Thursday, December 19, 2019

Exploratory Qualitative Research Paper - 1370 Words

ASSIGNMENT #2 Through exploratory qualitative research and measurable quantitative research, I will be discussing a final research document which will consider implications of how thought processes work as well as progression groups, and unique techniques through counseling will be applied to substance abuse, as well as addressing how the thought process works and how emotions play a large impact on personal recovery. In the Qualitative research article titled A Cognitive Behavioral Approach to Client Anxiety, Anger, Depression, and Guilt Kevin C. Murphy (1980) discusses how counselors are often trying to find ways to address ways to reach a client to help them through the thought process, through using different therapeutic techniques†¦show more content†¦Another strategy goes into helping the client create a mental shield around them that can’t be broken down (Schimmel Jacobs, 2011). Other concepts that a counselor may address is cultural aspects. (Jacobs, 2011) In a Qualitative article titled Managing racial anger: A Critical Skill in Cultural Competence Alexis D. Abernethy (1995) addresses how some ethnic populations may come to a therapy session having anger as being the main complication. The issue might revolve around job discrimination, job dissatisfaction etc. However, the counselor may show empathy before understanding the client’s situation or perspective, which may create a dilemma (Abernethy, 1995, p. 97). Cultural aspects are not the only concept for those who struggle with anger, Gender experience may also play a role. In a quantitative article titled Sex Difference in the Relationship of Anger and Depression: an Empirical Study Jody L. Newman, Elizabeth A. Gray, and Dale R. Fuqua (1999) go into detail about a study that had been conducted on two different inventories. The two inventories calculated the mean score between sexes and found that women scored much higher on depression, however there was no difference between t he six anger scales that were considered between the sexes (Newman, Gray, Fuqua, 1999). Also in consideration between the sexes a quantitative article titled Issues of anger in the workplace; do gender and gender role matter? By Irene Gianakos (2002) goes into detail about aShow MoreRelatedA Exploratory And Formal Studies Essay884 Words   |  4 PagesA. Exploratory and formal studies Explanatory studies inclined to no structure and its objective is to discover upcoming research tasks. When formal studies start the exploratory studies come to an end. Testing the hypothesis and answering the research questions are the goals of formal studies B. Experimental and ex post factor research Experimental research designs: While doing an experiment the researcher tries to control and deploy the variables in the reading. Ex post factor research designs:Read MoreA Research Study Of Nurses Beliefs And Practice1395 Words   |  6 PagesEnd-of-life care in the intensive care setting: A descriptive exploratory qualitative study of nurses’ beliefs and practice, is a research article chosen for this essay. This critical review will include an appraisal of the designated sections of the research paper, provide a realistic and practical explanation linking findings to clinical practice, as well as a personal reflection on how the process of appraisal of evidence from the article has increased my knowledge. The title and abstract ofRead MoreWhat Research Design Requires A Quantitative Methodology?904 Words   |  4 PagesAssignment 5-1: Reading Reflections What research design requires a quantitative methodology? There are two main types of research designs that are seen with the quantitative research methodology. These designs are the survey design and the experimental design. When using these types of research methods, it is helpful to understand how these design types are organized for the data analysis and components of the research plan. A survey design relates to a numeric representation of â€Å"trends, attitudesRead MoreSecurity Risk Management1111 Words   |  5 PagesAbstract In this paper, it’s have stress on importance of user in participate on information security risk management and its influence in the context of regulatory compliances via a multi-method study at the organizational level. Along with associated outcomes, the types of activities and security controls in which user’s participation as part of Sarbanes – Oxley compliance also understand here. Besides that, research model also been develop in this paper on the finding of the quantitative studyRead MoreStudy Of The High Crime Rate1113 Words   |  5 PagesThe study of the high crime rate in the city will include a range of research methods. I would indicate that there is no standard threshold for what constitutes a hot spot as well no clarity about what may be the best method to identify the area. In research of areas that may appear to be the hot spots in the city can vary depending on the area was researched. The variance in the research would fall into the unit of a nalysis, scale of the map, and the amount of data mapped. Having said that, movingRead MoreRelationship Between Employees And Business1189 Words   |  5 PagesIntroduction Research is about systematically obtaining and analysing data to increase our knowledge about a topic in which we are interested (Saunders et al. 2010). In order to develop a good research topic the objectives needs to be clearly identified.Formulating a research question is an intellectually challenging and time-consuming undertaking (Saunders and Lewis, 2012). Denescombe mentions (2012, p.167) that â€Å" a topic for research should be something that lends itself to being researched usingRead MoreCritical Appraisal Of A Research3370 Words   |  14 PagesJournal of Religious Education. 34 (3) pp. 317-331. This paper outlines a critical appraisal for a research paper conducted by Cathy Byrne (2012). Byrnes’ paper is an exploratory case study into the impact of segregated religious instruction in public schools. She argues that segregated religious instruction influences identity development and may lead to exclusionary behaviours in students. This essay argues that Byrnes’ use of an exploratory research design is an appropriate and useful approach as thisRead MoreThe Concept Of Triangulation : Why Is It Important?1580 Words   |  7 Pages1. Discuss the concept of triangulation. Why is it important? Triangulation in research involves the use of multiple data sources or approaches in order to enhance confidence and understanding in the ensuing findings of a research. It is a powerful technique that facilitates validation of data through cross verification from two or more sources as mention previously. It can be use in both quantitative and qualitative and it is the preferred line in the social sciences. An example of triangulationRead MoreResearch Methodology For Academic Journal Articles1268 Words   |  6 PagesMoreover, the types of research questions and its understanding can be significant in determining the research methodology. Abstract The primary goal of this study is to systematize the knowledge in the area of different research methodological approaches applied in academic journal articles, assess their usefulness and present the results of the analysis. Key words: qualitative research, quantitative research, mixed method research Introduction Defining a case study method indicates the problemRead MoreMarketing Research Tools Paper1080 Words   |  5 PagesResearch Methodologies Many companies use different research tools when conducting primary and secondary research. This paper will discuss the several research tools used and discuss the differences in primary and secondary research when using qualitative and quantitative approaches. Once that has been established, there will be discussion as to which tools are used for each approach and why. Primary Research Primary research also called field research is the most common approach. Primary research

Wednesday, December 11, 2019

Objectives of Information Security-Free-Samples-Myassignment

Question: Describe the Importance and Objectives of Information Security for Above Financial Organization Using Open Network/Internet and to Evaluate the Potential Threats/Risks and Vulnerabilities. Answer: Introduction Information security is considered to be a set of practices as well as techniques that prevent unauthorized access, modification and destruction of sensitive data. The main focus of information security is to maintain integrity, availability and confidentiality of information. Information technology is playing a significant role in various industries. With the growing usage of ICT, security issues are also increasing. Information security is gaining importance in the financial organizations for securing the sensitive information of the customers and protecting any financial transaction using IT. This report explains about the potential risks that are related to the standards along with the parameters that are used for monitoring information security. This report gives a brief overview about the standards and policies of information security that are followed by financial organizations. It also provides suggestions regarding the accomplishment of information security. Objectives and importance of information security Customer information is considered to be one of the most valuable assets of financial organizations. Hence, financial organizations are incorporating strong security standards as well as policies in its business processes for securing sensitive financial information. Information can be represented in various forms such as printed documents and electronic files (Kshetri 2013). Information can be transmitted through several communication channels. Information can take any frame size and it needs to be stored and transmitted in a secure manner. With a specific end goal to enough deal with these data security hazards that are winding up always enhanced and perplexing, money related foundations are encouraged above all else to learn the idea of hazard, and afterward to set up the required safety efforts and work toward their unswerving execution, similarly as they oversee different attacks (Kshetri 2014). This paper explains attention deeply parts of data security chance administration by monetary establishments. The skills used by Bank of Japan have been used in this paper. Kim and Kim (2015) stated that bank of Japan has gathered this skill through thorough research, studies, conference and examination with outside organization and applicable household. It has also used its experience that it has gained by working for so many years. The appended "Project of Information Security Measures for Systems That Make Use of the Internet" calls attention to real things for checking the data safety efforts in singular frameworks that utilization the Internet (Martins et al. 2014). The connection along with this paper will serve financial organizations and institutes in creating and actualizing their data safety efforts. Then, in spite of the fact that the utilization of open frameworks has opened the best approach to give more advantageous budgetary administrations, it has additionally differentiated and confused the idea of attacks (Graves et al. 2016). As it were, while at tacks, for example, framework breakdowns and unapproved acts by representatives have existed paying little heed to shut or open framework condition, with the expanded dependence on open frameworks, there are currently enormously expanded attacks, for example, burglary or adjustment of data transmitted over systems (Laudon and Laudon 2016). Moreover, there is the rise of new attacks, for example, unapproved access all things considered and benefit interferences that are particular to open frameworks. Potential security and data threats, risks and vulnerabilities Financial organizations such as banks are exposed to potential security as well as data threats and risks. Information security is being evaluated by financial organizations due to its transactional risk that is considered to be the most harmful risk for a financial. Japanese financial organizations are getting to be noticeably mindful that, with the fast changes in the business condition, it is basic for administration to give clients advantageous monetary administrations rapidly and cheaply (Dhillon et al. 2016). In order to accomplish this objective, money related organizations have been continuously using IT, which has experienced astonishing advances as of late. There has been an especially substantial measure of specialized development in the territory of open frameworks encapsulated by the Internet, and that has made it conceivable to construct such open frameworks significantly more inexpensively and rapidly than traditional frameworks and to give services to a more extensive scope of clients too (Li 2015). The monetary business is likewise mindful that a rapid reaction to the administrative issues of building up a client base is basic, and thusly more money related foundations utilize the Internet as an approach to accomplish this. Meanwhile, this expanded dependence on IT and the extended utilization of open framework in the money related administrations segment engenders data security hazard that requires new countermeasures for chance administration by individual budgetary organizations. Selamat and Babatunde (2014) stated that Japanese financial foundations have actualized safety efforts that are predicated on the utilization of shut frameworks construct basically in light of centralized computer, for example, (a) physical partition through services of passages and ways out of computer focuses and through the development of systems with rented lines, (b) the utilization of redid programming and correspondence conventions (principles), and (c) observing utilizing surveillance cameras and human observation in branch. Because of the utilization of such measures, security attacks from the outside have been moderately uncommon in these shut frameworks (Lipper et al. 2014). With the expanding push toward open frameworks, it is substantially simpler now to increase unapproved access all things considered and robbery of information than before. The inside business preparing frameworks of budgetary foundations are being associated with other outside systems and a more notewo rthy utilization of regular correspondence convention. In addition, there are numerous gadgets utilized for client exchanges that might be overseen by monetary establishments less adequately than money allocators and programmed teller machines (ATMs). Information security systems and policies Sharma and Warkentin (2014) mentioned that formulation of security policies and standards are essential for every financial organization for mitigating security issues that are involved in its business processes. In light of the more prominent utilization of open frameworks for a budgetary foundation's numerous business preparing needs, an assortment of specialty units inside those associations are under strain to execute data safety efforts. For the whole association to cooperate and successfully execute countermeasures under these conditions, strategies and their particular points of interest ought to be composed, and after that it must be guaranteed that the whole association is informed completely (Connolly et al. 2015). Albeit Japanese monetary foundations do have involvement in the utilization of measures for data security and in many examples these measures appear to have been conceived on an individual or single framework premise. Japanese money related organizations are behi nd their partners in Europe as well as North America with regards to the cross-sectional countermeasures that are covering the entire framework. New information security monitoring metrics and parameters Organizations combine the applicable frameworks of risk with all the control sets of the ISCM or information security continuous monitoring methodology for providing a holistic approach to compliance and carrying out the process of risk management (Kidwell et al. 2016). This can be done by providing controls over a wide range of areas along with a high level details and guidance on its metrics. As the utilization of open frameworks increments, there is a relevant need to get a handle on the data security attacks confronting the whole association precisely and to build up arrangements and norms that are vital for the definition and usage of fitting countermeasures (Von Solms and Van Niekerk 2013). Data security arrangement is the systematization of methodologies and strategies identified with the plan of data safety efforts to be connected inside an association so as to react to the requirements as sketched out above. It is an arrangement on shields went for playing it safe to guarant ee security of data and data frameworks claimed by an association. By and large talking, much of the time it comprises of a fundamental way to deal with data safety efforts essential approach and "measures and benchmarks material all through the association norms. Domains and scope of information security policy The domain as well as scope of the information security policy needs to be defined after a financial institute implements its security policies and measures for the purpose of securing information. The formulation of data security strategy is relied upon to bring budgetary establishments the adequacy of upgraded security levels as made conceivable by the usage of exhaustive and successful data safety efforts for the whole association. As of now clarified, both its significance and attacks inalienable to IT are expanding for budgetary establishments. In this way, it turns out to be evident that one of the basic issues of organizations is the administration of data security hazard on an association. Kshetri (2014) commented that keeping in mind the end goal to guarantee the required security level, it is important to commit the proper administration assets and to increase satisfactory comprehension and participation from every specialty unit inside the monetary organizations. In any ca se, it is troublesome for officials and staff to ordinarily detect the immediate focal points of data safety efforts, and thusly, it is difficult to advance these measures in a base up. In this manner, considering own particular IT techniques, administration is prescribed to play a dynamic part in the hazard administration process (Joo and Yoon 2014). This might be carried out, for instance, by ensuring that the administration gets an exact idea and view of data security hazards and propose vital measures to overcome it. In particular, there is a need to make a reasonable and solid sense that the whole association must hold fast to this strategy by detailing data security approach under the administration of administration. The duties of every specialty unit identified with data security and tenets, keeping in mind that issues emerge because of breaks of approach, ought to be clear to all inside the association. Selection of appropriate information security standard with proper justification Organizations need to select an appropriate security standard out of several standards that is best suited for its business processes. Galliers and Leidner (2014) stated that in the event that there is even just a single gap in data security, there is a hazard that unapproved gets to or other hurtful acts may happen. In this way, it is essential to intermittently affirm the most recent data on security and to set up components in a day by day course of business for checking the security arrangement itself as fundamental. As worldwide business operations and association of frameworks create, Japanese monetary organizations will be required to guarantee that their data security strategies are perfect with universal benchmarks (Abbasi et al. 2015). To accomplish this, it is ideal that they assess the reasonableness of their own measures frequently, while offering thought to the most recent innovation patterns and legitimately alluding to worldwide gauges and rules 16 detailed by the ISO (International Organization for Standardization). When data security approach is characterized, security levels and definite substance of safety efforts required for each different framework are resolved. With a shut framework, essential hardware is situated in a computerfocus and subsequently hazard could be confined in framework divisions, especially in framework working units. Be that as it may, with application to primary operations of open systems, as epitomized by the Internet, different security advancements are important to guarantee required data security levels. In any case, these security advancements are not generally simple for clients to actualize as a result of different limitations, for example, cost of presentation and its constrained flow. In this manner, in view of an adequate level of data security hazard and taking expenses into Unauthorized access, Closed frameworks, Firewall Encryption, Theft Alteration, VPN (virtual private networks), Encryption Digital mark , Use of shut systems, One-time passwords, Digital time-stamping, Biometric confirmation, Digital mark, Open frameworks account, Impersonation ID Password, each monetary establishment should draft thorough measures by properly joining advancements as per the significance of data and data frameworks and different elements. Highlight of the policies as well as traditional standards followed by financial institutions The traditional standards and contextual policies that are followed by financial organizations have been explained in the point of this study. Electronic confirmation utilizing open key cryptography is now settled and very assessed for giving a larger amount of security than passwords (Fahy 2014). Nonetheless, since electronic confirmation isn't exceptionally easy to understand, it has not gotten on as a technique for client verification in Internet saving money and different divisions. In any case, should IC cards that contain private keys as well as computerized declarations come to be sold at a low cost and turn into a settlement measure that is general; we can anticipate that money related establishments will encourage the utilization of open key cryptography (Kahate 2013). In addition, new validation innovations are advancing, for example, biometric verification and computerized time stamping (an "advanced legal official" innovation, which permits confirmation by an outsider of "who made and sent what information and when") that utilizes physical properties, such as, fingerprints, penmanship, retina imaging and voice prints. If, later on, different conditions for presentation are set up pair with propels in innovation and the more far reaching utilization of such innovation, or if attacks ought to uplift as a result of exchange sum limits being raised, it will be a smart thought to emphatically seek after approaches to apply new data security innovation as the necessities emerge. The quick pace of mechanical progress as for the equipment and programming that contain open frameworks implies that security gaps are persistently springing up, and, if these openings are dismissed, they will ease the process of hacking and various other types of abuses (Ab Rahman and Choo 2015). Hence, any data concerning security gaps must be instantly researched to decide if an issue exists, and appropriate measures executed if vital. In such manner, it is attractive to (an) a ppropriately assess to what degree attacks may be brought around then in the earth, (b) input assets esteemed fundamental immediately, and (c) quickly execute the vital measures. It is attractive to stay up to date with improvements on the innovative front all the time. Only concocting data safety efforts on an individual premise won't create powerful outcomes. For instance, in taking measures to forestall unapproved get to, simply putting in a firewall isn't sufficient; money related establishments must be continually mindful of the likelihood of unapproved get to and stay watchful for indications of such intrusive exercises (Lipper et al. 2014). By social affair, data identified with examples of unauthorized access as well as firewall openings and executing fitting countermeasures, the danger of assault can be brought down. It is additionally essential to get ready for threats by setting up crisis measures to limit harm and to have systems prepared for quick warning ahead of time. Moreover, the usage of interruption tests appointed to particular organizations is significant to affirm the viability of every safety effort. Fitting execution and administration are important to get the full advantage of data safety efforts. Data security levels can be maintained and also enhanced by building up a ceaseless checking cycle for (a) examining data security attacks (to what degree, where and what type of hazard), (b) concocting as well as actualizing both the innovation and the framework based countermeasures for the perceived attacks, (c) teaching, training and preparing workers (counting part-clocks and also subcontractors), (d) affirming the status and position of execution via data security reviews, and (e) ensuring that the review that comes about are reflected in future investigation of the hazards. One specific result of the more noteworthy measure of appropriated handling affected by frameworks is that the powerless purposes of data safety efforts might be le ft unnoticed. Also, over the long haul, conventional safety efforts end up noticeably lacking in view of changes in the innovative condition (Grinblatt and Titman 2016). In particular, there are not a couple of cases that element to harm data security in frameworks utilizing the Internet are continually and constantly showing up. In light of that, we need to continue refreshing countermeasures. In these cases, if a checking component is as of now settled, intermittent examinations can be directed to stay up to date with new attacks and plan for compelling reactions by the whole association. Policies for email usage, remote access, network configuration, network access, network protocols and external access According to Da Veiga and Martins (2015), there are various areas that are included in financial organizations such as network configuration, remote access, protocols and access that require policies as well as security measures for securing information in the organization. As portrayed above, all together for monetary foundations to capitalize on IT insurgency to build up their organizations, they should turn out to be adequately mindful of the obviously, given that the specifications and level of hazard administration required will shift enormously contingent upon the framework utilized and the business exercises of each money related establishment and furthermore given the emotional changes originating from specialized advancement, there is no single solution for security (Bond and Goldstein 2015). Each budgetary establishment should always refresh its own reaction while alluding to the different rules and other significant data distributed by universal associations, institutional ization associations, and different organizations. The Bank of Japan is mainly focused on supporting such endeavours through budgetary establishments and also will take after the advance made by each and every money related organizations in its administration of data security chance from individual monetary foundation's hazard administration see. As expressed in "Standards for in the vicinity Examination and Off-site Monitoring for Fiscal 2000," the Bank is persistently trying to acquire an exact idea of the conditions at money related organizations and also encourage their executions of required measures, including through the Bank's focused on examinations with an accentuation on data security. Testing and verifying the effectiveness of the information security system Testing and verification of the system effectiveness is carried out after the implementation of information security system. Data security is accomplished by actualizing an appropriate arrangement of controls, including forms, strategies, techniques, hierarchical structures, programming as well as equipment security systems (Hovav and Gray 2014). The way towards setting up, checking, actualizing, evaluating and improving these controls expect association to persistently and constantly distinguish and deal with each and every adjustments in the security attacks, business condition, industry best practices along with lawful prerequisites. This is to ensure that specific security along with business objectives of the association is met and the security procedure needs to be done in conjunction with various business administration forms and procedures (Dhaliwal et al. 2014). For precisely recognizing and seeing each and every progression that the associations are confronting, contributio ns from all the divisions along the association are critical. Administration has several objectives for the associations, and some of the time specialized individuals are not in the position for comprehending these subtleties. The two gatherings need to comprehend that security is not something that can be kept in a bundle and purchased from a shop. It is considered to be an objective that the two gatherings endeavour to keep up. Information Security Management Committee can be set up to fill up the security gap. There is dependably a misinterpretation on the duties of actualizing data security in an association. The prevalent concept is based on the fact that it is only the duty of the Information Security Department to ensure that the organizational data is secure and well protected. In any case, this is in no way, shape or form right. Response policy for a sample bank when security accident happens According to computing system, a response policy is considered to be a mechanism or procedure for utilizing the domain name system by recursive resolvers for the purpose of allowing customized handling of resolution of the various collections of domain name data as well as information (Von Solms and Van Niekerk 2013). It will probably build up a system for the bank to react rapidly, unequivocally, and suitably to constrain the effect of an unfavourable occasion on bank clients and data assets. The strategy is additionally proposed to encourage convenient redress of any harm caused by an episode and accommodate viable examination and follow-up activities (Grinblatt and Titman 2016). The bank's episode reaction program is intended to meet the Interagency Guidance on Response Programs for the Unauthorized Access to the Customer Notice and Customer Information, notwithstanding the Interagency Standards for the purpose of Safeguarding Customer Information which execute the Gramm-Leach-Bli ley Act, and the FFIEC Information Security Booklet. The National Institute of Standards and Technology considers digital security as "the way toward ensuring data by anticipating, identifying and reacting to threats." This arrangement covers digital security and all innovation related occurrences. Ameris Bank's Incident Response Program is bolstered by techniques and practices that incorporate the accompanying. Evaluating the nature and extent of an episode, and distinguishing what client data frameworks and sorts of client data have been gotten to or abused; advising the bank's essential Federal controller as quickly as time permits when the foundation winds up noticeably mindful of an occurrence including unapproved access to or utilization of delicate client data; reliable with the Regulatory Agencies' Suspicious Activity Report ("SAR") necessities, telling suitable law requirement experts, notwithstanding documenting a convenient SAR in circumstances including Federal criminal infringement requiring prompt consideration, for example, when a reportable infringement is continuous, finding a way to contain and control the episode to anticipate advance unapproved access to or utilization of client data, for instance, by checking, solidifying, or shutting influenced accounts, while saving records and other proof; and informing clients when justified (Grinblatt and Titman 2016).. Reference is made to the bank's Incident Response Procedures, which particularly address computer framework related episodes, the Security Manual, which tends to physical security occurrences and notification procedures which deliver ventures for reacting to computer security occasions. Security episodes can possibly happen in an eccentric way and may affect the bank's physical, electronic, and HR (Kahate 2013). Such occurrences may unfavourably influence the secrecy, accessibility, and respectability of the benefits and data having a place with the bank and its clients. To the best de gree conceivable, Ameris Bank endeavours to limit the potential for security occurrences to happen. In such manner, the bank has embraced far reaching strategies and methodology tending to physical and data frameworks security. Be that as it may, the bank additionally perceives that, even with its current controls and practices, security occurrences of changing seriousness may emerge. In like manner, the bank has embraced this strategy and supporting techniques to characterize the means that will be taken because of an occurrence. These means are characterized to ensure that fast and suitable moves will be made to limit any damage to the benefits and data of the bank and its clients. Training requirements for staffs for implementing proper information security program The staffs and employees of the financial institutes need to be properly trained for successful implementation of security policies. Kearney and Kruger (2016) commented that organizations are enormously reliant on Information Technology (IT) as it bolsters everyday exchanges and numerous basic business capacities. IT stores private data, for example, associations' money related records, restorative records, work execution surveys, exchange privileged insights, new item improvements and promoting systems, which all must be secured to guarantee association survival. However, this reliance has tragically brought about an expansion of potential attacks to the association's data. The writing survey shows that both purposeful and inadvertent insider attacks are considered as one of the best positioned attacks to data security over the previous decade (Yang et al. 2013). The Cybersecurity Watch Survey (2011) found that the harm caused by insider workers or contractual workers with approved access threats was greater than pariahs (those without approved access to organize frameworks and information. The most widely identified insider e-violations were: accidental or unintentional introduction of private or sensitive information (57%); unauthorized access to corporate sensitive data (63%), infections, worms, or different pernicious and malicious code (37%); burglary of licensed innovation (32%). This paper contends that one imperative component to experience the insider attacks is through the plan, execution and authorization of compelling data security strategies (Grinblatt and Titman 2016). Data security approach engineering is an arrangement of archives, including strategies, rules, principles, techniques, and updates that all things considered adds to the assurance of authoritative resources. The rest of this paper is composed as takes after: In the following area, a discourse of the difficulties relating to data security improvement is given. Area 3 and its sub-are as investigate the means of the substance examination explore procedure and how they have been connected in this exploration paper keeping in mind the end goal to answer the exploration question. The significant potential issue in the present security strategy advancement rehearse is ascribed to the absence of direction with reference to how to create security arrangement substance. We found no proof that shows well ordered procedures of creating and executing a data security arrangement. The writing focuses on the depiction of the structure and the substance of the security approach, yet by and large, neglects to portray the procedures used to create the yield of the data security strategy. Because of the absence of the security approach improvement direction, security arrangement designers regularly utilize industrially accessible sources or layouts accessible from the web with a specific end goal to build up their strategies. The subsequent strategy archive will, in any case, not give legitimate bearing for data security assurance. For this situation, the arrangement proclamations created may not be specifically ascribed to the attacks they are intended to invalidate; hence, they don't battle the security attacks that the particular association is confronting. Moreover, an example of existing security arrangement improvement strategies is incorporated into the procedure. Their finding uncovered fundamental strides for the advancement of a security arrange99ment record. It additionally demonstrated a few likenesses where there is a concession to similar advances, while likewise indicating contrasts on the significance of the means to be taken after. Having seen that there is a hole in the present security arrangement improvement techniques; and that the writing does not offer far reaching system or instruments that show in detail the procedures of building up a data security approach, a more down to earth methodology turns into a need. A substance investigat ion of security approach improvement is led from auxiliary sources keeping in mind the end goals to reveal the processes and procedures that are vital for the detailing, execution and usage of a successful and strong data security strategy. Appropriate recommendations for accomplishing information security Recommendations and suggestions for accomplishing effective information security policy in the organizations are discussed in this section of the report. Associations are enormously reliant on Information Technology (IT) as it supports everyday exchanges and numerous basic business capacities. IT stores private data, for example, associations' money related records, restorative records, work execution surveys, exchange privileged insights, new item improvements and promoting systems, which all must be secured to guarantee association survival. The association of pertinent partners in the security management improvement process is an effective factor for security approach in the phases of advancement, usage as well as assessment. Consequently, a group of agent partners from over the association at all the levels is gathered. Delegate partners in the association may incorporate specialized faculty, process proprietors, leaders, supervisors, lawful division, the human asset office, clients, in addition to other capacity zone staff influenced by the new strategy. The extent of the created arrangement is an essential factor to figure out who ought to include in the advancement procedure (Kahate 2013). For instance, a security arrangement created for a particular division inside the association may include fewer individuals in the advancement procedure than the approach produced for the whole association. It is vital to obviously characterize the parts and duties of improvement colleagues to keep away from delays in the advancem ent procedure because of relational difficulties and political complaints that may happen. While many creators underline the significance of including diverse partners in the advancement procedure; the parts of these partners stay misty. He likewise calls attention to that creators essentially say the name of the partner that should be associated with the improvement procedure without indicating what this gathering of individuals ought to do all the while. Because of the way that associations have distinctive security needs, associations have diverse security prerequisites and destinations (Kearney and Kruger 2016). It is critical to have a decent comprehension of the association's security prerequisites when creating security approaches. In this way, the association ought to recognize the security requirements, including the level of security that the association intends to accomplish. Security requirements need to indicate the prerequisites of the association for tending to securi ty dangers, recognized through hazard appraisal, all together satisfy its security needs and accomplish its business goals. The after effect of the hazard evaluation is a contribution to recognize security necessities; along these lines, a few creators incorporate hazard appraisal as training in their security approach lifecycles. However, despite the fact that the after effect of hazard appraisal is an essential to distinguish the security prerequisites, evaluating danger ought to be a piece of security chance administration, not arrangement improvement. There are different approaches to disperse the arrangement in the association (Kearney and Kruger 2016). While a few associations lean toward a printed copy spread in which a printed duplicate of the report is conveyed to the representatives, others distribute the approach electronically through emails and inward and outward system. Regardless of what strategies the association circulates the approach; it ought to be accessible and simple to get to. In this manner, the association should choose the most proper strategy conveyance strategies to guarantee that the arrangement contacts the general population it is connected to. The determination of the conveyance strategies relies upon the association condition and the inclination of the workers. In view of the analysis and translation of the ten classifications talked about, various measurements of the model are proposed. The main measurement is the security approach advancement as it includes the procedures expected to build up a data security arrangement, for example, chance evaluation, strategy development, strategy usage, approach consistence and approach observing, appraisal and audit. The second measurement is the security strategy drivers as it is made out of attacks that put the association under strain to have systems to ensure their data (Kearney and Kruger 2016). The third measurement is the security strategy direction since it is constituted by security models that guide associations in developing a data security approach. The fourth measurement is worried about the help of the arrangement. Administration, representatives and partners need to help the security arrangement with the goal for it to survive and accomplish its targets. The fundamental motivation to cr eate data security arrangement is to relieve the different security hazards that associations confront. One of the attacks that associations confront is the expanding legitimate prerequisites. Associations should first distinguish and see every single administrative necessity that manages the making of such approaches before composing the data security strategy. Conclusion Data security strategies designers ought to acquaint themselves with punishments of rebelliousness with laws, as this will help the associations to organize their arrangements and actualize the best possible level of teach to workers who abuse the approaches. In this way, it is vital that associations get lawful guidance to guarantee that their approaches are legitimately authoritative and the representatives disregarding such arrangements will be lawfully obligated of their conduct. The examination question depicted in this paper show procedures that are needed to be followed by organizations to create and execute a compelling and secure data arrangement. The ten classifications that were found out in the middle of the lessening phases of the substance investigation were examined and translated with the objective of developing a model for data security strategy. This could be deduced from the identified ten classes. This report shows the distinctive measurements that a particular or ganization needs to consider for achieving advanced data security strategy and execution process. It also ensures both exhaustive as well as supportable data security procedures and arrangements. References Bond, P. and Goldstein, I., 2015. Government intervention and information aggregation by prices.The Journal of Finance,70(6), pp.2777-2812. Da Veiga, A. and Martins, N., 2015. Improving the information security culture through monitoring and implementation actions illustrated through a case study.Computers Security,49, pp.162-176. Dhillon, G., Oliveira, T., Susarapu, S. and Caldeira, M., 2016. Deciding between information security and usability: Developing value based objectives.Computers in Human Behavior,61, pp.656-666. Fahy, B. ed., 2014.Security leader insights for information protection: Lessons and strategies from leading security professionals. Elsevier. Galliers, R.D. and Leidner, D.E. eds., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Graves, J.T., Acquisti, A. and Christin, N., 2016. Big data and bad data: on the sensitivity of security policy to imperfect information.The University of Chicago Law Review, pp.117-137. Hovav, A. and Gray, P., 2014. The Ripple Effect of an Information Security Breach Event: A Stakeholder Analysis.CAIS,34, p.50. Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems.Procedia Computer Science,32, pp.489-496. Kahate, A., 2013.Cryptography and network security. Tata McGraw-Hill Education. Kearney, W.D. and Kruger, H.A., 2016. Can perceptual differences account for enigmatic information security behaviour in an organisation?.Computers Security,61, pp.46-58. Kidwell, D.S., Blackwell, D.W., Sias, R.W. and Whidbee, D.A., 2016.Financial institutions, markets, and money. John Wiley Sons. Kim, G. and Kim, S., 2015. Applying Need Pull and Technology Push Theory to Organizational Information Security Management.International Business Management,9(4), pp.524-531. Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and institutional evolution.Telecommunications Policy,37(4), pp.372-386. Kshetri, N., 2014. Big data? s impact on privacy, security and consumer welfare.Telecommunications Policy,38(11), pp.1134-1145. Lipper, L., Thornton, P., Campbell, B.M., Baedeker, T., Braimoh, A., Bwalya, M., Caron, P., Cattaneo, A., Garrity, D., Henry, K. and Hottle, R., 2014. Climate-smart agriculture for food security.Nature Climate Change,4(12), pp.1068-1072. Martins, C., Oliveira, T. and Popovi?, A., 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application.International Journal of Information Management,34(1), pp.1-13. Selamat, M.H. and Babatunde, D.A., 2014. Mediating effect of information security culture on the relationship between information security activities and organizational performance in the Nigerian banking setting.International Journal of Business and Management,9(7), p.33. Sharma, S. and Warkentin, M., 2014, June. Exploring the role of the temporary workforce on information security policy compliance. In9th Annual Symposium on Information Assurance (ASIA14)(p. 49). Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study.Information management,51(2), pp.217-224. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, pp.482-500

Wednesday, December 4, 2019

The Fall Of Communism In Russia Essays - Perestroika, Eastern Bloc

The Fall of Communism in Russia The Reasons for the fall of Socialism/Communism and the Troubles of Starting the New Democratic System in the Russian Federation "Let's not talk about Communism. Communism was just an idea, just pie in the sky." Boris Yeltsin (b. 1931), Russian politician, president. Remark during a visit to the U.S. Quoted in: Independent (London, 13 Sept. 1989). The fall of the Communist regime in the Soviet Union was more than a political event. The powerful bond between economics and politics that was the integral characteristic of the state socialist system created a situation that was unique for the successor states of the Soviet Union. The Communist regime was so ingrain in every aspect of Soviet life that the Russian people were left with little democratic tradition. Russia faces the seemingly impracticable task of economic liberalization and democratization. This is combined with the fact that the new administration must address human rights issues, such as living conditions and the supply of staple goods in this new form of administration makes the prospect of a full democratic switch seemingly impossible. To fully underezd the scope of the transference of governing power in the Russian Federation, one must first look at the old Socialist/Communist regime, to see the circumezces under which it fell gives a good view of why this transference is almost impossible. In the beginning Communism seemed to the people of Russia as a utopian ideal. The promise of the elimination of classes, of guaranteed employment , "The creation of a comprehensive social security and welfare system for all citizens that would end the misery of workers once and for all." Lenin's own interpretation of the Marxian critique was that to achieve Communism there would first have to be a socialist dictatorship to first suppress any dissent or protest. Through coercive tactics this new government seized power and in 1917 Lenin came to power. Under his "rule" the Soviet Union underwent radical changes in it's economic doctrines adopting a mixed economy which was termed the New Economic Policy also referred to as NEP, this economy called for some private ownership of the means of production, but the majority of industry was made property of the people, which meant the majority of the means of production was controlled by the government. Lenin's government made many achievements. It ended a long civil war against the remnants of the old Czarist military system and established institutions in government. During this period, and in fact throughout the majority of the Communist rule, censorship and the subordination of interest groups such as trade unions was imposed to stop dissension and increase conformity to the new governments policies. Lenin died in 1924, and was quickly followed by Joseph Stalin as head of the Soviet Communist Party, the oppressive reforms started by Lenin were continued and at length became completely totalitarian. Stalin became the most powerful man in Russia. He controlled to bulk of all the political power and with that he started a ruthless campaign of removing all opposition to the Communist rule. During this period called the "Great Purge" Stalin systemically executed anyone who stood in his path. Millions of people were arrested and either harassed or killed. The economic status of the Soviet Union was yet again changed and the entire system became controlled by the government. All private ownership ended. A mass program of industrialization was commenced, and the strength of the Soviet Military was subeztially increased. The citizens during this period endured great hardship. Agricultural production output diminished resulting in food shortages, these shortages were enha! nce by the mass exportation of food, this was done to pay for industrial imports. Stalin also put the production of what he called production goods such as manufacturing machinery over basic consumer goods such as clothes and other staples. During this period the Second World War broke out and drained most of what was left of the already impoverished state. Yet after the war national unity was strengthened as well is the Soviet military machine. The Soviet Union became a super power, the U.S. being the only country more powerful than it. After the death of Stalin in 1953 Nikita Khrushchev became First Secretary of

Wednesday, November 27, 2019

Body Art and the Asian Culture free essay sample

Body Art the Asian Culture Marcie Helman March 22, 2009 Body art is a definitive and visual part of the Asian culture used to identify social and religious representations. The term tattoo is derived from the Tahitian word tatu, meaning to mark [1]. Throughout history, many cultures have socially acceptable ways in which to showcase their individuality. Contrary to popular belief, in the Asian culture, body modification is typically considered to be distasteful and socially unacceptable. The resurgence and ultimate popularity of the Asian Hanzi and Kanji characters is most prevalent in todays younger generation. However, the significance of Asian characters used in todays modern society is not as symbolic as its ancient representation. In the early 1700s, the Japanese used tattoos as a form of branding as a classification of criminals within their society. Those who bore the mark of dishonor on their foreheads were called Ronin, a masterless samurai warrior[2]. We will write a custom essay sample on Body Art and the Asian Culture or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page These criminals were believed to be the grass root society in which the yakuza was born. The Yakuza felt that because tattooing was painful, it was a proof of courage; because it was permanent, it was evidence of lifelong loyalty to the group; and because it was illegal, it made them outlaws forever. Historians note that this type of punishment replaced the earlier ostracism of nose or ear amputation. These types of punishments are clearly very visible and physical attributes that cannot be shielded or otherwise hidden. The Horis, the Japanese tattoo artist, were the undisputed masters in the use of color, perspective and imaginative design. One of the most intricate and colorful tattoo designs is found in the Irezumi, a culturally Japanese form of the body art. Early Chinese traditions regarding body art is quite surprising given our modern culture and the freedom of expression. It was believed that in early China, the art of Ci Shen and Wen Shen[3], loosely translated means to puncture the body, was considered distasteful and was an uncommon practice because it was a desecration of the body. The Chinese believe that the body is a precious gift and must be treated with respect. To harm, or in this case, puncture, was clearly sacrilegious. Synonymous with the Japanese culture, it was also used as a form of branding for their criminal population. There are hundreds of islands that make up Polynesia (also referred to as Oceania) including the more well-known islands of Hawaii, Tahiti, New Zealand, Marquesas, Fiji, Tonga, and Samoa. Early Polynesian history is not of written form, therefore, the use of this art to express their individuality was more pronounced than that of the Eastern lands of Japan and China. Most of what is known today within the French Polynesian society has been passed from generation to generation through legends, songs and ritual ceremonies. People were able to easily identify each others origins solely based on the design of their body art. Polynesian body art is used in many ritualistic and ceremonial rites of passage. Different symbols, design motifs and markings depict maturity, genealogy and rank within their society. Polynesian tattooing is considered to be the most intricate and skillful tattooing of the ancient world. It is believed that most everyone in ancient Polynesian society bore a tattoo; it was a symbol of their mana, their spiritual power or life force[4]. The design and placement on the body of the tattoo is decided by the master, a highly revered elder within the village and surrounding community. Other variables that determine design and location of the tattoo on the body are life events. An example would be if they were a warrior; preparing for or returning heroically from, battle. A composite of the more familiar Polynesian islands with their cultural adaptations regarding tattoos and interpretations within their social group will be elaborated below. Captain Cook had assisted in the popularity of this art by discussions with other British citizens. It has been noted that Mai, a Polynesian who accompanied Captain Cook back to the British Isles had become partly famous and enjoyed celebrity status because of his tattoos. By the middle of the 18th century, it had become a tradition in the British Navy and by 1862 was commonplace to have at least one professional tattoo artist in residence at most British ports[5]. In Thailand, the Sak Yant is a protective tattoo that covers the body of Thai soldiers. This is an ancient tradition that spans centuries. One of he most highly esteemed locations for Sak Yant is located about 30 miles west of Bangkok called the Wat Bang Phra Buddhist temple. In todays modern society, incorporating the use of both Asian character symbols as well as the Asian-inspired art such as dragons and tigers, the art has become much more a part of contemporary lifestyles. As cited above, the art of tattooingspans the Asian region in ways that are intricate with its culture. The direction in which tattooing as an ar t and personal statement seems to be making its inroads into the middle-class community, allowing our newest generation of twenty-somethings to lead the way. With the traditional Asian culture, it seems to be that even the most austere conservatives are more tolerant and accepting, maybe even allowing, this brand of individuality. It is also reflected in the popularity of American youths depiction of body art who are brandishing Asian inspired motifs that \are more concurrent with traditional styles. Most notably, North American statistics show that one in seven people have at least one tattoo further emphasizing how tattoos are appearing more frequently than in previous generations. REFERENCES

Sunday, November 24, 2019

Just Jackie essays

Just Jackie essays Like many other Americans, my fascination with Camelot and with the Kennedy family has been apparent since I first heard of the legacy. One of the most breathtaking and admiral women to grace the earth in the last century has been Jacqueline Lee Bouvier whom married the most famous of all the Kennedys, Jack. When Jack was inaugurated president in 1961 the White House and nation was brought a beautiful young wife and the first young children of the President in over half a century. As the First Lady, Jackie brought beauty, intelligence, and cultivated taste. Jackie born in 1929, was the daughter of John Vernon Bouvier and his wife, Janet Lee. Her early years were divided between New York City and East Hampton, Long Island, where she learned to ride almost as soon as she could walk. She was educated at the very best of private school. She learned to write poems and stories, draw illustrations for them, and studied classical ballet. Her mother obtained a divorce from Jackies father and remarried Hugh D. Auchincloss in 1942. The change brought Jackie and her younger sister Lee to a home near Washington, D.C. called, Merrywood. Jacqueline was named the Debutante of the year for the 1947-1948 season, but still after all her success socially she continued her education. As a young girl, Jackies father taught her that the way women gained power would be by associating themselves with powerful men. In many ways it seemed as Jackie and her father were more like confidants rather then father and daughter. Being the child of a verbal alcoholi c father, Jackie had learned to block things out at a young age. She spent her adult life striving to do this and trying to please her mother. She spent her junior year in college in France as a Vassar University student and traveled extensively. These travels left her with a great acceptance and understanding for foreign countries, and their pe...

Thursday, November 21, 2019

Case Study Changing Nestle Example | Topics and Well Written Essays - 750 words

Changing Nestle - Case Study Example Efficient CEOs like Helmut Maucher and Brabeck-Letmathe initiated radical changes in the organization. Large-scale and transformational changes are necessary for maintaining organizational survival. Clardy says about the organization change as, â€Å"the field organization change was long equated with organization development (OD), whose proponents were up-front with the bona fides of their approach: full disclosure, informed consent, inclusive participation, and so on.†(Rothwell, Stavros, Sullivan & Sullivan, R. A, 2009, p. 12). The OD includes the dispositions to improve their organizations by applying knowledge from the behavioral sciences—psychology, sociology, cultural anthropology, and other related disciplines. Analyzing the changes taken place in the Nestle shows that the firm had undergone both the first order change and second order change. In a first order change, the firm makes only some changes in terms of transactional and organizational climate. On the ot her hand, Nestle had undergone a second order change in terms of transformational changes. Some of the important organizational changes were as follows. First order changes 1. Nestle started to transfer executives Switzerland to United States. 2. Nestle concentrated on the strengthening and centralization of its IT departments. 3. Started to purchase local subsidiaries in local markets and began to expand globally. Second order changes 1. Nestle completely refurbished the executive board with ten executives replaced (Palmer et al, 2005) 2. Nestle started to diversify its markets through their introduction into cosmetic and pharmaceutical markets. 3. Nestle introduced the acquisition and merger of several companies. The second order change is more evident in the organization. Transformational change had taken place as the organization switched from entrepreneurial to a wider and more professional management. An important transformational change that had taken place in the organizatio n was involvement in other fields of business through product diversification. In the same way, the acquisitions and mergers provided them accelerated growth, and increased popularity and reputation. However, throughout the course of change, the company took extra care in sustaining employees’ loyalty, impression, motivation, self belongingness, and positive behavior, even though the management had applied some ‘mid-management change theory’. As Palmer et al (2005) state, the change occurred in Nestle, emphasized by Peter Brabeck-Lemathe as incremental change. It is based on his leadership mindset, which focuses on substance over style, with strong dedication, and long term approach to growing business. In contradiction to Peter’s concept of incremental change on Nestle’s overall business, the incremental change was not incremental at all. Its market had expanded due to the aggressive acquisition of a number of food industries and due to the automat ion and integration of all its worldwide operation to facilitate better coordination in an aggressive strategic move; and the move had ended in closing 38 factories and cutting $1.6 billion in cost while improving the company’s ability to obtain volume discount, which Peter meant was incremental (‘Peter Brabeck-Letmathe-1944’). The three important lessons coming from the frontline are downsizing through retrenchment and down scoping,

Wednesday, November 20, 2019

The evalution of copycats impact in market Essay - 1

The evalution of copycats impact in market - Essay Example premise encompassed high-similarity copycats would loose while the subtle copycats gain in the presence of a leader brand (Van Horen & Pieters, 2012). Since, the clients will be capable of making critical comparisons backed by former theories, which they have regarding the leader brand. Therefore, the article’s authors hypothesized that â€Å"shopping situation† usually avails consumers with an ample time meant to explicitly compare copycat brands with the leader, whereby the blatant lose and the subtle copycats gain (Van Horen & Pieters, 2012). To prove this hypothesis, the authors utilized both comparative and noncomparative evaluations to ascertain which copycats’ category would gain or lose under each test (Van Horen & Pieters, 2012). Results indicated that, moderate-similarity copycats gained under comparative evaluation contrary to high-similarity copycats because leader brands acted as their standard measures (Van Horen & Pieters, 2012). Conversely, high-similarity copycats gained under noncomparative evaluation whereas the moderate or subtle lost due to the assimilation aspect (Van Horen & Pieters, 2012). In the latter test, there was no leader brand meant for comparison, hence the clients ended up suggesting the high-similarity copycats being close to the standard brand (Van Horen & Pieters, 2012). In conclusion, despite a recent court ruling declaring reputation riding is unacceptable, subtle copycats will still benefit without the leader brands’ corporations prosecuting them (Van Horen & Pieters,

Sunday, November 17, 2019

Latin America Essay Example | Topics and Well Written Essays - 250 words

Latin America - Essay Example One of the key areas of influence was on the Latin American economy. As the article above highlights, there are two different forms of economies in the region, and this highlights how the different European countries that conquered Latin America had different economic policies and approaches. For example, Spain conquered Latin America in order to exploit the natural resources in the region and export them to Europe. This form of exploration favored the state controlled type of economy, which, according to the article, persists till today. On the other hand, countries such as Netherlands and England favored free trade where they allowed for the production of sugar, cotton and tobacco, which were sold to other countries for profit. These were the basis of globalization and free markets. This explains why certain countries in the region have shown greater economic success than others. In the article for instance, Luhnow argues that the Pacific-facing countries have shown higher levels of economic growth by taking advantage of globalization compared to their Atlantic facing counterparts who have favored state controls. For example, the author notes that Argentina has immensely suffered from the heavy-handed regulation. This article gives a clear picture of how Latin America has been influenced by the different European countries that colonized the

Friday, November 15, 2019

Obscenity And Vulgarity To Be Eschewed Media Essay

Obscenity And Vulgarity To Be Eschewed Media Essay The advancement of science and growth of modern technology and information has made things very easy to circulate and communicate to the entire world. We today easily get information of earthquakes or landslide happening in any part of the world with the help of satellite. To make this world a compact place and connecting everyone with fast and easy medium the media has placed a very crucial role. There were days when passing of news took day and days and now with just a click the entire news reaches the world in seconds. With the media becoming globalised the content of the news which is been circulated has become much vulnerable. When the audience of whole world at large is approached if becomes obvious that at times western country approached could hurt the sentiments of people of eastern country and vice versa. To avoid differences regulations must be formed to regulate which content would be suitable for display for a particular group of audience. Obscenity is one such ingredien t which prohibits content from being screened or displayed. Obscenity can be in common terms be called mind pollution, a social problem which is been affecting our society at large. Obscenity can be defined as any photograph, figure, picture, write up, video or a public act which corrupts the minds and appeals to the prurient interests or which is not acceptable with social moral standards would be called obscene and vulgar. Off late, the media has played a major role in promoting obscenity by way of semi-nude ads, video-graphy, news in the form of soft-porn and much more. They are certainly putting at stake the values of an entire generation just for a little more circulation, readership, viewership and a little more money. Obscenity is affecting us, our children, the various facets of a society, heres how: Women and children are the worst hit by the growth and exposure to obscenity. There is a direct link between the violence being shown in media and the actual  act of violence against women. The cases of molestation,sexual harassment  and rape are on the rise contributing to this is the constant bombardment of sex, nudity and violence in the media. Obscenity is also leading to the young generations growing interest in indulging in sexual activities, further causing problems such as  premarital sex, teenage pregnancy, sexually transmitted diseases and much more. Future threats of an open show of obscenity could be as harmful as the loss of ethics in the coming generations. In a country where marriage is considered a pure bond and sex serves a valuable purpose of sharing love and purity, obscenity is getting this bond a new meaning of an animal act, for the purpose of fulfilling ones sexual needs the female body becoming a mere object. FORUM AGAINST OBSCENITY OBSCENITY : A FORM OF MIND POLLUTION  Ã‚  Ã‚  Ã‚  Earth pollution is bad. Water and Noise pollution is worse. Air pollution is still worse. But the worst of all is Mind Pollution. It corrupts the most valuable trait of Human Species : It corrupts THINKING. One of the most common forms of Mind Pollution observed today is OBSCENITY WHY MOVEMENT AGAINST OBSCENITY  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In last few years, a large Section of the Media and particularly the Leading ones have taken liberty to flout all Norms related to Obscenity. A systemic overdose of Nudity and Vulgarity is being forced into the brain of  Ã‚  common Viewer through News Papers, Television, Films, Magazines, Hoardings, and Posters.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Their purpose is to use a cheap short cut to catch attention and thus beat competition. They want to make quick money by selling their real matter mixed with so called HOT STUFF.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The long term effect of this bombardment of sex and nudity is resulting in corrupting the Thought Process because thoughts are bound to come according to what you see, read and hear.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The psychologists all over the world are cautioning that exposure to Media violence and sex, have damaging impact on the children and minors and youth.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Common man and Parents of young children are worried, they feel helpless and frustrated. Their Right of bringing up their children in a Mind Pollution Free Atmosphere is snatched away.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This Long lasting damage cannot be checked individually. It needs a Mass Movement.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This restlessness has evolved into a large number of NGOs and individuals coming together in the form of this  FORUM AGAINST OBSCENITY HOW DO YOU DEFINE OBSCENITY o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Any picture, photograph, Figure, article, write up, etc. or a Public Act which depraves or corrupts the mind and which appeals to the prurient interests or which is against the acceptable social moral standards would be called obscene and vulgar. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The condition in which you would feel ashamed to see your mother or wife or daughter, is obscene. THE PRESENT SCENARIO o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Television Channels are full of adult contents. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The films and Serials show detailed rapes and sex sequences. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Music videos have half naked girls dancing, making suggestive gestures, almost performing pornography. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Newspapers like Mid-Day, Mumbai Mirror, Bombay Times etc are full of photographs of half or almost naked actresses and models. Kamasutra is printed. Sex Experts are guiding and solving difficulties being faced in Premarital Sex. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The News Channels shamelessly show pornography and uncensored scenes of Adult films in the name of News. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The posters of the films are made from those scenes, which are deleted by the censor board. The posters of films and hoardings of advertisements are so vulgar that it is difficult for women to walk with their heads up on the road. WHAT ARE THE RESULTS o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There is a direct link between the violence being shown in media and the actual act of violence against women. The cases of molestation, sexual harassment and rape are on the rise due to this constant bombardment of sex, nudity and violence in the media. In Mumbai there have been instances of 12 and 13 year old boys raping 9 year old girl, copying the act from television. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Premarital Sex and Extramarital Sex is fast growing and is gaining Social Acceptance in the new Generation. WHAT ARE THE FUTURE THREATS o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Marriage as an Institution is under threat. Like in West, the cases of Divorce are increasing. The Indian Culture of a Life Long Vow of faithful marital life is likely to get eroded. The Foundation of FAMILY is being dynamited. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Sex, instead of a serving a valuable purpose of maintaining intimacy and bond of Love between husband and wife, may get reduced to a sheer Animal Act. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Teenagers and minors are indulging in sexual activities due to constant hammering of adult content in the media. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The body of a woman has become an object of entertainment and  Ã‚  a mere commodity to draw peoples attention. WHAT DOES THE LAW SAY o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Article 19 of the constitution does guarantee freedom of speech and expression. However it clearly states that this freedom is subject to reasonable restrictions. Among various grounds of restriction, social moral standards and decency are also included. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Indian Penal Code 292 states that any obscene and vulgar act, video, audio, poster, printed material displayed in public are punishable offence. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Indecent Representation of Women [prohibition] Act 1986, states that depiction of the figure, body, or any part of a womans body, which is denigrating women or likely to corrupt Public Morality is a punishable offence. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Cable Television Network Act clearly mentions that 24 hours NO ADULT programme can be shown on television. [The criteria for the Adult content is the same as followed by the Censor Board] ARGUMENTS SUPPORTING OBSCENITY o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The freedom of Expression is a Fundamental Right Our answer- In a civilized society no freedom can be ABSOLUTE or UNLIMITED. The freedom of Expression as per Law is subject to reasonable restrictions, including the ground of social moral norms and standards. Had this been a free for all right then our Laws would not declare  indecent representation of women, obscenity and vulgarity   in public as a punishable offence. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Obscenity is a subjective issue. It is in the eyes of the Beholder. Our answer- One of the signs of primitive man getting civilized was that he started wearing Leafs and Barks of Trees. It has been a long gradual process of human civilization. If today so called liberals are advocating nudity in the name of liberalization then they are taking us back to the primitive man and primitive civilization. Keeping the society in mind, whatever generally is not acceptable in the society is called obscene, for example: wearing a bikini in the beach is normal but wearing it in a public place is objectionable and obscene. Having sex in closed rooms is normal, but doing it in public, even by legally married couple is objectionable. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Sex Education is a good thing which is being imparted indirectly by these Our answer   The vulgar and suggestive Displays instigate their unripe mind to indulge in sex. They get wrong notions about Sex Act. Education needs to be given scientifically in a class room. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This amounts to Moral Policing Our Answer: Can there be an Expiry Date to Morality !! Our Laws do make a mention of Morality as a basis. WHAT ARE THE PLANS OF FORUM AGAINST OBSCENITY o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To create Mass Awareness on this subject o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To initiate Legal Action against Violators through specific Complaint and through Public Interest  Ã‚  Litigation o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Social Boycott   and Public protest against Violators through Articles, Morcha, Dharna etc o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To catalyze similar Movements in all parts of the Country o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To garner Support of Right minded and Like Minded Media o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To approach Associations / Federations of Media for making guidelines for their Members and for ensuring it o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  To study the existing Laws and point out the need to change it, through Amendment / Addition. To take up the issue of Amendments   with Govt. WHAT CAN AN INDIVIDUAL DO o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  It is time that We as concerned and responsible citizens raise our voice to stop this sex, violence and vulgarity in media including Television, Newspapers, Films and posters of films. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  It is time that we raise our voice against this shameless display of womans body and her commodification in the name of entertainment, against the shameless and blatant violations of Laws, making the society unsafe for our Future Generation. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Please join hands in this fight against vulgarity and violence in media. Express your support by writing to us. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Lodge Complaint against Cases of Obscenity wherever you see. Attach a photo of the Obscene matter with details of location, date etc. The Complaint has to be lodged with Deputy Commissioner of Police, Enforcement, Office of Commissioner of Police,  Ã‚  Opp.  Ã‚  Crawford Market, Mumbai 400 001 o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Write to Hon. Minister, Information and Broadcasting, Hon. Chief minister, Hon. Home Minister, Director General of Police ( DGP ) and Commissioner of Police, asserting your Right to live and bring up your children in an atmosphere free of Obscenity and Violence. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Write to Union Minister of Information and Broadcasting Ministry at Shastri Bhavan,  New Delhi  , and demand that no Adult content should be shown at any time on the television. Demand that all Private TV Channels be converted to Pay Channels so that you can see the channels of your choice only and prevent undesirable channels in your home. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Mark copy of all above to us at address below o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Discuss this common Cause with your Family, Friends, and Society and create awareness and a sense of responsibility to do something. Convert this Movement into an all India Movement of Crores of well meaning Citizens. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Organize and Join the Protest Rallies / Morchas wherever possible. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Communicate with those indulging in Obscenity and make efforts to convince them to desist from Obscenity o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Boycott  Ã‚  those Media and News Papers which promote Nudity. o  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Contribute financially towards the campaigns by the Forum.

Tuesday, November 12, 2019

The Great Depression :: American History Economy Essays

The Great Depression There had been financial panics before, and there have been some since, but never did a collapse in the market have such a devastating and long-term effect. Like a snowball, it formed and swept away the whole economy before it. Businesses closed, putting millions out of work. Banks failed by the hundreds. Wages for those who were fortunate enough to still have work fell drastically. The value of money decreased as the demand for goods declined. The international structure of world trade collapsed, and each nation sought to protect its own industrial base by imposing high tariffs on imported goods. This only made matters worse. By the fall of 1931, the international gold standard had collapsed, further damaging any hope for the recovery of trade. This started a series of currency devaluations in several countries, because these nations realized that a devalued currency posed at least a temporary advantage in the struggle to find markets for their goods. This was the start of the Great Depression of 1929 to 1940, which began and centered in the United States but spread quickly throughout the industrial world. By 1932, United States industrial output had been cut in half. One fourth of the labor force (about 15 million people) was out of work, and there was no such thing as unemployment insurance. Hourly wages had dropped by about 50 percent. Prices for agricultural products dropped to their lowest level since the Civil War. More than 90,000 businesses failed completely. For nearly every unemployed person, their were dependents who needed to be fed and housed. This massive poverty and hunger had never before been known in the United States. Former millionaires stood on street corners trying to sell apples at 5 cents apeice. Hundreds of pitiful shantytowns, called Hoovervilles in honor of the unfortunate Republican president who presided over the disaster, sprang up all over the country to shelter the homeless. People slept under "Hoover blankets" (old newspapers) in the out-of-doors. People waited in bread lines in every city, hoping for something to eat. In 1931 alone, more than 20,000 Americans committed suicide. The theme song of the time was "Brother, Can You Spare a Dime?" For anyone who did have money, depression America was a shopper's paradise. A new home could be bought for less than $3,000. A man's suit costed about $10, a shirt about 50 cents, and a pair of shoes about $4.

Sunday, November 10, 2019

Social Networks and the Arab Spring

â€Å"An Examination of the Role of Online Social Networks in the Uprisings in Tunisia and Egypt in 2010-11† In the academic research and journalism about the Arab Spring, there are contrasting views surrounding the importance of the Internet and online social networks in the success of the uprisings. Did the uprisings in Tunisia and Egypt give validity to Egyptian Google executive Wael Ghonim’s claim that â€Å"if you want to liberate a society, just give them Internet† (Ghonim CNN), or was the function of online social networks greatly exaggerated by international media to highlight Western ideals of democracy?This research paper will closely analyze the extent to which these online social networks such as Facebook, Twitter, mobile phone networks, and YouTube were used as tools for the organization and mobilization of civil disobedience in Tunisia and Egypt in 2010-11. It will examine the role and impact of online social networks and will assess whether they we re merely extensions of offline communities or if they played an integral and mandatory role in these uprisings.Though this paper will investigate the range of opinion on the impact of digital media in the Arab Spring, it will argue that online social networks played an integral role for Tunisian and Egyptian citizens in their rapid and successful uprisings. Online social networks blur geographical boundaries, which create opportunities for widespread communication, effective organization, mobilization of citizens, and the sharing of videos locally and internationally.Before the proliferation of digital media in the Middle East, these opportunities were not available to citizens and communication was limited to individual communities or offline networks. The combination and collaboration of already established offline networks, various digital technologies, and online social networks lead to the success of the civilians in overthrowing their governments.Despite the years of civil di scontent and corruption in both the Ben Ali and Hosni Mubarak governments, revolution did not occur until digital media provided the opportunity for different communities and individuals to unite around their shared upsets and create mobilization strategies online. In Tunisia and Egypt, â€Å"social media have become the scaffolding upon which civil society can build, and new information technologies give activists things that they did not have before: information networks not easily controlled by the state and coordination tools that are already embedded in trusted networks of family and friends† (Howard 2011).It will be shown that although online social networks act as an extension of the offline public sphere, their role in these uprisings was integral in creating an organizational infrastructure and to generate international awareness and aid against the corrupt governments. Discontent had been brewing in Tunisia for years during President Zine El Ben Ali’s rule. I n 2009 he was reelected for a fifth term with an overwhelmingly fraudulent 89% of voters (Chrisafis, 2011).Despite years of suffering from an oppressive regime, rising unemployment rates, and censorship, it was not until the self-immolation of a vendor, Mohamed Bouazizi, was documented and transmitted online that the revolution gained the awareness and support it needed to make a difference. There had been previous acts of protest, but â€Å"what made a difference this time is that the images of Bouazizi were put on Facebook† (Beaumont, 2011).A relative of Bouazizi, Rochdi Horchani, went so far as to state, â€Å"we could protest for years here, but without videos no one would take any notice of us† (Chrisafis, 2011). The revolutions in Tunisia inspired Egyptian activists to use similar tactics to evoke change in their own corrupt government. Muhammad Hosni El Sayed Mubarak ruled over Egypt from 1981 to 2011, when he was overthrown by the organized and effective protes ts of Egyptian citizens.Although social media and digital technologies had little to do with the underlying sociopolitical and socioeconomic factors behind the civil discontent, they played a rapid role in the disintegration of these two regimes. In addition, even though corruption had been occuring for many years in the governments, â€Å"all inciting incidents of the Arab Spring were digitally mediated in some way† (Hussain, 2012) whether it was documented and disseminated online or discussed on an online social network.The corruption and discontent of the citizens may have inevitably lead to protests in both countries, but â€Å"social media was crucial† (Khondker, 2011) due to it’s communication and organizational abilities. The cruciality of online social networks and digital technologies is contested by theorists who argue that â€Å"other sociological factors such as widespread poverty and governmental ineptitude had created the conditions for extensive public anger† (Hussain, 2011) and that these preexisting conditions caused the revolutions.Several pundits including Gladwell and Friedman argue, â€Å"that while Facebook and Twitter may have had their place in social change, the real revolutions take place in the street† (Hussain, 2011). Though these theorists are correct in their attribution to the already existing political discontent for the preconditions to the revolution, online social networks acted as a necessary extension of offline social networks and action. It is likely the successes of the protests in the streets would not have been as large without the communication potential of digital media.One pundit attributed the lack of violence in the revolutions to the digital media stating that the use of online social networks â€Å"may have less to do with fostering Western-style democracy than in encouraging relatively less violent forms of mass protest† (Stepanova, 2011). Now that citizens had other ve ssels to communicate internationally and were no longer censored and controlled by their state regulated media, the governments could not be so open about their brutality.Pundits such as Gladwell and Friedman overlook the fact that â€Å"digital media allowed local citizens access to international broadcast networks, networks which were then used by online civil society organizations to lobby advocacy campaigns† (Hussain, 2012). It was these social networks that aided Tunisian and Egyptian citizens with their success in the streets. The Arab Spring has also been attributed the nickname of â€Å"The Twitter Revolution† (Stepanova, 2011) due to the large role Twitter and Facebook played in the uprisings.This nickname gives light to another contrasting perspective about the importance of online social networks being highlighted by international media to emphasize the role of Western ideals of democracy. Due to the fact that digital technologies and online social networks proliferated the West before the Middle East, the U. S claims credit for the democratizing effects they had on the Middle East during the Arab Spring (Stepanova, 2011). By emphasizing the power of new technologies in spreadingWestern democratic values, this approach ignores the socioeconomic and social equality dimensions of the massive protests in the Arab world. Ekaterina Stepanova states that â€Å"the automatic connection [The United States] makes between social media and a Western-style democracy agenda† (Stepanova, 2011) is a weak link in U. S policy. Social media tools with identical functions can operate differently in developed versus developing countries.It was not just the Western media which stressed the role of online social networks in the Arab Spring, but also local media and the civilians themselves. The role of Twitter and Facebook may have been emphasized in Western media due to their nationalistic attitude, but this should not downplay the actual importance that these technologies held in the uprising. During the uprisings in Tunisia and Egypt, social networks were the key factor in the communication, mobilization, and organization of civilians.Civilians used their mobile phones or computers to access online social networks where they could discuss and plan tactics for the revolution, and disseminate messages and photos of what was occurring. During the anti-Mubarak protests, an Egyptian activist put it succinctly in a tweet: â€Å"we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world† (Hussain, 2012). In the ‘Jasmine Revolution’, the role of mobile phones was integral in both sharing and receiving information. The phone acted as a tool which aided in the extension of offline networks into online.Now, civilians did not need to be face to face to communicate messages of discontent or plans for rebellion as they had mobile networks. The ability to message many people at one ti me of access their Facebook or Twitter from their phone was invaluable to the rebels. Reporters without Borders stated that â€Å"the role of cell phones also proved crucial [in Tunisia]. Citizen journalists kept file-sharing websites supplied with photos and videos, and fed images to streaming websites† (Reporters without Borders, 2011).It was not just the vast communication abilities that aided citizens in the revolt, but by putting cameras in the hands of a plethora of Tunisians they became citizen journalists with the ability to show what was happening to them to the world. The ability for citizens to take part in news is very valuable as this was a time where all media broadcast institutions were state run. The great difference between what was being reported about through the citizens versus the state allowed those uprisings to share their side of the story.Government censorship was a huge problem in both Tunisia and Egypt, but censorship â€Å"made the new media more relevant† (Khondker, 2011). Social media was very useful for the citizens as it â€Å"brought the narrative of successful social protest across multiple, previously closed, media regimes† (Hussain, 2012). It was due to the mobile phone and heavy proliferation of online social networks that citizens could show proof of the injustices that were occurring through photo and video documentation on an international scale.In addition, communicating online was very effective for civilians since they could plan out offline protests with a mass audience. As stated, the internet blurs geographical boundaries, which allows revolutionary leaders and advocates to find each other and communicate online. Social networks such as Facebook and Twitter provided citizens with a platform to discuss plans of action and reach mass audiences. The ability to reach so many people online was essential since â€Å"information and communication networks can serve as powerful accelerators of social transformation† (Stepanova, 2011).Facebook groups such as â€Å"We Are All Khaled Said† enlisted 350,000 members before the 14th of January (Khondker, 2011). This group provided the members with an incomparable medium of communication to anything offline social networks could provide. In addition, other than attempted media blackouts by the governments, communication was rather unlimited online. Activists posted relatively freely, which indicated that â€Å"new information technology has clearly the transformative potential to open up spaces of freedom† (Khondker, 2011).The idea of online spaces as democratic and free draw upon Jurgen Habermas‘ concept of the public sphere. There are integral benefits of the internet in relation to Habermas’ public sphere, such as the vast library of easily accessible information, a new platform for critical political discussion, the blurring of spacial boundaries, and the embracing of new technology. In the Arab Spr ing, the usage of the internet empowered Habermas’ concept of deliberative democracy, which highlights â€Å"the role of open discussion, the importance of citizen participation, and the existence of a well-functioning public sphere† (Gimmler, 23).Habermas holds that deliberative democracy is based â€Å"on a foundation that enables the legitimacy of the constitutional state and civil society to be justified† (Gimmler, 23). He separates the â€Å"constitutional democratic state and its parliamentary and legal institutions, on one side, and the public sphere of civil society and its more direct communication and discursive foundations, on the other† (Gimmler 24). The opposition between the corrupt governments and civilians was represented on online social networks.Civilians used social networks as spaces of deliberative democracy, which acted as an online public sphere. Henry Brady states that â€Å"meaningful democratic participation requires that the vo ices of citizens in politics be clear, loud, and equal† (Hindeman, 6), online social networks give power to those voices that are silenced by state regulations. The fact that â€Å"information technologies have opened up new paths to democratization and the entrenchment of civil society in many Arab countries† (Hussain, 2012) attests to their function as a public sphere.Though there were effective offline social networks such as the Church, family, and friends, â€Å"the networks of people who did mobilize, did so with the direct application, initiation, and coordination, of digital media tools† (Hussain, 2012). Online social networks acted as extensions of offline networks that were already present, but also provided the opportunity to reach a much larger amount of people. The plans and decisions made on the online networks made the offline protests so successful. Virtual networks materialized before street protest networks† (Hussain, 2012), which shows th e importance of online social networks. In the uprisings in Tunisia and Egypt, there was no single social network that was completely responsible for the success of the revolution. Instead, it was the combination of mobile phones, the internet, and traditional broadcast media which aided citizens in forming powerful networks which strengthened their cause. Castells defines a network society as â€Å"a society whose social structure is made of networks powered by microelectronics-based information and communication technologies.By social structure, [he] understands the organizational arrangements of humans in relations of experience and power expressed in meaningful communication coded by culture† (Castells, 2004). This definition accurately describes the atmosphere in both Tunisia and Egypt during their revolutions due to the reliance on online social networks. In both Tunisia and Egypt, there was a manifestation of technology which aided citizens in communicating. Social net working sites, instantaneous internet, and always-available mobile phones created a powerful network which allowed citizens to always be connected to each other.Some degree of formal organizational and informal networks is necessary for revolution in order to communicate and plan. Egyptians utilized heavy social media connectivity through the use of the mobile device via texting of internet through their phone rather than personal computer. One Egyptian citizen tweeted on January 26th, 2011 â€Å"You who have Twitter and Facebook working on your phone, use them to spread words of hope. We won’t let this end here #jan25 was just the start† (Boyd, 2011).Citizens were encouraging each other to avoid traditional forms of communications via the internet to avoid government censorship and interference. Castells stated that â€Å"thus was born a new system of mass communication built like a mix between an interactive television, internet, radio and mobile communication syste ms. The communication of the future is already used by the revolutions of the present† (Castells, 2011, emphasis on the original) when describing the use of technologies in the Arab Spring. The issue of censorship posed a large barricade on the protesters due to their reliance on social networks and the internet.The Ben Ali regime realized the importance of Facebook in early January 2011 and stepped up their censorship with attempts to curb the heavy distribution of photos of protests and repression. There was increasing interest from the foreign media due to the power of ICT’s in spreading the story worldwide, which also influenced the state to up online censorship. The head of the Agencie Tunisienne d’Internet (ATI) said â€Å"the number of websites blocked by the authorities doubled in just a few weeks. More than 100 Facebook pages about the Sidi Bouzid events were blocked, along with online articles about the unrest in foreign media†¦ olice also hacked into Facebook accounts to steal activists passwords and infiltrate networks of citizen-journalists† (Reporters Without Borders, 2011) . It was the power of networks which allowed the citizens to overcome the censorship of the government. Due to the many options of communications devices, when one was blocked citizens would resort to another. In addition, citizens found ways around the internet blockage and activist hacker groups rebutted with hacks on government websites and found technical ways to pass on news and demands from inside Tunisia.The positive role of technology within the uprisings in Tunisia and Egypt cannot be disputed. Although, such heavy use of technology caused the corrupt governments to attempt to intervene, the positives far outweigh the negatives. Information and communications technologies allowed oppressed citizens to rise above the government through the power of mobility, networks, and information. The portability of the cell phones partnered with the creation of networks through the multiple technologies utilized allowed the voice of the citizens to be heard worldwide.The positive effect these technologies had in empowering the both the Tunisians and the Egyptians is clear in the mere rapidity that they overthrew their corrupt governments once they started revolting. In addition, it is clear that these ICT’s had a large effect since the government responded so harshly towards them, clearly feeling threatened. Overall, it is evident that ICT’s played a large role in the effective and swift revolutions which started the domino effect of the Arab Spring. *Copy Right- Nobody has permission to use my work in their own academic research*