Wednesday, October 30, 2019

Marketing For Non-profit Organizations Case Study

Marketing For Non-profit Organizations - Case Study Example Coming to the Political factors which can influence the museum, it was identified that the Mayor's commission on the inclusion of Asian and African settlers in London into the Heritage could play an instrumental role in deciding if the museum would get the required support from the Greater London Association (GLA) for its further needs. It could also play a role in making a political impression, which could go a long way in the museum's growth. The 2012 Olympics and its preparations were also taken into consideration while formulating the political factors. At this juncture when the Government of UK was looking forward to make rapid changes to the city of London in a big way and also promote tourism, it is an undisputable fact that the museums would directly be impacted from this move. The 2012 Olympics and the Government's preparations for it and also the modernization agenda of London would really help the museum sector in the long run. Likewise, the social factors were identified to be the literacy rate of the city, country and the constitution of the population. Around 28% of the population consisted of the Asians and Africans and it was clearly identified that there was a need to include and appreciate their services too. Hence, extensive SWOT and PEST analyses on the British museum and the museum sector as a whole and suggestions were made. Since the marketing audit is essentially divided into Internal and External m arket analyses, we classify strengths, weaknesses as the internal analysis of the museum. Likewise, we classify political, economic, social and technological factors as the external environmental condition for any organization. It is obvious that the external environment for the museum too plays a crucial role in the growth of the organization in the long run. Marketing Audit and Recommendations It is a well-known fact that the British museum in London is one of the world's greatest museums of human history and culture. Its collections, which number more than 13 million objects from all continents, illustrate and document the story of human culture from its beginning to the present. is a point of controversy whether museums should be allowed to possess artefacts taken from other countries, and the British Museum is notable target for criticism (Albert Gunther, 2003).The Elgin marbles and the Benin Bonzes are among the most disputed objects in its collections, and organisations have been formed demanding the return of both sets of artefacts to their native countries of Greece and Nigeria respectively. The British Museum has refused to return either set, or any of its other disputed items, stating that the "restitutionist premise, that whatever was made in a country must return to an original geographical site, would empty both the British Museum. The Museum has also argued th at the British Museum Act of 1963 legally prevents it from selling any of its valuable artefacts, even the ones not on display. Internal Environment Analysis The Weaknesses Lack of funds, has clearly paralyzed the prospects of development of the museum in a real big way. Under funding has clearly caused discontent among the employees of the organization. In fact there were instances when the employees had gone off their duties in order to protest the government's attitude towards the museum. At a time when

Monday, October 28, 2019

Fitts and Posners Phases of Learning Essay Example for Free

Fitts and Posners Phases of Learning Essay Describe Fitts and Posners phases of learning and explain how you would structure practises to enhance a performance In this essay I will explain Fitts and Posners phases of learning and how I would structure practises to enhance performance. By practising a skill we can become better. Fitts and Posner theories were that everyone has to go through stages of learning, known as the cognitive, associative and autonomous stages of learning. Depending how good a person is at a particular sport, they will fall into a certain category. An example of this is Wayne Rooney. At a young age he was introduced to football and played amateur football from a young age, becoming one of the youngest strikers in football history. However by learning a skill in sport involves the development of skills by practice. An example of this is shooting practise you can only become good by practising to kick the ball in between goalposts. Until a person becomes confident enough that they score a goal, they will naturally fall into the next category. The three stages of learning can be divided into two main categories; associationists and cognitivists. Associationists views learning of a sport as the link of particular stimulus and particular responses. Cognitivists see it as a function of the brain, where we learn through the understanding and knowledge of the sport. There are 3 stages of learning according to Fitts and Posner. They are: Cognitive v Associative v Autonomous Cognitive This is the initial stage of learning and is essential if the learner is to process successful through the other stages and is to move a stage where the skill can be performed. The cognitive stage involves formation of a mental picture of a skill. The most efficient way is from a demonstration, which allows them to see the key requirements and to work through the performance mentally. Visual guidance is one of the best ways to make others understand, and so that the person learning can see the correct method to perform the skill. They will then attempt to perform. Success rate is usually 2/3 out of 10. The cognitive stage initially concentrates more on the skill, rather than the game. There is a lack of control and consistency. Trial and error is also a key way to learn. Reinforcement of this can be by giving positive feedback. Questions will arise when learning skills of a sport if the skill is not correctly learnt. The learner will be confronted with some very specific, cognitively oriented problems. Examples of this are, How do I score? What is the aim of this game? If so, where are the positions for players? If the mental picture is not correct the skill will not develop. It is important that the coach explains very thoroughly what is required of each athlete. Associative Learning at the associative stage means that the skill is becoming more consistent, but there are still some errors. The simple element of the skill has been grasped however the performer still refers back to the mental picture. The performer can begin to detect errors and begin to realise his/her mistakes. Feedback should encourage a feeling of a well performed skill. This means that the performer will begin to enjoy the sport. Success rate is 5/7 out of 10. Verbal guidance is essential as it is used in the associative stage. Some people never exceed this phase. An example of this is a semi-professional shot-put thrower. Some performers return to the cognitive stage to refer to the mental image of the skill. Also, some professional players return from autonomous stage to the associative stage if they have an injury they need to work hard and rise up to the expected standard of an autonomous performer. Autonomous Learning at the autonomous stage is where the skill is done without conscious thought. The movements of the performer are fluent, consistent and athletically pleasing. There is an advanced stage of learning where the elements of the skill have become part of long term memory and are automatically produced in response to a an appropriate stimulus. The skill is automatic. The attention of the performer focuses on the next movement, for example tactics. Consistent practise is required to reinforce being at the autonomous stage. Success rate is 9/10 out of 10. In tennis for example a player would be able to perform a serve whilst contemplating what their opponent will do next, rather than being focusing on the technical side of the serve. Not all performers reach the autonomous stage in all skills. For those who do, if practise is not maintained revision to the associative stage will occur. Closed skills such as throwing events can be finely tuned so that a high level of performance can be produced. Learning in its simplest form is the development of a position where we cant perform a skill to a stage where we can perform it. Knapp, 1973 The quote means that learning is a more or less permanent change in performance brought about by experience. Knapp is suggesting that once something is learnt, it remains with us, thus supporting the statement: Once you learn to ride a bike, you never forget. Learning in sport involves the development of skills through practice, hence the saying: Practice makes perfect. Fitts Posner recognised that as we learn, we do not move directly from cant to can. They suggest that the learning process is sequential we move through specific stages/phases as we learn. These stages are hierarchal, in other words each stage must be passed through before the next one is achieved. Ivan Pavlov was a scientist who conducted experiments on the response of dogs. He taught them that when a bell was rung, the dogs would learn to understand that it was time to eat. These findings link into Fitts and Posners phases of learning because a particular response with a stimulus can give a great benefit to sports performances. This approach can be used to mentally prepare the athlete for the sport. The player may be taught switching into the zone whilst walking onto the pitch. However in order to achieve this, the player would need to gradually progress to that level of conditioned stimulus. In order to teach and improve somebodys skills at a sport, I would structure a 6 week Personal Exercise Programme (or PEP). A PEP would help improve the skill of the performer, and help the learner to enhance their performance. This way the performer can test to see how long it takes him to master one specific skill. As a trainer I would encourage the performer and give feedback and give a clear understanding to the performer what they are doing right and wrong. Doing something wrong doesnt mean its negative feedback it would just acknowledge the performer on how to improve, becoming more successful. I would ensure that the performer practices the skill consistently and monitor any improvements in their ability. In a professional football match I would help keep the players to the standard that is required by making them do drills as a team. Warm-ups are essential as they prevent muscles getting damaged. I would also make sure that the stamina of the players is always high; this can be achieved by the Cooper run. In a tennis match the athlete must be able to complete a full match. There are no substitutions so the athletes stamina must be high. By hitting a ball for a long period of time every other turn there must be a large amount of upper body strength. In order to help the athlete achieve this, the coach should set the athlete physical training such as sprints, press-up, sit-ups and bicep curls. Technique is needed when serving, volleying; as being able to retain balance quickly is essential. An example of this is Andre Agassi. he focused more on physical conditioning than in the past and became one of the fittest players on the tour. His upper-body strength allowed him to bench press 350 lb (159 kg), which helped him retain pace on his shots late into a match, as well as adding to his serve power. He had remarkable endurance and rarely appeared tired on court. Golf is a sport where the athlete has to be very concentrated on the game. Having a perfect technique allows one to compete to a high level. In order to help raise concentration levels the coach must remove all apprehension and put the athlete in a confident frame of mind. To help an athlete raise concentration before a game the coach could give the athlete a structured diet. Junk food will slow down the concentration rate. Tiger Woods had a bad putting strike so he went home and perfected it. Well, thats one of the worst putting weeks Ive had in a long time, very frustrating. When I get home I am going to practise until I get it right. References: * Advanced P.E for Edexcel Heinemann * http://nobelprize.org/educational_games/medicine/pavlov/readmore.html. * http://www.answers.com/topic/andre-agassi * http://www.asapsports.com/show_interview.php?id=410149

Saturday, October 26, 2019

Cunstract, Intirnel, end Extirnel Velodoty :: dete, ivodinci, stady

Cunstract velodoty hes tu du woth istebloshong currict upiretounel miesaris fur thi cuncipts biong stadoid (Yon 2009, p. 40). Yon (2009), wrotis thet risierchirs cen ompruvi cunstract velodoty cunstract velodoty cen bi of maltopli suarcis uf dete os impluyid (troengaletoun uf dete), istebloshong cheon uf ivodinci, end rivoiwong thi ripurt woth thior onfurments (p. 41). In mekong sari thet uni cen drew e mienong end asifal onfirincis frum scuris un pertocaler onstramints uf dete cullictoun end tu dimunstreti thi eccarecy uf thior fondongs, Criswill (2013) elsu edvoci thi asi uf mimbir chickong end troengaletong dete (p. 201). Qaerm (2009) end Serqaeh (2008) buth asid sivirel dete suarcis (ontirvoiws, ducamints, midoe, end ontirnit) on thior stadois. Thi troengaletoun uf dete suarcis on thior stadois elluw fur sivirel ivodinci tu bi cullictid un thior cesis andir stady, cuncipts ur veroeblis wiri clierly end pricosily ixpleonid end upiretounelozid. Thos privintid oneccarecois end embo gaotois darong thi foild stady end elluwid fur lergi vulami uf dete tu bi cullictid end asid by buth onqaorirs. Bat buth ergaid thet dai tu tomi end fonencoel cunstreonts, thiy cuald nut rivoiw thi dete cullictid woth kiy onfurments tu currict eny mosteki, oneccarecois, clerofocetouns whoch tu sumi ixtint thrietinid thi velodoty uf thior stadois. 8.2 Intirnel Velodoty Thos rifirs tu istebloshong e ceasel riletounshop, whiriby cirteon cundotouns eri shuwn tu lied tu uthir cundotouns (Yon, 2009, p.40). Thi guel uf siikong tu isteblosh ceaseloty os muri ivodint on ixplenetury ur ceasel stadois rethir then discroptovi ur ixpluretury stadois (obod). Thos os dai tu thi lomotid cuntrul risierchirs hevi uvir ixtreniuas ur andisorebli veroeblis thet onflainci thi riletounshop bitwiin thi veroeblis. Estebloshong ceaseloty cen bi ompruvi darong thi dete enelysos stegi whiri thi risierchir niid tu du pettirn metchong, ixplenetoun baoldong, eddriss rovel thiurois end thi asi uf lugoc mudils (p.41). Buth Qaerm (2009) end Serqaeh (2008) stadois dod nut siik tu isteblosh ceaseloty bitwiin thior ondipindint end dipindint veroeblis. Buth stadois eri seod tu bi ixpluretury on netari. Fur ixempli, Qaerm (2009) stady siik tu discrobi thi meon ecturs end thi stretigois thiy impluyid tu pash thi dumistoc voulinci boll untu thi guvirnmint eginde fur ettintoun whiries Ser qaeh (2008) stady siik tu discrobi thi meon fecturs effictong thi omplimintetoun uf thi foscel dicintrelozetoun pulocy on Akaepim Suath dostroct uf Ghene. 8.3 Extirnel Velodoty Yon (2009) difonis ixtirnel velodoty es istebloshong thi dumeon tu whoch e stady’s fondongs cen bi ginirelozid biyund thi ommidoeti cesi stady (p.

Thursday, October 24, 2019

Access Control Proposal Essay

Access control: type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc. With mandatory access control, this security policy is centrally controlled by a secu rity policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes. (The traditional UNIX system of users, groups, and read-write-execute permissions is an example of DAC.) MAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users. Historically and traditionally, MAC has been closely associated with multi-level secure (MLS) systems. The Trusted Computer System Evaluation Criteria[1] (TCSEC), the seminal work on the subject, defines MAC as â€Å"a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained  in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity†. Early implementations of MAC such as Honeywell’s SCOMP, USAF SACDIN, NSA Blacker, and Boeing’s MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement. Originally, the term MAC denoted that the access controls were not only guaranteed in principle, but in fact. Early security strategies enabled enforcement guarantees that were dependable in the face of national lab level attacks. Data classification awareness: For any IT initiative to succeed, particularly a security-centric one such as data classification, it needs to be understood and adopted by management and the employees using the system. Changing a staff’s data handling activities, particularly regarding sensitive data, will probably entail a change of culture across the organization. This type of movement requires sponsorship by senior management and its endorsement of the need to change current practices and ensure the necessary cooperation and accountability. The safest approach to this type of project is to begin with a pilot. Introducing substantial procedural changes all at once invariably creates frustration and confusion. I would pick one domain, such as HR or R&D, and conduct an information audit, incorporating interviews with the domain’s users about their business and regulatory requirements. The research will give you insight into whether the data is business or personal, and whether it is business-critical. This type of dialogue can fill in gaps in understanding between users and system designers, as well as ensure business and regulatory requirements are mapped appropriately to classification and storage requirements. Issues of quality and data duplication should also be covered during your audit. Categorizing and storing everything may seem an obvious approach, but data centers have notoriously high maintenance costs, and there are other hidden expenses; backup processes, archive retrieval and searches of unstructured and duplicated data all take longer to carry out, for example. Furthermore, too great a degree of granularity in classification levels can quickly become too complex and expensive. There are several dimensions by which data can be valued, including financial or  business, regulatory, legal and privacy. A useful exercise to help determine the value of data, and to which risks it is vulnerable, is to create a data flow diagram. The diagram shows how data flows through your organization and beyond so you can see how it is created, amended, stored, accessed and used. Don’t, however, just classify data based on the application that creates it, such as CRM or Accounts. This type of distinction may avoid many of the complexities of data classification, but it is too blunt an approach to achieve suitable levels of security and access. One consequence of data classification is the need for a tiered storage architecture, which will provide different levels of security within each type of storage, such as primary, backup, disaster recovery and archive — increasingly confidential and valuable data protected by increasingly robust security. The tiered architecture also reduces costs, with access to current data kept quick and efficient, and archived or compliance data moved to cheaper offline storage. Security controls Organizations need to protect their information assets and must decide the level of risk they are willing to accept when determining the cost of security controls. According to the National Institute of Standards and Technology (NIST), â€Å"Security should be appropriate and proportionate to the value of and degree of reliance on the computer system and to the severity, probability and extent of potential harm. Requirements for security will vary depending on the particular organization and computer system.†1 To provide a common body of knowledge and define terms for information security professionals, the International Information Systems Security Certification Consortium (ISC2) created 10 security domains. The following domains provide the foundation for security practices and principles in all industries, not just healthcare: Security management practices Access control systems and methodology Telecommunications and networking security Cryptography Security architecture and models Operations security Application and systems development security Physical security Business continuity and disaster recovery planning Laws, investigation, and ethics In order to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are determined by an organization’s risks, threats, and vulnerabilities. Appropriate access controls are categorized in three ways: preventive, detective, or corrective. Preventive controls try to stop harmful events from occurring, while detective controls identify if a harmful event has occurred. Corrective controls are used after a harmful event to restore the system. Risk mitigation Assume/Accept: Acknowledge the existence of a particular risk, and make a deliberate decision to accept it without engaging in special efforts to control it. Approval of project or program leaders is required. Avoid: Adjust program requirements or constraints to eliminate or reduce the risk. This adjustment could be accommodated by a change in funding, schedule, or technical requirements. Control: Implement actions to minimize the impact or likelihood of the risk. Transfer: Reassign organizational accountability, responsibility, and authority to another stakeholder willing to accept the risk Watch/Monitor: Monitor the environment for changes that affect the nature and/or the impact of the risk Access control policy framework consisting of best practices for policies, standards, procedures, Guidelines to mitigate unauthorized access : IT application or program controls are fully automated (i.e., performed automatically by the systems) designed to ensure the complete and accurate processing of data, from input through output. These controls vary based on the business purpose of the specific application. These controls may also help ensure the privacy and security of data transmitted between applications. Categories of IT application controls may include: Completeness checks – controls that ensure all records were processed from initiation to completion. Validity checks – controls that ensure only valid data is input or processed. Identification – controls that ensure all users are uniquely and irrefutably identified. Authentication – controls that provide an authentication mechanism in the application system. Authorization – controls that ensure only approved business users have access to the application system. Input controls – controls that ensure data integrity fed from upstream sources into the application system. Forensic controls – control that ensure data is scientifically correct and mathematically correct based on inputs and outputs Specific application (transaction processing) control procedures that directly mitigate identified financial reporting risks. There are typically a few such controls within major applications in each financial process, such as accounts payable, payroll, general ledger, etc. The focus is on â€Å"key† controls (those that specifically address risks), not on the entire application. IT general controls that support the assertions that programs function as intended and that key financial reports are reliable, primarily change control and security controls; IT operations controls, which ensure that problems with processing are identified and corrected. Specific activities that may occur to support the assessment of the key controls above include: Understanding the organization’s internal control program and its financial reporting processes. Identifying the IT systems involved in the initiation, authorization, processing, summarization and reporting of financial data; Identifying the key controls that address specific financial risks; Designing and implementing controls designed to mitigate the identified risks and monitoring them for continued effectiveness; Documenting and testing IT controls; Ensuring that IT controls are updated and changed, as necessary, to correspond with changes in internal control or financial reporting processes; and Monitoring IT controls for effective operation over time. References : http://hokiepokie.org/docs/acl22003/security-policy.pdf Coe, Martin J. â€Å"Trust services: a better way to evaluate I.T. controls: fulfilling the requirements of section 404.† Journal of Accountancy 199.3 (2005): 69(7). Chan, Sally, and Stan Lepeak. â€Å"IT and Sarbanes-Oxley.† CMA Management 78.4 (2004): 33(4). P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998. Access Control Proposal Essay Proposal Statement Integrated Distributors Incorporated (IDI) will establish specific requirements for protecting information and information systems against unauthorised access. IDI will effectively communicate the need for information and information system access control. Purpose Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change. See more:  Perseverance essay Scope This policy applies to all IDI Stakeholders, Committees, Departments, Partners, Employees of IDI (including system support staff with access to privileged administrative passwords), contractual third parties and agents of the Council with any form of access to IDI’s information and information systems. Definition Access control rules and procedures are required to regulate who can access IDI information resources or systems and the associated access privileges. This policy applies at all times and should be adhered to whenever accessing IDI information in any format, and on any device. Risks On occasion business information may be disclosed or accessed prematurely, accidentally or unlawfully. Individuals or companies, without the correct authorisation and clearance may intentionally or accidentally gain unauthorised access to business information which may adversely affect day to day business. This policy is intended to mitigate that risk. Non-compliance with this policy could have a significant effect on the efficient operation of the Council and may result in financial loss and an inability to provide necessary services to our customers. Applying the Policy – Passwords / Choosing Passwords Passwords are the first line of defence for our ICT systems and together with the user ID help to establish that people are who they claim to be. A poorly chosen or misused password is a security risk and may impact upon the confidentiality, integrity or availability of our computers and systems. Weak and strong passwords A weak password is one which is easily discovered, or detected, by people who are not supposed to know it. Examples of weak passwords include words picked out of a dictionary, names of children and pets, car registration numbers and simple patterns of letters from a computer keyboard. A strong password is a password that is designed in such a way that it is unlikely to be detected by people who are not supposed to know it, and difficult to work out even with the help of a Protecting Passwords It is of utmost importance that the password remains protected at all times. Do not use the same password for systems inside and outside of work. Changing Passwords All user-level passwords must be changed at a maximum of every 90 days, or whenever a system prompts you to change it. Default passwords must also be changed immediately. If you become aware, or suspect, that your password has become known to someone else, you must change it immediately and report your concern to IDI Technical Support. Users must not reuse the same password within 20 password changes. System Administration Standards The password administration process for individual IDI systems is well-documented and available to designated individuals. All IDI IT systems will be configured to enforce the following: Authentication of individual users, not groups of users – i.e. no generic accounts. Protection with regards to the retrieval of passwords and security details. System access monitoring and logging – at a user level. Role management so that functions can be performed without sharing passwords. Password admin processes must be properly controlled, secure and auditable. User Access Management Formal user access control procedures must be documented, implemented and kept up to date for each application and information system to ensure authorised user access and to prevent unauthorised access. They must cover all stages of the lifecycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed by IDI. User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks. User Registration A request for access to IDI’s computer systems must first be submitted to the Information Services Helpdesk for approval. Applications for access must only be submitted if approval has been gained from Department Heads. When an employee leaves IDI, their access to computer systems and data must be suspended at the close of business on the employee’s last working day. It is the responsibility of the Department Head to request the suspension of the access rights via the Information Services Helpdesk. User Responsibilities It is a user’s responsibility to prevent their userID and password being used to gain unauthorised access to IDI systems. Network Access Control The use of modems on non- IDI owned PC’s connected to the IDI’s network can seriously compromise the security of the network. The normal operation of the network must not be interfered with. User Authentication for External Connections Where remote access to the IDI network is required, an application must be made via IT Helpdesk. Remote access to the network must be secured by two factor authentication. Supplier’s Remote Access to the Council Network Partner agencies or 3rd party suppliers must not be given details of how to access IDI ’s network without permission. All permissions and access methods must be controlled by IT Helpdesk. Operating System Access Control Access to operating systems is controlled by a secure login process. The access control defined in the User Access Management section and the Password section above must be applied. All access to operating systems is via a unique login id that will be audited and can be traced back to each individual user. The login id must not give any indication of the level of access that it provides to the system (e.g. administration rights). System administrators must have individual administrator accounts that will be logged and audited. The administrator account must not be used by individuals for normal day to day activities. Application and Information Access Access within software applications must be restricted using the security features built into the individual product. The IT Helpdesk is responsible for granting access to the information within the system. Policy Compliance If any user is found to have breached this policy, they may be subject to IDI’s disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s). If you do not understand the implications of this policy or how it may apply to you, seek advice from IT Helpdesk. Policy Governance The following table identifies who within [Council Name] is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply: Responsible Head of Information Services, Head of Human Resources Accountable Director of Finance etc. Consulted Policy Department Informed All IDI Employees, All Temporary Staff, All Contractors. Review and Revision This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. Key Messages All users must use strong passwords. Passwords must be protected at all times and must be changed at least every 90 days. User access rights must be reviewed at regular intervals.  It is a user’s responsibility to prevent their userID and password being used to gain unauthorised access to IDI systems. Partner agencies or 3rd party suppliers must not be given details of how to access the IDI network without permission from IT Helpdesk. Partners or 3rd party suppliers must contact the IT Helpdesk before connecting to the IDI network. Access Control Proposal Essay 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project for IDI 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables †¢ Solutions to the issues that specifies location of IDI is facing †¢ Plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability †¢ Assessment of strengths and weaknesses in current IDI systems †¢ Address remote user and Web site user’s secure access requirements †¢ Proposed budget for the project—Hardware only †¢ Prepare detailed network and configuration diagrams outlining the proposed change 1.4 Project Guides Course Project Access Control Proposal Guide Juniper Networks Campus LAN Reference Architecture 1.5 Project Members David Crenshaw, IT Architect and IT Security Specialist Members of the IT Staff 1.6 Purpose A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations. 1.7 Goals and Objectives Objective 1 To assess the aging infrastructure and then develop a multi-year phased approach to have all sites (except for JV and SA) on the same hardware and software platforms. Objective 2 The core infrastructure (switches, routers, firewalls, servers and etc.) must capable of withstanding 10 – 15% growth every year for the next seven years with a three-to-four year phased technology refresh cycle. Objective 3 Solutions to the issues that the specifies location of IDI is facing Objective 4 Assessment of strengths and weaknesses in current IDI systems Objective 5 Address remote user and Web site user’s secure access requirements Objective 6 Prepare detailed network and configuration diagrams outlining the proposed change Objective 7 Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location. Objective 8 A comprehensive network design that will incorporate all submitted requirements and allow for projected growth. Objective 9 Final testing of all installed hardware, software, and network connectivity. Objective 10 Initialization of the entire network and any last minute configuration adjustments to have the network up and operating within all specified ranges. 2 Current Environment 2.1 Overall: There are a variety of servers, switches, routers, and internal hardware firewalls. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. The information technology infrastructure is old and many locations are running on outdated hardware and software. Also, the infrastructure is out dated in terms of  patches and upgrades which greatly increase the risk to the network in terms of confidentiality, integrity, and availability. 2.2 Data Center: Logisuite 4.2.2 has not been upgraded in almost 10 years. Also, numerous modifications have been made to the core engine and the license agreement has expired. Progressive upgrading to the current version will be required. As a result, renewing this product will be extremely cost and time-prohibitive. RouteSim is a destination delivery program used to simulate routes, costs, and profits. It is not integrated into Logisuite or Oracle financials to take advantage of the databases for real-time currency evaluation and profit or loss projections. IDI’s office automation hardware and software has not been standardized. Managers have too much liberty to buy what they want according to personal preferences. Other software problems include early versions of MS Office 5, WordPerfect 7.0, and PC-Write that are not compatible. Telecommunications has not been since the company moved its current headquarters 15 years ago. This has left many of the new features for telecommunications lacking and not integrated with the customer service database to improve call management efficiency. The generic system was acquired from a service provider who is now out of business. Policies for personal devices are being ignored by many of the executives who have local administrators install the clients on their unsupported, non-standard personal laptop computers and workstations that interface with the internet. The original WAN was designed in the early 2000’s and has not been upgraded. During peak periods, usually between September and March, the capacity is insufficient for the organization resulting in lost internet customers which  further reduces growth and revenue. Telecommunications works through a limited Mitel SX-2000 private automatic branch exchange (PABX) that only provides voice mail and call forwarding. 2.3 Warsaw, Poland This is the largest office based on number of employees, strategically located to assist IDI for major growth in the Middle East and Asia, and the home portal for expansion and geographical client development, yet there is insufficient computing power to stay afloat on a day-to-day basis. The primary freight forwarding application is almost 10 years old and does not interface with the McCormack dodge accounting and finance system There are 6 Web servers (4 are primary and 2 fail during clustered load balancing) The cafeteria sponsors a public wireless network running WPA (Wi-Fi Protected Access) with no password protection. Telecommunications is an 8 year old Siemens Saturn series PBX, some of whose features have become faulty. The desktop phones have not been replaced or upgraded during this time. There is a lack of separation of duties between the network operations and the accounts receivable department and there is evidence of nepotism and embezzlement. 2.3 Sao Paulo, Brazil Vendors are unwilling to sign a service agreements.

Wednesday, October 23, 2019

Arthur Miller Essay

An important theme in Arthur Miller’s play â€Å"All My Sons† is the responsibility a man has for another man. Miller stressed that people must be held accountable for their actions to society and they will be held accountable by the inevitable justice found in the universe: karma. This theme is expressed through action as well as characters throughout the entire play; it is subtle at first but slowly becomes more prominent until Joe Keller finally realizes exactly how his actions affected people outside of his family. To begin, Keller’s character is important to the theme because he represents the opposite of being responsible for his actions and being held accountable to society. Joe Keller seems like a simple kind of man. His greatest wishes are to obtain the American dream for his wife and to create a legacy to pass on to his son. However, he harbors a dark secret that explains how he achieved those dreams for his family- he knowingly shipped out faulty airplane parts during wartime. Up until the time of the play, Keller did not believe he did a terrible thing by shipping those parts out. As he explains, when he came home from jail he was like an expert on the â€Å"whole jail thing† and, over time, the children â€Å"got it confused and†¦ [he] ended up a detective†(29). Or, more clearly, he went from being the bad guy to being the good guy. In Keller’s mind, he was the good guy because he saved his family from being poor and having their reputations in the gutter. He says to his wife, â€Å"you wanted money, so I made money†(76). To him, he simply did what he had to do to protect and take care of his family. At that point in his life he was not able to see the big picture of things; he was only able to see one little contour, just one small piece, of what makes up the universe. Furthermore, it is evident that Keller’s small piece of the universe, his family, is what is most important to him. Throughout the play he tells Chris that everything he has done with the business , including sending out cracked gear heads, was for Chris: â€Å"it was a chance and I took it for you†(70). Keller believed that he had to send out those parts so that he would still have a business to pass on to his son. Chris replies â€Å"what is that, the world- the business?†(70). He is asking his father if the whole world is the business. And the answer in Keller’s mind is, as long as it takes care of his family, yes it is the world. Slowly, though, Keller begins to see just what his actions have caused to happen to other people. Take, for example, when he speaks to Ann about her father, Steve. He finds out that Ann and George never visit Steve in jail and that they don’t even write to him. Keller is unable to understand why the children would â€Å"crucify† their father and he pleads with Ann to not â€Å"make a murderer out of him†(32). He realizes that Steve’s life was ruined and his relationships with his children, something that Keller gives very high value to, are ruined as well. It is also easy to believe that Keller doesn’t want to see Steve crucified because if he is, that means that Keller should be too. And if Keller was punished for his actions, that means there is â€Å"something bigger† in the world than the relationship between father and son. The whole ordeal with Steve and Steve’s children gives Keller a clue that there may be bigger things in the world than familial relationships and also that there may be consequences to wrongful actions. Finally, Chris and Larry (posthumously) work to enlighten Keller that â€Å"there’s a universe of people outside and that [he’s] responsible to it†(84). Chris’ character alone serves as a guidepost to this revelation. He is the epitome of the idea of responsibility and accountability to society because he is the person that reaches for something he wants but pulls â€Å"back because other people will suffer†(16). Chris takes other people’s feelings and well-being into account before he acts. He learned to be so self-less in the war, as he watched his men kill themselves for each other. He describes it as â€Å"a kind of†¦ responsibility. Man for man†(35-36). He learned that you cannot only look out for yourself in this world, but you have to help other people out as well. And Larry, whom Keller thought shared his ideas on the way the world was made (with a â€Å"forty-foot front†), had a good sense that people must consider the good of the many before they act for the few. It is his letter to Ann, in which he states he â€Å"can’t bear to live anymore†(83) because of what his father did, that brings everything crashing down around Keller. In the same way Larry’s memorial tree came crashing down and allowed more light to shine into the arbor, his letter shined light onto the true ways of the universe. Everything that Keller stood for, everything he believed in was wrong. He finally realized that he did a terrible thing that killed not only strangers, but people who were fathers, brothers, and sons. In essence, he killed the thing he lives for; he killed family. This revelation drives home the idea that justice will inevitably be brought to the wrong-doers. Keller’s karma comes back and makes him not only set everything right in the universe again but pay the ultimate price for his actions: death by his own hand. Chris, Ann, and Kate can now move forward, not bogged down by shame and guilt, and they can â€Å"live.†

Tuesday, October 22, 2019

Free Essays on 20th Century Cuban Immigration

Cuban Nationalism For several reasons, Cubans have a very strong sense of "Cubanidad," cultural identity. This sense of cultural identity comes partially from a sense of placeCuba as an island has clearly defined boundariesand partially from the homogeneity of language and shared culture. It is a major factor in the relative stability of the revolutionary government in Cuba and in the stability of the Cuban community in the United States. Despite the fact that within the Cuban-American community there is a great deal of political contention, the community forgets its differences in taking care of its own. One of the practical problems service providers face in working with newly-arrived Cubans is that they can function so comfortably within the Spanish-speaking Cuban-American communities: There is little motivation to learn English or move away to areas where there are better jobs. Cuban Immigration to the United States Given the closeness of Cuba to the United Statesboth geographical and, before the 1959 revolution, economicit is no surprise that there has always been movement of people between the countries. The 1910 census showed that there were officially 15,133 Cubans living in the United States, and a report on immigration to Congress at the time included data on 44,211 Cubans. In 1959, an estimated 124,000 Cubans were living in the United States. In the early years of the revolutionary government, an additional 215,000 moved here, and now the Cuban community is well over a million. As we mentioned above, the center of that community is in Miami, but there are sizable communities in other cities in Florida and in New York, Illinois, and California as well. The existence and size of the Cuban community in the United States is a result of both "push" and "pull" factors. The revolutionary government's inflexible attitude toward dissent, and its imperviousness to demands that dissenters make, probably constitute the greatest... Free Essays on 20th Century Cuban Immigration Free Essays on 20th Century Cuban Immigration Cuban Nationalism For several reasons, Cubans have a very strong sense of "Cubanidad," cultural identity. This sense of cultural identity comes partially from a sense of placeCuba as an island has clearly defined boundariesand partially from the homogeneity of language and shared culture. It is a major factor in the relative stability of the revolutionary government in Cuba and in the stability of the Cuban community in the United States. Despite the fact that within the Cuban-American community there is a great deal of political contention, the community forgets its differences in taking care of its own. One of the practical problems service providers face in working with newly-arrived Cubans is that they can function so comfortably within the Spanish-speaking Cuban-American communities: There is little motivation to learn English or move away to areas where there are better jobs. Cuban Immigration to the United States Given the closeness of Cuba to the United Statesboth geographical and, before the 1959 revolution, economicit is no surprise that there has always been movement of people between the countries. The 1910 census showed that there were officially 15,133 Cubans living in the United States, and a report on immigration to Congress at the time included data on 44,211 Cubans. In 1959, an estimated 124,000 Cubans were living in the United States. In the early years of the revolutionary government, an additional 215,000 moved here, and now the Cuban community is well over a million. As we mentioned above, the center of that community is in Miami, but there are sizable communities in other cities in Florida and in New York, Illinois, and California as well. The existence and size of the Cuban community in the United States is a result of both "push" and "pull" factors. The revolutionary government's inflexible attitude toward dissent, and its imperviousness to demands that dissenters make, probably constitute the greatest...

Monday, October 21, 2019

Unconventional Family essays

Unconventional Family essays Adoption is considered a noble act. It brings joys into the lives of many heterosexual parents and their adopted children. There is no reason why the same cannot happen for homosexual couples. I am sure that many homosexual couples are as capable as heterosexual couples in raising a child. Just because homosexuals cannot physically have children together does not mean that they have no parental instincts or would be incapable as parents. It's most important to me that the child will feel safe and loved, no matter who his or her parent(s) are. Thus, adoption should not be banned against homosexuals. I don't believe a gay couple isn't capable of loving OR knowing how to raise a child. However, I dont think that a homosexual couple can raise a child in a normal, healthy or sage environment as a heterosexual couple could. I think that homosexual parents should be extra sensitive to their location. Unfortunately, in my community such an adoption would be "unthinkable" to most people (as is homosexuality), so it would be a definite disadvantage for any child in a homosexual family to live here. Although, I know there are plenty of areas where homosexuality is accepted. On the other hand, homosexual couples will be able to bring the child to an understanding of the lifestyle or decision they made to live in the way they do. I do not think that being brought up in this kind of environment can do a child a great deal of good, but I cant say itd hurt the child either. It may help the child be more explicable with the homosexual life and itll make a child stronger in the society. Itll make them higher than the rest of society. For they have the capability to not be prejudice. Society may feel that its wrong for a homosexual to have kids. Nevertheless, its just as bad for a straight couple to have kids. Homosexual couples want kids. They want to take care of them. They want...

Sunday, October 20, 2019

Boiling Point Elevation Example Problem

Boiling Point Elevation Example Problem This example problem demonstrates how to calculate boiling point elevation caused by adding salt to water. When salt is added to water, the sodium chloride separates into sodium ions and chloride ions. The premise of boiling point elevation is that the added particles raise the temperature needed to bring water to its boiling point. The extra particles interfere with the interactions between solvent molecules (water, in this case). Boiling Point Elevation Problem 31.65 g of sodium chloride is added to 220.0 mL of water at 34  °C. How will this affect the boiling point of the water?Assume the sodium chloride completely dissociates in the water.Given: density of water at 35  °C 0.994 g/mLKb water 0.51  °C kg/molSolution:To find the temperature change elevation of a solvent by a solute, use the equation:ΔT iKbmwhereΔT Change in temperature in  °Ci van t Hoff factorKb molal boiling point elevation constant in  °C kg/molm molality of the solute in mol solute/kg solvent.Step 1 Calculate the molality of the NaClmolality (m) of NaCl moles of NaCl/kg waterFrom the periodic tableatomic mass Na 22.99atomic mass Cl 35.45moles of NaCl 31.65 g x 1 mol/(22.99 35.45)moles of NaCl 31.65 g x 1 mol/58.44 gmoles of NaCl 0.542 molkg water density x volumekg water 0.994 g/mL x 220 mL x 1 kg/1000 gkg water 0.219 kgmNaCl moles of NaCl/kg watermNaCl 0.542 mol/0.219 kgmNaCl 2.477 mol/kgStep 2 Determine the van t Hoff factorThe van t Hoff factor, i, is a constant associated with the amount of dissociation of the solute in the solvent. For substances which do not dissociate in water, such as sugar, i 1. For solutes that completely dissociate into two ions, i 2. For this example NaCl completely dissociates into the two ions, Na and Cl-. Therefore, i 2 for this example.Step 3 Find ΔTΔT iKbmΔT 2 x 0.51  °C kg/mol x 2.477 mol/kgΔT 2.53  °CAnswer:Adding 31.65 g of NaCl to 220.0 mL of water will raise the boiling point 2.53  °C. Boiling point elevation is a colligative property of matter. That is, it depends on the number of particles in a solution and not their chemical identity. Another important colligative property is freezing point depression.

Saturday, October 19, 2019

Animal testing should not be banned Research Paper

Animal testing should not be banned - Research Paper Example Since the Roman Church had burned dissecting of human beings, researchers opted to go the animal way as they provided the best alternatives to human being and indeed, animal testing should not be forbidden considering that animal testing is beneficial for science field. One of the primary reasons of performing animal experiment is that animal testing is beneficial for science field. Scientists and doctors argue that every achievement in medical field in 20th century has relied on the use of animals in some way. Thus, scientists have prior knowledge and experience of using animal testing in carrying out experiments for many years (â€Å"National Academics Press† 12.) First, animal testing plays an essential role in developing the surgical field. According to Cooke (18), toxicologists have the responsibility of determining the level of exposure that is either safe or harmful to human health, animals as well as to the environment. Certain reasons make it necessary to use animals in scientific research and testing. By the fact that the composition of all organisms is chemical, introduction of a substance into the animal interacts in various parts of the body and effects of one process could bring unexpected consequences in others. It is important to understand the relationship between dosages given to a person and those administered to different organs and body tissues. Studies conducted on a whole animal are very important for ensuring proper use of beneficial chemicals to avoid causing harmful effects to receiving organs. Laboratory tools such as tests and computers cannot make a duplicate of the phenomena and thus the only sure method of testing is the use of animals. A study on chemical interaction with living organisms normally helps scientists to unveil some of the most fascinating mysteries of living organisms functioning. There is a dynamic relationship between plants, environment, and animals. According to McCally (1), the physiological processes al low living systems process chemicals that are in constant balance with the world. Scarce information relating to these fundamental processes is available. When disturbed by increasing levels of one substance, the measure of available toxic level becomes credible (Connel, et al. 102). Toxicologists in understanding chemical toxicity of substances have developed critical knowledge. The knowledge is important in protecting human beings, animals as well as the environment from both artificial and natural exposures. Animal testing is an important procedure in ensuring drug`s safety and efficiency. All chemicals, whether harmful or otherwise, have harmful effects to people if administered in wrong proportions. Any small amount of a useful or harmful substance when administered hardly causes a detectable significance in the body of a human. According to Cooke (18), toxicologists have the responsibility of determining the level of exposure that is either safe or harmful to human health, ani mals as well as to the environment. It is important to understand the relationship between dosages given to a person and those administered to different organs and body tissues. Studies conducted on a whole animal are very important for ensuring proper use of beneficial chemicals to avoid causing harmful effects to receiving organs. The process of making medicines, beauty products, foodstuffs, and chemicals for use in the environment requires mixing of different kinds of chemicals in

Friday, October 18, 2019

Campaign Rhetoric Essay Example | Topics and Well Written Essays - 1500 words

Campaign Rhetoric - Essay Example By use of information technology, a click of a button has been enough for a marketer to reach enormous number of customers. Technology has given millions of people instant access of information. Marketers trying to get their products into the public eyes have actively used this fact. While the internet allows large dissemination of advertising, other technologies such as wired magazine has even made it easier for technology enthusiasts to access online information by just subscribing to wired magazine that is a new site for online information in a printed form. The issue of technology has changed the marketing of products. Buying and selling has been boosted by technology since it has become more convenient something that has attracted most people to rely on technology hence becoming technology enthusiasts forming often readily available cloud service for the sellers of high-tech products. Sellers such as Motorola company has been in the forefront on the use of wired magazine to promote the market of motor X since it was introduced in the market in August this year. Motorola has used wired magazine to back up the phone advertisement with a straightforward campaign including national TV commercial, print ads, online display units and stunts like getting it in the hands of models on fashion. Wired magazine has made it possible for motor X customers to access clear images of the phone in colors while marketers have been able to respond quickly to the marketplaces. For example, different markets can be targeted with differently themed promotions using digital technology without the prohibitive costs associated with traditional print technology. A wired magazine advertisement using graphic design software sent via email enable technology enthusiasts distinguish products from different marketers through the pictures bringing new experience to technology fans. Establishment of advertisement through

CALCULUS 3 (LAGRANGE MULTIPLIERS) Essay Example | Topics and Well Written Essays - 500 words

CALCULUS 3 (LAGRANGE MULTIPLIERS) - Essay Example It is possible to find the minima or maxima of a given function f of several variables given that the variables have restrictions. Langrage multipliers help us minimize or maximize functions with constraints that are points on a definite surface (Stewart, 67). Finding critical points of a function f (w, x, y) on a level surface or subject to the constraint g (w, x, y) = M. Solving this problem requires a solving the following series of simultaneous equations. ÃŽ » is a dummy variable known as a langrage multiplier. The most important variable in the equation are w, x, and y. After solving for the critical values, you insert them into the function to find the maxima and the minima. The critical points where the function is greatest are maxima while where it is smallest are minima (Stewart, 72). Solving the system equations can be a difficult task. In order to solve for the critical points in an easier way, one should consider the following tricks; Solve for ÃŽ » in terms of the variables w, x, and y to eliminate it from the equations. Solve any of the variables in terms of the other variables. Consider both the positive and negative square roots whenever using a square root (Courant,

Thursday, October 17, 2019

Describe a situation in which you combined analysis and creativity to Personal Statement

Describe a situation in which you combined analysis and creativity to solve a challenging problem - Personal Statement Example A major factor in the retail industry is the influence by policy published by Chinese government that takes the anti-corruption campaign against gift-giving culture. Men luxury, jewelry will definitely be affected by the policy. This year, I come back to China to find out the many new stores of famous brands in the Chinese market that have been closed and its sales have reduced from about 150 in 2012 to about 100 in 2013. Meanwhile, the decrease rate is one-third and I think it is very puzzling and challenging to figure out the real reasons of this phenomenon. It is said that Chinas luxury market has grown rapidly from the enclosure stage to the development of sustained attention to the customer experience and comparable store sales stage. I want to establish the reason because I feel very interested in this situation and want to research the reasons for this problem. In this regard, I plan to apply the theoretical and practical knowledge to study this problem. It is not easy to learn all the pictures of all the problems faced by stores of famous brands. Therefore, I run to many stores that sell the famous brand clothing and learn this price in China since I am a Chinese and want to study Strategic design a nd management. It is easy and creative for me to know some situations, sales, and styles by communicating with sellers. Usually, it is thought that the price is the most important reason to explain the reduction and decrease of the sales for luxury clothing. However, only the price in China is higher than the clothing with same style, but also the types of styles are rich. This probably explains the phenomenon that many Chinese customers want to buy luxury clothing in foreign countries instead of China. Meanwhile, from my own research I established that the main method is to search for information from the internet and library in the university to establish the reasons behind this whole scenario. Essentially, 73% of

What are the Main Differences Between Liberal and Radical Feminism Article

What are the Main Differences Between Liberal and Radical Feminism - Article Example According to Margaret Jackson (1995), the progress of the feminist activism and struggle started by a series of organized campaign in the British Victorian and Edwardian periods in regard to marriage, spinsterhood, and the sexual double standard. (p. 3) From then on, it has gathered steam, propelled by women activism as seen in literature, cultural and political campaigns advancing feminist engagement. However, as mentioned elsewhere in this paper, its history is fragmented, making it difficult to pinpoint its specific history or cultural tradition. All in all, the history of feminism is contingent on other political issues and social changes. As a political ideology, it has been made by women through different campaigns and moral surges, hence, its objectives and ethos varies through time. This dimension is highlighted by the fact that contemporary feminism has found expression in two principal forms: liberal feminism and radical feminism. Liberal Feminism The liberal feminism has been largely seen as positive social movement that only seeks gender equality in social political and economic roles and opportunities. It primarily seeks to bring women into the fold - fully participating in the mainstream society, exercising full privileges and responsibilities of citizenship in genuinely equal partnership with men. Since the 1700s, the liberal feminists have been important advocates vigorously campaigning for women's education and campaigning for equality of access and provision. As years passed, this advocacy extended its focus on individual rights, education, political and religious freedom, individual choice, and self-determination. Feminism has addressed gender inequalities through... This paper explores that feminism may have existed in the ancient times such as in Egypt and Greece, the concept as we of it today traces its roots from the struggle for female sexual autonomy as conceptualized in the nineteenth and early twentieth-century feminists in terms of emancipation of women from sex slavery. This essay stresses that the liberal feminism has been largely seen as positive social movement that only seeks gender equality in social political and economic roles and opportunities. It primarily seeks to bring women into the fold – fully participating in the mainstream society, exercising full privileges and responsibilities of citizenship in genuinely equal partnership with men. Since the 1700s, the liberal feminists have been important advocates vigorously campaigning for women’s education and campaigning for equality of access and provision. As years passed, this advocacy extended its focus on individual rights, education, political and religious freedom, individual choice, and self-determination. Feminism has addressed gender inequalities through their efforts and campaigns for inclusion within civil rights legislation, access to education, and equal opportunity. This feminist school’s main argument is that women are as rational as men. Liberal feminism h as, over the years, campaigned and achieved equal access to education and profession, property rights, suffrage, and all other rights enjoyed by men.

Wednesday, October 16, 2019

Describe a situation in which you combined analysis and creativity to Personal Statement

Describe a situation in which you combined analysis and creativity to solve a challenging problem - Personal Statement Example A major factor in the retail industry is the influence by policy published by Chinese government that takes the anti-corruption campaign against gift-giving culture. Men luxury, jewelry will definitely be affected by the policy. This year, I come back to China to find out the many new stores of famous brands in the Chinese market that have been closed and its sales have reduced from about 150 in 2012 to about 100 in 2013. Meanwhile, the decrease rate is one-third and I think it is very puzzling and challenging to figure out the real reasons of this phenomenon. It is said that Chinas luxury market has grown rapidly from the enclosure stage to the development of sustained attention to the customer experience and comparable store sales stage. I want to establish the reason because I feel very interested in this situation and want to research the reasons for this problem. In this regard, I plan to apply the theoretical and practical knowledge to study this problem. It is not easy to learn all the pictures of all the problems faced by stores of famous brands. Therefore, I run to many stores that sell the famous brand clothing and learn this price in China since I am a Chinese and want to study Strategic design a nd management. It is easy and creative for me to know some situations, sales, and styles by communicating with sellers. Usually, it is thought that the price is the most important reason to explain the reduction and decrease of the sales for luxury clothing. However, only the price in China is higher than the clothing with same style, but also the types of styles are rich. This probably explains the phenomenon that many Chinese customers want to buy luxury clothing in foreign countries instead of China. Meanwhile, from my own research I established that the main method is to search for information from the internet and library in the university to establish the reasons behind this whole scenario. Essentially, 73% of

Tuesday, October 15, 2019

Racism in Finding Forrester Essay Example | Topics and Well Written Essays - 1000 words

Racism in Finding Forrester - Essay Example Finding Forrester" has elements of class, race, ethnicity and stereotyping and even gender inequality that are featured invariably in the various threads of the story as the director, Gus Van Sant would relate the 2000 movie. The film tries to reproduce what obtains in society in as close to reality as possible. Starting with sociological perspectives, this paper gives a synopsis of the film, progresses on to the story in selective perception mode and picks on incidents of the story featuring these sociological terms with an insight of what happened.In a gritty New York neighborhood, a shadowy but perpetually unseen figure appears behind thin curtains. Rumors abound regarding The Window's identity and story, prompting African-American Jamal Wallace to accept a dare to infiltrate The Window's apartment and bring something out. Jamal is a 16-year-old scholar-athlete and aspiring writer in inner-city Manhattan. When he's not writing in his journal in his bedroom, Jamal and his boys woul d play basketball on a local Bronx street court. They note that they're being observed by someone with binoculars in a nearby apartment building.As Jamal enters the apartment, he is caught in the act and accidentally leaves behind his backpack, which contains his journals. The Scottish reclusive genius writes comments in the notebooks, and drops the backpack through a window.Jamal returns for more lessons. His efforts lead him to get tutored by The Window, with Jamal agreeing not to reveal his whereabouts. The tutor turns out to be a Pulitzer Prize-winning classic novelist, William Forrester, who wrote "the Great 20th Century Novel," Avalon Landing, and had been reclusive for four decades. Forrester is a male Caucasian in his mid seventies. Sociological perspectives Blacks like Jamal are considered inferior by some theorists as a result of flawed genetic traits (Eitzen and Zinn 2004). In The Bell Curve work of Herrnstein and Murray (1994), Blacks are said to be mentally inferior to Whites. Such genetic inferiority, according to Gould (1994) cannot be changed by environmental changes. These theories bordering on biological deficiency, generally are not accepted in the scientific community (Eitzen and Zinn 2004). Media, however, just like films, continue to give attention to the thinking of these theorists. The Movie Race is a huge issue in the film and many stereotypes are made. Jamal Wallace is introduced in the film as a typical Black teenage male who goes to a low class school in the Bronx and really excels on the court as a basketball player. He is looked upon as an amazing Black as though unexpected because of his color. One proof of this is that the teacher (April Grace) calls Jamal's mother in to school, to inform her of her child's amazing abilities. Jamal is also looked at as given to playing or to pleasure because of his class. Although he had wanted to realize his writing ability, the exclusive New York school that had offered him a scholarship, is actually more interested in having Jamal play basketball to improve their school image. He soon learns that after losing several players to graduation, the school is looking to restock the basketball team. In fact, Jamal gets transferred there as a junior, presumably to have him educated. A Black, Jamal is seen to fit in their objectives as Blacks are of a class, easily pliable and more oriented to playing than studying. Or so the prep school thought. Jamal has been characterized also as an underachiever in class. This plot point caters to the stereotype that Black students get bad grades. This is different from the view that Jamal may want to get bad grades to fit in with his bad-grade-getting peers. This is probable and is more of peer pressure among the young which can be found in whatever race. The first view, however, which appears truer as far as the story is concerned, is stereotyping while the second view is non-racial. The first view which

Monday, October 14, 2019

Games to Life Essay Example for Free

Games to Life Essay Pong, Super Mario Bros. , and Pac-Man are a couple classic games most everyone has played. These games were some of the first video games ever made and had very little to no violence in them. These video games have now evolved into more graphic, gory, and violent games. This increased violence in video games has caused more aggression in society. On April 20th, 1999 at Columbine High School in Colorado a shooting occurred killing 12 students, 1 teacher and also injured 24 other students. Two students were the cause of this shooting. The two seniors played video games religiously and were big fans of a game named Doom. Doom is a game where players is a space marine who must fight his way through hordes of invading demons from Hell. The two shooters liked and played this game so much that even designed their own based off of it. Eric and Dylan’s, the two shooters, game was created based on the Columbine High School’s floor plan. Their game contained characters based off student at their school whom they did not like. When students, in their game, that believed in God would die they would say â€Å"My Lord, why did you do this to me? † which is what Eric and Dylan believed they would say as they would kill them. When a newer game called Duke Nukem came out, a similar game to Doom, Eric and Dylan were quick to design another levels based on Columbine High School. In this game they had more realistic guns and bombs, which the shooters liked. They also mapped out how they would invade the school and whom they would target in these levels they created. Through both these games, that Eric and Dylan loved to play, inspired them to create there own games using their school as a layout and students as the characters. They planned out how they would approach their shooting and where they would place their bombs based on what they did in their games. They knew whom they would kill first and where they would be. They also placed bombs around the school as they would in the game that thankfully did not go off. Video games have become a big part of our culture in today’s society. When video games first came out they were simple, friendly, and non-violent. Since then video games have become more sophisticated, completive, and especially more violent. Eric and Dylan’s shooting on their school was an act of aggression supported from the violent videos games they played.

Sunday, October 13, 2019

Medulla Oblongata: Function and Location

Medulla Oblongata: Function and Location Medulla oblongata The medulla oblongata is a very interesting part of the brain. This very small section of the brain stem has a very large amount of responsibility in the human body. Studies concerning this section help in the understanding of many basic biological functions of the body. Some of the actions are ones that we dont even notice are happening on a day-to-day basis but are very important to human life. The medulla oblongata has many different connections with other areas of the brain, plays a key role in several functions of the body, has neurotransmitters that are involved in the functioning of this area, has diseases that can greatly affect its roles in the body. The medulla oblongata has many connections to other areas of the brain. The medulla oblongata is the most inferior portion of the brainstem and is about three centimeters long. It slightly bulges out of the brain stem. It is located in between the pons and the spinal cord. The axons that carry sensory information to and motor instructions from the higher brain regions pass through the brainstem. It creates tracts that allow communication to pass through from certain sides of the brain. These tracts house fibers that cross each other in pyramidal region of the medulla oblongata allowing the brain to communicate with the opposite of the body. Vital nuclei located in the gray matter of the medulla oblongata are used for cranial nerves. The medulla oblongata has many different functions in the body. These functions are being performed at all hours of the day, many of them without contribution from other sections of the brain. One main function is relaying signals between the brain and the spinal cord. The medulla helps with coordinating very large body movements liking jogging or climbing. The medulla houses portions of the brain that control what is considered automatic homeostatic functions as well as some primitive organs (Campbell and Reece 2008). The cardiac portion constantly sends inhibitory impulses to the heart to tell it to slow down. This portion also sends acceleratory impulses through the spinal nerves to make the heart beat faster whenever it may be necessary. The vasomotor portion sends impulses via spinal nerves through the spinal cord to muscles walls around arteries causing them to constrict. This constriction of arteries will cause blood pressure to rise. The respiratory portion houses respiratory nuclei that control the depth and rate of breathing. The medulla oblongata also plays a role in reflex responses. The capability to respond quickly to a stimulus can be very important when there is a need to survive. Reflex responses include swallowing, sneezing, vomiting, coughing, and digestion. A lot of these functions are involuntary or start off voluntary and then transform in to involuntary functions. The activity of the medulla oblongata rely on axons that reach many areas of the cerebral cortex and the cerebellum, releasing neurotransmitters such as norepinephrine, dopamine, serotonin, and acetylcholine. When under stress, norepinephrine relays messages to the brain that control reflex reactions and ability to pay attention. Like epinephrine, norepinephrine also triggers the fight-or-flight response. The fight-or-flight response is directly related to heart rate. It causes glucose from energy being stored to be released and blood flow to increase to muscles that enable the body to react as necessary. Norepinephrine raises blood pressure when used as a drug. This raise in blood pressure causes a correlated drop in heart rate. Dopamine, another neurotransmitter in the brain, opens dopamine receptors also affecting blood pressure and heart rate. Serotonin is a neurotransmitter that deals with mood. Excessive aggressive, sadness, or jealousy is linked to the medulla oblongata. Acetylcholine is used in the motor division and cross over in the medulla oblongata. It is involved in muscle movement, autonomic body functions, and excitatory reactions. Many diseases and disorders affect the medulla oblongata. One disorder is a very rare and often fatal medullar abscess (Wait 2009). A medullar abscess is viewed as a condition of rapidly progressive multiple cranial nerve palsies and decreased level of consciousness (Wait 2009). Multiple system atrophy is a neurological disorder that degenerates nerves cells located in areas of the brain including the medulla oblongata. This disease can cause the loss of control of autonomic functions such as bladder control, movement, and coordination (Benarroch 1997). Damage to the medulla oblongata can cause several functions of the body to be thrown off and even death. Because cranial nerves run through this section of the brain injury there can cause several sensory problems. For instance, injury can cause numbness or paralysis of the palate and throat causing drooling and a lack of taste. This numbness can also obviously cause problems with speech. It can also cause gagging, inability to rotate the neck, and acid reflux. Surprisingly if a person suffers from brain damage their body can still function if the medulla oblongata is not damaged. However, damage to the medulla oblongata can cause the need for a breathing machine or other life support equipment. If the medulla oblongata is damaged sometimes the brain and body can recover and no longer need the use of a life support machine, but often the body cannot recover and a person is considered to be brain dead. In this stage, the removal of a life support machine will mean a persons body will no longer function and that person will die. A great assortment of medications and drugs can also alter the state of the medulla oblongata. Overdoses usually result in death because the medulla oblongata cannot carry out its functions under that amount of a specific drug. Opiates, coma, and hypothermia can affect the medulla oblongata in ways that cause the body to exude physical conditions comparable to death. Anesthesia is able to function as it does because its chemical components cause the medulla oblongata to decrease its autonomic functions. References Benarroch E, Smithson I. 1997. Distribution and relationships of neuropeptide y and NADPH-Ddiaphorase in human ventrolateral medulla oblongata. J Auto Nerv Sys. 62(3): 143-146. Hashimoto M, Hatasa M, Shinoda S. 1992. Medulla oblongata germinoma in association with Klinefelter syndrome. Surg Neur. 37(5): 384-387. Wait S, Beres E, Nakaji P. 2009. Bacterial abscess of the medulla oblongata. J Clin Neur. 16(8): 1082-1084. Campbell A, Reece J. 2008. Biology. 8th ed. San Francisco (CA): Benjamin Cummings. 1245.

Saturday, October 12, 2019

Harry Forster Chapin: Musician, Song Writer, Film Editor and Political

In the short thirty-nine years of the life of Harry Forster Chapin (1942-1981), he managed to distinguish himself as a creative genius in multiple fields, ultimately leaving a distinct mark on this world, though he received only moderate public recognition. Professionally, he was a musical performer and songwriter, a film editor, and a political activist and lobbyist, able to reach remarkable heights in all three fields. In the field of music, Chapin rose to stardom as a rock and roll performer and songwriter during the 1970's, introducing the world to a new style of music he created and popularized, the story-song. Within this new framework, Chapin was able to use his interest and proficiency in poetry to create song lyrics which told the story of a character or group of characters. He was able to weave wonderfully powerful tales of the lives of his characters in a few short stanzas, applying many traditional story-line techniques; a rising action which lead to a climax, followed by a falling action which usually revealed an unexpected twist, offering a recognizable message in the last few lyrics of the song. The subjects of these songs were generally based on Chapin's real life experiences and moods, and in this sense, he was able to express more honestly the feeling associated with the stories. Furthermore, Chapin went a step further by adding music to his stories, accentuating the changes in tone of the stories with musical accompaniments. His musical style contained many folk, rock and roll, jazz and blues elements, revealing his diverse musical background and familiarity with a variety of styles. The result was a remarkably popular style, which granted Chapin the ability to generate a strong connection to his audience during... ...o Gardner, another major milestone taking place around 1976, with the completion of perhaps his most comprehensive piece, an autobiographical song called "There Only Was One Choice". In it, Chapin mysteriously foretold of his tragic death at a young age: When I started this song I was still thirty-three. The age that Mozart died and Sweet Jesus was set free, Keats and Shelly, too soon finished, Charlie Parker would be And I fanaticized a tragedy be soon curtailing me. He also included in the song, the lyrics which have come to define his life more than any other: Inexperience - it once accursed me, but your youth is no handicap, it's what makes you thirsty. (From "Danceband on the Titanic" 1977) Bibliography: Coan, Peter M. Taxi: The Harry Chapin Story. New York:Carol Publishing Group. C. 1990. Http://www.littlejason.com/chapin/longbio.html

Friday, October 11, 2019

Assess the View That Life in a ‘State of Nature’

The state of nature Is the term used to describe a lawless state of human behavior, wherein all people are free of legal and moral restraint. It would create a state where all people would be able to act on their wants and desires without fear of punishment from a governing body, as there wouldn't be one, and that man would only have to fear the retaliation from other people against their actions. In this essay, I will be outlining the views of both Hobbes and Locke on the state of nature and drawing a conclusion from their opinions.Hobbes' view on the state of nature is that such a thing would lead only to a state of war. He believed that without moral or legal constraints, mankind will simply pillage, murder, and plunder In order to get what they desire, regardless of the views of others. In a state of war, man will use power as he sees fit In order to survive and with no clear definition of rights or duty, each Individual will be free to Judge the rights and duties of others and of themselves.There will be no duty to keep other people safe and out of harm and no-one will have the explicit right to live or to keep heir property. If another claims that you hold something he needs to survive, you would have no right to deny him as there is no law or right outlining that it was yours and yours alone. As our desires are never satisfied and we have a continuous want of things, man will continue to overturn others if it means he gets what he wants in life, whether or not he truly needs it.He believes in the state of nature translating to a state of anarchy, as no human will ever be satisfied with what they have and will always strive for more. Hobbes claims that In a lawless state, we may not wish direct arm onto others, but we will be constantly aware that other people may wish to harm us. In order to prevent being the volt, we would attack first In order to stay alive, thus becoming the aggressor. Self-preservation In a lawless state, In Hobbes' opinion, would o nly ever lead to conflict as man turns on man In order to keep themselves alive.Due to this, we would never trust another person and the lack of alliance or allegiance would lead to us all being equally vulnerable. So despite the lack of rights or duty, each of us are equal in a state of nature, as we are all equally able to be pushed over by the person beside us, whether they are friend or otherwise. Hobbes is very much in agreement that living in a state of nature would be truly awful. Locke, however, doesn't completely agree.He doesn't believe – as Hobbes does – that scarcity In society and living in a state lawlessness would lead to man killing man In order to stay alive. He believes that people will provide themselves with natural moral principles that we are all inclined towards. Locke drew this belief from his belief in God and the creation of Man and all things on the Earth. By this logic, we have a duty to protect others from harm. We are therefore obligated, as God's creations, to punish those that cause harm to others, and those principals would be our natural obligations.He also believes that we cannot claim property unless our labor helped create what is on the land, but we still have no lawful right to it and the supposed right to it is not dependable. He proposed that removal from a state of law would create a form of democracy among men where they would govern themselves and keep themselves in equal measure in order to create a fair semblance of society. Locke thinks that society can exist in a state of nature and exist informally, so he disagrees with the statement that living in a state of nature would be awful in any sense.He believes that people can and will work together to protect themselves and each other as we have an obligation to care for other people as a natural instinct. By Locker's reasoning, man would eventually enter into an unspoken social contract and form a crude government to better protect their rights and pro mote organization in their society. I believe that although a state of nature would initially lead to man taking whatever he pleased from others and doing what he had been previously unable to do, eventually a form of society would emerge.People cannot continue without governing themselves and eventually they would create some form of law in order to govern themselves and protect their rights and duties. Initially living in a state of nature would be awful because there would be the breakaway from lawful restraint and that new freedom would lead to complete uproar as the population of the world indulged in all they had been unable to do. I still, however, believe that Locker's state of things would prevail and that man would find a way to organize themselves in order to survive and beat the inevitable scarcity.

Thursday, October 10, 2019

Mary Celeste

MARY CELESTE The Mary Celeste was a ghost ship found off the coast of Portugal in 1872. The Mary Celeste is a ship was discovered atlantic ocean unmanned and apparently abandoned and she was fine and the people and it remain a mystery. Her cargo was virtually untouched and her crew was never seen or heard from again. The crew’s disappearance was the greatest mystery of all time. Eyewitness Account The only eyewitness is Captain Morehouse. Captain Morehouse said that he thought that the crew was panic. Reports that likely to be true.The weather was very bad and for four days before the storm was very heavy and they found and maybe they have unlikely survive but the ship remains good and thus it remains a mystery. It seems reasonable to suggest that in order to take a break from the pounding sea, the captain gave the order to sail to the lee side of Santa Maria Island where the cook started a fire in the large galley stove to make hot food while other members of the crew furled most of the sails, leaving just enough canvas up to hold her heading as they made their way slowly along the lee shore of the island.Other crew members set about pumping the bilge and doing other chores. When the food was ready, the men stopped what they were doing and ate. After taking a smoke break, the Captain gave orders to get underway and the crew went back to work. Some went back to pumping the bilge; others started to set the sails they had recently furled. Just then the seafloor near Mary Celeste was ripped apart by a shallow-focused earthquake, a relatively common occurrence in the Azores.Report that might be exaggerated Conan Doyle (the author) was dramatized the Mary Celeste's story by adding such touches as meals laid out on the table, tea boiling on the stove, and the ship was sailing boldly into the harbor at Gibraltar with nobody at the helm. Today, most people who have heard of the ship think these details are part of what actually happened. They aren't. Conan Doyle 's was only the first of many such treatments.A 1913 magazine article was forged account of a man named Fosdyk who claimed the stowaway on board the Mary Celeste, witnessed the entire crew fall overboard as they pressed against the rail to watch three men have a swimming race, then managed to be the only one not eaten by sharks and eventually washed ashore on Africa. In the 1920s an author named Keating forged an article for Chamber's Journal telling the story of a man named Pemberton who survived. Keating soon expanded the fictitious Pemberton's tale into a book called The Great Mary Celeste Hoax.Unfortunately, the book's success has became its downfall: Interviews with Pemberton were widely sought. Keating tried to weasel his way out with excuses, and even offered a picture of his own father as a photograph Pemberton; but it was soon discovered that he made the whole thing up. Some information about the court inquiry held in Gribraltar The Inquiry into the Mary Celeste An inquiry of  Mary Celeste  disaster was held at the Admiralty Court by the British Royal Navy. Witnesses, experts, sailors, friends, business-partners and  acquaintances  were all questioned and interrogated.It was a slow, frustrating process. Not least a man who’s name was Flood. Flood was the Attorney-General of Gibraltar at the time. During the inquiry the judge listened acutely listened that was told and praised the crew Dei Gratia for their attention to detail and their bravery and skill in rescuing the ship , and bringing it safely back to land. Frederick Flood, however, had his own agenda. Flood was hell-bent on proving that the passengers was Mary Celeste had all met with some horrible and violent bloody end was suggested the theory of a drunken mutiny.He even rowed out to the ship to find evidence! He found the broken leaking barrels and the alcohol and the captain’s sword had cut-marks along the railings. He proposed the theory that the crew got an alcohol, dr ank themselves blind, murdered the captain, his wife, his daughter, his first mate has chucked them all overboard, then into the lifeboat and rowed†¦away†¦from a perfectly good ship†¦ Indeed, not a single piece of ‘evidence’ Flood submitted was found to be what it was!The barrels were empty because they were leaking (they’d been built of red oak, a porous wood which would’ve explained the empty barrels). The damage of railings? Ropes across the wood. The blood on the captain’s sword? It wasn’t blood. It wasn’t even the captain’s sword†¦that sword was stored under his bed! The sword that Flood found was an old, rusty knife lying on the deck. Scientists examined the blade and determined that the red substance was nothing but rust and old paint. It was probably used to lever open paint-cans and stir coagulated paint around!Examples of theories about the Mary Celeste crew’s disappearence Theories range fro m, alcoholic gas or smoke (fumes) to underwater earthquakes, to waterspouts, to paranormal explanations involving extraterrestrial life, unidentified flying objects (UFOs), sea monsters, and the phenomenon of the Bermuda Triangle, although the Mary Celeste is not known to have sailed through the Bermuda Triangle area. The Mary Celeste is often described as the ghost ship, since she was discovered without any apparent explanation, and her name has become a synonym for similar occurrences.The ship was said to be â€Å"cursed† and had a long history of disasters and catastrophes, and three captains died on the ship. The ship was destroyed in 1885 when it was intentionally wrecked off the coast of Haiti in an attempted insurance fraud. My opinion about Mary Celeste I think the story is half true and half right. The truth part is the storm and the earthquake in the water. The false part is the curse or the ufo and the phenomenon of the Bermuda triangle.

Profit Maximization Model

SAMPLE ANSWER FOR QUESTION 5 Profit-making is one of the most traditional, basic and major objectives of a firm. Profit-motive is the driving-force behind all business activities of a company. It is the primary measure of success or failure of a firm in the market. Profit earning capacity indicates the position, performance and status of a firm in the market. In spite of several changes and development of several alternative objectives, profit maximization has remained as one of the single most important objectives of the firm even today.Both small and large firms consistently make an attempt to maximize their profit by adopting novel techniques in business. Specific efforts have been made to maximize output and minimize production and other operating costs. Cost reduction, cost cutting and cost minimization has become the slogan of a modern firm. It is a very simple and unambiguous model. It is the single most ideal model that can explain the normal behavior of a firm. Main proposit ions of the profit-maximization model The model is based on the assumption that each firm seeks to maximize its profit given certain technical and market constraints.The following are the main propositions of the model. 1. A firm is a producing unit and as such it converts various inputs into outputs of higher value under a given technique of production. 2. The basic objective of each firm is to earn maximum profit. 3. A firm operates under a given market condition. 4. A firm will select that alternative course of action which helps to maximize consistent profits 5. A firm makes an attempt to change its prices, input and output quantity to maximize its profit. The model Profit-maximization implies earning highest possible amount of profits during a given period of time.A firm has to generate largest amount of profits by building optimum productive capacity both in the short run and long run depending upon various internal and external factors and forces. There should be proper balan ce between short run and long run objectives. In the short run a firm is able to make only slight or minor adjustments in the production process as well as in business conditions. The plant capacity in the short run is fixed and as such, it can increase its production and sales by intensive utilization of existing plants and machineries, having over time work for the existing staff etc.Thus, in the short run, a firm has its own technical and managerial constraints. But in the long run, as there is plenty of time at the disposal of a firm, it can expand and add to the existing capacities build up new plants; employ additional workers etc to meet the rising demand in the market. Thus, in the long run, a firm will have adequate time and ample opportunity to make all kinds of adjustments and readjustments in production process and in its marketing strategies. It is to be noted with great care that a firm has to maximize its profits after taking in to consideration of various factors in to account.They are as follows – 1. Pricing and business strategies of rival firms and its impact on the working of the given firm. 2. Aggressive sales promotion policies adopted by rival firms in the market. 3. Without inducing the workers to demand higher wages and salaries leading to rise in operation costs. 4. Without resorting to monopolistic and exploitative practices inviting government controls and takeovers. 5. Maintaining the quality of the product and services to the customers. 6. Taking various kinds of risks and uncertainties in the changing business environment. . Adopting a stable business policy. 8. Avoiding any sort of clash between short run and long run profits in the business policy and maintaining proper balance between them. 9. Maintaining its reputation, name, fame and image in the market. 10. Profit maximization is necessary in both perfect and imperfect markets. In a perfect market, a firm is a price-taker and under imperfect market it becomes a price -searcher. Assumptions of the model The profit maximization model is based on tree important assumptions. They are as follows – 1.Profit maximization is the main goal of the firm. 2. Rational behavior on the part of the firm to achieve its goal of profit maximization. 3. The firm is managed by owner-entrepreneur. Determination of profit – maximizing price and output Profit maximization of a firm can be explained in two different ways.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Total Revenue and Total Cost approach.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Marginal Revenue and Marginal Cost approach. Profits of a firm are estimated by making comparison between total revenue and total costs. Profit is the difference between TR and TC.In other words, excess of revenue over costs is the profits. Profit = TR – TC. If TR is equal to TC in that case, there will be break even point. If TR is less than TC, in that case, a firm will be incurring losses. In this case, we take in to account of total cost and total revenue of the firm while measuring profits. It is clear from  the following diagram how profit arises when TR is greater than that of TC. 2. MR and MC approach In this case, we take in to account of revenue earned from one unit and cost incurred to produce only one unit of output.A firm will be maximizing its profits when MR= MC and MC curve cuts MR curve from below. If MC curve cuts MR curve from above either under perfect market or under imperfect market, no doubt MR equals MC but total output will not be maximized and hence total profits also will not be maximized. Hence, two conditions are necessary for profit maximization- 1. MR = MC. 2. MC curve cut MR curve from below. It is clear from the following diagrams. Justification for profit maximization 1. Basic objective of traditional economic theory.The traditional economic theory assumes that a firm is owned and managed by the entrepreneur himself and as such he always aims at maximum return on his capit al invested in the business. Hence profit-maximization becomes the natural principle of a firm. 2. A firm is not a charitable institution. A firm is a business unit. It is organized on commercial principles. A firm is not a charitable institution. Hence, it has to earn reasonable amount of profits. 3. To predict most realistic price-output behavior. This model helps to predict usual and general behavior of business firms in the real world as it provides a practical guidance.It also helps in predicting the reasonable behavior of a firm with more accuracy. Thus, it is a very simple, plain, realistic, pragmatic and most useful hypothesis in forecasting price output behavior of a firm. 4. Necessary for survival. It is to be noted that the very existence and survival of a firm depends on its capacity to earn maximum profits. It is a time-honored hypothesis and there is common agreement among businessmen to make highest possible profits both in the short run and long run. 5. To achieve ot her objectives.In recent years several other objectives have become much more popular and all these objectives have become highly relevant in the context of modern business set up. But it is to be remembered that they can be achieved only when a firm is making maximum profits. Criticisms 1. Ambiguous term. The term profit maximization is ambiguous in nature. There is no clear cut explanation whether a firm has to maximize its net profit, total profit or the rate of profit in a business unit. Again maximum amount of profit cannot be precisely defined in quantitative terms. . It may not always be possible. Profit maximization, no doubt is the basic objective of a firm. But in the context of highly competitive business environment, always it may not be possible for a firm to achieve this objective. Other objectives like sales maximization, market share expansion, market leadership building its own image, name, fame and reputation, spending more time with members of the family, enjoying leisure, developing better and cordial relationship with employees and customers etc. lso has assumed greater significance in recent years. 3. Separation of ownership and management. In many cases, to-day we come across the business units are organized on partnership or joint stock company or cooperative basis. In case of many large organizations, ownership and management is clearly separated and they are run and managed by salaried managers who have their own self interests and as such always profit maximization may not become possible. 4. Difficulty in getting relevant information and data.In spite of revolution in the field of information technology, always it may not be possible to get adequate and relevant information to take right decisions in a highly fluctuating business scenario. Hence, profits may not be maximized. 5. Conflict in inter-departmental goals. A firm has several departments and sections headed by experts in their own fields. Each one of them will have its own independent goals and many a times there is possibility of clashes between the interests of different departments and as such always profits may not be maximized. 6. Changes in business environment.In the context of highly competitive and changing business environment and changes in consumer’s tastes and requirements, a firm may not be able to cope up with the expectations and adjust its policies and as such profits may not be maximized. 7. Growth of oligopolistic firms. In the context of globalization, growth of oligopoly firms has become so common through mergers, amalgamations and takeovers. Leading firms dominate the market and the small firms have to follow the policies of the leading firms. Hence, in many cases, there are limited chances for making maximum profits. 8.Significance of other managerial gains. Salaried managers have limited freedom in decision making process. Some of them are unable to forecast the right type of changes and meet the market challenges. They are more worried about their salaries, promotions, perquisites, security of jobs, and other types of benefits. They may lack strong motivations to make higher profits as profits would go to the organization. They may be contented with only satisfactory level of profits rather than maximum profits. 9. Emphasis on non-profit goals. Many organizations give more stress on non-profit goals.From the point of view of today’s business environment, productivity, efficiency, better management, customer satisfaction, durability of products, higher quality of products and services etc. have gained importance to cope with business competition. Hence, emphasis has been shifted from profit maximization to other practical aspects. 10. Aversion to reduction in power. In case of several small business units, the owners do not want to share their powers with many new partners and hence, they try to keep maximum powers in their hands.In such cases, keeping more power becomes more important than profit maximization. 11. Official restrictions over profits of public utilities. Public utilities or public corporations are legally prohibited to make huge profits in many developing countries like India. Thus, it is clear that a firm cannot maximize its profits always. There are many constraints in the background of multiple objectives. Each one of the objectives has its own merits and demerits and a firm has to strike a balance between all kinds of objectives.