Wednesday, September 2, 2020

Meaning of Life Essay Example for Free

Which means of Life Essay Personhood Chart This diagram contains a matrix for various philosophical anthropologies that answer the topic of personhood. Complete the accompanying outline with regards to characterizing being human as indicated by Christianity, Materialism, and your very own View. Allude to the alloted perusing for clarification of qualities recorded on the left. Christianity Materialism Personal View Relational God made individuals to live in network. At the point when individuals lose that feeling of affection and having a place, they lose their significance and reason throughout everyday life. God made family and the neighbor to be give the human the relationship required for expectation and mending. So as to complete creation and trade, individuals need to go into unmistakable social relations, most in a general sense creation relations. Associations with others ought to be dependent on the materials in which they can give you the advantage an individual the most. I accept everybody ventures into our lives for some explanation either positive or negative and we should be the ones to separate between the two. Every relationship gives us a feeling of affection and comprehension on the motivation behind our life. Multidimensional There is a dynamic feeling of the individual in relationship to God and the world through the real faculties and capacities. The body, soul, psyche, soul and even the different body parts are articulations of the completeness that is simply the human. People are material articles. They are not unimportant things, or items, or substances; neither do they contain as parts insignificant selves or spirits or entelechies. Their parts are material: fragile living creature and bones and blood, particles, iotas, electrons. A human is in excess of a body. We are multidimensional and each measurement is significant in what our identity is and how we act in the public eye. Â © 2015. Great Canyon University. All Rights Reserved. Sexual Jesus gave us that we are sexual creatures. Sexuality envelops the physical, passionate and profound parts of our being. Man and ladies should remain dedicated to one another and not submit infidelity. It is accepted to be a physical demonstration between two people that makes vitality and may bring about the production of a youngster through logical methods. Sexual conduct influences a person’s physical wellbeing as well as mental self view, relational connections and relationship with God and others. Moral We ought to decide to act dependent on great reasoning, Scripture and supplication, and the Holy Spirit causes us recognize the correct other options. God realizes we will probably satisfy him and want the best good results for all. The cerebrum and body are a unique framework communicating with the earth. There is no non-physical substance which could assume praise or fault for the result of our activities. We become familiar with our ethics through experimentation just as through the connections we have with others. In the event that we encircle ourselves with morally people we too with be moral. Mortal We are humans, however God has given us everlasting life in Jesus Christ. We bite the dust, but then we live. Helpless stewardship of the existence God has given us may well worsen the passing and rot that encompass us In request for individuals to endure and proceed with presence from age to age, it is important for them to deliver and imitate the material prerequisites of life Mortality is unavoidable yet troublesome. When somebody passes on their spirit will either go to Heaven or to Hell. Bound for Eternal Life Destined for interminable life: Eternal life is the existence one lives in the afterlife. By death the spirit is isolated from the body, however in the restoration God will give ethical life to our body, changed by get-together with our spirit There is nothing of the sort as unceasing life. Life starts when the heart begins pulsating and finishes with the heart quits thumping. I accept that the individuals who accept will carry on with an everlasting life and that the individuals who don't won't. 2 References Plantinga, Alvin. (2010) Materialism and Christian Belief. Recovered from http://www. andrewmbailey. com/ap/Materialism_Christian_Belief. pdf Shelly, J. , Miller, A. (2006). Called to mind: A Christian perspective for nursing (second ed. ). Killjoys Grove, Ill. : IVP Academic/Intervarsity Press.

Saturday, August 22, 2020

The Effectiveness of Public Relations and Relationship Marketing to the Successful Promotion of Winbeldon Championships

The world has encountered sensational changes in the manner business is led and furthermore in the manner data on a specific occasion, event or item is spread. The world has likewise experienced extraordinary mechanical headways that have given individuals simple availability to data on nearly everything that an individual might be keen on (Waters, Tindall and Morton 2010).Advertising We will compose a custom paper test on The Effectiveness of Public Relations and Relationship Marketing to the Successful Promotion of Winbeldon Championships explicitly for you for just $16.05 $11/page Learn More This, along with the dynamic power of progress that continually face business world, has prompted the requirement for another methodology in the manner a business substance does its exercises so as to have a fruitful deals battle for its items. One way that organizations have reacted to the adjustments in the business world is through the expansion in open connection exercises which target ele vating the items to the objective markets by taking part in what is esteemed by the objective clients. In advertising, a business intends to accomplish the goal of making a positive connection between its clients, the item and the association itself through different methods for correspondence (Strã ¶mbã ¤ck, Mitrook and Kiousis 2010). It is additionally planned for making a decent picture for the association, dealing with any emergency that may confront an organization or its item and furthermore making generosity in the eye of the overall population. A business can likewise make a trade framework between colleagues and itself with the point of accomplishing shared advantage for the two sides of the deal. This is alluded to as the relationship promoting and is planned for accomplishing the goal of making client faithfulness for items offered by the organization, cooperation between the organization and the market it serves, and the maintenance of the piece of the overall industry told by the organization (Botan and Taylor 2004). This goal is reachable through the arrangement of pertinent data to the clients on the items offered by the organization and bolster data about the correct utilization of such items. This can make a pool of rehash clients, who are happy to see the accomplishment of the organization through the arrangement of applicable data on advertise necessities and referrals. PR as a corporate movement has been affected vigorously by the headway of innovation. With work stations being able to get data, alter such data and furthermore to send data, another way to deal with PR exercises is unavoidable. Matters have been confounded by the way that data on different exercises, items, and the business as a rule is currently accessible in the information banks over the web (Grunig 2006).Advertising Looking for article on business financial aspects? How about we check whether we can support you! Get your first paper with 15% OFF Learn More The headway of innovation particularly in the correspondence division has likewise influenced the lifestyle of social orders other than making another pool of chances for business associations. One of the open doors introduced to PR exercises is the capacity to deliver customized data that focus on a particular market specialty. Criticism from the market is currently conceivable and the evaluation of the viability of the advertising exercises is presently conceivable. Different hypotheses have been proposed to clarify advertising. One of such speculations is the even methodology which utilizes the idea of four models. As per this methodology, the principle target of the advertising is to advocate the enthusiasm of the association that supports open connection exercises. This is conversely with the uneven model proposed early which see advertising as an idea planned for advancing the interests of both the association and the overall population. The perspectives on the symmetric methodology are c onsidered unreasonable, yet additionally hopeful since by employing open connection specialists, an organization focuses on the advancement of its inclinations as opposed to attempting to advance the impression of an ideal association so as to win the enthusiasm of the partners outside the association, who may have various perspectives other than those held by the association. Advertising are viewed as dependent on morals (Health 2006). Be that as it may, the subject of support of morals in term of fiscal comes back to the association emerges. Another way of thinking that has been progressed to conceptualize advertising is the talk hypothesis. The hypothesis gives talk discourse as the procedure through which impact and ends can be found. As indicated by Hung (2009), this can be accomplished in two different ways; one of the ways includes commitment of gatherings in return of proclamations and counter explanations on the items offered, open arrangements and the administrations with a perspective on surveying the manner in which each gathering view esteems and real factors. In this exchange, the PR experts and the customers take part in powerful talk (Roper, 2005). Talk hypothesis on advertising and the symmetric hypothesis concur on the way that morals ought to be polished on a level ground. It additionally underpins the perspectives on the uneven hypothesis on the declaration of the possibility that open arrangements and thoughts should remain in the commercial center on their own dependent on merit. Notwithstanding, this view by the proponents’ talk approach is reprimanded by open connection pundits who contend that the method of reasoning proposed by the talk hypothesis neglects to make advertising progressively moral, except if there is equivalent appropriation of assets to the included public.Advertising We will compose a custom paper test on The Effectiveness of Public Relations and Relationship Marketing to the Successful Promotion of Winbeldon C hampionships explicitly for you for just $16.05 $11/page Learn More The social way to deal with advertising additionally attempts to clarify the jobs of the advertising to the association (Li and Bernoff 2008). This methodology takes an association and the general public everywhere into point of view and effectively gives the genuine significance to advertising. This hypothesis considers the relationship that exists between associations that finance the advertising exercises, and the general population through which an association means to advance its items, in which receptiveness, productivity, collaboration, duty and believability are upgraded (Sweetser and Metzgar 2007). This methodology neglects to contrast and the other two in as much as the principle perspective on the idea of the relationship is concerned. For this situation, the relationship by and large may not be even. The administration of relationship is viewed as instrumental instead of a methodology towards advertising action. It is viewed as the progression of altruism in advertising. Wimbledon Championship attracts extraordinary intrigue the wearing scene. The occasion which was organized in 2011 was viewed as critical given the way that it was the zenith of the improvement of the Wimbledon tennis yard which had begun in 1993. This universal game has a rich history that goes in 1977. The principal occasion highlighted the England tennis croquet club which was begun in Wimbledon as a private association in 1865. At first, the occasion highlighted members from England, however later turned into a universal occasion drawing in members from to the extent the United States of America. The enthusiasm to take part in this occasion in 1954 was helped by the progression of air travel innovation which made it simpler for the worldwide players to partake in the occasion without any problem. Anyway the support stayed shut to most nations until 1968 when it was opened for various classes of global players. The motivation behind why the grass social club was shut down for significant improvement was to improve future support and to arrive at the norms suggested by the global games associations. The 2011 occasion likewise included remembrance of a long time since the beginning of the occasion. The Wimbledon title had different partners that incorporated the social club individuals, volunteers, the executives, press and the social club staffs. Then again, the occasion pulled in outside partners that included worldwide players, organizations, overall population and observers from everywhere throughout the world.Advertising Searching for article on business financial aspects? We should check whether we can support you! Get your first paper with 15% OFF Find out More The investigation of the methodologies utilized by the inside partners uncovers various significant components. To start with, there was the definition of goals which planned for keeping these partners concentrated on the work. This empowered the staffs to focus on the objectives that had been set for them. There was the foundation of three sorts of expert projects with the end goal of advancement by the association the executives for staff individuals, the board and different members in the readiness of the occasion (Hallahan 2009). The point of this advancement was to make eagerness among every inward partner on what they were doing. A few projects presented were site based, while others were offered disconnected and furthermore through courses and gatherings on improvement. Another key administration instrument utilized by the Wimbledon title the executives board of trustees included the adjusting of representatives in all divisions engaged with the arrangement of the Wimbledon oc casion (Kim, 2011). There were connections among directors and representatives, just as members and volunteers over the span of execution of work or through casual gatherings where little gatherings of representatives would be welcome to join in. The point of this was to improve the relationship that existed between the board, workers and volunteers. It additionally assisted with improving the procedure t

Friday, August 21, 2020

Professional Development IP 5 Research Paper Example | Topics and Well Written Essays - 1000 words

Proficient Development IP 5 - Research Paper Example From the three qualities, you would likewise pick one of the qualities that you expand increasingly about from your past work environment, and it ought to be identified with the present position that you are looking for. While responding to such an inquiry you ought to exhibit an elevated level; of certainty to persuade the board that you are the most-reasonable up-and-comer and that you merit that activity (Stein, 2003). Another inquiry that you ought to be set up to answer is the reason you would wish to leave your present work environment? The reaction to this inquiry ought to be extremely short. The respondent ought not make a poor image of the past work and show that the move was an individual choice. Genuineness assumes a significant job since your new business can contact your past work environment. Sometimes, the respondent can likewise be asked of the compensation he/she expects.it is significant that the respondent has data about the market estimation of the objective position. The respondent can cite the compensation got in the past work environment and give a figure inside a similar range whenever chose. If not expressed in the notice, you can cite a compensation that is up to 20% higher. Now and again, the topic of abilities may emerge. Because of the continually changing business sector the key factors that ought to be clear in the appropriate response ought to incorporate adaptability that will permit moving starting with one the predetermined obligations then onto the next or starting with one group then onto the next. Versatility is key here where you should be capable fit to another condition and work in numerous offices inside the organization. The interviewee ought to likewise exhibit high critical thinking aptitudes in order to have the option to explain rising difficulties over the span of obligation. The capacity and eagerness to learn ought to likewise be brought out as representatives will be required to go to workshops and classes regularly. A few questioners may get some information about your past achievements. In such an inquiry, you would give the most-testing conditions that you experienced in

Thursday, June 4, 2020

Theories of Portfolio Diversification Research Paper - 2750 Words

Portfolio Diversification and the Reduction of Risk (Research Paper Sample) Content: Portfolio Diversification and the Reduction of RiskName:Instructor:Theories of Portfolio Diversification and the Reduction of RiskThis paper seeks to explain the various theories of portfolio diversification as well as reduction of risk. An investment is made with the intention of earning periodic and terminal returns. However, it is not always the case due to uncertainties in various industries. Portfolios theory comprise of modern and traditional theories. Cowles.econ.yale.edu, (2015). says that the aim of investors and investment banks in having a portfolio of investment is to diversify risk. Portfolio management seeks to have an optimal combination of assets. It involves securities selection, feasible security construction and determination of the appropriate weight of the different classes of asset making up the combination. The objectives of portfolio management include facilitation of planning of the investorà ¢Ã¢â€š ¬s income, achievement of capital growth th rough reinvestment, securing the investments and maintaining liquidity of the investor. It also includes diversification purposes that is reducing risks and obtaining a favourable tax status. Phases of portfolio management comprises of five phases. They comprise of security analysis, portfolio analysis, portfolio selection, portfolio revision and portfolio evaluation. Security analysis involves examination of each type and security class in a portfolio such risk and returns, Cowles.econ.yale.edu, (2015).The pricing of an asset is important aspect of this analysis to determine those that are underpriced or overpriced. Technical and fundamental analysis is critical in this phase. Technical analysis evaluates the share movement while the fundamental analysis evaluates the company factors such as market share and earnings per share. Portfolio analysis involves combining the identified desirable securities into a portfolio. Cowles.econ.yale.edu, (2015). says that the portfolio selection phase involves seeking the most efficient portfolio by selecting the portfolio with the highest return. Portfolio revision involves changing the portfolio as a result in the changes in the financial market due to their dynamic nature. These changes include sale of some securities which are not performing as per the expectation and buying new securities which have been analyzed and found to be performing well. Care must be taken while carrying out portfolio revision. Portfolio evaluation is done through quantitative measurement of return and return of the chosen portfolio, (Alphatheory.com, (2015).A portfolio describes the various forms of assets in which an individual or an entity invests. There exists in the market in which one makes an investment. Risk is the chances that an investment will not give the expected output. The causes of these deviations from the actual or expected returns are the risks. Some risks are controllable are controllable while others are not. Risks may be s ystematic or unsystematic. Some risks affect certain industry or certain assets of investment. Alphatheory.com, (2015). says that Diversification seeks to control unsystematic through investing in a variety or combination of assets. Diversification and hedging are used to manage risks that investment face. The portfolio may comprise of assets such as bonds, futures, forwards, shares and swaps among others.Alphatheory.com, (2015). indicates that the role of portfolio theory seeks to maximize returns by minimizing risks. It was developed as a guideline to investor on the various methods of selecting the right mix of portfolio by making the right analysis of risks. Diversifiable risks can be mitigated through diversification of assets. It is also referred to as unsystematic risks. Systematic risks cannot be reduced since they affect the entire economy in which all industries operate. Traditional portfolio theory seeks to encourage diversification by investment in variety of assets. Th ere is a certain level of investment in which the risks cannot decrease any more. The traditional approach uses a non-quantitative approach. It is meant to minimize risks through investment in different classes of asset of different companies operating in different industries. This ensures that there is little correlation between the classes of asset an investor chooses to invest in. Under the traditional portfolio theory they emphasize on characteristic of the investor, objectives of the portfolio, strategy of the investment and individual investment selection. The investor characteristics comprise of age, purpose of the income, liquidity and risk altitude as well as status of the taxation system. The objectives of the portfolio include investorsà ¢Ã¢â€š ¬ wealth maximization. The investments with higher risks are considered to have higher returns. The strategy of investment includes achieving and maintaining liquidity, finding a balance between transaction costs and capital gains and determining balance between equities and fixed interest securities. Diversification is meant to minimize risks. Individual investment selection involves seeking expert advice on the right portfolio mix to invest in. technical analysis uses share price to estimate the value of return in a portfolio, Aase, K. K. (January 01, 1984).The modern portfolio theory was developed in 1950 by harry Markowitz. It s also referred to as Markowitz model and optimization of risk and return. Markowitz described as father of the modern portfolio theory indicates that diversification can be used for risk reduction and returns are a function of expected risk. He explained that investors can only concern themselves with risk and returns when analyzing assets to invest in. the investor are more concerned with the overall risk of the portfolio rather than the risk of an individual asset. Risk is the variability of expected returns. Low risks portfolio are those that the actual returns are fairly stabl e. Those with high rate of fluctuations are considered to be highly risky. The modern portfolio theory uses statistical techniques in selection and balancing of assets to be invested in. coefficient calculation are used to determine the riskiness of the portfolio. (Matuszak, 2015) says that the difference between modern portfolio theory and the traditional theory since the modern theory achieves risk reduction through quantitative methods. The modern theory main objective is to ensure the right and efficient portfolio is achieved. An efficient portfolio is one which gives back the highest returns. An efficient and optimal portfolio enables profit maximization. An optimal portfolio is based on an investorà ¢Ã¢â€š ¬s tolerance to risk and which gives him the highest yields. An efficient frontier is a portfolio that balances risks with return. Markowitz work on portfolio theory was build up by James Tobin who added the risk free assets in 1958.he led to the development of the market security line and super efficient portfolios. The capital pricing model was coined by Sharpe in 1964 as well as brought about the asset beta. The CAPM states that market portfolios should be held at the risk free asset.The major assumption of the modern portfolio theory is that investors are risk averse. They are not risk takers and will prefer a portfolio with the lowest risk unless he accepts higher returns from the portfolio. Risk is determined through the use of standard deviation. The two mutual fund theorem is used in the portfolio analysis. It applies the efficient frontier concept in a mutual fund investment, Aase, K. K. (January 01, 1984). A risk free asset is one which whose payment rate are risk free based. Government securities are considered as risk free since the probability of government default in payment is very low and is usually fixed. However due to this low risk nature they usually pay with a low rate of return. Government securities comprise of treasury bills, and bonds.The modern portfolio theory makes certain assumptions regarding the investors and the market. They comprise of the following. The interest of the investors is on optimizing the mean-variance. There is normal distribution of asset returns is also assumed. Other assumptions include the correlations will remain constant and forever, the main aim of investors is to maximize their economic utility through the efficient market hypothesis, there is risk averseness and rationality among investors, there is information asymmetry in the market, there exist no transactions costs and taxes, investors tend to be price takers, securities are divisible into parcels and risk and returns are constant and are known in advance. An extension has been made to the modern portfolio theory giving rise to the post modern portfolio. It makes use of mean variance analysis. All these theories assist investors in diversification of their portfolios, Aase, K. K. (January 01, 1984).Variations in return s are caused by some factors known as elements of risks. Risks may be systematic or unsystematic. Combined they form the total risk to a portfolio. Systematic risk arises from economic changes. During depression the stock prices decline as the companyà ¢Ã¢â€š ¬s profits decrease. The companyà ¢Ã¢â€š ¬s stock price rises during the boom as a result of increased profit and better performance.thr system risk comprise of the interest rate, market and purchasing power risks, Aase, K. K. (January 01, 1984).The interest rate risks arise from changes in the interest rates of debt securities. Most securities have a fixed interest rate. There is an inverse relationship between price and the rate of interest prevailing in the market. The purchasing power risk occurs due to the rate of inflation prevailing in the economy. The higher the inflation rate in a given economy the lower the purchasing power. During high inflation period bonds and fixed income securities are not desirable...

Sunday, May 17, 2020

Invention Funding How Inventors Raise Money

Before you get to market and sell your  new invention, youll likely need to raise some capital in order to fund the production, packaging, storage, shipment, and marketing costs for your product, which you can do through a variety of means including acquiring investors, taking out business loans, or applying to governmental and grant programs.   Although you can make a personal investment on your own invention, its often difficult to earn enough money to get a product off the ground—especially since most people find it hard to even cover base living expenses—so its imperative that you are able to seek financial help from investors, loans, grants, and governmental innovation programs. New inventors hoping to acquire lucrative business partnerships should always conduct themselves in an appropriate businesslike manner—an e-mail inquiry asking for financial support penned in an informal manner (full of grammar and spelling errors, etc.) will likely yield no response, but a professional e-mail, letter, or phone call will likely at least get a response. For more help getting your invention off the ground, you could also join a  local inventors  group to learn from those in your area who have already successfully created, marketed, and sold their own inventions—after raising money, finding backers, and getting a  patent  themselves. Find Grants, Loans, and Government Programs Many branches of the government give grants and loans to fund research and the development of inventions; however, these grants are often very specific as to what type of funding is given and what inventions can apply for federal aid. For example, the U.S. Department of Energy offers grants for the development of inventions that benefit the environment or can save energy while the U.S. Department of Small Business offers small business loans to get new companies off the ground. In either case, getting a grant or loan will require footwork, research, and a lengthy application process on your part. Additionally, you could apply for several  student innovation programs  and competitions where students can win prizes or a scholarship to pursue their inventions. There is even special  Canadian invention funding  available, which provides research money, grants, awards, venture capital, support groups, and Canadian government patent offices specifically geared toward Canadian citizens (and residents). Find an Investor: Venture Capital and Angel Investors Venture capital or VC is funding invested,  or available for investment, in an enterprise such as bringing an invention  that can be profitable (along with the possibility of loss) to an investor and the marketplace. Traditionally, venture capital is part of the second or third stage of financing for a business startup, which starts with the entrepreneur (inventor) putting their own available funding into a shoestring operation. Becoming an entrepreneur  is quite an undertaking as youll need to manufacture, market, advertise and distribute your own invention or  intellectual property. During the initial stage of financing, youll need to draft a  business plan  and invest your own capital into the product, then pitch your idea to the venture capitalists or angel investors who might want to invest. An angel investor or venture capitalist may be convinced to contribute funding. Generally, an angel investor is someone with spare funds that have some personal (family) or industry-related interest. Angel investors are sometimes said to invest emotional money, while venture capitalists are said to invest logical money—both are willing to help give the new enterprise a more solid footing. Once you secure financing, you will likely have to report back to these investors throughout the fiscal quarter and year to update your backers on how well their investment is doing. Although most small businesses are expected to lose money in the first one to five years, youll want to remain professional and positive (and realistic) about your earnings projections to keep your investors happy.

Wednesday, May 6, 2020

Fate and Free Will in Romeo and Juliet - 1546 Words

CONSIDER THE ROLE OF FATE AND FREE-WILL IN THE PLAY It might seem at first glance that the role of fate in the play is crucial to its outcome. Certainly many of the characters blame fate/destiny for what happens to them, and the language of the play does at times encourage the audience to view the events as dominated by fate. Romeo for example describes himself as fortunes fool, and the prologue seems to follow his judgement in its pronunciation of the couple as a pair of star crossd lovers. The play is full of ominous lines which take various forms. Firstly, there is the kind of comment by the speaker that all is not well, such as in Act 1, Scene 4 when Romeo and Mercutio discuss Romeos dream in which he has had a premonition that†¦show more content†¦Clearly it isnt either Romeo or Juliets, but its hardly fate either – the feud is created by human rather than supernatural forces. Right from the beginning of the play, when a quarrel between servants develop into a full-blown fight, we see how volatile the situation is , and its hardly comes as a surprise to us therefore that, later on, the quarrels become more violent and lead to the deaths of Tybalt and Mercutio. The older generation arent exactly good role models in terms of accepting responsbility for their own actions: old Montague and Capulet blame each other for their petty feud, the Nurse enthusiastically tries to be the orchestrator of Juliets life, and even the well-intentioned Friar comes up with his meddling and grand schemes for unity mainly out of desperation, and which we feel were thus bound to go wrong at some point. It is significant in this respect that, at the end, old Montague and Capulet do finally take on board their own responsibility in having set the tragedy in motion, with even the Prince admitting that he turned a blind eye to (winking at) the discords of the two families – social harmony is restored only when personal responsibility is accepted and that the play ends of this note suggests that it is a central th eme of the play. Much of the plot does hang on some rather implausible coincidences, and these have often been argued to lend substance to the belief thatShow MoreRelatedRomeo and Juliet Fate or Free Will797 Words   |  4 PagesRomeo and Juliet, Fate or Free will? The story of Romeo and Juliet is a tragic tale of love and hate. The story ends in conflict and controversy because of their families and other outside forces in which fate was a factor. The Star Crossed Lovers death was caused by free will and blinding love, this was a significant turning point in the book because Romeo was banished. As the story goes on characters such as Tybalt and Mercutio set off a spin of events eventually ending in the death of theRead MoreEssay about Romeo and Juliet Fate or Free Will852 Words   |  4 PagesApril 2012 Romeo and Juliet: Fate or Free Will? In Shakespearse’s classic play The Tragedy of Romeo and Juliet, the two star-crossed lovers created one of the most notorious tragedies known to man. Romeo and Juliet met as an act of a single force known as fate. Fate is the idea used to describe a circumstance when it is meant to happen; fate is the living body responsible for controlling everything, except the decisions you personally make. Act I indefinitely demonstrates Romeo and Juliet met asRead More Romeo and Juliet: Fate or Free Will? Essay example543 Words   |  3 PagesRomeo and Juliet: Fate or Free Will? The play Romeo and Juliet was one of the most famous love tragedies ever written. This love story unfortunately had a fatal ending. Many people argue over why the lovers had died, was it over Free Will or Fate? The death of Romeo and Juliet was partially because of free will. The fact that Romeo and Juliet got married knowing that there was a bitter feud between their families, the Montague and Capulet’s. This feud brought on many problems, such as theRead MoreFate And Free Will : William Shakespeare s Romeo And Juliet1301 Words   |  6 PagesFate has always been of interest to society, and even today, people continue to question whether someone’s life is destined for a certain fate, or if it is shaped by their own free-will. Such thoughts come into play throughout various acts and scenes of Shakespeare s Romeo and Juliet. Shakespeare’s play often strongly suggests that Romeo and Juliet’s relationship is built upon fate and free-will. There are many critics who argue fate is what makes up this play in its entirety due to the variousRead MoreFate vs Free Will- Romeo and Juliet West Side Story Essay892 Words   |  4 PagesCrashing Down When two people are meant to be together, no time is too long† (Anonymous). Romeo and Juliet by William Shakespeare and West Side Story by Arthur Laurents show the pure evils of acting extremely hastily and how it can change the outlook on the future. Romeo and Juliet are two young lovers who were taught to hate one another and who suffer deeply because of the consequences of fate. Romeo and Juliet’s deaths were sure to be tragic as was hinted at early on throughout the play. BothRead MoreFree Romeo And Juliet Essays : Fate Versus Human Errors1412 Words   |  6 PagesNoah Meyer Teruya English 9 Honors 3 May 2015 Fate versus Human Errors in Romeo and Juliet One of Shakespeare’s greatest plays, Romeo and Juliet brings the validity of fate into question. Although Shakespeare wrote himself Romeo and Juliet were, â€Å"A pair of star-cross’d lovers,† (Prologue) more human error than fate lead to their untimely demises. The first factor to take into consideration while observing the complex series of events that led to Romeo’s and Juliet’s deaths is the family feudRead MoreRomeo And Juliet Analysis762 Words   |  4 Pages The fate of Romeo and Juliet in Act 1 is for romeo and juliet to meet and fall in love.Romeo and juliet are supposed to fall in love no matter what because it’s their fate and it’s how it was written to be.In the story on page 828 and 829, romeo and juliet are talking to each other about their feeling and then they kiss.Fate brought them to that kiss it was their destiny to kiss and fall in love. That kiss symboled their love for each other. And then juliet tells her nurse that she loves him andRead MoreFate: The Guiding Force Behind Life in Romeo and Juliet by Shakespeare1160 Words   |  5 PagesA timeless topic--fate and free will--still captivates society today. Fortune cookies, physics, and horoscopes all contribute to the obsession people have with this controversial debate over who manipulates life; fate or free will. No one is sure who really pulls the strings, but everyone has an opinion on the matter. Many famous plays center on this topic, and one such play that features characters’ views on fate and free will is Romeo and Juliet. This legendary play, written by William ShakespeareRead MoreWilliam Shakespeare s Romeo And Juliet773 Words   |  4 Pagesextremely different in Elizabethan England than they are today. In Romeo and Juliet, written by William Shakespeare there are many examples of this concept. In this story, two families, the Montagues, and Capulets have been feuding for many generations. Romeo Montague and Juliet Capulet defied their societal rules and fell in love. This toxic relationship turned out to be the cause of many tragedies, including their own suicides. Romeo and Juliet are so in love, that they are both willing to kill themselvesRead MoreRomeo And Juliet Essay On Fate933 Words   |  4 Pages20th-century American writer, once said that â€Å"We create our fate every day . . . most of the ills we suffer from are directly traceable to our own behavior.†(Miller). Miller is linked a person’s free will to their fate. In Romeo and Juliet, the two main characters have a set fate from the very beginning. The play is about two feuding families, the Montagues, and the Capulets. Juliet is a Capulet and Romeo is a Montague. Juliet and Romeo are two teenagers that decided to get married. Neither of their

Tuesday, May 5, 2020

Report on Information security management

Question: Diascuss about a Report on Information security management for The university of Sanford information security management? Answer: Introduction Risk can be defined as the probability or the chances that the result or the outcome of an investment made would be different from that expected. Thus it becomes important on the part of the business organizations to identify the potential risks that might hamper the process and the outcomes so that appropriate strategies can be implemented for effective risk mitigation which leads to the development of the concept of risk management (Agrawal, 2009). Risk management can be defined as the process that is used by the management of the business organizations to identify, analyze and either accept or mitigate the uncertainty that exist in the decision making process while making any investments. Moreover it is also a process of identifying the risk, assessing the identified risk and prioritizing the risks together while applying the available resources in an economical and coordinated manner. This will in turn be used for minimizing, monitoring and controlling the chances of occurrence o f the risk so that the benefits and opportunities can be reached to the maximum level (Das and Das, 2006). Thus taking into consideration the above aspects the report would emphasize on conducting an information security risk assessment of the University of Sanford and develop a strategy for mitigation of the identified risks. The identified risks would be analyzed with the help of the TVA (Threat, Vulnerability and Asset) together with providing the SLE (Single Loss Expectancy) and ALE (Annualized Loss Expectancy) (Krause, 2006). Analysis of the risks in the context of the Salford University and its results together with TVA analysis and ALE which is presented with the help of the following table: taken as a whole risks within university Threats Vulnerabilities Assets Annualized Loss expectancy () Controls The most important significant risks within a university are loss of information about the student, its details, information about the admission and data. The most important threat is that an intruder is knowing and gaining access of employees computer database. Taking leaving computer on by means of unlocking database (store most important data and information related to student records as well as staffs records) left unattended. Data and information is one of the most important assets in organization or university perspective. Implementation of better security and information management polices Decrease in brand image or reputation of the university A hacker is hacking data and information with the help of implementing of spear phishing and stealing student dissertation or research paper. In addition hacking computer network and taking workforce information. Workers or staffs security ethics Impact on organization brand reputation prevention Decrease in confidentiality related with question paper used for examination The most significant threat is that the students of the university are gaining access to the exam question papers and the outcome is they are getting higher marks at the same time not attending classes which is hampering their career in the long term. This is affecting the reputation of the university as well as the organization which is a cycle in itself. Workers or staffs security ethics University exam papers prevention Risks1 Topics: - The most important significant risks within the university are loss of availability of student data and information which includes loss of data of students admission and their information. Assets Thus from first risk, it can be said that assets of risk are address, name, student records related to admission, research paper as well as status of the undergraduate, graduate students. In addition to it is also identified that university lose their valuable data and information before payment process which impacts on their reputation as well as their brand values. Vulnerability Within the university vulnerability has been identified with the computer administrator is having dreadful security polices and ethics. The employees are leaving their computer logged on which result is in organization losing their effective data and database stored in it. Threats In an organization it is well known that data and information are the most important elements for protecting of any kind of information therefore the threats which have been discovered within an organization are: A hacker can gain access to the data through organizations computer as all records are stored in database related to student data, admission records as well as staffs records are stored, thus taking into the account all this. The university has the authority to access data, modify data, edit data and retrieve data and information from computer system and the threats which can be assumed as that hacker can access all data and record form database. ALE, SLE and ARO It is considered that there are 15,000 students in a university and the total number of students have been multiplied by 1/4taking into the center of attention is that schools are in an university. Aging it multiply by taking into the estimated that approximately number of graduate and undergraduate student will be appearing in the university in next intake. Thus to finding the calculation, an average amount of college tuition fee is multiplied by it and the costs of all graduate and undergraduate student will be identified. Controlling procedure Single Loss Expectancy (SLE)=3,768,884 Annual Rate of Occurrence (ARO)=20% Annualized Loss Expectancy (ALE)=753,777 Control 1 prevention Appointing a security guard within university = 15,000. Therefore it is considered that it decreases the ARO by 75% .thus it is said that hiring of security grads will secure 75%, thus it is a most effective steps. On the other hand it is to be considered that 25% uncertainty ALE1 0.2 X0.25 = 0.05 753,777 x 0.05x 1.25 = 47,111, Reduces ALE by (753,777-47,111) 706,666 Implementation of control 15,000 + 47,111 =62,111 Cost benefit analysis Therefore as per the Cost benefit analysis it is said that control is worth organizing if Annualized Loss Expectancy with control + implementation of cost Annualized Loss Expectancy without control 15,000 + 47,111 =62,111 753,777 Control 2 improvement Backing-up the computer database system in everyday will enhance Information technology service, managers salary by 5% is to be calculated that 38,643X 0.05 = 1,932. Therefore form above calculation it is clear that it will be effective 99% and approximately one percent it is to be contained uncertainty. ALE1 Annual Rate of Occurrence = 0.2 (it is to be considered it remains same) Single Loss Expectancy = 0.1% X 3,768,884 = 376,888 Annualized Loss Expectancy = 376,888 x 0.1 X 0.2 x 1.01 = 7,613 ALE1= 7,613 Thus form calculation is to be observed that it Reduces Annualized Loss Expectancy by 360,275 Implementation of control 1,932 paying information technology service manager to back-up everyday five percentage enhance in salary Cost benefit analysis Therefore according to the Cost benefit analysis it is to be said that control is worth deploying if Annualized Loss Expectancy with control + cost of implementation Annualized Loss Expectancy without control 1,932 + 7,613 = 9545 753,777 Utilize both controls Annualized Loss Expectancy = 376,888 x 0.05x 1.25x1.01 Annualized Loss Expectancy = 22, 791 Therefore from above facts and figures it is to be observed that appointing security guards within the organization will enhance their security performance and cost of the Annualized Loss Expectancy with the control can be observed with less Annualized Loss Expectancy without the control. Moreover utilizing this strategy the organization can improve its performance and solve the problems relating to stealing of data and information from computer because security guard will entertain only those students who have ID cards. Another consideration is that organization need to take cost effective as Annualized Loss Expectancy that will help them to improve and control their costs. On the other hand it is to be said that utilizing this control process organization can migrate the risks in an cost effective manner whole having decreased financial loss. Thus from the above analysis it can be considered that implementing the control procedure 2 organization will manage it cost more effective manner and achieved better profits. Audit An effective plan i.e. internal audit must be attended by the authority in every one week On the other hand it is to be seen that most of the irrelevant information and data to be stored in a university database; thus organization or computer administrator needs to delete such data and then to be again perform restore process. Polices In order to provide an effective solution and implement better security polices within the organization back up polices should be implemented and created. Overview The policy contents will include storage, timing etc. Purpose The main propose of the polices in present case is to order the most efficient back up process that helps them to secure their student admission records and data which helps to organized their valuable in a more organized manner. Scope It will include in information technology service as well as admission departments Definition To backup the most effective and valuable data that helps the organization to archive and attain better security and increase better student satisfaction. Storage In order to store huge amount of data and information, organization needs to implement huge amount of database i.e. external hard disk etc. Testing and age of database Data will be taken through database in 6 pm and age of external database is approximately 5 years. Testing and storage location Data administrator must be insured that data must be stored in particular location. In storage location, it must be ensued that data stored in particular location. Incident responses: (ISO/IEC 27035-1: principles of incident management) Thus as per the above represented issues it is to be said that incident responses team is to be consisted with the help of the information management service department and one of the admission member departments. In addition it must be sure that the incident department has a better knowledge about the data accessing and storing process. In a potential incident is to be said that staffs members have no authority to access and modify the student records without administration permission. On the other hand it is to be also considered that in payment polices, staffs are not involved i.e. staffs members are not to take payment form students. In an initial response it is to be said that, if any students face any difficulties then the admission authority has to be informed. After that ITS members are restore the data and find who is responsible for this at last it is to be said that staffs members should be implement security policies. Rules and compliance Organization needs to implement data protection acts as well as computer misuse acts. Risk 2 Another risk associated with the security of information that has been identified can have a negative influence on the brand image and reputation of the university taken under consideration i.e. the Salford University. It has been observed that in the recent times the case of hacking has increased and thus there is a potential risk that the hackers can attack the system of a lecturer of the university which may result in the loss of the research work of the students which have been stored on the server. So this incident take place, then the students would directly sue the university in the court of law which would hamper its brand image and reputation. So this would have an adverse impact on its business since the number of students who would be joining the university in the succeeding year would decrease. Thus taking into consideration the above risk, the situation can be described as follows: Suppose, number of students = 15,000 (aprox.) and if it is estimated that around 3,000 student take admission for the master degree course in each year. Thus, due to loss of reputation, the university would experience a loss i.e. reduce in the admission = 10%. 3,000*10% = 300 students i.e. number of students taking admission would reduce to 300 from 3,000. Again if it is considered that the average fees that is paid by the students every year = 4,000 Then if the risk event that has been described above occurs then total fees earned by the university = 300*4000 = 1,200,000 Therefore, Single Loss Expectancy (SLE) = 1,200,000 Again if it observed that Annual Rate of Occurrence of the risk event is 40% then it can be said that that the event can take place 2 times within 5 years. Therefore, Annualized Loss Expectancy (ALE) = 1,200,000*40% = 480,000 So, taking into consideration the above figures and aspects, it becomes important on the part of the university to organize various training programs to make the individuals familiar with the practices that need to be followed and the ethics that need to be maintained by the lecturers. The number of trainees i.e. the lecturers = 60 and 20 employees Number of days = 2 Amount spent on each trainee for 2 days training = 600 Again it is expected that the above strategy would be helpful in reducing the Annual rate of Occurrence (ARO) by around 40% and the management is around 90% sure regarding the effectiveness of the above mentioned strategy So the percentage of uncertainty = 10% So, ARO = 40%*0.6 ALE = 1,200,000*(40%*0.6)*1.10 = 316,800 Moreover the cost of implementation of the strategy can be calculated as follows: 600*80 = 48,000 However it is important to analyze the benefit against the cost i.e. if the present ALE + Cost involved in implementing the control is less than the previous ALE, then it can be inferred that the strategy is effective and efficient. Present ALE + Cost = 316,800 + 48,000 = 364,800 Previous ALE = 480,000 So it is observed from the above calculation that the present ALE + cost (364,800) is less than the previous ALE (480,000), thus it can be inferred that the strategy that has been implemented is effective. Audit Again even though the strategy has been proved to be effective in financial terns, it is important on the part of the management of the University to conduct an audit and this would be conducted in two phases. Phase I: A phishing test would be courted to identify whether the lecturers and the employees have efficiently learnt from the training sessions. Phase II: A survey would be conducted with the help of the questionnaire method to evaluate the ethics of the employees in the context of security. Policy Moreover for successful implementation of the above strategy, the university needs to implement certain policies in relation to the maintenance of the ethics. The policy would put forward certain codes of control for the staff members that would guide them in terms of good practices and security that need to be maintained and would also provide provisions for the training sessions. The main purpose of the policy would be to establish such an organizational culture that would promote the consciousness and awareness regarding the security of the information and data. The formulated policy would be applicable for the ITS department of the university, the lecturers and the other individuals who has the right to access the information which are sensitive in nature. The policy would guide the management to organize training programs so the staff members and the lecturers remain updated of the threats related to security and it would be mandatory on the part of the new employees to undergo this training. Moreover the fact that policy is complied within the university would be the responsibility of the ITS department. Response towards the Incident This would be controlled and maintained under the Principles of Incident Management mentioned in the ISO/IEC 27035 1. The team would consist of all the members of the ITS apartment, members from the Board of the University. They would have efficiently trained so that they are capable of identifying the incidences of unauthorized access, malware threats and damage of the IT equipments, abnormal traffic in the server, disability of the protective mechanisms. Moreover they would be responsible for carrying out the following procedures i.e. reviewing the logs f the system, deterring the rights of the individuals towards authorized access to the information, analyzing the impact of identified risk on the university and formulating strategies to mitigate the impact of risk. Risk 3 In addition to the above mentioned risks, it is also possibility that students of the university might gain an access to the exam papers if the papers are being printed in the absence of the lecturer or any staff members or has not been collected immediately after they have been printed. Thus taking into consideration the above scenario, the TVA analysis is as follows: Threat It might happen that the student is present at the time when the exam papers are being printed or it might also happen that the exam papers have been left at the printing house and has not been collected at the right time. So this would allow an access to the exam papers on the part of the student. Vulnerability The vulnerability can be related to the ethics related to staff security. This refers to the lack of responsibility on the part of the staff members to remain physically present at the printing house where the papers are getting printed. On the other hand it might also happen that the staff member lacks the seriousness and thus has left the paper at the printing house instead of the collecting it at the right time. Assets The asset in this particular scenario is the exam papers formulated by the lectures of the University. Thus taking into consideration the above risk, the situation can be described as follows: Suppose the number of pages in the question booklet = 10 pages Cost of printing the paper for each student = 40p Number of students appearing for the exam = 2,000 Total cost incurred = 2000*0.40 = 800 Number papers that would be appeared by each student = 4papers Therefore cost = 800*4 = 3,200 Therefore, SLE = 2000*4*0.40 = 3,200 Again if it is assumed that that probability of occurrence of the event is 400%, thus it can be inferred that the event can occur 4 times in a year. Therefore Average rate of Occurrence (ARO) = 400% There ALE = 3,200*2 = 6,400 Moreover, it becomes important on the part of the management of the University to implement certain control measures in order to avoid the risks. So in this context, the management should emphasize upon printing the papers of the exam on the day on which the exam is going to be conducted rather than printing the papers beforehand. So, if this strategy is implemented, then it is expected that it would reduce the ARO by 380%. Moreover the control would increase to 85% which reveals the fact that there would be an uncertainty of 15%. So it would lead to an increase in Ale BY 15%. Therefore present ALE = 3,200*(4*0.2)*1.15 = 2,944 So in such case it is observed that the ALE id reduced by (6,400-2,944) = 3,456 Again it is also important to take into consideration the control implementation. So if the strategy is implemented then it becomes important on the part of the staff member responsible for the printing of the exam papers to arrive at the University premise at an earlier time than usual. So if it is assumed that if the exams are expected to start by 10 am, the staff members should be present by 7 am. So, in this case if the per hour wage = 7. So in this case if 4 staff members have been appointed and they have to work for 3 hours extra then they have to be paid for that. Therefore hourly wage rate = 7 Total wage for extra 4 hours = (7*4) = 28 Again since there are 4 teachers need to be appointed and the exam would be conducted for 4 days. Therefore extra cost on the part of the University would be = 28*4*4 = 448 Moreover analyzing the benefits of the University against the costs incurred it was observed that present ALE + the cost of control remains less than the previous ALE then the strategy would be considered as effective. Thus, 2,944 + 448 = 3,392 6,400 Therefore the strategy that would be implemented can be considered as effective and efficient. Finally, it is observed that the above mentioned strategy can be implemented for conducting the exam in an efficient manner, the risks involved in the exams include delay in the exam, the exam rescheduling and cancellation and if these risks are not mitigated and controlled and managed then it would add to the cost of the University. So if the above strategy would be implemented then it would enhance the control to 85%. Under this strategy, the students need to be seated for the exam by 9 am and with the help of the strategy implementation; the ARO of the event would also be reduced. Audit On the other hand it is also important that the above formulated stagey need to be audited in order to identify the staff members to identify the number of staff members present at the printing house while the question papers are being printed and the evaluate the time taken to print the question papers. Policy Moreover certain polices need also to be implemented which would put forward certain rules and regulations regarding the conduct of the exam. Moreover it would also emphasize upon ensuring the fact that the exams are conducted efficiently and risks associated can be effetely identified and treated. The policy also puts forward the fact three set of question papers should be prepared by the lecturers and the papers would be printed on the day on which the exam is going to be held. Response towards the Incident Emphasizing upon the response towards the incident it becomes important on the part of the management to follow the principles of incident management as mentioned under ISO/IEC 27035-1. The response team that would be formulating for the implementation of strategy would consists of lecturers and the examiners and the members need to be trained so that they can efficiently manage the risk. The training would be emphasized upon entering into conversation with the students and remarking of the booklets. The potential incident would include news among the students regarding the leakage of the question papers, the time taken to complete the exam by the students. Section 2 Critical Analysis of the Strategies impel meted From the above assignment, it can be inferred that there are various risks related to information security that the Salford University can encounter while conducting its operations of providing high quality education to the students. So it becomes important on the part of the University to identify the risks efficiently and formulate strategies so that the identified risks can be mitigated and controlled and managed in an effective and efficient manner. From the above it has been observed there is high chances that the University can lose the data of the students who have taken admission in the University for the study. The critical analysis of the incident reveals the fact that this type of incident is expected to occur in the University mainly because of the bad security ethic on the part of the staff members involved in maintaining the record for admission applications and they also lack the seriousness of shutting their machines down while leaving their place which in turn may re sult in the loss of the data. In this context, it has been observed that the university is planning to employ a security guard together with making provisions for keeping backup of the data on a daily basis by increasing the salary of the ITS service managers and getting the work done by them. So in this context, the review analysis puts forward the fact that both the strategies taken into consideration would be beneficial for the University since the cost benefit analysis reveals the same. But again the most important point is to not that which strategy would be more profitable and would incur low cost. In such situation critical analysis reveals that the increasing the salary of the managers and keeping the data backup on a daily basis would be more profitable since it is considered as cost effective and would provide great benefits. In this situation the University would have to take into consideration the legal aspects, the ethical aspects while implementing the strategy. The et hical aspect would be like whether it would be ethical on the part of the part of the University to get more work done by the managers by paying them more i.e. increasing their time of work and whether the managers can be relied upon that they would not make any mistakes like the staff members of the admission cell. On the other hand the legal aspects would include factor like the University have to operate under the legislations like the Data Protection Act and the Act under which authority can be given to some members on the University to have an access to the relevant information (Determann, 2012). On the other hand, another risk that would be faced by the University would be risk of hackers which would lead to the leakage of the research papers of the students. So for this they need to implement some security systems and the lecturers and the staff members need to be trained so that they become proficient in identifying the risks of hacking and is well familiar with the preventive systems like Firewall. The critical analysis reveals the fact that the training and forcing a team to look into the hacking risks would be an effective strategy since the benefits would be more against the costs. In this context, ethical consideration is that the University cannot maintain a casual approach towards the career of the students since if their papers are hacked then it would spoil the career of the students and thus proper security need to be maintained. On the legal grounds, leakage of the research papers of the students would provide them the right to sue the University to the court of law against maintaining a casual approach towards the storage and the maintenance of the data (Fu et al., 2010). Finally on the other hand the University might also face the risk of the question papers getting leaked before the exam because of the lack of ethics and responsibility on the part of the staff members. So the strategy of printing the question papers on the day of the exam would prove to be effective. Analyzing the situation from the ethical point of view it can be inferred that it would be the lack of ethic son the part of the staff members to not remain present at the printing house when the papers are getting printed or making delay in collecting the papers. Moreover in legal terms it is also not lawful that they maintain such a casual approach towards the examination and the printing of the question papers and they can sued by the students in the court of law (Jori, 2015). Critical Analysis of the hurdles while applying Strategies and Contingences for forming a Culture of Security The risks which are estimated are loss of assets, loss of reputation and loss of duplicity in information. The purpose of this analysis it to mention the policy of the university and the model for operating of information security which implies protection of data so that any individual cannot access it and the security rules are also not broken. The information which is shared has to protect by different means so the goals, objectives and the preferences are secure in nature. The information is the electronic and hardcopy of the stored data and files which are formed through its life process from universitys creation while disposing it correctly. Thus form the above scenario it is to be seen that the organization is suffered from data and information security process (Makulilo, 2012). Thus, form the represented facts and figures is to be said that organization needs to implement better security process as well as back up polices. In addition is to also be observed that some of the st udent faces problems regarding admission fees i.e. when they wants to submit their fees then they found that their records are not available in organization database. Thus form above problem, in polices it is to be said that organization needs to use back up process, better security and also provide an authority to only one man to access their data that will helps them to protect their data and information also. In addition, the most effective barriers of implementing these stagey within the organization is that, if an organization has not better technical staffs then they are not able to implement these strategy within the organization. In addition these strategy change organization process and polices thus is not easy to implement within the organization or university. In addition another barrier financial i.e. price of computer equipment is higher. In addition another barrier of implementation of these strategies is time consuming and unavailability of better trainer because of w ithout better trainer staffs members cannot perform better work. On the other hand it is to be observed that the organization face problems regarding physical, personnel, policies and technical. Thus in order to provide better student satisfaction and better performance organization requires to implement security in their physical devices including in hardware, network and administered security. On the other hand with the help of using better policy and procedure organization improve and achieve better performance as well as reduce their security in an effective and efficient manner. On the other hand it is to be said that organization needs to implement data protection acts and policies. Moreover, better opportunities of implementation of police and security system within the organization are that improve data security and enhance data protection. On the other hand organization protects their confidential information related to student information, and staffs data records. In addit ion reduce threats and make a better brand image i.e. better reputation in market and this will help them to increase number of students. Apart from that, confidential data and information should be kept back more secure and store it in dedicated and practicable storage including file server rather than local computer or local disk that will provide an organization proper level of security related to physical security (Heng, Wright and Goi, 2010). In a university, it is founded that the organization suffer problem related to loss of student records and their thesis or research paper thus implementing cost effective as the Annualized Loss Expectancy process organization improve their existence security in well organized manner. In addition, it is said that password techniques facilities them only one person access their data base thus with the help of using this any staffs members are not be able to access and retrieve student record form database. Therefore it is said that implement ing polices, security in physical as well as software devices and provide better training organization not only increase better revenue, performance and security but also increase better staffs and students satisfaction with better quality of services. Thus from above scenario it is inferred that organization must be implemented above strategy and polices, in order to improve performance and provide better security to their database. Reflective report on the process This assignment is focused upon the university problems related to data and information not available in a proper manner. Therefore, in this assignment I have to learn how data and information is protected within the organization and their also learn their importance in organization perspective. On the other hand, I learn about the IT rules and regulation including data protection laws, Communications Decency Act 1996 (UK) Companies Act 2006, Computer Misuse Act 1990, Consumer Credit Act 1974, UK Consumer Protection Act 1987 (Product Liability) (Modification), Criminal Justice (Terrorism and Conspiracy) Act 1998, Criminal Justice Act 1988, Criminal Justice and Public Order Act 1994 and electronic commerce regulation 2002 (Fafinski, 2009). In addition in this assignment I learned importance of backup system and how it will help the organization. On the other hand, in present assignment I learned about how brand and reputation will affects the organization performance. Apart from that, it is also observed that the data and information that is stored in data base needs to more security. At last I learned importance of firewall system and training system in the organization. In addition form this assignment, I learned how firewall techniques helps the organization and also protect network in an effective and efficient manner. Therefore in this assignment I personally feel that organization should have to implement dual firewall technique process and also need to implement cryptography techniques. On the other hand I suggest that organization needs create their own servers and make their own application program that will help them to secure their data more effective manner. on the other hand I personally suggest that organization or computer administrator need to implement continuous password changing process that helps them to improve their security related to password. Moreover organization needs to implement fragmentation techniques in its database process that facilities them to secure and store data in appropriate manner and also provide better database storage because of fragmentation data will store in an appropriate manner (Huang, MacCallum and Du, 2010). In addition it is to be said that with the help of better monitoring technique organization secure their system in a better ways. Information man agement system helps the organization to secure a d filter data and also makes easier to secure their data in effective manner. In addition it is to be said that data and information of student records are theft then in such situation organization needs to implement proxy server that will helps them to secure and not enter any unwanted data or hackers though network (Sarngadharan and Minimol, 2010). At last it is to be said that organization needs to implement and perform routine scanning process that helps them to identify theft and provide security. In addition in present and technology advance market, it is to be observed that most of hackers are hacking data and information though network i.e. via computer networking. Thus, in this scenario it is to be suggested that with the help of implementation of the patching or intrusion prevention system organization secure their data more secure. On the other hand, in present scenario it is to be observed that organization needs to imple ment disaster recovery process system because in something it is to be seen that if any reason if organization loss their server then they recover their effective data and information through it. Therefore form the above discussion I personally suggest that organization need to implement cloud computing technique and store their effective data in it because in disaster situation organization recovers their effective data and information. References Agrawal, R. (2009). Risk management. Jaipur, India: ABD Publishers. Alexander, P. (2008). Information security. Westport, Conn.: Praeger Security International. Das, S. and Das, S. (2006). Risk management. Singapore: John Wiley Sons. Determann, L. (2012). Determann's field guide to international data privacy law compliance. Cheltenham, UK: Edward Elgar. Fafinski, S. (2009). Computer Misuse. Uffculme: Willan Pub. Fu, Y., Chen, Z., Koru, G. and Gangopadhyay, A. (2010). A privacy protection technique for publishing data mining models and research data. ACM Trans. Manage. Inf. Syst., 1(1), pp.1-20. Heng, S., Wright, R. and Goi, B. (2010). Cryptology and network security. Berlin: Springer. Huang, S., MacCallum, D. and Du, D. (2010). Network security. New York: Springer. Jori, A. (2015). Shaping vs applying data protection law: two core functions of data protection authorities. International Data Privacy Law, 5(2), pp.133-143. Krause, A. (2006). Risk management. Bradford, England: Emerald Group Pub. Makulilo, A. (2012). Privacy and data protection in Africa: a state of the art. International Data Privacy Law, 2(3), pp.163-178. Sarngadharan, M. and Minimol, M. (2010). Management information system. Mumbai [India]: Himalaya Pub. House. Bibliography Catlett, C. (2013).Cloud computing and big data. Amsterdam: IOS Press. Christianson, B. (2002).Security protocols. Berlin: Springer. Czarnecki, K. and Hedin, G. (2013).Software language engineering. Berlin: Springer. Harrington, J. (2005).Network security. Amsterdam: Elsevier. Kambayashi, Y., Mohania, M. and Tjoa, A. (2000).Data warehousing and knowledge discovery. Berlin: Springer. Knipp, E. and Danielyan, E. (2002).Managing Cisco network security. Rockland, MA: Syngress. Kurose, J. and Ross, K. (2008).Computer networking. Boston: Pearson/Addison Wesley. MacKinnon, L. (2012).Data security and security data. Berlin: Springer. Mankell, H. (2002).Firewall. New York: New Press. McNab, A. (2000).Firewall. New York: Pocket Books. Pfleeger, C. (1997).Security in computing. Upper Saddle River, NJ: Prentice Hall PTR. Physical-layer security. (2011).Journal of Communications and Networks, 13(5), pp.545-545. Pineiro, R. (2002).Firewall. New York: Forge. Rowe, S. and Schuh, M. (2005).Computer networking. Upper Saddle River, NJ: Pearson/Prentice Hall. Shinder, D. (2001).Computer networking essentials. Indianapolis, IN: Cisco Press. Sosinsky, B. (2011).Cloud computing bible. Indianapolis, IN: Wiley. Taylor, E. (2011). UK schools, CCTV and the Data Protection Act 1998.Journal of Education Policy, 26(1), pp.1-15. Jayeju-akinsiku, B. (2002). Technology and Electronic Communications Act 2000.Computers Security, 21(7), pp.624-628. Highfield, M. (2000). The Computer Misuse Act 1990: Understanding and Applying the Law.Information Security Technical Report, 5(2), pp.51-59.