Tsarist (or Imperial Autocracy) regime. The revolution broke out in 1905 because of the public unrest and economic depression caused by the Russo-Japanese war in 1904-5; and because of the Bloody Sunday of January 9th, 1905. The significance of the 1905 Revolution was determined by the October Manifesto, which was the Tsars response to the revolution, and by the Tsarist-opposing parties realisation after the Tsars issuing of the Fundamental Laws. In 1904 the Tsar Nicholas IIs Minister of the Interior, Plehve, recommended to him that Russia expanded its Empire in the Far East and in doing so create a small victorious war to stop the revolutionary tide. The resulting Russo-Japanese war was a failure for the Russians, as the Japanese seized Port Arthur and destroyed most of the Russian fleet. The war ended in 1905 with Russia defeated by Japan. Although the resulting peace treaty (the Treaty of Portsmouth) was relatively easy on the Russians, the defeat was humiliating as Japan was only a second-rate power and should have been easily defeated by Russia, one of the five great powers of the time. The war itself caused significant economic strife in Russia, creating food shortages and mass unemployment. This, added to the public opinion that the war with Japan had been completely unnecessary, created unrest among the Russian population, and many of those who were upset blamed the Tsar. On January 9th 1905 the Leader of the Assembly of Russian Factory Workers, Father Gapon, led 150,000 workers to the Winter Palace in St. Petersburg to hand the Tsar (also known to the people as the Little Father of Russia) a petition asking for the release of political prisoners; freedom of speech, press, meetings and conscience in religion; universal and compulsory education; responsibility of the ministers before the people; and equality before the law of all. The Assembly of Russian Factory Workers was tolerated by the government because the police had several informers -including Father Gapon himself- in the group. However, on the workers arrival at the palace, the troops there opened fire on the mass, killing more than a hundred of the demonstrators. This caused the Russian view of the Tsar as their Little Father to be completely shattered and produced a great deal of unrest and  sympathy strikes, leading to the 1905 Russian Revolution. One significant effect of the 1905 Revolution that brought about political change was the Tsars response to the revolution. In order to appease those who would overthrow him, Nicholas II set up a Duma (Russian Parliament) under the October Manifesto of 1905, as well as a set of constitutions granting freedom of conscience, speech, meeting and association and promising that in future no one would be imprisoned without a trial. Although many Russians felt that the Manifesto was not enough of a reform, the small step towards democracy was also seen as a basis for further development, and was enough to put an end to the revolution. The first and seconds Dumas were dissolved by Nicholas as they contained too many radicals from parties such as the Mensheviks, Bolsheviks, Octobrists and Constitutional Democrat Party. However, these first two Dumas allowed the Russian people to discuss and vote on issues, which to them was the slow beginning of a democracy, and was very significant in bringi ng about political change. The fact that the October Manifesto was meant by the Tsar not to bring about change to Russia, but to stall for time, was made clear to the Russian population when Nicholas II issued the Fundamental Laws in 1906. These laws stated that The Emperor of all the Russias possesses the supreme autocratic power, and The Emperor approves laws; and without his approval no legislative measure can become law. While the Fundamental Laws also confirmed the rights granted by the October Manifesto, they sent out the message that while the Tsar had granted the Russians a Duma, Russia was still very much an autocratic country, and that the Tsar could take away the Duma any time he wished. After these Laws were issued, Tsarist-opposing parties such as the Mensheviks and the Bolsheviks realised that there could be no real political change in Russia while the Tsar was still in power. This idea, brought about by the Fundamental Laws, was of crucial significance in bringing about political change in Russi a. In conclusion, the 1905 Revolution broke out in Russia because of unrest and the depression caused by the Russo-Japanese war in 1904 to 1905; and because  of the Bloody Sunday on the ninth of January, 1905. The 1905 Revolution was of important significance in bringing about political change by 1912 because the Duma granted by the October Manifesto allowed the Russian people to get their first taste of democracy, and because the Fundamental Laws issued by the Tsar the following year made them realise that in order to bring about political change, they must overthrow Nicholas II, Tsar of Russia. Bibliography: Lenin and the Russian Revolution by Steve Phillips, published 2000 http://en.wikipedia.org/wiki/Revolution_of_1905 http://www.historylearningsite.co.uk/1905_russian_revolution.htm

Wednesday, August 21, 2019

The Role Of Cryptography In Network Security Computer Science Essay

The Role Of Cryptography In Network Security Computer Science Essay Network security is concerned with the protection of network resources against alteration, destruction and unauthorized use, cryptography and encryption are most critical components of network security. In my assignment, as a network security manager, I will try to research explore the performance of various cryptographic schemes and evaluate web security and the security of wireless network system. Networks take all kind of sensitive data and security play a vital role of any wireless network system. Security certify level of data integrity and data confidentiality as maintain wired network, without accurately implement security measures and wireless network adapter come within range of the network adapter. Security is high lack, laziness, and lack of knowledge and employee are not aware of these things, especially in small organisation and home, every organisation need to aware and training for employees time to time. Cryptology has two components, kryptos and logos. Cryptographic methods to certify the safety and security of communication and main goal is user authentication, data authentication such as integrity and authentication, non-repudiation of origin, and confidentiality and it has two functions encryption and decryption. In my research, as a network security manager, I will analyze cryptography, web security, and security of wireless network system to implement the network security strategies for the organisation in future. 1. Explore and explain different types of cryptography and assess the role of cryptography in network security. Cryptography has different methods for taking clear, readable data, and converts into unreadable data of secure communication and also transforms it back. Cryptography is also used to authenticate identify of message source and certify integrity of it. Cipher send message and use secret code. The cipher scrambles the message so that it cannot be understood by anyone other than the sender and receiver. Only the receiver who has the secret code can decipher the original message, thus ensuring confidentiality. (Citrix-system, 2010) Type of cryptography Following three common types of cryptography as below: Secret key cryptography is identified as symmetric key cryptography. Both sender and receiver know same secret code described the key and messages are encrypted by the sender and use key, decrypted by the receiver. It use single key for both encryption and decryption. This method works healthy if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. Secret key cryptography use is such as data encryption standard, advance encryption standard, Cast-128/256, international data encryption algorithm, and rivest ciphers etc. (Citrix-system, 2010) Public key cryptography is called asymmetric encryption and use couple of keys one for encryption and another for decryption. Key work in pairs of coordination public and private keys. Public key can freely distributed the private key. If senders and receivers dont have to communicate keys openly, they can give private key to communication confidentially. Public key cryptography use for key exchange and digital signatures such as RSA, digital signature algorithm, public-key cryptography standard etc. Hash functions use a mathematical transformation to permanently encrypt information. It also called message digests and one way encryption. Hash function use to provide a digital fingerprint of file contents and it is commonly employed by many operating system to encrypt passwords and it provide measure of the integrity of a file. It is also use message digest, secure hash algorithm, RIPEMD etc. (Kessler, G,2010) The role of cryptography Many feature combine to throw network security to the top issues in the organisation and face IS professional daily. Nowadays business operation decentralization and correspondence growth of computer network is the number one driver of concern about the network security. As far as security concern, many organisation networks are accidently waiting to occur, such accident will occur is impossible to predict but security breaches will occur. When organisation network security chooses is 100% involve cryptography technology. The following five basic uses of cryptography in network security solution are: Confidentiality Cryptography gives confidentiality through changing or hiding a message and protects confidential data from unauthorized access and use cryptographic key techniques to critically protect data; Access control Only authorized users (login password) can access to protect confidential data etc. Access would be possible for those individual that had access to the correct cryptographic keys; (Mitchell, M, 1995) Integrity Cryptographic tools give integrity verify that permit a recipient to authenticate that message transformed and cannot prevent a message from being transformed but effective to identify either planned and unplanned change of the message; Authentication is the ability to verify who sent a message. It done through the control key because those with access to the key are able to encrypt a message. Cryptographic function use different methods to certify that message is not changed or altered. These hash functions, digital signatures and message authentication codes. 2. Explore encryption for network security. Encryption for network security Encryption is the most effective method to reduce data loss or theft to encrypt the data on the network security. Encryption is a process of network security to apply crypto services at the network transfer layer on top of the data link level and under the application level. Network encryption other name network layer or network level encryption. The network transfer layers are layers 2 and 4 of the open systems interconnections (OSI) is the reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts. Encryption for network security execute through internet protocol security and set of open internet engineering task force (IETF) standard and apply in combination and build structure for confidential communication over IP networks. Internet protocol security works through the network architecture and encrypted packets show to be the same to unencrypted packets and rout through any IP network easily. Network encryption product and services provide several companies such as Cisco, Oracle etc. (Search security, 2010) http://www.cipheroptics.com/images/network-encryption-big.jpg Figure 1 Network Encrypted 3. Critically review the key and password management in terms of network system security. The key management Information become essential assets and protects it and availability is vital for business success. Encryption is the technology for doing so and become significant part of network system security. Encryption key is very helpful to secure data and information. There are two types of key public and private key use to secure the information and network. These key used in cryptographic system as below: Public Key it was invented in 1976 and refer to cypher architecture type and apply two key pairs is encrypt and decrypt. It can use to encrypt message and corresponding private key to decrypt it. Public key encryption believe extremely secure because it does not need secret shared key among the sender and receiver. It is helpful for keeping private emails and stored on mail servers for many years. It programs such as PGP has digital signature ability built message sent can digitally signed. Private Key it also called secret key and encryption/decryption key to exchange secret messages and shared by the communicators so that each can encrypt and decrypt messages. Public key uses with private key together. (Search-security 2010) Password management Password is the most important aspect to login into the system and the network. Organisation should allow only authorised users to access to the network and every user access individual login and passwords to enter the network, its result increase the security aspects. There are following necessary things to secure password in the network system as below: Long Password every user need to long password because short password can very quickly compromised and analyse the permutation based on the password length; Change password anytime employee should change password regularly, nobody assume easily and helpful for security breaches of the network; Avoid utilize similar password dont use the same password for different accounts because it would naive for administrator to think and employee should use different password for safety and security for network system; Necessity to changing password regularly employees also gradually more access their work accounts from remote location, user need to educate/awareness on the required of altering the password frequently. (Storts, J, 2010) 4. Compare symmetric and asymmetric encryption systems and their vulnerability to attack. Symmetric encryption systems and their vulnerability Symmetric encryption system use same secret key is used to encrypt and decrypt information and transform between two keys. Secret key concern to information to transform the content because both can use encrypts and decrypts traffic. Symmetric encryption system has two types are: Stream ciphers it is bits of information one at a time and operates on 1 bit of data at a time. It is faster and smaller to implement and have an important security gap. Certain types of attacks may cause the information to be revealed; Block ciphers it is encrypts information by breaking it down into blocks and encrypt data in each block and this data is fixed sized commonly 64 bit and mostly use in triple DES and AES. (Encryptionanddecryption, 2010) Symmetric encryption algorithms including Des, 3DES, AES, and RC4 etc. 3DES and AES are normally used in IP sec and other types of VPNs. RC4 is used on wireless networks and used by WEP and WPA for encryption. Symmetric encryption algorithms can be extremely fast, and their relatively low complexity allows for easy implementation in hardware. However, they require that all hosts participating in the encryption have already been configured with the secret key through some external means. (Stretch, J, 2010) Symmetric Encryption Vulnerabilities are: To break symmetric encryption system through brute force and cryptanalysis; Figure-2 Symmetric encryption system Weak password can break symmetric encryption systems; Password always keep in mind or make a backup copy of the password; Exchange secret keys in secure manner and stored properly. (Encryptionanddecryption, 2010) To leaking and spying out password. symmetric_encryption.png Asymmetric encryption systems and their vulnerability Asymmetric encryption system use two keys one for encryption use for public, anyone can encrypt a message and another for decryption use for private and only receiver can decrypt a message, normally set up a key pair within a network and involve in six main elements are: Plaintext Text message applied in algorithm; Encryption algorithm it performs mathematical operation to conduct substitutions and transform to the plaintext; Public and Private keys the keys pair where one use for encryption and other decryption; Ciphertext produce encrypt message by applying algorithm to plaintext message through using key; Decryption Algorithm generates ciphertext and match key to produce the plaintext. (Encryptionanddecryption, 2010) Most common asymmetric encryption is RSA and if compare with symmetric encryption it is much slower but its capability to establish secure channel over a non-secure medium such as internet. This is accomplished by the exchange of public keys, which can only be used to encrypt data. The complementary private key, which is never shared, is used to decrypt. (Stretch, J, 2010) asymmetric_encryption.png Asymmetric Encryption Vulnerabilities are: Figure-3 Asymmetric encryption systemPublic key can be distributed freely; It is computing intensive; It process very slowly; Weak password can easily steal; Weak encryption to break this system; Crash digital signature; Security breach at the time of key exchange. 5. Explain and critically assess web security and critically list down different type web security tools and technologies. Web security Web is very vital role in our daily life such as online searching, surfing, customers, vendors, co-staffs, email, etc but need to be web security and identity theft protection. Web security has many problems like spam, viruses, security breaches theft etc. This problem with web security is the part of network of attack computers and servers send out spam messages without knowing it and email / passwords produce and re-sale to competitor. In my research, security expert says that shows you how to do something in five minutes and conveniently neglect to mention the security implications of their advice. If it sounds too easy to be true, it probably is. A perfect example of this is PHP solutions that use a file for data storage and ask you to make it writable to the world. This is easy to implement, but it means that any spammer can write to this file. (Heilmann, 2010) Web security has many risk and attacks such as IP address identify the computer, Fixed IP address is larger security risk, share network, staff unaware security leak in the network setting, SQL injection attacks, exploits browsers and websites, remote file inclusion (RFI), phishing etc. (Heilmann, 2010) Web Security Tools and Technologies The following list down of different type of web security tools and technologies as below: Spike Proxy It is a professional grade tool for looking for application level vulnerabilities in web application and cover SQL injection and cross-site-scripting; Power fuzzer It capable of spidering website and identifying inputs and common web vulnerabilities such as XSS, SQL injection and support https. Written in python; Sec point penetrator It network security tools based, penetration testing appliance or web based service give vulnerability scan pen testing and can change IP address to scan and report; Net sparker It allows users to exploit the identified vulnerabilities and see real impact of the problem. It capable false positive free, handling of websites that rely on AJAX and JavaScript; OWASP It uses multiple techniques such as conditional errors injection, blind injection based on integers, strings/statements, MS-SQL verbose error message and identify database version and gather information Gama Sec It is automated online website vulnerability assessment delivers test to web servers, web based application and web-interfaced system and support HTTP authentication schemes, HTTP protocol, BASIC etc; NIkto Scanner Open source web server scanner and perform complete tests against web servers for multiple items, dangerous files, CGIs, and problems of the server; Perimeter check it analyze external network devices such as servers, websites, firewalls, routers and security vulnerabilities and also lead to interrupted service, data theft, system destruction and help immediately remedy security problem. (Hower, R, 2010) . 6. Identify vulnerabilities and mis-configurations in wireless networks. Vulnerability and mis-configuration describe as some event that exposes organisation and network security has ability to work efficiently its required confidentiality level and protects lack of the systems. Wireless networks vulnerabilities Some of the following common wireless networks vulnerabilities as below: No set physical boundaries wireless access points can lose signals, due to doors, walls, floors, and insulation etc; Untrained users setting up unauthorized networks and workstation untrained users who either are uninformed and therefore unaware of security measures that must be taken when deploying wireless, or whose desire to have wireless is so strong that it completely overshadows the rules set by the organization to ensure that systems are secure. (Lane, H, 2005) Rogue access points this attack consist of connecting illegal access point on the network; Lack of monitoring every organisation has some loopholes in monitoring but intrusion detection tools can use continuously monitor to secure the network system; MAC address filtering it is unique number assigned and wireless LANs allows access point to connect to network. Filtering can result in security breach as user change MAC address, it result identity theft; Insufficient encryption standards weak encryption standard say that users will not enable it and harmful to wireless LAN as weak encryption; Easy to eavesdrop wireless use airwaves to listen easy on network traffic or connect to network and it results the data is encrypted with strong encryption. If WEP encryption use, hackers can some attempt to decrypt the information; Unsecure holes in network hacker can enter wireless LAN by circumventing firewalls and allow other to come, as a result confidential data lost or may compromise on the network; Denial-of-service attacks external causes based is Denial-of-service attacks and make network unproductive and forcefully user to disconnect continually disrupting operation in the organisation such as jamming (jam a radio network), rush access (overload network with malicious connection), spoofed de-authentication frames etc. (Lane, H, 2005) Wireless network mis-configuration Mis-matched software and hardware it is problem arises for network infrastructure that is vulnerable to wide range of attacks. Sometime function work properly but awfully mis-configured; Service Set ID (SSID) SSID is a configurable identification mechanism to enables a client to communicate with the correct base-station. Configured properly with SSID otherwise attacker can exploit the SSID in attempt to access base station and change SSID password and change 802.11 security settings for authentication. (Spam-laws, 2009) 7. Demonstrate how to keep wireless network system safe. Nowadays, wireless network become more common called Wi-Fi /802.11 and allow computer to connect to another without cables and using computer easier and more convenient than ever before with fast internet connection and wireless router and surf internet, data transfer, print documents, email, download information etc but unhappily, it also make easy for outsider/hacker to do the same. Organisation should following points to keep wireless network system safe and secure as below: Keep-out undesirable wireless guests wireless network restrict access through encryption is easy through which encoding or scrambling information to receive and send, only those can access with right password or encryption key and restrict wireless network to normal office hours. Some encryption protect wireless network such as wired equivalent protection (WEP), Wi-Fi protected access (WPA), WPA2 etc; Choose strong password in my research, I found some basic guideline when create a wireless network password is Password should be longer (20 characters) it takes someone to figure it out; Use mixture lowercase and uppercase letters; Insert numbers in between letters; Change password every 3 months; Write password down and keep in safe (in case of forget). Use the firewall it is front security and secures network, computers and data from snooping eyes; (Bryan, S, 2010) Dont show the name of the network (SSID); Change default SSID, dont use name to identify the organisation; Use MAC filtering because each network card is unique code known MAC address and access points to restrict access to assured; Switch on and use built-in encryption to prevent eavesdrop; Restrict user ability (network administrators) to setup quick and dirty wireless network, even temporarily. One rogue access point can undo all the good work you do on the others; Certify all security measures are in place, it result defence against intruders; (Microsoft, 2010) Turn off the wireless network when it isnt use; Hide/keep safe place confidential files/data. Conclusion I conclude that security of wireless network system play key role in every organisation and also implement all network security strategies for the organisation in present and future and secure network resources against alteration, destruction, and unauthorized use. Cryptography tools and web security tools are also very helpful to secure the network system and protect IT assets, confidential data and information. Recommendation I recommend some of the important points as below: Better education and stronger security implementation; Wireless network awareness and training for employees timely; Update wireless network security timely; Certify to secure wireless access point with a strong password; When it need implement WEP authentication method; Make sure all users have proper key or password configured on their system; Make sure all service provide to users are protected by end to end encryption; Use SSID, MAC address filtering allows to configure wireless APs.

Tuesday, August 20, 2019

Gender Differences in Early Years Sector

Gender Differences in Early Years Sector Chapter 3 – Literature Review Introduction: The aim for this literature review is to examine the literature on the selected topic of men working in the early years sector and to the objectives of this research by acquire knowledge, through familiarising myself with the literature on the area. The objectives of this research are, to critically analyse the literature on Gender balanced workforce within in the early year’s sector. To explore what are the benefits to children of a more gender balanced childcare service and to identify are there any disadvantages? To identify practitioner’s views on why men in Ireland are not choosing to work in the early year’s sector and to identify practitioner’s views on how to encourage men into the childcare sector and finally to explore issues parents may have, if any on men working in the early year’s sector. Background: For many decades there has been a division of gender within the labour force. Commonly with men found in well paid occupations that are, highly skilled and that involve heavy work such as the construction or transport industries with female workers, on the other hand, have been found in caring nurturing occupations such as childcare, nursing or social work (Garrett, 1987). At present men are a very small percentage of the early year’s workforce in Ireland. Sources of data on the early years workforce show that men are at around 1 percent of the early year’s workforce in Ireland. Considering the huge changes in Ireland over the last decade it is surprising that this figure hasn’t really changed over the last ten years. So it isn’t surprising that also at present men are a small percentage of the childcare trainees in Ireland. Data gathered from research in other European countries shows some differences but men are usually well below 5 per cent of the early years workforce (see Cameron et al, 2003). This data from Europe also shows that Denmark has the highest proportion in Europe of male childcare workers, in Denmark men are 8% of the early year’s workforce. Benefits of a more gender balanced childcare workforce: The early years sector is not only a big employer in its own right but the early years sector is essential to enabling parents especially mothers to take up employment in the workforce. The childcare sector is, therefore, important to the achievement of gender equality in the workforce of Ireland. Increased participation of mothers in the labour market reduces child poverty and improves educational outcomes for children (see Penn et al, 2004). An important element of early years care and education is to promote inclusion and valuing diversity a more gender balanced workforce contests stereotypes and shows gender equality to young children. In this way, it is seen to enrich the quality of childcare (see Cameron et al, 1999; Moss, 2000). It is expected that in practice males will bring diverse skills to the workforce, reflecting on their own gendered rearing. (Jensen, 1996) argues that the quality of childcare is improved for children because it exposes them to diverse styles of playin g, caring and instructing. The literature frequently states that such diversity enriches the range of children’s experiences while attending an early years’ service. It is proposed that children can benefit from seeing a male in a caring, nurturing and responsible role, particularly in terms of their relationships with others, behaviours and attitudes. (Daycare Trust, 2002), Furthermore Miller (1986) draws our attention to the fact that a conflict of identity can be experienced by both male and female teachers; between teachers’ roles as ‘nurturers’ and ‘carers’ on one hand, and on the other hand their professional role as educators (as cited in Drudy, Martin, Woods O’ Flynn, 2005, p.23). The literature suggests that male childcare practitioners can be positive male role models for children these benefits are mostly spoken about in relation to the benefits for children of lone mothers as cited in Cameron, 2001, (Jensen, 1996) suggested that ‘the presence of male childcare workers could go some way towards providing constant, positive male role models for these children, as some kind of compensation for what is missing at home’ this is disputed by Christie (1998) as cited in Cameron, 2001 p. 435 Christie argues that ‘this model does not explain how, why, or for whom, male workers are expected to compensate, or whether compensation is possible’. Christie goes on to state, it may be wrong to assume that a child lacks a ‘father figure’ or other type of role model simply because they do not live with their father. And that it may not be realistic to expect a male worker to fulfil this role when such expectations are not placed on fema le childcare workers. Furthermore Owen (2003) states, it is unclear whether males provide role models for children by being as he say ‘traditional’ males in a female environment, Owen questions is it by engaging in so called ‘male’ play activities such as sport, or by challenging stereotypes by taking on a more traditionally ‘feminine’ caring and nurturing role. Further evidence to support such claims is provided by Bricheno and Thornton (2007) who found no indication that children even saw their teachers whether they are male or female as role models (p.394). Even though the concept of men in childcare being role models may be weak, it is supported by parents, early years employers, and the general public (Daycare Trust, 2002). Every child is unique in their own individual way and has specific individual needs that need to be met in a responsive and appropriate manner by those who are caring for them. Children who are been cared for by Early Childhood Practitioners on a full-time basis within a pre-school setting are in their care for more than eight hours a day, therefore it is extremely important for Child care practitioners to meet their physical and emotional needs all the time in order to form close emotional bonds with children. According to Roberts (2010), childcare practitioners learn to recognize children’s emotional and physical cues and respond to them promptly and appropriately. By doing this she believed that practitioners allow for close emotional relationships to blossom (Roberts, 2010). As a result of these emotional relationships, Roberts (2010) also believed that they pave the way for children to develop healthily. This idea is highlighted by Benson et al (2009), who state that one of the most important contributors to healthy development is children developing close emotional relationships with a responsive and nurturing caregiver. Nowhere in this literature is it stated that gender affects the ability to care for a child. Barriers to men working in the early year’s sector: The literature suggests that main barrier to men working in the early year’s sector is the fact that there is such a low rate of pay and that childcare practitioners level of qualifications are not represented in their rate of pay as cited by RTE News online (18/2/2015), The association of childhood professionals said that over 25,000 people are working in the early years sector where the typical income is less than â‚ ¬11 an hour. Marian Quinn the associations chairperson stated that the situation is unsustainable because young people are choosing better paying careers instead of the early years. Furthermore the Irish Examiner (3/1/2015) argued that Representative bodies have been flooded with accounts of workers, qualified to degree level and with many years of experience, earning just â‚ ¬18,000 per annum. For a male who is the bread winner of a family this would not be sustainable Research by the Daycare Trust (2003) stated that nearly half of over 2000 adults that w ere interviewed said that better wages would encourage more males to work in the early years sector. Not surprisingly (Drudy, Martin, Woods et al., 2005,) found that In an Irish study of school-leavers and student teachers ‘low pay† was given as a primary reason for fewer males in primary teaching. Another prominent barrier to the lack of males working in the early years sector is the it is a female dominated sector and the notion that it is women’s work, it is easy to understand that being in a minority may be an uncomfortable experience, and data suggests that this could be one of the key issues discouraging men from working in the early years sector. Historically, early childhood education has been seen as synonymous with caring for and nurturing young children and, consequently, continues to be widely regarded as ‘women’s work’ (Murray, 1996, p.368). Furthermore Daycare Trust (1999) posits that â€Å"Childcare staffs are overwhelmingly women and are strikingly badly paid compared with other caring professionals despite the commitment and professionalism which exists within the industry. Staffs have poor conditions of work and do long hours with little access to training or support. Morale can be low and the best often leave for better prospects e lsewhere.† Interestingly Cameron (2001) acknowledges and asserts that if early childhood work was re-examined, with ‘higher professional status and a higher rate of pay, it could be expected that there would be more male employees, fewer men in the token, isolated situation, and possibly less reason to move on quickly’ (p.444). Many Childcare positions are part-time and this also causes a barrier to males seeking employment in the early year’s sector. At the same time, the availability of part-time employment in the sector suits many women in the sector, a number of who work in childcare while their children are young. This motivation has been found to be particularly strong among childminders, who work on a self-employed basis (see Mooney et al, 2001ab). The high proportion of part-time jobs in the sector is thought to deter men and that they are more likely to seek full-time employment. According to Cameron, (2004). it is also evident that the men that do work in the early year’s sector are more likely to be found holding positions with older children in positions such as after school care rather than working with babies and younger children, This has been explained with reference to men’s preference for working with older children and choosing roles in education more so than caring roles. What needs to be done to increase the numbers of men working in the early year’s sector? As cited by Fine-Davis, et al (2005) highlights that there has been extensive backing for men to consider childcare as a career this was made clear by the European Commission (1992) which called on Member States to encourage and support increased participation by men in the care and upbringing of children. This theme was again encouraged in the White Paper on European Social Policy, A Way Forward for the Union (European Commission, 1994), and by the European Commission Network on Childcare (1990). It was found that despite the unquestionable support for increasing the number of men working in the childcare sector, the recruitment of men into the childcare field has not gained momentum. It has been suggested that particular attention should be focused on recruiting men into this area of childcare but as discussed earlier the barriers such as rate of pay, the lack of professional status associated with the profession and the current lack of males currently employed within the sector ar e barriers that need to be overcome before the possibility of men entering the early years workforce. Cameron, (1997) states that â€Å"It would appear from the example of Danish childcare centres that where the work has been re-evaluated as valuable, and as appropriate for a mixed-gender workforce, the perception of ‘mothering and childcare equals low value work’ no longer holds as a principal motivation for employment in childcare work† (1997a: 64-65). Fine-Davis, et al (2005), also suggests that it is evident that males will not be attracted to the field unless the salaries increase. At present Irish parents are paying some of the highest childcare fees in Europe, this isn’t because Ireland has the most costly childcare in Europe, but because the Irish government invests such a small percentage of GDP. Research also found that many early years’ employers acknowledge that the barriers to recruiting men into the early years sector are significant but they do not see that it is their duty to encourage men into the early year’s sector, but that responsibility lies with the Government, that the government needs to encourage this through advertising or through services such as careers education and guidance (see Rolfe et al., 2003). As cited by RTE News online (2015) Professor Noirin Hayes stated that the current investment in childcare of 0.1% of GDP compared to our European counterpart’s investment of 0.7% is not appropriate, addingchildcare was not a business but a social service and that needs to be recognised. Furthermore to this as cited by the Irish Times (2015) Chief executive of Early Childhood Ireland,Teresa Heeney, said crà ¨che workers that are qualified to degree level 7 or level 8 with many years of valuable experience are being paid as little as â‚ ¬18,000 per year. Furthermore the Irish times also cited Marian Quinn (Chairperson of the Association of Childhood Professionals) she said,â€Å"We are losing many qualified, and skilled experienced and knowledgeable people who can at afford to remain in the profession of childcare. Things need to change on a government level for it to have any impact on the barriers to men working in the childcare sector. â€Å"Equal opportunity needs to be a two-way process, as women move into male dominated areas and are encouraged to aspire to management positions, men should be encouraged into childcare and education, so that male participation becomes the norm rather than the exception.† (Thurtle et al, 1998: 632) Parents views of a more gender balanced early year’s sector: The literature suggests that parents recognise the benefits of a more gender balanced early year’s work force as cited by Cameron et al, (1999) some parents believed men and women had different skills in childcare, with men more able to engage in physical and fun activities, and women seen as more skilled in caring, nurturing and planning. But unfortunately the stigma of it being women’s work and the pre-conceptions that it is not a role suited to males still prevails. Even though parents and the general public mostly support the employment of more males in the early years sector, mainly on the grounds that males provide positive role models, there is also an element of concern identified through research from parents, college lecturers and the general public about the possible abuse from male practitioners (Thurtle and Jennings, 1998; Cameron et al., 1999). Penn and McQuail,1997concour with this stating that the topic of sexual abuse is undoubtedly a most important iss ue discouraging men from seeking employment in the early years sector. Male practitioners working with young children have reported being probed on their motives, and mistrusted of having perverse sexual intentions but there is no research out there that support any of these concerns and furthermore research by the Daycare Trust (2003) found that, although 77 per cent of participants, who included parents of children attending early years services, were in favour of more males working in the sector, 57 per cent said that one of the key barriers to men’s employment was the risk of paedophiles working with children’ and 56 per cent agreed that ‘people could be suspicious of a man working in childcare’ Owen, 2003 argues that this is somewhat unexpected given that cases of sexual abuse in early years sector are exceptionally rare, and that they do not all involve men. Conclusion: In concluding this literature review on men working in the early years sector it is evident through the literature that there are strong beliefs in the benefits of a more gender balanced early years workforce for the children and the workforce of the sector. Majority of the literature on the topic of men working in the early year’s sector seemed to focus on the range of perceived benefits, with particular focus on the benefits to children that attend early year’s services, but there was also a small focus on the benefits to the workforce and for the men that work in the sector. As cited by Scott and colleagues, research in the area of employment in the early year’s sector has focused more on the role of the sector in enabling women to participate in paid employment (Scott et al, 2000). The literature on the barriers to men working in the early years sector was also examined here we found how pay and the lack of professional status were the main barriers to men wo rking in the early years sector. Following this we explored the strategies that were researched on ways to encourage men to see the early year’s sector as a viable career prospect it was discussed that more would have to be done on a government level for any changes to be prompted. Finally the area of the views of parents was explored in this section it came to light that parents did see the benefits to a more gender balanced early year’s workforce but that some parents still had concerns when it came to the safety of their children. It also became very clear throughout the process of this literature review that because of the small percentage of men employed in the early years and the fact that there are very few examples of a mixed-gender workforce, these have not been examined empirically. The researcher was unable to source studies which explored the benefits of a mixed gender workforce through empirical research. Rather, the benefits identified are largely indicative and based on anecdotal evidence. The researcher also noted a lack of research or studies carried out on this area in Ireland. Thus forming an important research agenda for the future, it suggests a need for focused research on mixed gender workforces in childcare, to more accurately identify the benefits to children, parents and the workforce in Ireland.

Monday, August 19, 2019

The Google Culture Essay -- Business Management

Introduction Google was created in 1998 due to the need for a more efficient Search Engine. Actually Google is one of the most successful internet based companies since the booming of â€Å"dotcoms† in the late 1990s and remains a leader. This success is based on its great organisational practices and core competencies. Google ´s success is not only in its technology and the functionality of its product; it ´s also in its aggressive ability to get profits innovating, which is critical to their workforce because it operates in a global market. Through innovations, Google has expanded its services and features. Google today is no longer a search engine company but a web computing Applications Company. This innovative capability, the integrated process and a supportive culture creates the actual sustainable competitive advantage of Google. The focus of this study will be on that very culture that has allowed Google to become the giant it is today. From a garage start up to a company earning billions in revenue, Google has managed to maintain its charm. Google offers the perfect environment for its workforce where communication, respect and freedom are the reigning principles. The company is well known for its informal organization and flexible schedule, however there's a lot more to what is seen on the surface, as we delve into the inner make up of the Google Culture. The Google Culture Google's corporate culture is based on a number of principles that lay in the foundation of the company's success. First of all, members of the Google workplace are seen as equals. Of course for organizational purposes there are managers and those they manage, but this doesn't create any kind of barriers as communication flows swiftly back and forth and... ...e and the effort of staying true to important values that lie at the heart of the organization, Google should be able to move forward with as much grace as it has done in the past. Googlers are at the end of the day what drives the company along, thus keeping a strong and united workforce would be integral elements for Google to maintain its focus on. It's of utmost importance for the company to carefully manage its overseas offices, in order to avoid an internal breakup due to the diversity between them. This should be taken care of by communicating a clear set of values that are present in any culture across the world. This basis of the corporate culture would thus be a linking element despite racial differences. Works Cited http://www.google.com/intl/en/corporate/ http://www.davechaffey.com/E-commerce-Internet-marketing-case-studies/Google-case-study/

Sunday, August 18, 2019

Serialization in A Tale of Two Cities by Charles Dickens :: Charles Dickens

In Charles Dickens' A Tale of Two Cities, serialization is an important and effective tool that divides the literary work into episodes, creating a suspenseful plot. In addition, serialization also creates a "soap opera" effect on the novel's readers, leaving them with a cliff-hanger scenario at the end of each episode. A major effect of serialization is the change it renders in character development. Sydney Carton would be a prime example. In the novel's beginning, he is portrayed as a drunk, a loser with no purpose to his life. However, as the readers go on, they find that Carton is, indeed, not what he seems to be. Ultimately, our reprobate saves Charles Darnay's life from certain death and is instrumental in having him escape to England with his beloved Lucie, their daughter, and his father-in-law, Dr. Manette. Charles Dickens uses an unusual method of serialization that resembles that used by daytime soaps. After covering several plot developments of several characters, usually primary ones, he switches to a series of subplots involving other characters, usually secondary ones. For example, after Dickens covers the adventure of the Marquis St. Evremonde, he jumps back to Darnay. The effect is a narrative hook that encourages the readers to go on. This leads to suspense and, of course, a successful tale. A final, and obvious, effect of serialization is the steady advancement of plot development. As the novel is divided into thematic parts, it gives the readers a definite feeling for the plot and causes them to think about possible outcomes.

Saturday, August 17, 2019

Plague, Pox and Pestilence: Disease in History Essay

The book ‘Plague, Pox and Pestilence’ is an interesting and complete survey of epidemics and diseases, which have occurred in the past. The book was written by a historian, and it contains a lot of detailed information that puts the progression of various epidemics into view, as they relate to societies that are in their developing stages. Western imperialism, Western elites, Western religions, and Western medicine have made these epidemics even more dreadful. Throughout the text, short contemporary reports are shown, which suggest that these epidemics have had an enormous impact on society, especially during the peak of their outbreaks. The book is also aesthetically illustrated with a lot of engravings, drawings and photographs that were collected from plenty of sources. â€Å"Some of the sources used for this book back as far as the 15th century. Although not a â€Å"hard† science book, it should be of enormous interest to all microbiologists. Its size and appearance suggest that the book is aimed at the â€Å"coffee table† to which it would be an interesting if somewhat gruesome addition. † Westwell, J. The book ‘Plague, Pox and Pestilence’ is an interesting read because it brings into focus, the pathogenic killers diseases of the developing world (bubonic plague, leprosy, smallpox, syphilis, cholera, and the tropical fevers, malaria and yellow fever. ) About the Author. Kenneth Kiple is the author of the book ‘plague, pox and pestilence’ He has written several other books including the book ‘Black Yellow Fever Immunities, Innate and Acquired, as Revealed in the American South, A Movable Feast: Ten Millennia of Food Globalization (2007), Contemporary Authors: (1939), The Caribbean Slave: A Biological History (Studies in Environment and History) (2002), Blacks in Colonial Cuba (1976), The African Exchange: Toward a Biological History of Black People (1988), The Cambridge World History of Human Disease (1993), Another Dimension to the Black Diaspora: Diet, Disease and Racism (2003), The Cambridge World History of Food (2000), The Cambridge Historical Dictionary of Disease (2003), and Stone agers in the fast lane? Today’s health and yesterday’s nutrition (University professor lecture series) (1995). He has also written several book reviews, including an article on Malaria: Poverty, Race, and Public Health in the United States, which was published in the Journal of Southern History on the 31st of July, 2005. Book Summary. The book ‘Plague, Pox and Pestilence: Disease in History’ states that epidemics have had an enormous impact on society, especially during the peak of their outbreaks. The book also tries to remind the reader of the larger problem of the consequences of allowing disease and pestilence to multiply, without checking their spread in time. The author succeeds in showing that epidemics have had an enormous impact on society and its development. The book also observes that it is unlikely that most pandemics would have become anything more than an epidemic without the modern methods of transportation. For example, Cholera â€Å"unlike other diseases that require human transportation, can exist outside the human body. † (Kiple, K. F. 1997). It is a bacterium and under the microscope it is shaped like a comma. It only affects humans. Epidemiologists believe that it evolved in the Ganges Delta region and until the modern era, was isolated to that area. Until the arrival of Europeans and their technological transportation inventions including railroads, steamships and canals, cholera had been restricted to India. For this reason, Cholera has been called a disease of the 19th century. Anyone having contact with an individual suffering from this ailment, his soiled bedding, clothing, or infected water sources was a potential victim and transporter of the disease. In its most virulent form, cholera’s death rates were, and are, over 50% for adults and overwhelmingly fatal for the elderly, infants, and the otherwise infirmed. (Kiple, K. F. 1997). The book also enlightens about the mortality rate of diseases like cholera, and about the fears and superstitions of a disease like cholera in the developing parts of the world, and the effects of such superstitions. With great justification, Cholera was perceived as a demonic, evil and foreign force similar if not worse than smallpox or the plague. In its most virulent forms, it was a highly efficient killer and often resulted in a 50% mortality rate among its healthy adult victims. Deaths in India between 1817 and 1860 are generally considered to have exceeded 15,000,000 persons. Another 23,000,000 died between 1865 and 1917. (Kiple, K. F. 1997). The author’s work has made a contribution to the academic community herein because the work succeeded in creating an awareness of diseases and the importance of controlling disease, so as to stop the growth of illness, especially among people in developing countries.