Wednesday, October 30, 2019

Court Procedures 1 Essay Example | Topics and Well Written Essays - 1000 words

Court Procedures 1 - Essay Example Unjustified questioning and searches were common and caused tension in the pre-revolutionary America. Not every arrest, annexation or search should be made pursuant to a legitimately effected warrant. The Supreme Court specifies that police might conduct searches or arrests without necessarily producing a warrant so long as the circumstances justifies and/or necessitates such seizures or arrests (exigent circumstance). Consequently, felonies and searches incident to legalized arrest are excluded from the 4th amendment. In a legal proceeding, equity between the victim and the offender and the rule of law must be upheld. The present form of jurisprudence exists to inform about imperative aspects in criminal justice including their rights, responsibilities and trial forms such as trial by compurgation and trial by battle. Commonly, police officers must produce a warrant of arrest when arresting a suspect and prosecution action follows unless the charge(s) against the individual are dismissed. The Miranda requires that the police inform a person in custody of their right to remain silent during a criminal proceeding and inform them that anything said might be used as evidence against them in a court. The chapter presents the case of North v. Russell where the supreme court upheld a layperson’s decision to sentence North to 30 days imprisonment for drunk driving. It considered that the layperson was justified to preside over the case due to inaccessibility of higher courts. Chapter 2 explores the rights, responsibilities and rules governing the use of engine-powered machines and roads. It specifies the occasions under which the police are authorized to conduct an arrest or seizure of a vehicle and its occupants. A pat down is legitimate at a police station if an officer suspects that the suspect is armed, the automobile is an instrumentality of the time, the recent occupant of the vehicle is

Monday, October 28, 2019

Penalties and Offences in Tax Essay Example for Free

Penalties and Offences in Tax Essay In understanding the context of penalties and offences in Self-Assessment System, we first need to understand the overall meaning of Self-Assessment System. Self-Assessment System is based on the concept Pay, Self Assess and File. Whereby, Pay stands for monthly salary deductions are made for the individuals who are having an employment income or also for the individuals who are having business income through installments. The Self assess stands whereby the taxpayers are responsible in computing their own taxes. And the file stands for the Income Tax Revenue Form (ITRF) where it will be submitted to the Inland Revenue Board Malaysia together with the payment for the balance of the income tax payable where it is to meet any shortfall in the monthly payments or maybe a claim for a repayment, in case if there is an overpayment. Self-Assessment System (SAS) is being practiced in some developed countries such as United States, United Kingdom, Australia, Japan and The Organization for Economic Co-operation and Development (OECD) Countries as a group. There are some other developing countries also practicing Self-Assessment System such as Cambodia, Sri Lanka and also Malaysia. As we realize that the central motivations of the Self-Assessment System is being introduced is to increase the efficiency of tax collection for the tax authority. But yet there are some broad groups whereby they offences against the Act, filling inaccurate returns and providing incorrect information, fraud and willful evasion. This leads to the introduction of penalty and offences provision under Income Tax Act. There are few penalties for each offence under Income Tax Act. All the provision of penalties does helps to ensure the proper compliance by the taxpayers with the tax laws. But how does it ensure the proper compliance. First of all, all the taxpayers are responsible in submitting their income tax for every year assessment. In a way, by submitting their income tax for every year, influence directly where it helps the country to increase its revenue. Income tax is a major source of revenue to a country which it is required to pay for schools buildings and maintenance of schools and hospitals, rural development and other multifarious services which directly and indirectly benefits the publics. Therefore, a development of a country is depends on the residents. If a taxpayer fail to furnish return or give notice of chargeability will be liable under Section 112 (1) of the Income Tax Act which explains that any person who fail to furnish the return without any reasonable excuse, be guilty of an offence and shall be liable to a fine of not less than RM 200 and not more than RM 2,000 or to imprisonment for a term which not exceeding six months or to both. As this offence will slow down the countries tax administration cycle. The provision for penalties and offences ensures the taxpayer to avoid submitting the incorrect return. In Section 113(1) under Income Tax Act explains that any person who makes an incorrect return by omitting, understating any income or gives any incorrect information where in relation to any matter affects his own chargeability to tax or any other person. As stated in the law, the taxpayers who have submitted an incorrect return will be liable to a fine of not less than RM 1,000 and not more than RM 10,000 and also shall pay a special penalty of double the amount of tax that has been undercharged in the consequence of the incorrect return or for incorrect information and no imprisonment. Those penalties will be a courage for the taxpayers for not to submit an incorrect return or incorrect information. This is because those penalties are an extra burden for the taxpayers. Providing an incorrect return and incorrect information will also burden the IRB, for them to come with a report for the year. Therefore as a resident of Malaysia, we should avoid ourselves from submitting an incorrect return and incorrect information to the IRB. Thus, we also have to play a part in developing our country. The higher is the penalty rate the greater the discouragement for potential tax evasion. There was a few studies has been carried out, and they summarized that penalty rates impact upon tax compliance behavior. When the taxpayers are aware of the offences that they are committing when evading tax and the consequences of being a non-compliant taxpayers, therefore they might reduce their tendency to evade tax. As stated in Section 114 (1) Malaysian Income Tax Act, which explains that any person who willfully and with intent to evade or assist any other person to evade tax, will be liable to a fine of not less than RM 1,000 and not more than RM 20,000 or to imprisonment for a term which is not exceeding 3 years or to both, and also shall pay a special penalty of treble the amount of tax uncharged. This section in the act, seems to be a big burden for those who willful the evasion. The awareness of the penalties for the offences, will help the taxpayers to not against the laws and always ensures the proper compliances. In conclusion, the provision for penalties and offences under the Malaysian Income Tax Act 1965 help to ensures proper compliance by taxpayers with tax laws. Imposing the penalties is the most effective way to ensure the proper compliance. The taxpayers must be co-operative, well-mannered, fair, and honest with high integrity. They should also provide all reasonable facilities and assistance to enable the audit office to carry out his duties as it has outlined in Public Ruling No. 7/2000.

Saturday, October 26, 2019

Mill on Liberty Essay examples -- essays research papers

In Chapter 2, Mill turns to the issue of whether people, either through their government or on their own, should be allowed to coerce or limit anyone else's expression of opinion. Mill emphatically says that such actions are illegitimate. Even if only one person held a particular opinion, mankind would not be justified in silencing him. Silencing these opinions, Mill says, is wrong because it robs "the human race, posterity as well as the existing generation." In particular, it robs those who disagree with these silenced opinions. Mill then turns to the reasons why humanity is hurt by silencing opinions. His first argument is that the suppressed opinion may be true. He writes that since human beings are not infallible, they have no authority to decide an issue for all people, and to keep others from coming up with their own judgments. Mill asserts that the reason why liberty of opinion is so often in danger is that in practice people tend to be confident in their own rightness, and excluding that, in the infallibility of the world they come in contact with. Mill contends that such confidence is not justified, and that all people are hurt by silencing potentially true ideas. After presenting his first argument, Mill looks at possible criticisms of his reasoning and responds to them. First, there is the criticism that even though people may be wrong, they still have a duty to act on their "conscientious conviction." When people are sure that they are right, they would be cowardly not to act on that belief and to allow doctrines to be expressed that they believe will hurt mankind. To this, Mill replies that the only way that a person can be confident that he is right is if there is complete liberty to contradict and disprove his beliefs. Humans have the capacity to correct their mistakes, but only through experience and discussion. Human judgment is valuable only in so far as people remain open to criticism. Thus, the only time a person can be sure he is right is if he is constantly open to differing opinions; there must be a standing invitation to try to disprove his beliefs. Second, there is the criticism that governments have a duty to uphold certain beliefs that are important to the well being of society. Only "bad" men would try to undermine these beliefs. Mill replies that this argument still relies on an assumption of i... ...s beliefs are not reflected in their conduct. As a result, people do not truly understand the doctrines they hold dear, and their misunderstanding leads to serious mistakes. Mill presents one possible criticism of this view. He writes that it could be asked whether it is essential for "true knowledge" for some people to hold erroneous opinions. Mill replies that having an increasing number of uncontested opinions is both "inevitable and indispensable" in the process of human improvement. However, this does not mean that the loss of debate is not a drawback, and he encourages teachers to try to compensate for the loss of dissent. Mill then turns to a fourth argument for freedom of opinion. He writes that in the case of conflicting doctrines, perhaps the most common case is that instead of one being true and one false, the truth is somewhere between them. Progress usually only substitutes one partial truth for another, the newer truth more suited to the needs of the times. Dissenting or heretical opinions often reflect the partial truths not recognized in popular opinion, and are valuable for bringing attention to a "fragment of wisdom." This fact can

Thursday, October 24, 2019

Ict Policy and Server Room Proposal for a Small Firm

INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT INTRODUCTION Information and Communications Technology Policy addresses security issues and how to effectively apply and maintain information systems, thereby facilitating protection of critical, valuable and confidential information together with its associated systems. Most people are likely to recognise the impact and severity of the loss or theft of confidential designs for a new product. However they do not always recognise the potential risk, and consequential result, of seemingly ‘innocent' activities, such as copying software or copying the corporate database onto their laptop computer or not documenting changes made to their systems. The purchase and installation of hardware and software requires those involved to consider carefully the Information Security issues involved in this process. Careful consideration of the company's business needs is paramount, as it is usually expensive to make subsequent changes. Analysis of user requirements versus the various benchmarks test results will establish the best choice of server/software to be purchased. Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the IT & T Policy issues are adequately covered. The issue of IT consumables is looked into. These are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. Valuable items should always be kept in a secure environment to avoid damage or loss. OBJECTIVES To develop an Information Communication Technology policy for KPLC Retirement Benefits Scheme that introduces efficient and effective use of IT systems and in turn facilitate the smooth running of the secretariat. MISSION STATEMENT To strive to provide nothing but the best means of data and telecommunications services to the secretariat as a whole. DEFINITION OF ICT POLICY A set of rules, regulations, procedures and plans of action for administration of equipment, resources, and services in the ICT section. TERMS OF REFERENCE The aim of this document is to; ) Analyse procedures and practices that are in use currently and identify those that can be reinforced or changed. ii) Work out a time plan for the smooth transition from the use of KPLC systems and resources. iii) Review implemented policies elsewhere to facilitate broad knowledge and adapt ideas suitable to our environment. TABLE OF CONTENTS INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT1 INTRODUCTION1 TABLE OF CONTENTS2 PREAMBLE4 IT & T SYSTEM DESCRIPTIONS4 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT8 1. 1 Purchasing and Installing Hardware8 1. 2Cabling, UPS, Printers and Modems15 1. 3Consumables16 . 4Working off premises or using out-sourced processing18 1. 5Using Secure Storage20 1. 6Documenting Hardware23 1. 7 Telecommunications equipment25 1. 8Other Hardware Issues28 1. 9 Disaster Recovery Plans30 2. 0 CONTROLLING ACCESS TO INFORMATION & SYSTEMS IN THE SECRETARAIT32 2. 1Controlling Access to Information and Systems32 2. 1. 5 Controlling Access to Operating System Software38 Managing Passwords39 3. 0 PROCESSING INFORMATION AND DOCUMENTS46 3. 1Networks46 3. 2System Operations and Administration49 3. 3E-mail and the World Wide Web57 3. 4Telephones & Fax69 3. 5Data Management73 3. 6Backup, Recovery and Archiving75 . 7Document Handling78 3. 7. 3 Countersigning Documents79 3. 7. 5 Approving Documents before dispatch80 3. 7. 6 Signature Verification80 3. 8Securing Data83 3. 8 . 4 Maintaining Customer Information Confidentiality86 4. 0 PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE90 4. 1Purchasing and Installing Software90 4. 2Software Maintenance & Upgrade92 4. 3Other Software Issues94 5 COMBATING CYBER CRIME95 5. 1Combating Cyber Crime95 5. 1. 1 Defending Against Premeditated Third Party Cyber Crime Attacks95 5. 1. 2 Minimising the Impact of Cyber Attacks97 5. 1. 3 Collecting Evidence for Cyber Crime Prosecution98 5. 1. Defending Against Premeditated Internal Attacks99 5. 1. 5 Defending Against Opportunistic Cyber Crime Attacks100 6. 0 COMPLYING WITH LEGAL AND POLICY REQUIREMENT101 6. 1Complying with Legal Obligations101 6. 1. 2 Complying with General Copyright Legislation101 6. 1. 3 Complying with Copyright and Software Licensing Legislation102 6. 1. 4 Legal Safeguards against Computer Misuse103 6. 2Complying with Policies103 6. 3Avoiding Litigation106 6. 3. 3 Sending Copyrighted Information Electronically107 7. 1 E- Commerce Issues108 7. 2 Structurin g E-Commerce Systems Including Web Sites108 7. 3 Securing E-Commerce Networks109 . 4 Configuring E-Commerce Web Sites110 7. 5 Using External Service Providers for E-Commerce Delivery Channel111 8. 7Cost Considerations116 9. 0 DEALING WITH PREMISES RELATED CONSIDERATIONS118 9. 1 Physical Security of Equipment and Assets118 10. 0 NETWORK SECURITY MEASURES122 10. 1 Data Network devices122 10. 2 System administration123 10. 3 System Auditing129 10. 4 Email Policies130 10. 5 The Internet131 10. 6Computer desktop equipment133 10. 7Human Resource Aspects Policies141 10. 8Security Policy Auditing142 10. 9Incidence Management and Responses146 Reporting an Incident146 What is Cybercrime? 151 10. 0Movement of Telecommunications Equipment155 11. 1Setting Classification Standards157 12. 0 RETIREMENT OF OBSOLESCENCE OR OBSOLETE EQUIPMENT158 12. 1 Setting New Hardware Standards158 12. 2Methods of assessing old and inapt Software/hardware158 12. 3Hardware and software obsolescence160 12. 4RBS Depre ciation Factors for Defining Old Or Inapt Equipment161 13. 0 APPENDIX 1162 13. 1 LIST OF SPARES & ACCESSORIES162 14. 1 GLOSSARY & REFERENCES163 PREAMBLE It is necessary for one to be familiar with the various Information Technology and Telecommunications Systems that the company has acquired and installed over the years. This document provides the description of the systems as well as the policies formulated in regard to these IT & Telecommunications systems. IT & T SYSTEM DESCRIPTIONS 1. Telephony The telephone network for RBS consists of the public interconnected network using automatic branch exchanges (PABX) which connects us to the public network using telecommunication service providers and private branch network (PBX) which is housed in our commercial office premises which help us communicate in the premises through extension numbers. 2. Computer Data systems These are composed of data network hubs and switches which make the Local Area Networks (LAN) and the routers which interconnect the LANs. Each LAN is composed of passive data networks, servers and PCs that use the network thus realised to exchange information and data throughout the enterprise. 3. System Software and Data System software is the general term used to describe the many software programs, drivers and utilities that together enable a computer system to operate. One of the main components of system software is the operating system of the computer e. g. Microsoft Windows ® XP Professional. 4. Data Data in the language of information technology means the individual elements that comprise the information and can be processed, formatted and re-presented, so that it gains meaning and thereby becomes information. Here we are concerned with the protection and safeguard of that data/information which, in its various forms can be identified as Business Assets or Information Assets. The term data and information can be used somewhat interchangeably; but, as a general rule, information always comprises data, but data is not always information. ICT SYSTEMS DESCRIPTIONS DESCRIPTIONS THE OF SYSTEM RBS – Open Retirement Benefits Scheme System The system is used for the administration of employee and employer contributions into the RBS Fund. It has a database for member details together with their dependants. This is used when benefits are to be calculated for deceased persons and withdrawing members. The system also has a pensioners payroll used to pay all pensioners whether retirees or widows and orphans. Group Life for all employees and the issue of Last Expense is also maintained and administered in the system. Database Management Systems The secretariat database is managed using ORACLE database management systems(DBMS). Oracle databases are relational, thus data is stored in them in row-column (table) format. All the company data is stored and managed using ORACLE. WINDOWS NT ENVIRONMENT The Window NT environment operates in domains. A domain is a collection of computers and users defined by the administrator of a Windows NT Server network that share a common directory database. A domain provides access to the centralised user accounts and group accounts maintained by the domain administrator. Each domain has a unique name. Window NT Environment In the current WAN model of KPLC there is a single master domain called KPLCSTIMA. The KPLCSTIMA is also the main account domain and KPLCNET as Internet resource domain. A child domain known as RBS. KPLCSTIMA will be created from the master domain and will have trust relationship with it. This is will give us more control of our systems and semi-autonomy from the KPLC systems. It will be installed with Windows Server 2003 standard edition operating system which will provide the following services at RBS: 1. File and Print sharing. 2. Microsoft Exchange Services – host the resident Staff member’s mailboxes and enable efficient sending and receiving of internal/Internet mail and if need be provide also storage of the mailboxes. 3. Anti-virus Software. 4. Systems Management Server for Network management. 5. Internet Browsing. 6. To allow for faster downloads of the application updates. 7. To enable the efficient installation and periodic updates of the PC anti-virus in the local area network. 8. For faster and seamless primary logon of client PC’s to the network. Our application i. e. RBS system is already running in a stand alone server and will continue that way to ensure system stability and integrity. The new system will also run on its own stand alone server for the same reason. †¢The primary domain controller (PDC) tracks changes made to domain accounts. Whenever an administrator makes a change to a domain account, the change is recorded in the directory database on the PDC. The PDC is the only domain server that receives these changes directly. A domain has one PDC. A backup domain controller (BDC) maintains a copy of the directory database. This copy is synchronised periodically and automatically with the PDC. BDC’s also authenticate user logons, and a BDC can be promoted to function as the PDC. Multiple BDC’s can exist in a domain. Client PCs Currently there are four PCs and two laptops in the secretariat all running Windows XP as the desktop operating system and networked using Windows NT operating system of the K PLC master domain. All PCs have MS Office 2003 – 2007 as an office desktop application. The PCs have between 256 and 512 MB RAM. All the PCs are running on Microsoft TCP/IP protocol and use USER LEVEL access on the network. Microsoft Exchange Server Microsoft Exchange Server is used for electronic messaging in and out of the organisation. Exchange is organised into entities called sites each consisting of one or more servers containing mailboxes and public folders. Mailboxes are where a user’s messages are kept, each user having a single mailbox whereas public folders are like notice – boards, containing information that is shared between multiple users. Intra-site communication has to occur at high speed and with high reliability. Inter-site communication can occur at lower speeds. In addition to local messaging, there is Internet messaging, implemented via the Proxy Server. Anti-Virus Software McAfee’s Total Virus Defence Software is the current company guard against viruses. The software is loaded on all the Exchange server protects against viruses distributed. A group of computers and the server that manages them is called an Anti-virus Domain. The anti – virus server downloads new version automatically from McAfee Website on the Internet. Once the new software version is downloaded, the system administrator configures it for distribution. It also alerts the system administrator to ‘pull’ the latest versions to the Anti-virus Server. Internet Microsoft Proxy Server provides an easy, secure way to bring Internet access to every desktop in an organisation. The proxy server is a gateway between the company’s network and the Internet. A gateway is special software, or a computer running special software, that enables two different networks to communicate. The gateway acts as a barrier that allows you to make requests to the Internet and receive information, but does not allow access to your network by unauthorised users. [pic] 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT 1. 1 Purchasing and Installing Hardware This Chapter deals with the Information Technology and Security issues relating to the purchase, use or maintenance of equipment through which information is processed and stored. 1. 1. 0 Procurement of Hardware, Peripherals and Other Equipment Policy Statement All purchases of new systems hardware or new components for existing systems must be made in accordance with Information Security and other organisation Policies, as well as technical standards. Such requests to purchase must be based upon a User Requirements Specification document and take account of longer-term organisational business needs. The purchase and installation of hardware requires those involved to consider carefully the Information Security issues involved in this process. This section covers the key areas to be considered. . 1. 1 Specifying Information Security Requirements for New Hardware The purchase of new computers and peripherals requires careful consideration of the business needs because it is usually expensive to make subsequent changes. |ICT Issues to consider |Action Required | |The system must have adequate capacity or else it may not be |Estimate the current and potential load on the system. | |able to process your data. For critical applications ensure t hat the system is reliable and of | | |high quality. | | |Select a supplier with a proven ‘track record', who is likely to be | | |in business for the life of the hardware. | |Data must be adequately protected; otherwise there is a risk |Determine the type of safeguards necessary for the information | |of loss or accidental / malicious damage. concerned and ensure that the hardware is capable of supporting the | | |required features, e. g. the type of operating system and attached | | |devices. See classifying information and data | |Where hardware maintenance is poor or unreliable, you greatly|Choose a supplier with a proven ‘track record', who is likely to be | |increase the risk to the organisation, because, in the event |in business for the life of the hardware. |of failure, processing could simply STOP. |Enter into a maintenance contract at the time of purchase with a | | |suitable response time in the event of a failure. See service level | | |agreement | |T he system must be sufficiently ‘resilient' to avoid |Determine your organisation’s tolerance to system non-availability | |unplanned down-time, which can have an immediate negative |(seconds, minutes, hours or days? , and approach the design of your | |impact on your organisation |hardware configuration accordingly. | | |Consider the use of mirrored disks to guard against disk failures; | | |duplicate processors in case of processor failure; duplicate | | |configurations; and the use of an Uninterrupted Power Supply (UPS) | | |and standby generators. 1. 1. 2 Installing New Hardware Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the ICT Policy issues are adequately covered. (See Premises for further detail. ) Policy Statement All new hardware installations are to be planned formally and notified to all interested parties ahead of the proposed installation date. Information Technology and Securi ty requirements for new installations are to be circulated for comment to all interested parties, well in advance of installation. ICT Issues to consider |Action Required | |The equipment must be located in a suitable environment otherwise|Adhere to the specifications and recommendations of the | |it may fail. |manufacturer or supplier, e. g. for operational temperature, | | |humidity etc. | |Adequate safeguards against fire, water and electrical failure | | |should be in place. See Premises | |Any disclosure of your network diagrams, security features, |Ensure that all persons on site, whether from your own | |locations and configurations etc. exposes potential |organisation or not, have completed a Non-Disclosure Agreement | |vulnerabilities, which could be exploited. Although a Non Disclosure Agreement paves the way for legal | | |redress, it cannot protect you against actual commercial damage. | |Leaving tools, utilities and developer's kits on your new system |All new syste ms should be configured for maximum practical | |endangers the confidentiality and integrity of your data |security by the removal of unnecessary utilities, developers' | | |programs, etc. a technique known as hardening. | |Without an installation plan for the new equipment, disruption to|Ensure that all special pre-installation requirements (e. g. air | |operational systems is more likely. |conditioning) have been met. | | |Identify the precise location for the equipment and ensure that | | |the power and network cables are ready. | | |Agree a detailed installation plan with the vendor. | |Anticipate what might go wrong and consider how to minimise the | | |risks. | |Where the installation plan does not include safeguards against |Agree a detailed installation plan and document it. See Project | |the (inevitable) increased security threat resulting from |Plan | |(relatively) ‘open access' to the systems area, accidental or |Monitor progress against the plan. |malicious damage can result. |Only allow authorised persons access to the systems area. | | |To protect all parties never allow engineers to work unattended. | | | | |Breaches of Health and Safety regulations endanger the well being|Ensure Health and Safety regulations are followed when locating | |of your staff and your organisation’s commercial activities. the equipment, peripherals and cables. | | |A periodic visual inspection is beneficial also. | 1. 1. 3 Testing Newly Installed Systems and Equipment Hardware should be tested when new to verify it is working correctly, and then further tests applied periodically to ensure continued effective functioning. Policy Statement All equipment must be fully and comprehensively tested and formally accepted by users before being transferred to the live environment or user sites. |ICT Issues to consider |Action Required | |Where new equipment is not tested for critical functions before |Ensure that all new installations are thoroughly tested after | |being used, it can lead to failure and hence damage to both data |initial set-up and prior to live use. |and other linked systems. |All such tests should be in accordance with a documented test | | |plan. | |Inadequate testing can threaten the integrity and availability of|Check the test outputs to confirm the results. Ensure that | |your data. |all-key components, e. g. hard disk subsystems are included in the| | |tests. | |Devices that are known to degrade with time, e. g. printers, | | |should be tested periodically | |Where testing is performed in a manner that does not simulate |Ensure that the test plan simulates realistic work patterns | |live conditions, the results of such testing cannot be relied | | |upon. | |Poor security procedures during equipment testing can compromise |Ensure that Non Disclosure Agreement have been obtained from all | |the confidentiality of your data. |third party staff involved in testing the equipment. | |Verify that the required security configuration and safeguards | | |have been implemented for the new hardware. | | |If live data is used in the testing process for the new hardware,| | |ensure that it is closely controlled. See Use of Live Data for | | |Testing | Explanatory notes NT servers The analysis of user requirements (client base and mail sizes expected) versus the various benchmarks test results will establish the best choice of server to be purchased. For file and print server only disk space is a key requirement. IT & T Issues |Key Actions | |CPU Board |Dual CPU, redundant system components in many aspects | |Disk & Disk space |Enough storage to cater for expected growth of mail database for the next| | |fiscal year | | | | | |Redundant and RAID-5 capable | |SPEC INT2000 |Compares CPU speeds for various servers. | | | |SPEC CPU2000 |To establish best processors and server performances. | | | | |(http://www. specbench. org/) |To establish best server as per RBS requirements. | | | | | |Do sample analysis based on databases expected or consult database | | |product vendor on system demands. |TPC-C benchmark |The TPC-C benchmark measures the ability of a server to process | | |transactions in a simulated business environment, calculating both the | |See guidelines at http://www. tpc. org/ for |performance of the System Under Test and real world scenario. | |transactions per server | | | |Mail servers should handle 1500 mail user traffic simultaneously in a | | |normal business environment. | | | | |Mail servers should be capable of storing all mails processed in a normal| | |working day. | Routers |ICT Issues |Key Actions | |Router basics |Dual CPU, all redundant system components installed at time of purchase | | |in many aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X. , 128 MB RAM and suitable flash memory to | | |store all features of IOS. | | | | |VPN and 3-DES features enabled | |IOS compatibility |New routers should Cisco compatible to integrate seamlessly with existing| | |IOS and equipment. | |Number of WAN ports |Decide by local needs e. g. | | | | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local o r by remote interface, RMON, SNMP or network user | | |interfaces. | Hubs and Switches Item |Action | |Hardware basics |Dual CPU, all redundant system components installed at time of purchase in many | | |aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X, VLAN and work grouping, bridging possible. | |IOS compatibility |Cisco compatible to integrate seamlessly with existing IOS and equipment. |Protocols |Ethernet enabled | |L | | |Number of LAN ports |Decide by local needs e. g. | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local or by remote interface, RMON, SNMP or html enabled network | | |user interface. | Modems Item |Action required | |Software Compatible |Supports HyperTerminal for Windows | | | | | |Should be configurable using AT commands | |V90 |Modems should be V90 standard and downward compatible with existing V54 & V42 | | |types, etc. |2 & 4 wire |Supports two wire dialup and 4 wire leased analogue line use. | Data cabinets Equipment cabinets should be properly chosen. The current 6U cabinet is too small for any future expansion or even good workmanship to be carried out. Vendors should provide cabinet of size equal or larger than 12U cabinet. |Item |Action | |Sufficient space for equipment |The cabinet should house all the equipment and accessories at the installation| |See http://www. datacabinets. om/ |time, leave room for future expansion and provide free space for proper | | |ventilation | |Aesthetically chosen for office environment |The cabinet aesthetically coloured to match with general looks in the vicinity| | |free standing or wall mounted and should be equipped with sufficient power | | |blocks. | |Proper ventilation and humidity |The cabinet must have sufficient cooling fans. The fans in these cabinets | | |shall be designed to give minimum noise level expected in a normal office | | |environment and must be designed to keep the humidity level low. | |Designed for equipment therein |The cabinets will be used to house all the active equipment and connection | | |accessories such patch panels, Light Unit Interfaces (LIU). | | | | | |Be lockable and be equipped with some trays. LIUs, cord organisers, cable | | |straps etc. |Grounding and ESD |All cabinet shall be electrically grounded to ensure electric noise and | | |electrostatic discharge is minimised. | Server Room The following items are useful in a server room construction. |Item |Action | |Backup supply |Installation of a central UPS to back up for at least 30 minutes after an | | |outage. | |Conditioned power supply |Installation of spike protectors is necessary to ensure well regulated supply | | |free of surges and dips. |Neat and extensive cable trays |Construction of a technical (false) floor and technical roof (false ceiling) | | |to house all types of cabling and utilities such as fire hydrants, smoke | | |detectors, etc | |No electrostatic discharge (ESD) in computer centre and |Proper grounding and use of anti-static PVC tiles on floor. Each tile must be| |equipment |grounded well. | |Maintain ambient temperature |Installation of a two way redundant air conditioning system. | | |Maintain 16 ? C via room wall. | |Guard against fires and similar hazards |Installation of an automatic fire-fighting system |Use effective extinguishers that are less hazardous to |Use most inert system e. g. Inergen | |human health. |See www. inergen. com/ | |Classify room usage |Partitioning of the computer room | |Proper lighting |Supply and installation of False Ceiling | |Protection against harmful effects of fire hydrants |Supply of Gas Masks | 1. 2Cabling, UPS, Printers and Modems Cabling For best of cabling the following international standards should be incorporated when carrying voice/data-cabling works. |Item |Action | |Scope |Systems Administrator to access scope of requirements. | |Design of cabling plant and premises consideration |According to ANSI/EIA/TIA 568B & 569 standards | | |See www. ansi. org, www. eia. org & http://www. tiaonline. rg | |Implementation and workmanship of cabling works and testing |According to ANSI/EIA/TIA 606 & 607 standards of installing and | | |maintaining data/voice cabling plant. | |Network Active devices |Different vendors have preferred methods of rolling out active | | |devices try this method: | | | | | |Develop | |high-level process flow diagram for deploying new solutions | | |solution hardware requirements | | |solution management platforms | | |solution validation by pilot project | | |full solution deployment | | |document all related information for management, maintenance and | | |future extensions | UPS The following formulas are useful in determining choice of UPS. The UPS are rated in terms of steady power out put and backup time. Steady power rate is given in watts= W Backup time is given in Hours or Ampere-hour of the batteries. = Ah Backup capacity in terms of Ampere-Hour is Ah = (Watt x time) and or is computed to be Ah =3. 6 Mega joules. Power x Time = Energy (joules) Translates to Time =Ah/power E. g. StimaEIS is 7. 2-kVA load. To backup for half an hour it requires (7200 x 30 x 60 x 60)/3. 6 x106 = 216 Ah Given that each small battery is 12V with 9 Ah each then the UPS will have 24 small batteries. Similarly for rest of the computers same formula can be used. 1. 3Consumables Introduction ICT consumables are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. This section deals with the Information Security aspects of IT consumables. 1. 3. 1 Controlling IT Consumables Policy Statement IT Consumables must be purchased in accordance with the organisation’s approved purchasing procedures with usage monitored to discourage theft and improper use. They must be kept in a well-designated store away from working area. Explanatory Notes Examples of consumables are printer forms, stationery, printer paper, toner & ink, ribbons, disks, diskettes, bar-code labels and other accessories. Item |Key Actions | |Pilfering of your consumables results in increased organisational|Safeguard Consumables against petty theft by locking cupboards, | |expense. |maintaining a register, written authorisation prior to removal of| | |items etc. Keys to be kept by the supervisor’s office. | |Consumables may be s tolen with the intent to defraud your |Take special measures to protect potentially valuable pre-printed| |organisation or customers. |forms and account for their usage. Store area should be a | | |restricted area, use gate-passes and authorisation. |Confidential data may be revealed to unauthorised persons from |Ensure that confidential information cannot be identified from | |discarded Consumables e. g. discarded draft printer output and |discarded Consumables, such as printer ribbons and floppy disks, | |test data printer output. |by destroying them. | | |Destroy or shred surplus printout / fiche containing data, | | |whether or not the data appears to be confidential – it may be! | | |See also Classifying Information and Data. | 1. 3. Using removable storage media including Diskettes and CDs Policy Statement Only personnel who are authorised to install or modify software, and staff who are authorised to transfer and update data shall use removable media to transfer dat a to / from the organisation’s network. Any other persons shall require specific authorisation. Explanatory Notes When using removable storage media, there are additional ICT Security risks associated with the portability of the media. Personnel authorised to install & modify software is the system administrator. Personnel authorised to transfer and update data shall be determined by the general manager and systems administrator. ICT Issues |Key Actions | |Loss or ‘disappearance' of disks, tapes, etc. can |Ensure that all media are stored safely and securely. | |compromise the confidentiality of the organisation’s |Make sure that all media are labelled clearly, whether physically and/or | |data. |electronically, and that they can be located easily when needed. | | |Designate key individuals to monitor the storage and use of removable | | |media. | |Damage to media compromises the integrity of your |Follow the manufacturers' recommendations when handling the m edia. | |corporate records. Take protective measures against environmental extremes of temperature, | | |humidity, dust, etc. , appropriate to the importance and sensitivity of the| | |data. | | |Consider carefully the safeguards required for any media being moved or | | |stored off-site; especially backup tapes / disks. | | |In the case of irreplaceable data, you should consider taking security | | |copies, each of which must be properly safeguarded. | |Consider using fire-resistant storage cabinets for such media. | 1. 4Working off premises or using out-sourced processing Working Off-Premises involves a broad range of Information Security risks. In addition to the obvious threat of theft of the equipment there are also significant risks to the information contained on portable equipment. It is necessary to use business centres with great care as confidential information or data can be input onto equipment that is not under your control. 1. 4. 1 Contracting or using Out-sour ced Processing The following issues should be considered if the organisation decides to utsource some or all of its computer processing. Policy Statement Persons responsible for commissioning out-sourced computer processing must ensure that the services used are from reputable companies that operate with accredited information security and quality standards which should include an appropriate Service Level Agreement. |ICT Issues to consider |Action Required | |Inadequate performance can threaten your organisation's |Determine the critical success factors for your organisation in terms of| |information processing and business operations. speed, reliability, response and ability to scale rapidly (if | | |necessary). | | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Poor reliability threatens the performance of your |Consider your organisation's tolerance to system non-availability in | |business. |seconds, minutes, hours or days? | | |Ensure that the service provider can meet these needs. | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Lack of direct control when outsourcing can compromise |Due diligence should be exercised to ensure that the outsourcing company| |data confidentiality. |is reputable and operates with adequate standards. | | |Obtain a Non Disclosure Agreement from the outsourcing company. | | |Insist on secure transmission methods between your organisation and | | |theirs, e. g. authenticated transmission with encrypted data. | 1. 4. 2 Issuing Laptop / Portable Computers to Personnel Laptops, Portables, Palmtops -or even electronic ‘organisers', which connect to and store your organisation’s data – are included within this topic. Throughout this topic we refer to them collectively as ‘laptops' Policy Statement Line management must authorise the issue of portable computers. Usage is restricted to business purposes, and users must be aware of, and accept the terms and conditions of use, especially responsibility for the security of information held on such devices |ICT Issues |Action Required | |Confidential data disclosed to unauthorised persons can |Be certain that the member of staff has a valid business reason for | |damage the organisation. |using a laptop. Maintain and update the Hardware Inventory with the | | |primary user's name and contact details | | |Ensure that you are always able to trace the physical location of the | | |laptop and that the type and sensitivity of any stored data is known and| | |properly secure. | | |Always use any ‘power-on' password feature as a simple deterrent to | | |opportunistic usage. | | |Ensure the confidentiality and security of backup files. |The use of unlicensed software can subject your |All software used on the laptop must be licensed and comply with both | |organisation to legal action |legal and organisational standards. | |Viruses, Worms, Trojans and other Malicious Code can |Scan the laptop for malicious code and viruses regularly. | |corrupt both data and the system files. |Always scan files before accepting them onto the laptop | |Theft of the laptop exposes the organisation to the threat|Ensure that the holder implements adequate safety procedures against | |of disclosure o f sensitive corporate data to competitors. |theft. | |Consider the use of securing wires or other security devices in open | | |offices. | | |Ensure that the Hardware Inventory contains relevant allocation details | | |of all computers. Insure the laptop against loss, theft and damage. | | |Be aware of any exclusion in cover. Prepare guidelines for issuing | | |portable computing equipment. |Inadequate backup and recovery routines can lead to the |Ensure that laptop computers can have their data safeguarded through | |loss of data. |regular backups. | | |Ensure that the primary user of the equipment recognises their | | |responsibilities in this regard. | Guidelines for Issuing Portable Computing Equipment Those responsible for issuing portable computer equipment must ensure that the following is complied with before issuing such equipment to employees. †¢ Ensure that adequate insurance cover is provided for the portable equipment for use in the home country and abroad. Ensure that suitable virus scanning software is present on the equipment. †¢ Supply suitable network connections and ensure that access procedures are applied if the equipment is to be connected to a network. †¢ Ensure that adequate capacity (hard disk and memory size) is available on the equipment to support business processing. †¢ Ensure that adequate backup and restore facilities and procedures are in place. †¢ Ensure that compatible versions of application software are in place. †¢ Ensure that software encryption and/or physical locking devices are in place. †¢ Ensure that adequate records of the equipment are maintained, and that the issue is authorised and receipted. Ensure that authorisation for use of portable computing equipment is received †¢ Ensure that the Terms of Use are issued and signed. 1. 5Using Secure Storage Introduction It is essential that valuable confidential or critical information or equipment is stored in a secure locati on. This section covers secure storage. Policy Statement Sensitive or valuable material and equipment must be stored securely and according to the classification status of the information being stored. Documents are to be stored in a secure manner in accordance with their classification status. 1. 5. 1 Using lockable storage cupboards & filing cabinets A lockable storage cupboard should be considered for storing sensitive or valuable equipment. A lockable filing cabinet should be considered for secure storage of paper-based files and records, or small but movable items. |ICT Issues |Key Actions | |Unsecured organisation sensitive material may be |Ensure that all sensitive material is secured in a lockable storage | |stolen from the department. |cupboard, cabinet or safe when not required. The more sensitive the | | |material, the more care must be taken in selecting the appropriate storage| | |method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | |Securely locked organisation sensitive material may be|Ensure that highly sensitive material including computer discs and tapes | |stolen or damaged whilst in store. |are stored in a fire rated storage cupboard, cabinet, or sa fe. Beware that| | |the cabinet itself may survive the fire but the items inside may be | | |damaged irreparably. | | |Ensure that all sensitive material is secured in a lockable storage | | |cupboard, cabinet, or safe when not required. | | |Use a storage unit, which matches the sensitivity of the material. The | | |more sensitive the material, the more care must be taken in selecting the | | |appropriate storage method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | 1. 5. 2 Using Fire-Protected Storage Cabinets & Safes A fire protected storage cabinet is a good way to protect sensitive material against the risk of being destroyed by fire and possible water damage from fire fighting activities. The use of safes for storage is to be en couraged. The security of the safe itself is just as critical. Policy Statement Items such as backup-tapes, microfiche, microfilm, archives, recovery diskettes, passwords, CDs for software installation shall be considered sensitive and valuable to the organisation and must be stored in fire-protected storage cabinets & safes. |IT & T Issues |Key Actions | |Sensitive data stored in fire-protected cabinets can |Ensure that all sensitive material is secured in a Fire protected | |nevertheless be damaged beyond use. Due to their possible |cabinets & safe when not required. Yearly & Monthly system & database | |additional weight, siting is a key consideration |backups should be kept away from the building | | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a | | |data control issues process in case the key holder is unavailable or the | | |item is required in an emergency. | |Sensitive data may be lost if stolen or during transit. |Copies of archives should be kept separate from actual database backups. | |A physical log file to control backup data movement to various safe | | |locations to be kept up-to-date both with signature of security personnel| | |and person moving the backups. | | |Data Library to be up-to-date with details of backup date, type, | | |location, type & expiry date | 1. 6Documenting Hardware Introduction This section deals with hardware documentation and manuals, and also hardware inventory. It is es sential that hardware documentation is kept up to date and made available to all users as appropriate. 1. . 1Managing and Using Hardware Documentation ‘Documentation' refers to both the operator manuals and the technical documentation that should be provided by the supplier / vendor. Policy Statement Hardware documentation must be kept up-to-date and readily available to the all staff that may need it. |ICT Issues |Key Actions | |If equipment is operated incorrectly mistakes and |Ensure you receive all operational and technical manuals for each piece | |damage may result. |of equipment. | | |Store the documentation accessibly but safely. | |Systems users must be trained according to the supplier's manuals | |A failure to follow the recommended schedule of |Ensure all regular maintenance is carried out and monitored. | |maintenance runs the risk of system malfunction, which |Adopt procedures which ensure that your operators complete all | |could possibly jeopardise your busines s operation. |maintenance for which they are responsible according to the | | |manufacturer's recommendation | |Failure to operate equipment in accordance with the |Ensure you receive all operational and technical manuals for each piece | |instructions can invalidate the warranty. |of equipment. | |Ensure that such manuals are readily available and form the basis of all | | |training. | |Failure to complete and return the manufacturer's |Complete the warranty card in time and record the details in your | |warranty card may invalidate the warranty and hence |Hardware Inventory Register. | |limit the manufacturer's liability | | ] 1. 6. 2 Maintaining a Hardware Inventory or Register Introduction A register / database of all computer equipment used within your organisation is to be established and maintained. Policy Statement A formal inventory of all equipment should be maintained and kept up to date at all times. ICT Issues |Key Actions | |Theft of equipment is most likely to result in additional |Establish inventory and implement procedures for updating it. | |cost to the organisation and could compromise data security. |Ensure that you have a procedure to advise the acquisition of new | | |hardware, the disposal of old items and any changes of location. | | |Periodically verify the correctness of the inventory by checking that | | |a sample of hardware is physically present. |Inadequate insurance could render your organisation liable |Establish inventory and implement procedures for keeping it | |to loss in the event of a claimable event. |up-to-date. | | |Ensure that you periodically review the adequacy of your insurance | | |cover. | |Shortcomings in the planning of equipment replacement can |Establish an inventory and, in conformance with your IT Plan, ‘ear | |make it difficult to plan ahead for new technology. |mark' equipment for replacement and plan accordingly. | 1. 7 Telecommunications equipment (Procurement, maintenance, practices and design t elecommunications) Procurement of telecommunications system †¢ Manufacturer maintenance (internal & external) †¢ Design criteria of systems †¢ Commissioning & Decommissioning of systems †¢ Fibre optic systems Introduction This chapter deals with the Information Communication Technology issues relating to the purchase, use, maintenance and the design of equipment through which information is processed and transmitted. The systems covered include, Telephony (PAX and PABX) Data Networks Fibre Network 1. 7. 1 System Design ( Engineering) Policy statement ICT system engineering will be based on tested and proven state of the art technology for a given ICT system. Explanatory notes The systems administrator shall from time to time update her/himself with new international standards for ICT systems. She/he shall be required to come up with flexible systems that will meet the company needs at the best. |ICT Issues |Actions | |Technology |System engineering shall be based on the latest technology in the | | |required field such as Telephony. | |Company's needs (Application) |The design shall address the company needs and applications for at least| | |the next ten years. |Flexibility |The system design shall address the equipment flexibility and upgrade. | |Redundancy |The design will state the expected loading and redundancy of the | | |equipment | 1. 7. 2 Procurement Policy Statement In addition to the public and company procurement procedures, the ICT departments will specify in details the functional and capacity requirements of system before any purchase is done. Explanatory notes Before any system acquisition is done, the system administrator will be requir ed to have evaluated the company's needs. This will include system performance; reliability ultimate capacity and staff abilities included proposed training requirements. This will be in the form of Request for Proposal (RFP) documents. |IC T Issues |Actions | |Tender document |Shall have detailed system/equipment description of the performance, | | |reliability and capacity of hardware. The system life expectancy shall be| | |required | |Spares and Support |The system spares will be stated. The system support and staff training | | |clearly be addressed | |Authorised dealership/partnership |The vendor shall be required to state and prove the partnerships with the | | |manufacturer | |Tendering |The type of bidders to be invited shall be stated | 1. 7. 3 Commissioning/ Decommissioning Policy Statement System commissioning will be carried out as stipulated in the manufacture's testing/commissioning sheets for any new ICT equipment. Tests should nclude all the RFP system requirements. System commissioning is necessary to ascertain system performance all the designed parameters will be tested. After the commissioning the system passwords should be immediately changed as a security measure, to protect any data manipulation or corruption from the vendor. |ICT Issues |Actions | |Performance |All tests as per system design and manufacturer's | | |specification/performance shall be carried out. |Drawings |All system drawings shall be submitted ( at least three copies)and kept | | |in safe custody | |Equipment Cabinet keys |The equipment cabinet keys shall be handed over to the functional head | |Decommissioning |System decommissioning shall be carried out once the equipment is no | | |longer in use. | | |Commissioning sheets and drawings shall be used to determine the current | | |connection (Circuit termination) of the system. | | |The decommissioned equipment shall be removed from the Telecom room and | | |all wires/cables not used shall be removed. | |The drawings for decommissioned systems/equipment shall be retired. | 1. 7. 4 Maintenance Practices Policy Statement All ICT systems shall be maintained regularly as per manufacture's recommendations. Where system are placed in harsh environments, system maintenance will be carried out as deemed by the systems administrator. Explanatory notes All system maintenance should be done in house as much as possible. Outsourcing of maintenance (Annual Maintenance Contracts, AMC’s) contrac

Wednesday, October 23, 2019

Technology of War

Patrick Struszczyk Professor Mako November 23, 2010 HHS-125 Technology of War War brings with it a surge of technologies. Development of tactics, machines, and general technology usually arise in times of trial. Two wars, the French and Indian War and the Revolutionary War, are prime examples of how technology and tactic morph and evolve. Tactics in war are one of the more vital aspects, a proper set of tactics can help overcome dramatic odds. The French/Indian War involved the French, the Natives of North America, and the British.During the war, European powers followed strict guidelines and protocol when in battle; form lines of 3 men deep, fire in volleys, take care of prisoners lives, opposing generals would dine together; these and other rules composed European warfare. The Indians, on the other hand, fought guerilla style ambushing and using hit/run maneuvers to harass, tire, and weaken the enemy. The tactics in the French/Indian War were integrated by the Americans during the Revolutionary War while the British continued with their traditional tactics. Though tactics play an important role in battle, it is not the single factor that determines the victor.As war developed, so did the machines used. An army with more advanced weapons would have tremendous advantages over an army with ‘outdated weapons’. During the French and Indian War, great strides were made in the area of guns and cannons. Both the French/Indian and British used muskets, cannons, and the newly created rifles. ‘Involving muskets the British favored the ‘Brown Bess’ and the French had the Charleville’ (French and Indian War). Before this war muskets were only accurate at around 50 meters and had to be protected by pikemen when reloading.The addition of bayonets and rifling in the barrel fixed these problems and increased effectiveness. ‘Since rifling was expensive and time consuming, at first only the best shots in the regiment were given rifle s’ (Weapons). The Revolutionary war continued these military improvements. Rifles began replacing muskets in the British divisions while the Americans had to collect weapons from the French and Indian War, other countries, or from captured British holds. ‘A key in battles such as in Boston and defending coastal bases were cannons’ (Valis).Cannons were usually imported from England and stolen by the Americans, they were measured based on the size of the cannonballs they fired. War is demanding on not only soldiers, but also on citizens who have to provide food, funds, shelter, and tools for the armies. The demands of war usually bring advancement of general technology either during or after a war. A few years after wars, the technology is usually made open the public to do what they can and adapt it to their lives while the government begins new ways of improving warfare. A few examples are from the French and Indian war.The men kept their muskets and were able to use them for hunting and such. ‘Interchangeable parts in France began in the production of muskets but soon trickled into textiles, crafts making and such’ (Interchangeable). War is an activity that evolves over time due to development in tactics, weapons, general technology, and other factors; such as the changes from the French and Indian war to the American Revolution.Works Cited†French and Indian War. †Ã‚  Military:French and Indian War. GlobalSecurity. Org, 27 04 2005. Web. 23 Nov 2010. http://www. globalsecurity.org/military/ops/french_indian. htm  Valis, Glenn.†Tactics and Weapons of the Revolutionary War.. †Ã‚  Tactics and Weapons of the Revolutionary War. A basic overview of how the weapons of the American Revolution were used and why.. Glenn Valis, 3/31/02. Web. 23 Nov 2010. http://www. doublegv. com/ggv/battles/tactics. htmlâ€Å"INTERCHANGEABLE PARTS . †Ã‚  Inventors and Inventions from the 1700's – the Eighteenth Cen tury :INTERCHANGEABLE PARTS  2010. n. pag. EnchantedLearning. com. Web. 23 Nov 2010. http://www. enchantedlearning. com/inventors/1700. shtml

Tuesday, October 22, 2019

Internet Courses essays

Internet Courses essays Take regular courses or take internet courses? A decade ago, schooling still meant that the students sat in a classroom while listening to the teacher ¡Ã‚ ¯s lectures. Now, we have another choice, which means the internet courses. We can listen to the lectures on line while sitting on the comfortable chair at home. Somebody think that taking the internet course is really a great way to learn because it is convenience and efficiency, while the others may argue  ¡Ã‚ °Does it contain appropriate material for us? Does it achieve the same quality as the regular course? ¡ Whether it is good or not, internet courses is now available for us. First, let ¡Ã‚ ¯s recall how did we study in a classroom when the internet is not available. We sat with our classmates while the teacher giving us the lecture. The teacher discussed the problems with the students, gave the quizzes, also collected assignments . Of course, study in a regular class is a good method for learning. It can maintain a small size of class and reach the high quality of achievement. In 1978, Smith and Glass published a meta-analysis combining the results of 77 empirical studies pertaining to the relationship between class size and achievement, and soon followed it with a second meta-analysis analyzing the relationship between class size and other outcomes. Overall, they found that small classes were associated with higher achievement at all grade levels, and if student assignment was carefully controlled. In their second study, they concluded that small classes were superior in terms of students' reactions, teacher morale, and the quality of the instructional environment.[1] On the other hand, does an internet class can maintain a small size of class? Obviously, it can not. Another big advantage of taking traditional classes is that people can make a lot of friends in school. They can discuss the problems, share their experiences, either good or bad, make a gr ...

Monday, October 21, 2019

Vancouver Style Citation Guide Coming Soon!

Vancouver Style Citation Guide Coming Soon! Vancouver Style Citation Guide Coming Soon! Big news! Vancouver Style! We are excited to announce that will soon have a comprehensive citation guide for Vancouver style!   We hope to have the guide ready to go by the start of this coming academic year.   In the mean time, you can use our Vancouver (author-date)  or Vancouver (brackets, no â€Å"et al.†) automatic citation generators! Modern day Vancouver. (Image Courtesy of Darren Stone) What is Vancouver style? The Vancouver style is the style of choice for most biomedical journals and journals in  other scientific fields.   It was conceived during  a meeting in 1979, where medical journal editors convened in Vancouver, BC and decided on a standard citation style for the International Committee of Medical Journal Editors (ICMJE).   Another name for Vancouver style is the Uniform Requirements for Manuscripts Submitted to Biomedical Journals.   The style is also based on the requirement’s of the U.S. National Library of Medicine’s guide to citing medicine.    If you’re a scientist, regardless of age, Vancouver is certainly an important style to know about.   The other most common referencing system used in medicine is the Harvard system- CiteThisForMe.com has a great guide for Harvard Referencing, if  you want to learn more. Here is a sample citation for a standard journal article: Leurs R, Church MK, Taglialatela M. H1-antihistamines: inverse agonism, anti-inflammatory actions and cardiac effects. Clin Exp Allergy. 2002 Apr;32(4):489-98. The general rule of thumb for mentioning a work in one’s scientific paper is that each cited piece of work that cited in the writer’s text is assigned a unique number, assigned by order of citation.   This number  is used  in bracket or superscript form whenever the paper references  that particular resource. For more general information on the Vancouver system and the history of medical referencing, check out this Wikipedia article. As usual, please leave any feedback you have on the update or the site in general.   We are constantly looking for ways to grow and improve and be as useful to the academic community as possible.   Thanks for using !

Sunday, October 20, 2019

Definition of Asymptotic Variance in Statistical Analysis

Definition of Asymptotic Variance in Statistical Analysis The definition of the asymptotic variance of an estimator may vary from author to author or situation to situation. One standard definition is given in Greene, p 109, equation (4-39) and is described as sufficient for nearly all applications. The definition for asymptotic variance given is: asy var(t_hat) (1/n) * limn-infinity E[ {t_hat - limn-infinity E[t_hat] }2 ] Introduction to Asymptotic Analysis Asymptotic analysis is a method of describing limiting behavior and has applications across the sciences from applied mathematics to statistical mechanics to computer science.  The term  asymptotic  itself refers to approaching a value or curve arbitrarily closely as some limit is  taken.  In applied mathematics and econometrics,  asymptotic  analysis is employed in the building of numerical mechanisms that will approximate equation solutions. It is a crucial tool in the exploration of the ordinary and partial differential equations that emerge when researchers attempt to model real-world phenomena through applied mathematics. Properties of Estimators In statistics, an estimator is a rule for calculating an estimate of a value or quantity (also known as the estimand) based upon observed data. When studying the properties of estimators that have been obtained, statisticians make a distinction between two particular categories of properties: The small or finite sample properties, which are considered valid no matter the sample sizeAsymptotic properties, which are associated with infinitely larger samples when n  tends to ∞ (infinity). When dealing with finite sample properties, the aim is to study the behavior of the estimator assuming that there are many samples and as a result, many estimators. Under these circumstances, the average of the estimators should provide the necessary information. But when in practice when there is only one sample, asymptotic properties must be established. The aim is then to study the behavior of estimators as n, or the sample population size,  increases. The asymptotic properties an estimator may possess include asymptotic unbiasedness, consistency, and asymptotic efficiency. Asymptotic Efficiency and Asymptotic Variance Many statisticians consider the minimum requirement for determining a useful estimator is for the estimator to be consistent, but given that there are generally several consistent estimators of a parameter, one must give consideration to other properties as well. Asymptotic efficiency is another property worth consideration in the evaluation of estimators. The property of asymptotic efficiency targets the asymptotic variance of the estimators. Though there are many definitions, asymptotic variance can be defined as the variance, or how far the set of numbers is spread out, of the limit distribution of the estimator. More Learning Resources Related to Asymptotic Variance To learn more about asymptotic variance, be sure to check the following articles about terms related to asymptotic variance: AsymptoticAsymptotic NormalityAsymptotically EquivalentAsymptotically Unbiased

Saturday, October 19, 2019

CRJS300 U1IP Research Paper Example | Topics and Well Written Essays - 1000 words

CRJS300 U1IP - Research Paper Example Boston Legal, on the other hand, shows judges and courts to be susceptible entities that can be manipulated and whose opinions can be changed in the favor of those accused. Castle and Dexter are shows highlighting operations and effectiveness of police department in solving crimes. There are limited instances where Policemen and detectives are shown as villainous characters. Mostly, they are law abiding professionals, following procedures and paying less attention to their human side which can introduce bias in their overall practice. It is important to note that Castle considers bad policemen to be an exception and a source of bad name for the whole department. On the other hand, Dexter’s leading character is a serial killer who assists Police department in forensic examination and only kills those who managed to escape from law. The overall approach portrays villainous nature of Dexter to have a just cause in murdering others. However, there are other detectives in the same show that support drug dealers like various real-life detectives (Edwards, 2013). Prison Break and American History X have shown correctional agencies especially prisons as hubs of ultimate corruption where punishment is more emphasized than rehabilitation and also as a centre of inmates politics. Furthermore, it is an institution run by corrupt officials like Bellick in prison break. There are also several real life examples of police corruption that support the theme of these shows about police corruption e.g. more than ten corrupt police officers in Atlanta charged with protecting drug dealers (Milligan, Paluska, & Starzyk, 2013, Edwards, 2013). A critical analysis of these shows would illustrate that a perception of a given authority in the show depends on its overall theme. Some of the shows have depicted criminal justice professionals as well as authorities to be righteous, law abiding individuals as well as

Friday, October 18, 2019

Microeconomics issue-airline market Essay Example | Topics and Well Written Essays - 750 words

Microeconomics issue-airline market - Essay Example However, these airlines can justify their imposition of penalties in the terms of microeconomics. These fees, according to a source in the market says has been implemented to discourage people from making irrational booking at the online source of airline. If we link this statement to the lens of microeconomics, we can see that this fee has been imposed to even out or to pay for the social costs of ticket changing or cancelations. Theses social costs may include additional cost for the company to change tickets, cancel booking of each tickets etc. Furthermore, as a result of ticket cancellations, it may happen that many planes of the company would operate below their capacity and hence incur social costs like additional fuel, additional clerical costs to change or cancel the tickets, some people who will be in need to travel urgently will be denied a ticket because company may be assuming that it has sold all the tickets and at the last minute they will find out that some of the pass engers have either returned or changed their tickets. This is a social cost to the entire society and thus higher prices imposed through these penalties are going to reduce irrational buying and reduce the quantity of tickets bought and hence reduce the societal costs, which are discussed above. Another article also makes a good assumption that since these costs are incurred for the benefits of the society they should be used to counter the life-threatening diseases that are prevalent in the society. A United Nations program has raised around $1.2 billion from a small fee that was added to airline fares. The program was that passengers were asked to contribute voluntarily towards the programme by adding a small amount to their total ticket fare. This program was a success and raised huge amount of funds for the United Nations. However, if this program would have forcefully increased the ticket prices, than this would have been disastrous for the airline

Human ressource management Essay Example | Topics and Well Written Essays - 1500 words - 1

Human ressource management - Essay Example oblem-solving skills, coaching, and counseling, rather than an adherence to structured programs or a menu-driven approach to training and development. The organization is the basic framework within which individuals and groups behavior occur. The quality and nature of the decisions made are influence by the nature of the structure. The external environment contains a range of influences that affect an organization. They include: socio-demographic, technological, economic and political factors. Political system means the way of authority and management style adopted by organizations. Organizations as a part of external environment should pay attention to social ans cultural issues which make a significant contribu ­tion to the business. This may become even more important when the organization’s strategy is taking it into new countries, or different forms of alliance and collaborative ventures. Organizations can contribute to the success of such plans by ensuring that social differences are considered when common policies are defined, that announcements are made in a way that is most effective for each culture, and that managers who have to operate across country borders understand the nature of the cultural differences involved, and adjust their own behavior to obtain the best result (Bartlett, Ghoshal, 1999). According to Storey (1989): The drive to adopt HRM is...based on the business case of a need to respond to an external threat from increasing competition. It is a philosophy that appeals to managements who are striving to increase competitive advantage and appreciate that to do this they must invest in human resources as well as new technology (Storey 1989, p. 34). With the commodification of products, increases in liquidity, and widespread availability of information, services and products have a great need for flexibility and creativity on the part of managers in order to secure high-quality revenue. With customer demands for products often requiring

Thursday, October 17, 2019

Reason in Philosophy Term Paper Example | Topics and Well Written Essays - 1000 words

Reason in Philosophy - Term Paper Example Reason in Philosophy Thus, philosophers even criticize what has being existing for many years’ Mummies have being f found to cry successfully thus, creating a senses of immoral and deceiving people about true world. On the other hand of reasoning, philosophers learn to be moral so as to free themselves from deception of senses. On the other hand, Heraclitus is considered to be highly respected. Thus, he holds in multiplicity of change while others rejected it. This was due to solidity and unity of other opposing members. According Heraclitus, the testimony that introduced lies in the way the Eleatics believed. Arguing the lie of unity and like of thing hood of permanence thus rejecting the testimony. More so, they derived reason for fake the testimony of the senses. Insofar as the senses show becoming, passing away and change they do not lie. Unlike Heraclitus remain right with his statement that being is an empty invention. Therefore, in real world the true world is always accompanied by a lie. R easoning also addresses the magnificent instruments of observation which overlook the logic of which are posed in our senses. Various weak instruments are in position to sense tiny chemical concentrations that even avoid spectroscope. Nowadays possessions of science have contributed to an extent to which new innovation and ideas are incubated. Thus, applied logic has been considered not to be reality even when solving problems with the recommended signs. The other characteristic of philosophers consist of confusing the last and the first of any subject. Additionally, believe in a concept that ought to have similar start and end. This shows the way of respect thus, origin of something is considered an opposition of questioning of value. Consequently, all the concepts which has being absolute the good, the true, the perfect thus they become cause. In turn, to conclude philosophers arrive to an amazing concept which is always the last thing in their subject (Friedrich14) On the other h and, is contrast which conceives the problem of error and appearance, thus alteration of the past which leads to proof of mere appearance to the philosopher? In addition the suggestion that lead to something which is lost.In contrast, nowadays prejudices of reason forces individuals unity, identity, caught error, so as to certain the basis of rigorous examination where error lies. The other case is when philosopher advocates of error thus individual language is used. Hence, elementary psychology which come in the realm of crude fetishism when summon prior to consciousness, the basic belief of metaphysics of language. Philosophy of reasoning can also be reduced in four theses. First proposition which outline world as apparent thus representing the reality thus, other kind of reality is completely indemonstrable. On the other front, the principle that has being granted on the true being of things that are not reality. The third proposition is inventing of fables about a world of †˜other ‘that has no meaning at all unless an instinct against life. Consequently, human being gained an upper hand for better life. Fourth proposition bring distinction between a true and an apparent world whether in Christian manner or in the way an unhanded Christian. In the case of appearance, it explain reality more only by way o f assortment and support. How The ‘True World’ Finally Became A Fable. According philosopher’s true world has attainable for the sage thus, the pious and virtuous

Comparative Analysis of Altarpieces Essay Example | Topics and Well Written Essays - 1500 words

Comparative Analysis of Altarpieces - Essay Example The San Marco Altarpiece (Madonna and Saints) This piece is the work of early Italian renaissance artist, Fra Angelico. It is currently in Florence, France at the San Marco Museum. Its estimated time of creation is around 1438 to 1443. It is tempera on wood and is a panel artwork, with a main panel accompanied by nine other predella panels although only the main panel remains today. The main panel has an illustration of the enthroned virgin and child with saints and angels surrounding them. There is a curtained panel standing on two pillars overlapping a landscape with trees forming the background (Woods 204). The Merode Altarpiece (The Annunciation) Renaissance artist Robert Campin did this piece in the period 1427 to 1432 and it is currently in the Metropolitan Museum, USA. It oil on oak with three panels. It has a main (center) panel in between two smaller panels. The main panel shows the moment just before the annunciation of Mary. She is sitting on the floor reading a bible and is looking down. To her left is an angel she is not aware of, with an oval table separating them. A small figure of Jesus is flying towards Mary holding a crucifix. The right panel has Saint Joseph in a carpentry workshop where he is making mousetraps with a townscape appearing behind him in an open window. The right panel has two figures called the donors waiting to go inside an open door (Metropolitan Museum of Art). Similarities The scenarios appearing in both paintings depict religious themes. In The San Marco Altarpiece, there is Virgin Mary who is holding baby Jesus around saints and angels, which is a scenario in Christian beliefs. The same case applies in The Merode Altarpiece where the same Virgin Mary is in the same room with an angel and a perception of Jesus flying in. much of the iconography is therefore religious. On another note, both paintings are renaissance panel altarpieces that Italians made in the 1300’s to 1400’s. Altarpieces consist of wooden pan els covered with cloth that is plastered with gesso paste to create a smooth painting surface (D'Elia 19). Both have several panels that make up a complete work under the same theme. Another similarity between the two is the exclusion of the crucifix with Christ on it from the main idea of the picture. According to Casa Santa Pia, the Dominican order of those days only allowed painted or sculpted crucifixes on altarpieces. In The San Marco Altarpiece, Angelico uses a special optical illusion to include the crucifix in the main picture but still it appears as a unique piece on top of the bigger painting. In The Merode Altarpiece, Campin uses an almost similar tactic. The crucifix is not easy to spot but it is in a miniature size above the angel’s head and appears as a small figure (representing Jesus) flying down towards Mary clutching onto a crucifix. There is also a similarity in the use of a single color to highlight subjects in both paintings. In The Merode Altarpiece, the highlight color is red. In the left panel, the color red attracts the eyes to reveal a tiny figure in the extreme background. In the main panel where the most red is, the eye concentrates on

Wednesday, October 16, 2019

Reason in Philosophy Term Paper Example | Topics and Well Written Essays - 1000 words

Reason in Philosophy - Term Paper Example Reason in Philosophy Thus, philosophers even criticize what has being existing for many years’ Mummies have being f found to cry successfully thus, creating a senses of immoral and deceiving people about true world. On the other hand of reasoning, philosophers learn to be moral so as to free themselves from deception of senses. On the other hand, Heraclitus is considered to be highly respected. Thus, he holds in multiplicity of change while others rejected it. This was due to solidity and unity of other opposing members. According Heraclitus, the testimony that introduced lies in the way the Eleatics believed. Arguing the lie of unity and like of thing hood of permanence thus rejecting the testimony. More so, they derived reason for fake the testimony of the senses. Insofar as the senses show becoming, passing away and change they do not lie. Unlike Heraclitus remain right with his statement that being is an empty invention. Therefore, in real world the true world is always accompanied by a lie. R easoning also addresses the magnificent instruments of observation which overlook the logic of which are posed in our senses. Various weak instruments are in position to sense tiny chemical concentrations that even avoid spectroscope. Nowadays possessions of science have contributed to an extent to which new innovation and ideas are incubated. Thus, applied logic has been considered not to be reality even when solving problems with the recommended signs. The other characteristic of philosophers consist of confusing the last and the first of any subject. Additionally, believe in a concept that ought to have similar start and end. This shows the way of respect thus, origin of something is considered an opposition of questioning of value. Consequently, all the concepts which has being absolute the good, the true, the perfect thus they become cause. In turn, to conclude philosophers arrive to an amazing concept which is always the last thing in their subject (Friedrich14) On the other h and, is contrast which conceives the problem of error and appearance, thus alteration of the past which leads to proof of mere appearance to the philosopher? In addition the suggestion that lead to something which is lost.In contrast, nowadays prejudices of reason forces individuals unity, identity, caught error, so as to certain the basis of rigorous examination where error lies. The other case is when philosopher advocates of error thus individual language is used. Hence, elementary psychology which come in the realm of crude fetishism when summon prior to consciousness, the basic belief of metaphysics of language. Philosophy of reasoning can also be reduced in four theses. First proposition which outline world as apparent thus representing the reality thus, other kind of reality is completely indemonstrable. On the other front, the principle that has being granted on the true being of things that are not reality. The third proposition is inventing of fables about a world of †˜other ‘that has no meaning at all unless an instinct against life. Consequently, human being gained an upper hand for better life. Fourth proposition bring distinction between a true and an apparent world whether in Christian manner or in the way an unhanded Christian. In the case of appearance, it explain reality more only by way o f assortment and support. How The ‘True World’ Finally Became A Fable. According philosopher’s true world has attainable for the sage thus, the pious and virtuous

Tuesday, October 15, 2019

Rebuttal abortion Essay Example | Topics and Well Written Essays - 500 words

Rebuttal abortion - Essay Example It’s the abortion that, in many cases, is unwanted by the woman, not the baby. Most often, the father of the child, not wishing to accept responsibility, may beg or even threaten a woman until she agrees to the abortion. â€Å"In 95 percent of all cases the male partner played a central role in the decision† (Zimmerman, 1977). This and other studies have illustrated clearly that most women decide against their own conscience. A myth espoused as fact is that the aborted fetus is no more than a cluster of cells, a bit of tissue unable to even feel pain. A developing embryo has a unique set of fingerprints as well as different genetic patterns than its mother. It is a human being unto itself. If one defines death as the stoppage of a heartbeat and murder as the forceful and intentional stopping of a heart then abortion is surely murder. If the existence of a heartbeat legally defined life, then almost all abortions would be illegal as the heart is formed by the 18th day in the womb. A British medical journal reported that when a pin is stuck into an eight-week-old fetus, it opens his mouth in a crying motion and pulls his hand away. By week five, eyes, legs, and hands begin to develop. â€Å"By week six, brain waves are detectable, mouth and lips are present and fingernails are beginning to form. By the eighth week the baby can begin to hear. Every organ is in place, bones begin to replace cartilage, and f ingerprints begin to form† (National Right to Life Foundation, n.d.).   ‘Pro Choice’ activists argue that women should have access to safe abortions, that ‘a nation founded on and dedicated to civil liberties could allow its citizens to resort to dangerous self-abortion procedures.’ That too is a false premise. Ninety-seven percent of women who have had abortions describe intense pain experienced during the procedure despite the

Monday, October 14, 2019

Csr in Inidan Banking Sector Essay Example for Free

Csr in Inidan Banking Sector Essay State regulatory bodies, NGOs, media, customers have significantly addressed social responsibility issues in banking sector. International organization such as World Bank also exerts pressures on banks to analyze social and environmental risk involved in projects to be financed. In addition the reputation and resultant profitability of an organization are greatly effected by their CSR activities. Researchers have found a positive correlation between CSR and financial performance of the organization. Around the globe, a good commitment is being shown by the banking industry to CSR principles. Banks are showing conscious efforts to reduce the regulatory actions by depicting a good environmental citizen image. Banking in India has originated in the last decades of the 18th century with the establishment of General Bank of India in 1786, and the Bank of Hindustan set up in 1870 (both banks are now defunct). At present, the commercial banking structure in India consists of Scheduled Commercial Banks Unscheduled Banks. Banking in India has evolved in four distinct phases: Foundation phase, Expansion phase, consolidation phase and Reforms phase. An integrated approach of combining CSR with the ultimate customer satisfaction is being adopted by Indian banking industry voluntarily. An attempt has been initiated to ensure social responsible behavior of banking sector in a more systematic manner. Public and private sector banks have common thrust areas which are children welfare, community welfare, education, environment, healthcare, poverty eradication, rural development, vocational training, women’s empowerment, protection to girl child, employment. The core areas for reporting CSR activities are slightly different in both public and private sector banks. The major areas investigated for reporting CSR activities in public and private sector banks is shown by the Figure 1 and Figure 2 respectively below: X axis in the below charts represents the fields of CSR activities and Y axis represents the number of banks working in the particular fields out of the selected sample. Figure 1: Core thrust areas for reported CSR activities in public sector banks Source: 1-IJAEBM-Volume-No-1-Issue-No-2-CSR-Practices-and-CSR-Reporting-in-Indian-Banking-Sector-058-066 As per the chart above rural development has been the ost actively participated activity for Indian public sector banks. Besides, their primary focus has been on gender equality through women empowerment. Figure 2: Core thrust areas for reported CSR activities in private sector banks Source: 1-IJAEBM-Volume-No-1-Issue-No-2-CSR-Practices-and-CSR-Reporting-in-Indian-Banking-Sector-058-066 Enhancing the level of education and employment has been the major areas for reporting CSR activities i n Indian private sector bank. Following are community welfare, programs for child welfare and protection of environment. 3. 1 RBI guidelines on CSR: On December 20, 2007 RBI circulated a notice for all the scheduled commercial banks to highlight the role of banks in corporate social responsibility, with title â€Å"Corporate Social Responsibility, Sustainable Development and Non-Financial Reporting – Role of Banks†. Major issues discussed in the notice were regarding – 1. Corporate Social Responsibility 2. Sustainable Development 3. Non-Financial Reporting Talking about the corporate social responsibility program RBI followed many international initiatives to highlight the importance of the notice like – 1. United Nations Environment Program Finance Initiative (UNEP FI) 2. They can achieve the mission by supporting initiatives that are * Cost effective * Capable of large-scale replication * Measurable * Having potential for both near and long-term impact. * Banks must provide appropriate training to its employees on environmental and social risks in lending to ensure that climate change is taken into account in corporate banking decisions. 6. Conclusion The CSR moment in the banking sector is slowing picking the pace. Many banks are showing their inclination and interest towards the CSR activities and believe it as their social responsibility. On the other side CSR reporting practices are far from satisfaction. There are hardly few banks which report their activities on triple bottom line principles. The lack of uniform standards for rating CSR practices leads to problem in comparison of corporate houses and difficulty in determining the CSR rating. In spite of the slow adaptation of CSR reporting practices in India, it is predicted to pick up a great pace in near future. The need for enacting some stringent regulatory provisions to ensure adherence to social responsibility principles is necessary. https://ru.scribd.com/doc/19779226/CSR-PROGRAM-IN-BANKING-SECTOR-AN-INDIAN-PERSPECTIVE http://www.karmayog.org/ https://en.wikipedia.org/wiki/Reserve_Bank_of_India https://en.wikipedia.org/wiki/Corporate_social_responsibility

Sunday, October 13, 2019

Cross Cultural Application Of Maslows Hierarchy Of Needs Commerce Essay

Cross Cultural Application Of Maslows Hierarchy Of Needs Commerce Essay Studies have proposed that the effective use of human capital is likely the most important determinant of organisational performance (Adler, 1991 cited in Fey 2005). This has prompted organisations to seek for ways to motivate their employees to work to their full potential and to ensure optimal organisational performance. Once of the most cited and discussed theories of motivation is Abrahams Maslows Hierarchy of needs, which is same as with other popular motivation theories, Maslows model was based on research carried out on individuals from the United States (Fatehi, 1996, Gibson 1994). While it is reasonable to assume that this theory can help managers in America, the question arises as to its applicability to international management. The aim of this essay is to address that question using America and China as case studies. This essay is structured into three parts, the first part of this essay would consist of an overview of the various theories of motivation, the second part w ould look at Hofstedes cultural dimensions of individualism and collectivism while the final part would analyse the applicability and implications of using Maslows Theory of Motivation within individualistic and collectivistic cultures (America and China respectively). Motivation According to Bateman and Snell (2007) motivation refers to forces that energize, direct and sustain a persons efforts. Theories of Motivation There are two groups under which motivation theories are classified namely: content theories and process theories. Content theories, also known as the need theories are concerned with the internal factors that motivate an individual. These theories suggest that individual needs keeps changing and that to motivate individuals, it is important to take into consideration these needs and fulfil them. Notable among the content theories is Maslows Hierarchy of Needs Theory, Herzbergs Hygiene Theory and McClellands Learned Need Theory. On the other side, the process theories of motivation are concerned with the how people initiate, direct and maintain their motivations. These theories see motivation as a rational cognitive process. Examples include Adams equity theory (1963), which assumes that people expect a balance to exist between their contributions and their outcomes. They compare their circumstances with other similar people and if there is any inequity (if it is to their disadvantag e) they adapt their behaviour to lessen that inequity. Vrooms Expectancy Theory (1964) is also part of the process theories. Maslow Hierarchy of Need Theory: Maslows theory suggests that people will satisfy basic-level needs before adjusting behaviour to satisfy higher-level needs. Once a lower need is satisfied, it ceases to be a motivator and the individual progresses to the next need in hierarchical order. Source: Maslows Hieracy of Needs; www.learnmanagement2.com Such needs have been recognized by Maslow and in their hierarchical order, include physiological needs, safety needs, social needs, self-esteem, and self-actualization. In Maslows model, individuals at the outset desire to gratify physiological needs. Physiological needs are the fundamental human needs which are necessary to maintain life and consist of food, clothing and shelter. Other desires present slight motivation pending the satisfaction of these basic needs. As soon as physiological needs are satisfied, safety becomes the next need. Safety characterizes the need to be liberated of the fear of bodily harm, the want to experience freedom from lack of fundamental physiological needs and the desire for self-protection. Subsequently, the social need arises as the chief need to be satisfied. The social need represents striving for significant relationships with other people. Once the need for significant relationship is fulfilled, the individual begins to seek more personal recogni tion and desires esteem or recognition from other people. The satisfaction of this need produces feelings of self-confidence, prestige, power, and control. After satisfying the need for self-esteem, self-actualization becomes the principal need. Self-actualization represents the desire to take full advantage of ones abilities and be what one is able to be (Maslow, 1970, Hersey, 1996, Gambel and Cianci, 2003). Cultural Dimensions Culture can be defined as a system of values and norms that are shared among a group of people and that when taken together constitute a design for living (Hill, 2009 p. 89). According to Hofstede (1984), there are five dimensions of culture namely: power distance, uncertainty avoidance, individualism vs. Collectivism, Masculinity vs. Femininity. Power distance relates to the way a society deals with the fact that people are unequal in intellectual and physical capabilities. The uncertainty avoidance dimension relates to the extent to which different cultures socialised their members to accepting uncertainty and ambiguous situations; According to Hofstede, members of high uncertainty avoidance cultures place a premium of job security, benefits and demonstrate a strong resistance to change while the opposite applies to members of cultures with low uncertainty avoidance. Individualism and Collectivism refers to relationship between the individual and his fellows. In individualistic cultures, bonds between individuals are loose and freedom an individual achievement are valued while in cultures where collectivism is emphasized, bonds are tight and individuals are supposed to look out for the interest of others before his own. Hofstedes masculinity versus femininity dimension refers to the distribution of roles between genders in a particular culture. (Hofstede, 1984, Hill, 2009). Overview of Individualism and Collectivism Individualism Amongst individualistic societies, Hofstede (1984) suggests that individuals desire and gain a high quality of life as a result of success achieved by his or her efforts alone. Achievement, self-actualization, and self-respect describe an individualistic society and furthermore typify self-esteem and self-actualization in Maslows hierarchy of needs. One conserves self-respect and separates work and private life in an individualistic society. In the work organization, completing the job task will come before developing relationships. Collectivism Hofstede (1980) suggests that collectivism can be described by a tight social framework where differences exist between in-groups and out-groups. Individuals expect to be cared for by their fellows, which can consist of relatives, clans, or organizations in exchange for absolute allegiance. Hofstede (1982) also points out that individual are born into a collective society. Consequently, Hofstede (1984) suggests that in a collectivist society, a high quality of life is defined more in terms of the family and close relatives than the individual. In terms of the work environment, individuals from collectivist cultures do not separate their private lives from their jobs, relationships take precedence over job tasks and importance is placed on the development of relationships as a requirement to work together effectively. American and Chinese Culture To better understand the extent to which various factors motivates individuals from different cultures, it important to look at their national culture. The national culture of America and China shall be discussed briefly using Hofstedes (1984) model. Despite the short coming of this model, it is still widely used because it provides data on characteristics of culture based on a large number of respondents from variety of countries. Dimension America China Power Distance 40 80 Individualism 91 20 Uncertainty Avoidance 46 40 Masculinity 62 66 Source: Hofstede, G (1983), The Culture Relativity of Organisational Practices and Theories, Journal of International Business Studies, Vol.14 (4) pp.75-89 American Culture Hofstede argues that, the ordering of needs in Maslows hierarchy represents a value choice Maslows value choice. This choice was based on his mid-twentieth century U.S. middle class values (1984, p. 396). Maslows hierarchy was developed during an era when the American culture stressed individual achievement. The rapid growth of this country, which was facilitated by strong emphasis on education, lifestyle and career opportunities, influenced the formulation the needs demonstrated on Maslows model (Gambel and Cianci, 2003). Hamden, Turner and Trompenaar (1993) argue that the American culture places a lot of emphasis on making the individual self reliant as against being influenced by his or her external environment or others. Nevis (1983) also states that the American culture over the years has developed from assumptions that stress the independence of the individual. It can be confirmed from the research done the Maslows Theory was based on individualism that was prevalent in the Ame rican society. The question therefore arises as to whether this theory can be applied to cultures that are high on the collectivism dimension. Chinese culture Lit et al (2002) state that research on cultural studies identify family oriented collectivism as a key Chinese cultural characteristics. According to Triandis (1996), the Chinese are collectivist individuals. Similarly, Smith and Bond(1993) points out that a lot of research have discovered that the Chinese place a lot of emphasis and importance on family values and hierarchy. This characteristic is also noticed in the work environment; Chinese business practices are influenced by family-oriented collectivism and the structure of their organisations supports the collectivist nature (Nevis 1983, Li et al, 2000). These factors suggest that a Chinese hierarchy of needs would differ significantly from Maslows original model. The main issue concerning Maslows Theory and its ability to apply to Chinese cultures is the aspects of self actualisation and the need for social belonging. Other needs such as physiological and safety needs are basic needs that are present in any culture, although it may not be sought after in the sequence proposed by Maslow. However, his hierarchy of needs places the need for social belonging as being desired after physiological and safety needs are met. While self actualisation is the ultimate need. While these may be applicable in the American society, such cannot be said concerning the Chinese. Being a collectivist culture, one of the main focuses of individuals in such societies is to look out for the well being of their immediate family and relations. Such characteristics are acquired from young as the individuals watch the way their fellows interact. It is therefore not a need that they aspire to or desire but rather one that is already embedded in their environment. This ne ed therefore, cannot be used as a motivator for individuals from collectivist cultures especially China. Another problem with the application of this theory in collectivist cultures is the importance Maslow places of self actualisation. Self actualisation is seen as the chief desire of individuals. While this is possible in cultures that are highly individualistic, the same doesnt apply to collectivist cultures. As demonstrated in the literature on collectivist cultures, the aspect of self is not emphasized while communal thinking is promoted in place of individualistic behaviours. In cultures such as China, the need for Self-actualisation as proposed by Maslow may not exist at all. The implication of this is especially important for managers who are working in cross cultural environment. When using Maslows theory of motivation, it should be clear as to who such motivations are targeted to. Generalising this theory as being applicable to individuals from diverse cultures may not be in the best interest of management as they may not achieve their aim of motivating their employees to full potential. Although Maslows Hierarchy of Need theory is an important contribution that can help managers in motivating their employees, it should be handled carefully when dealing with individuals from diverse backgrounds.