Monday, August 24, 2020

Avoid Run-On Sentences in Your Business Writing

Maintain a strategic distance from Run-On Sentences in Your Business Writing This announcement contains a mistake. Find and right it: The following not many weeks will be occupied. Both the site update and the application dispatch have cutoff times in December.Huang is our most constant representative, I might want him in my group. Run-on sentences and sentence pieces are turning out to be increasingly normal, and appear to be a dubious region for some individuals. I surely have been liable of these previously, especially when I am messaging. While I think it is to some degree irrelevant to have a linguistic slip-up in a brisk book ran off to a companion, these sorts of errors become tricky when they spill into progressively formal business settings, for example, messages, letters, and notices. Truth be told, run-on sentence development (additionally called melded sentences) is the #1 most regular business composing syntax mistake we find in customer composing. Divided sentences is the #2 mistake, and they are exceptionally related. We should back up a stage or two (we need to return to center school sentence structure class now) and take a gander at the distinction among Independent and Dependent Clauses. The contrast between these two is the fundamental explanation that sudden spike in demand for sentences and sentence sections aren't right. Above all else, what is a condition? A statement is a gathering of words with a subject and an action word. There are two fundamental kinds of provisos: Independent and Dependent. An Independent Clause can remain solitary as a total sentence. Ex. John is an exceptionally keen specialist. Ex. Suzette was perceived for her commitments. A Dependent Clause can't remain solitary, and accordingly it must be associated with an Independent Clause. A Dependent Clause as a rule happens when you include a needy marker word. These words are frequently conjunctions or intensifiers, and leave us with an inquiry. Ex. Since John is a profoundly shrewd representative, Ex. When Suzette was perceived for her commitments. You should see that by adding the needy marker word to these conditions, they become deficient sentence parts, and you are basically left hanging; what happened when Suzette was perceived? What happened in light of the fact that John was a profoundly keen agent? To fix this circumstance, you have to interface those Dependent Clauses to Independent Clauses. Ex. Since John is a profoundly canny representative, his organization is truly beneficial. Ex. When Suzette was perceived for her commitments, she was given an advancement and a corner office. Associating a reliant proviso to an autonomous condition causes us to maintain a strategic distance from sentence sections. Be that as it may, shouldn't something be said about the more typical sudden spike in demand for sentences? Run-on sentences happen when we interface two autonomous statements without utilizing appropriate accentuation. Ex. Huang is the most constant worker, I might want him in my group. There are numerous approaches to fix the sentence above: Huang is the most tireless worker; I might want him in my group. (You could likewise include a progress here on the off chance that you might want: Huang is the most persevering representative; thusly, I might want him in my group.) Huang is the most tenacious representative. I might want him in my group. (Like the sentence above, you could likewise include a change here: Huang is the most steady worker. Thus, I might want him in my group.) Huang is the most tenacious representative, and I might want him in my group. Since Huang is the most tenacious representative, I might want him in my group. Basic clear language is the way to great business composing, soit is normally best to just part the sudden spike in demand for into two complete sentences, as appeared in number 2: Huang is the most constant worker. I might want him in my group. Run-on sentences and sentence pieces are simple errors to make, and are similarly as simple to fix. Start by posing yourself this inquiry: Does this proviso express a total idea? If not, associate it to another statement that responds to the unanswered inquiry. On the off chance that it does, ensure that it isn't associated with another total idea with a comma (utilize a period or a semi-colon). This one inquiry should make it simple for you to discover the sudden spike in demand for sentences and sentence parts in your business composing, and fix them all alone. In the event that you need extra help here, Instructional Solutions offers business composing courses that incorporate definite, individualized teacher input on your business composing.

Saturday, August 22, 2020

The function of design and how graphic design speaks to society and Essay

The capacity of structure and how visual computerization addresses society and influences human involvement with in a wide range - Essay Example Paul Rand’s quote above shows the basic idea of correspondence as it identifies with visual depiction and the plan procedure as it impacts various types of the open trade of thoughts. In â€Å"Declaration by Design: Rhetoric, Argument, and Demonstration in Design Practice† (1985), Richard Buchanan stated, On the off chance that one thought could be discovered fundamental to configuration contemplates, it in all likelihood would be correspondence. (Buchanan, 1985)Thus, plan influences the human experience by making an extended jargon of articulation to relate the shifting degrees of emotional experience to a crowd of people, and further mirrors the need of individuals to communicate in perpetually complex musings. Effortlessness, in this viewpoint, can be viewed as a plan device that slices through reasonable elaboration to introduce an original structure or structure. The objective of configuration is to make new words that are not words however images, signs, and pictu res which express a message to society through a language that the two references and rises above normal, regular discourse. In such manner, plan can be viewed as â€Å"stylized language† and discusses the multifaceted nature of social correspondence while passing on the message or topic of the fashioner. Configuration at last is a type of workmanship, yet it very well may be drawn nearer deductively to decide the attributes which characterize it and administer its tasks socially. Martin Buber’s hypothesis of information depends on the examination of social types of correspondence, and in this hypothesis the emblematic parts of correspondence are recognized from signs that simply portray or point headings as a component of correspondence by the idea of amazing quality. Buber makes various social connections as models indicating the significance of correspondence referencing the subjectivity of the â€Å"other† in its methods for taking the person past the self i nto an otherworldly condition of understanding and shared understanding. As this is the close, profound nature of correspondence that we speak to in craftsmanship, it is uncommon by and by and the real utilitarian correspondence in the public eye is frequently sign situated in that it just tries to advise or coordinate yet not incite an otherworldly encounter. As Maurice S. Friedman writes in his book â€Å"Martin Buber: the life of dialogue† (2002): Subject-item, or I-It, information is eventually nothing other than the socially objectivized and expounded result of the genuine gathering which happens among man and his Thou in the domains of nature, social relationsm and art.† (Friedman, 2002) Buber’s hypothesis of information is significant in understanding the social parts of correspondence as they identify with structure. For instance, social correspondence that is coordinated or interceded by the sign can be required to be useful, utilitarian, and illustrativ e, intended for the help of individual tasks in every day life however not especially worried about the extraordinary as topic. Representative correspondence, interestingly, takes as its topic and goal the emblematic parts of articulation that identify with the correspondence of Truth and the communicator looks to make a higher condition of mindfulness or comprehension in the other. Hence, the structure and realistic craftsmanship procedure ought to be assessed first to decide if the type of social correspondence is utilizing a language dependent on signs, which point to different articles, or of images, which rise above themselves in shared subjectivity, when

Saturday, July 18, 2020

MLA 8 is Now the Default Citation Style

MLA 8 is Now the Default Citation Style (0) Great news has arrived just before the fall semester rush: MLA 8 is now the default citation style on ! If you go to our main page at www.easybib.com, you’ll notice that MLA 8 is listed as the first citation style option. MLA 7 will remain as a free option for those who need it. We have spent our summer tailoring our citation formatting services to better support this style and make it even easier for users to keep track of and reference their sources. Happy citing!

Thursday, May 21, 2020

The Health Belief Model Is Used For Health Promotion And...

The Health Belief Model is commonly used for health promotion and health education. Its’ underlying concept is that health behavior is explained by perception of the disease and the strategies available to lower its occurrence. There are four perceptions of the HBM, which are perceived seriousness, perceived benefit, perceived susceptibility and perceived barriers. In addition to that, more constructs are added to health belief model that includes motivating factor, cues to action and self-efficacy. Each of these constructs in combination or individually, could be used to determine health behavior. The HBM also provides guidelines for the program development allowing planners to address reasons for non-compliance with recommended health action. The health belief model is a process used to promote healthy behavior among individuals who may be at risk of developing adverse health outcomes. A person must gauge their perceptions of severity and susceptibility of developing a disea se. Then it is essential to feel vulnerable by these perceptions. Environmental factors can play a role as well as cues to action such as media, and close friends. In order to determine that taking action will be meaningful, the benefits to change must be weighed, against the barriers to change behavior (Green Murphy, 2014). Reisi, M., Javadzade, S., Shahnazi, H., Sharifirad, G., Charkazi, A., Moodi, M. (2014). Factors affecting cigarette smoking based on health-belief modelShow MoreRelatedHealth Promotion : Theories And Models1660 Words   |  7 PagesHealth promotion utilises theories and models to guide practice. A theory is the general principles of a framework of ideas in regards to a particular topic. (Merriam-webster.com, 2016) A model is a set plan of action based on theoretical ideas to achieve a set goal. (Merriam-webster.com, 2016) The difference between a theory and a model is that a theory is related to evidence based knowledge and a model is built on this knowledge although it is presented as a process to reach certain targets. TheRead MoreDrug Abuse And Dependence Policy1680 Words   |  7 Pageslife (Department of Health, 2015). With this policy in place drug treatments are becoming more successful with 18% of people staying in treatment and leaving drug free (Department of Health, 2015) this shows the policy is successful and works with people to reduce drug dependency (HM Government, 2012). 193,198 people aged 18 and over were in treatment for drug use during 2013 to 2014, 29,150 of these patients completed treatment and have overcome their drug dependency (Public Health England, 2014). FromRead MoreHealth Belief Model Of The American Diabetes Association, The Complications And Cost Acquired From Diabetes767 Words   |  4 Pagesdramatically reduce if patients are more aware of the potential risk and receive proper health prevention education. Diabetes self-management is essential in reducing the complications of disease. Researchers use several theories to help come up with the best way to provide ca re to patients with chronic illness such as diabetes. The major theory for this EBP is the Chronic Care Model, the author chose this model because of its versatility, it can be apply in any setting and allow for the improvementRead MoreObesity As A Risk Factor For Cardiac Health844 Words   |  4 Pagestheir surveys and data collections and the same conclusion; obesity is a major problem in American society and it leads to multiple health issues. Data shows that obesity is the cause of chronic disease risk, morbidity, high health care costs and social costs (Nestle Jacobson 2000). After the American society has identify obesity as a risk factor for cardiac health, many federal agencies has come up with guidelines, educating American people how to reduce their calorie intake, how to stay activeRead MoreThe Theories of Health Promotion1775 Words   |  7 PagesHealth Promotion Introduction The U. S. Department of Health and Human Services recently announced $1.01 billion in grant-funding opportunities for Health promotion. These grant programs emerged directly from the Affordable Care Act (PPACA). Enacted in 2010, this legislation significantly affects both Medicare and Medicaid. It is designed to gradually shrink Medicares drug-coverage doughnut hole until it is completely eliminated, a goal set for 2020. (The doughnut hole in Medicare Part D beginsRead MoreA Health Promotion Proposal Is Based On The Health Belief Model ( Hbm )813 Words   |  4 PagesThe theoretical framework of this health promotion proposal is based on the Health Belief Model (HBM). HBM is one of the most commonly used theories to analyze the feasibility, barriers and perceptions of a person in adopting interventions aimed at health promotion and disease prevention (Kim, Ahn, No, 2012). The four main constructs of the HBM are perceived susceptibility, perceived barriers, perceived benefits, and perceived severity (Yazdanpanah, Forouzani, Hojjati, 2015). MotivationalRead MoreHealth Promotion With Childhood Immunization Essay1728 Words   |  7 PagesSouth University Online Health Promotion with Childhood Immunization Adherence One of the many health goals for society is to reduce both the prevalence of communicable disease and to decrease the risk of infant and childhood morbidity and mortality. There is an association between appropriate vaccination and improved health outcomes. In 2009, reports indicated 42,000 deaths and 20 million cases of diseases were prevented by the Advisory Committee on Immunization Practices (AICP) recommendationsRead MoreNursess Promotion Of Health Literacy Using Theories1706 Words   |  7 PagesRole in Promotion of Health Literacy Using Theories Health literacy has been a problem with our patients. The most vulnerable populations are the elderly, people with low-income levels, those with limited education, non-native speakers of English, those with chronic mental and physical health conditions, minority, and immigrant populations. Nurses have a great role in helping our patients succeed in understanding their health conditions. Nurses can be of great help in promoting health literacyRead MoreHealth Promotion Model And Mid Range Theory Essay1483 Words   |  6 Pagesnursing field comprises different theories that are used to govern nursing practice through offering different perspectives and views of phenomena. A theory can be defined as the development of a link between concepts that create a certain view of a phenomenon (Jackson, n.d.). The theories in the nursing field focus on issues that are relevant to enhancing patient care, overall nursing practice, and nursing education. Moreover, these theories are used to de fine, create, and distribute existing knowledgeRead MoreThe American Nurses Association ( Ana ) And The Health Ministries Association Essay1474 Words   |  6 PagesThe American Nurses Association (ANA) and the Health Ministries Association (HMA) have described Faith Community Nursing (FCN) as a form of a specialized nursing practice carried out by a nurse within a faith community (American Nurses Association Health Ministries Association, 2012). The role played by the FCN is to protect, promote, and optimize health and abilities, prevent illness and injury, and respond to distress regarding the practice beliefs and the values of a faith community (Dyess, Chase

Wednesday, May 6, 2020

The Islamic State During Iraq And Al Sham ( Isis )

If individuals or a society are to improve, they should seek power through their responses to hardship and struggles according to Nietzsche. If an individual or society responds well to the hardships and suffering it encounters, that individual or society will continue to improve and evolve. Today, the media reports that the Islamic State in Iraq and al-Sham (ISIS) is struggling to gain power for their people through the reacquisition of land and reunification of Islamic people. ISIS has threatened attacks on the western world, should they attempt to intervene in this struggle (Ivison, 2014). The western world views this as a threat to its power and is poised to address this threat through military intervention. How each society responds†¦show more content†¦They do all of this in the name of Allah - their god- and to gain power, however their objectives and ultimate goal is unclear to the western world. In a recent SKYPE interview conducted by Vice.com, Canadian ISIS membe r Farah Mohamed Shirdon gave mixed messages about the intent of ISIS. At one point, Shirdon claimed that the group wished to be left alone, stating that he didn’t want to fight, nor did his group. He further stated that the group wishes to enable Muslims to live under their own laws and authority and that they view western interference as a threat (Shirdon, 2014). However, Shirdon went on to state that he hoped to be made a martyr by dying in conflict for Allah and that ISIS would not stop until their flag was flying over the White House (Shirdon, 2014). Shirdon also made direct threats against western civilization, stating they were coming for â€Å"us† and that â€Å"a lot of brothers are mobilizing there right now in the West†¦mobilizing for a brilliant attack†¦Ã¢â‚¬  on the West (Shirdon, 2014). This could lead one to believe that the group is actually looking at expanding its power beyond its stated limitations. What is unclear from media reports is w hether ISIS is seeking to gain more power to allow its individual’s greater opportunities to improve their individual circumstances, or whether the group is seeking world domination for their group and Allah. Nietzsche’s Theory Nietzsche asserts that human actions should be driven by an aspiration to

Opportunities for Women-Owned Businesses Free Essays

Introduction Women business owners are crucially vital to the American economy.   Women are establishing businesses at twice the pace of all businesses and remaining in business longer. In fact, America’s approximately 9. We will write a custom essay sample on Opportunities for Women-Owned Businesses or any similar topic only for you Order Now 1 million women-owned businesses provide work for about 27.5 million individuals and put in around $3.6 trillion to the economy (Page, 2006).   Nevertheless, women persist to confront rare and distinctive barriers and challenges in the world of business.   This paper will establish that in spite of present global turndown, there are now tremendous opportunities for women owned businesses both domestically and in the international market place. The total number of women owned companies throughout the world provides considerable business-to-business (B2B) opportunities. Actually, US women owned companies spent around $48 billion on technology equipment alone (Page, 2006). This just proves that women can definitely respond in this 21st century by their numbers to the â€Å"ole boy’s network† of old. These women business owners are a primary force in the global economy with considerable spending powers. The major  obstacles to trading internationally  are frequently the time and costs concerned with getting it done.   The costs of marketing to a number of different countries at the same time can be unusual. It takes  some time  to go into new markets,  it takes considerable time to build new business relationships and it takes a lot of  time to create the right contracts.   A number of the conventional methods of entering new markets  have been participation at international conferences or trade fairs.   These  can  be time consuming, expensive, and,  unluckily,  not at all times productive. Some time ago,   globalization has been set aside for the elite corporate, with their  Ã‚   huge budgets and  Ã‚  Ã‚  massive  resources. For a lot of small businesses turning out to be a player on the world market was  Ã‚  Ã‚  just  basically further than their expectations. For women business owners, there’s often double whammies,  since  women are  frequently declined the essential capital for starting up in business and then often declined capital for growth and expansion.  Ã‚  Women business owners frequently lack access to information and easy access to a recognized trade network. In the year 2000, President Bill Clinton initiated Executive Order 13157 reiterating his administration’s pledge to boosting opportunities for women-owned businesses (Office of the Press Secretary, May 29, 2000).   The E.O. required agencies and departments to formulate long-term comprehensive strategies to develop and increase opportunities for women-owned businesses. The Executive Order also obliged federal agencies to â€Å"meet or exceed† the five percent government-contracting objective that now subsist for women-owned businesses. At present, there are various supports being offered to create opportunities for women-owned businesses and help these women entrepreneurs succeed in their businesses.   First, there is the growing popularity of certification among women-owned businesses; next, there is increasing federal procurement opportunities for women-owned businesses; and third, a web site was created to assist women business owners obtain federal contracts. Certification Growing in Popularity Among Women-Owned Businesses Nowadays, certification to qualify for government contracts is becoming more popular among women-owned businesses (Page, 2006). Specifically, a lot of women-owned businesses in Oklahoma are obtaining or securing certification to meet the criteria or qualify for government contracts. Moreover, certification likewise offers firms owned by women an advantage in securing contracts from big corporations, as mentioned by Debbie Hurst, president of the Women’s Business Council-Southwest. According to Hurst, she informs women that certification can be a significant part of their marketing tool case. Hurst added that with merely 5 percent of women business enterprises obtaining government and corporate contracts yearly, there is still a need to bridge the gap between the opportunities for business and the capability of women-owned businesses (Page, 2006). The group Women’s Business Council-Southwest (WBCS), with headquarters in Arlington, Texas, stands for women-owned businesses located in Oklahoma, north Texas, New Mexico, and Arkansas. The association operates in coordination with the Women’s Business Enterprise National Council to endorse and certify members. As asserted by Hurst, the number of Oklahoma companies securing certification has increased 60 percent ever since the year 2004, the year the Oklahoma Leadership Forum was created by the regional group (Page, 2006). As maintained by Tamara Walden, president of Walden Energy (a certified women-owned business) based in Tulsa and a council member The Oklahoma Leadership Forum was conceived to assist women capitalists boost business and gain access to more contracts (Page, 2006). Walden added that certification is a vital marketing tool for increasing a women-owned business’ visibility between procurement decision makers and corporate supplier. Several companies necessitate that a firm be licensed or certified before they will offer a contract as a women’s business enterprise. The WBCS is striving to create consciousness of that fact to local businesses, as well as offering educational opportunities and fun networking that help support that. There is promise and potential for growing certifications in Oklahoma for the reason that the state has a projected 77,000 women-owned companies (Page, 2006). Moreover, there is an enormous market of women-owned businesses that are not availing of certification programs like that being offered by WBCS that can help them access diversity and government programs. Growing Federal Procurement Opportunities for Women-Owned Businesses Although Federal procurement might not sound like a significant issue to the general public, or even a term that a lot of people is aware of, it is considered one of the most profitable, yet complicated and difficult, markets for small businesses to access, specifically those owned by under-represented minorities and women. According to the Office of the Press Secretary (May 29, 20000), in the year 1999, women-owned businesses composed 38 percent of all businesses but obtained merely 2.4 percent of the $189 billion in Federal prime contracts. Certain Federal agencies have taken the lead in operating with women owned businesses, and must be applauded. As indicated by the Federal Procurement Data System, the Consumer Product Safety Commission, the Nuclear Regulatory Commission, the Federal Mine Safety Health Review Commission, the Department of Housing and Urban Development, and the Small Business Administration have all not just met the five percent objective, but have come in at approximately fifteen percent or better (Office of the Press Secretary, May 29, 2000). These Federal agencies recognize that coordinating and operating with women-owned businesses is not merely a philanthropic exercise. These businesses owned by women are dependable, strong, and do good work. Furthermore, these companies offer a solid service to their clients, and the Federal contracting officers are aware of it. Altogether, about 20 Federal agencies either fulfilled or exceeded the five percent objective. Thus, this just proves that it is certainly possible for government agencies to accomplish the five percent goal. Nevertheless, it is anticipated that agencies will work harder, adhering to the examples of the agencies mentioned above, to contract with women-owned businesses.  Ã‚   Over the years, government officials are supportive of numerous initiatives to boost resources and opportunities for women-owned businesses. For instance, several senators have passed legislation to re-authorize the National Women’s Business Council for a period of three (3) years, and to raise the annual appropriation from $600,000 to a total of $1 million. Part of that amount will be utilized to help Federal agencies satisfy the five-percent procurement objective for businesses owned by women (Seck, May 23, 2000). The National Women’s Business Council has offered magnificent leadership in this field, making bigger contracting opportunities a main concern since it was established in the ye ar 1988, and merited praise from Republicans and Democrats for two general and extensive procurement studies it published in the years 1998 and 1999. Besides sustaining reauthorization of the National Women’s Business Council, Senator Kerry initiated the Women’s Business Centers Sustainability Act of 1999 (Seck, May 23, 2000). Proclaimed a public law, that Act is assisting Centers deal with the funding limitations that have been making it more and more hard for them to maintain the level of services they offer after they graduate from the Women’s Business Centers program and no longer be given federal matching finances. Hence, it is certain that President Clinton’s Executive Order creates a strong system within the Federal Government for raising the number of contracts that can be obtained by women-owned businesses. SBA Creates Web Site to Help Women Business Owners Obtain Federal Contracts In the year 2000, the U.S. Small Business Administration (SBA) launched a new web site, which aimed to boost procurement and networking opportunities to women-owned businesses by means of putting all contracting assistance information at a single on-line site. The web site called WomenBiz.gov is a joint venture of SBA’s Office of Federal Contract Assistance for Women Business Owners, National Women’s Business Council, the Interagency Committee for Women’s Business Enterprise, and the SBA’s Office of Women’s Business Ownership (Comtex News Network, 2000). WomenBiz.gov offers women-owned businesses direct access to the government networks and the federal acquisition tools to draw on the $200 billion federal marketplace. Furthermore, the web site functions as the official gateway to over 100 procurement and acquisition sites hosted by a variety of federal agencies. Furthermore, the web site likewise incorporates connections to Electronic Posting System, PRO-Net, the GSA Federal Supply Schedule Program, DefenseLINK, CBDNet, and SBA’s Government Contracting page (Comtex News Network, 2000). When President Clinton asked the SBA to lead the efforts to make sure that women-owned businesses be given their fair share of federal contracts, SBA answered that call and reiterated its promise to the President Clinton’s initiative though endorsing the launch of its web site and establishing the office. These are two vital instruments for offering procurement opportunities to women-owned businesses. Generally, the web site contains information pages specially developed to help women entrepreneurs who want to take part in government procurement. Meanwhile, the women’s contracting office is one of numerous initiatives the White House has instigated to encourage procurement opportunities for women-owned businesses. Conclusion All of the initiatives discussed in this paper show that there are several complementary national policies to increase procurement opportunities for businesses owned by women. The phenomenal growth and success of women-owned businesses was primarily due to the development of a national network of women’s business centers and organizations. As an outcome of lobbying by women business owners and the establishment of the SBA’s Office of Women’s Business Ownership, various women’s business centers have offered would-be entrepreneurs with adequate and necessary knowledge, information, training, skills, loans, and technical assistance. Nowadays, the Federal agencies have started to make progress from the time when Congress implemented the five-percent procurement goal, but the contracting managers should keep in mind that this goal is just a minimum, not a maximum. Out of the over 9 million women-owned businesses in the United States, the Federal Government can find ones that are reliable and qualified, with good products and services to boost, to fulfil their contracts if they make it a main concern or top priority. References Comtex News Network.   SBA Unveils New Web Site to Help Women Business Owners Get Federal Contracts.   U.S. Newswire, September 12, 2000. Office of the Press Secretary.   Executive Order 13157-Increasing Opportunities for Women-Owned Small Businesses.   Compilation of Presidential Documents, May 29, 2000. Page, David.   Certification growing in popularity among women-owned businesses.   Dolan Media Newswires.   March 18, 2006. Seck, Kathyrn. Kerry Floor Statement on Increasing Federal Procurement Opportunities for Women-Owned Businesses.   U.S. Senate Committee on Small Business and Entrepreneurship.   May 23, 2000. How to cite Opportunities for Women-Owned Businesses, Essay examples

Saturday, April 25, 2020

Information Security Essay free essay sample

Introduction Information security is the protection mechanism used by the organizations to protect their data from losses, unauthorized access or unauthorized modification of data. Today information that an organization has in its database is very valuable to them and many refer to it as their company’s asset. This information of the organization needs to be made available to the employees and therefore is vulnerable to security threats.Question 1As an organization makes technological advancements, its work processes become more efficient and less use of resources is required. The output of the employees becomes greater when there is technological obsolescence in the organization. Use of data and information becomes more frequent and concentrated. This data which constitutes the records about the organization and important customer data is very useful to organizations. Loss of this data or unauthorized use of this data means the loss to the organization in monetary terms also. We will write a custom essay sample on Information Security Essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The importance of data to the organization depends on the type of business the organization is in. For example, an organization which is an Information technology (IT) solution provider; this firm will have everything in the form of data and its data is the firm’s only main assets. Therefore this data needs protection to safeguard it from loss or unauthorized access.The information in the organizations should be available whenever needed that is why it cannot be locked up in the databases or files. This data is needed by certain employees to perform their tasks and some data is not needed by other employees and needs to be hidden from them. If this data is made available to all the employees, it will be viewable by all of them and they can modify. This data needs to be protected and given different access levels to different designations of employees. As technology advances are made in the organization and systems are installed in the organizations to make the data available to the employees, the threat to information security becomes more.Data from all the departments of the organization are integrated in one platform to make it highly available, to keep it one format, for fast access, keep it up to date and to make the   retrieval of information more efficient and fast. This integration of data of different departments also means that all the employees of the organization will access the database. If there are no controls, the information becomes more vulnerable to loss of data and unauthorized use of information. An organization can protect against threats to information security in a variety of ways. Every threat has a different control and security management. Access controls can be implemented to control the access of unauthorized personnel to the information. Access controls can also be implemented for giving employees different levels of access to them. The employees who only need to view the information in the database will only be given rights to view the information and those who needs to modify, add or delete the records can be given the relevant access level to the database. The best way to implement access control is to create unique user id for each system user and allow each id different access levels and privileges. The user id is authenticated by passwords which is also unique for each user. The users should be trained and educated about the security controls so that they understand that different information is viewed by different users.The information should be stored in a cryptographic form so that it is unusable to someone who is unauthorized. The authorized users will be able to transform the cryptographic information into usable form. The information is also protected from any physical damage, disruptions or disasters. These disasters may be manmade or natural which includes fire, earthquake, destruction of building etc. For protecting the data against these disasters or physical damages, physical controls are implemented such as locking systems in the doors, air conditioning, fire alarm, cameras and security guards. Data recovery mechanism should also be present in the organization which includes making backup of the important data. The backup is usually made on some distant site and sometimes also at the same location. This ensures that the data will not be lost even if a disaster strikes the organization.The management should be informed about the losses of customer data and valuable information which will cause heavy losses in the earnings. The management should also be told that inadequate information security may cause theft of customer data. The customers are very conscious about the data that is being recorded about them. Therefore if their data is placed in wrong hands or stolen, the customers are most likely to switch to the competitors such as UPS for services. A presentation should be prepared by the IT personnel that should be presented to the management to win their support. This presentation should also contain the fact that UPS is better equipped with security controls much better than us which that is why they attract more customers. It should also be mentioned that the return on investment will rise as a result of more security of data, the number of customers will also rise and they will also be more satisfied than before.Question 2The collection of data from many sources has allowed organizations to put together databases of facts and information. This information can easily be abused and stolen even by the authorized employees who can use it for illegal and unethical purposes. The organization should   make strict regulations of ethics in information security to avoid illegal and unethical behavior of employees. There are cultural differences in ethical concepts in determining what is ethical and what is unethical. When one nationality’s ethical behavior contradicts that of another, difficulty arises. Deterrence to unethical and illegal behavior is the prevention of such activities. With the enforcement of laws, policies and technical controls, unethical and illegal behavior can be prevented. Laws and policies in the organization are only successful if some conditions are present. These conditions are listed below:-Fear of penalty-High probability of being caught by the management-Possibility of penalty being administeredOrganizations have codes of ethics or code of conduct to avoid unethical behavior at their organizations. Just having a code of conduct created is not enough unfortunately. The employees must be made aware of the important topics related to information security and must be trained of the expected behaviors of an ethical employee. Proper ethical and legal training is essential in creating a well prepared, informed and low-risk system user. This is especially vital in the areas of information security as the organizations witness technological obsolescence. Many employees do not have formal technical training to understand that if their behavior is unethical or even illegal.The security professionals are responsible to act unethically and accordingly to the policies and procedures of their organization and laws of the society. Therefore most organizations create and formalize a body of expectations which is referred as policy. Policies function in organizations like laws. To make the policy enforceable, it must be:-Distributed to all the employees who are supposed to comply with it-Easily understood by the readers and translated versions should be available in different languages-Readily available for reference by employees-Signed and acknowledged by the employee in form of consent letter.The course that is required to be designed for the students should not be technical and should contain the laws of states and govern ment. First of all the objective of the course is needed to be defined to the students in order to give an overview of the core ideas present in the course. Distinctions between laws and ethics should be clearly made in the course presentation for a better understanding of the future studies. Types of laws, U.S. Laws relevant to information security and privacy should be included in the course. A topic about customer data privacy and its sacredness should also be included in the curriculum. Definition of international laws, legal bodies, state and local regulations, copyright acts and UN charter about information should be included in the course. Policy and law should be differentiated and guidelines should be mentioned to design enforceable policy at organization. Auditing bodies such as Information System Audit and Control Association (ISACA) and their purpose should also be taught to the students.Question 3An organization has many assets and information assets are the least well managed although it is being recognized as one of the organizations’ most valuable assets. Information has started consuming vast resources of finance and human resources to record, store, manage, and process information, but it receives no financial identification on the balance sheet.When all these conditions are met only then the organization has a reasonable expectation of effectiveness of policy.   we are going to look at the information assets valuation methods which can be used for valuation. Using the communications theory (Shannon and Weaver, 1949), the information can be valued through focusing on the amount of information being transmitted over certain distance. It can be measured in volume of data per second that is transmitted over a distance. However this method of valuation is not so effective because the content and its usefulness is not being taken into account while evaluating.Accounting valuation model is used to value information as the accounting theory is used to value other assets of the organization. The value of an asset comes from two sources according to the accounting theory. The first source is the use of asset; if the asset is frequent in use and its use is beneficial for the organization, which means that the asset is valuable for the organization. Same theory applies to information assets of the organization; if the piece of information’s use is beneficial for the organization, then the value of the information is high. The other source is the sale of asset; which means that if the sale of the asset is generating enough money then the asset is valuable. The same theory applies to information; if information is more valuable, more buyers will be there and more revenue from its sale will be generated. Another way of valuation of information is market value of that information.The amount that other firms are ready to pay for the information is the market value of it. Advent of internet has allowed information to be sold as a product or paid for on a usage basis. The entire informational databases of the organization are generally not usable by the other firms. In general only a small proportion of information is saleable to other organizations for use. Information can be sold over and over again without losing value and is reusable. While the market value represents what another party is ready to pay for it, the utility model is better because it generated future cash flows rather than payment of one time only. The utility valuation of money is measured by the profits that can be derived from it in terms of future cash flows.This method is the best indicator, although difficult, because it takes into account how the information is used. The major setback of this method is that the estimates of the future benefits are highly subjective and time consuming to collect. In case of liquidation of General Motors (GM), the information in the databases of GM is not of any use to the organization. There are three types of information; administrative, commercial and confidential. The internal information such as financial budgets, employee   salaries, purchasing costs are generally not of interest to other external parties. This internal information is only for the use of internal management and other firms cannot use this information directly. Although it can be used indirectly to train the employees of the organization or in seminar sessions but it cannot be used for operations of the business.The second category of information is commercially sensitive information. Usually it is not in the interest of firms to sell this type of information to other firms as they will use it to profile customers and improve their sales process. In the case of GM, this type on information will be very vast and diverse as this company has been one of the largest firms of US. Its sales information and production procedures will be very useful for the other firms and these firms can use this information to make better decisions.The third category is confidential information which is very sensitive and the firms may be sued if this information is not kept private. In case of GM, this information will be very useful to the other firms which need this data, as they will be able to get customer data and personnel records. But this information is not allowed to be sold or passed to an external form for privacy reasons. References Boo Layton, P. Timothy. (2007). Information Security: Design, Implementation, Measurement, and Compliance. ca Raton. FL: Auerbach publications.