Wednesday, October 30, 2019

Racism Still Exists in America Essay Example | Topics and Well Written Essays - 1500 words

Racism Still Exists in America - Essay Example Facts about racism would be well understood among the Americans if it would be considered for what it really is; an institutional ideology, according to CNN which reported that â€Å"racism is like a virus that has mutated into a new form that we don’t recognize†. There is more to racism than personal hatred. It refers to the belief that a group of people, identified by unique biological make up are superior to other groups with different biological make up. The President of Catholic Charities USA, Synder further indicates that racism refers to â€Å"unearned advantage, conferred dominance, and invisible privilege enjoyed by white Americans, to the detriment, burden, and disadvantage of people of color† (8). The superior group would thus be allowed to rule economically and socially over the groups considered to be weaker. The situation has been made worse in America due to the many action plans that have been started in the recent past to fight racism in the country. Since the times of Montgomery Bus Boycott of 1955 to the 1965 Selma March led by Martin Luther King, the relations were assumed to be headed towards improvement. With every move forward, the country appeared to be moving backwards in achieving genuine racial reconciliation. In the 20th Century, racism was mainly between the Blacks and the Whites. However, with the immigration of people from different parts of the world into the country, racism now includes hostility among people from different cultures.... Effects of racism Synder (11) acknowledges that the privileged status of being white did not just happen accidentally. This had been constructed through time, through social policies, procedures and institutions which deliberately developed a system that promoted the white Americans’ welfare while greatly hindering opportunities for people of color. Racism has caused people from other cultures in America to despise their own cultures in favor of Americanism. Alvarez (37) describes her personal experience in America, having emigrated from Dominican Republic where beauty was synonymous with all women. In America, however, beauty was reserved for American girls only. Women from other races would not enjoy what Synders (5) describes as white privileges but would always be socially discriminated due to their different biological traits. This was well demonstrated with the airing of Miss America beauty pageant where Julia Alvarez and her sisters were portrayed to admire being Americ an girls to be considered beautiful. The beauty pageant show presented Americanism as desirable and made people from other races appreciate the American blue eyes and blonde hair while despising their biological traits. Such discrimination in beauty contests enhanced racism in the American society. Among the major indications of racism, or otherwise white privilege include economic advantage which has been reserved for the white Americans through public policy and also through political power over years. Racism results into economic burden and disadvantages people of color. Take for instance the institution of slavery. Slavery was just a means to exploit labor where African slaves would be used to create

Monday, October 28, 2019

Images of Womans Sexuality in Advertisements Essay Example for Free

Images of Womans Sexuality in Advertisements Essay Considering the time an average American spends in front of the TV screen, it is obvious that the things he/she sees there influence greatly his/her perception of the world around. The stereotypes media offers us make a great impact of our perception of people. Thus, its no wonder that the images of womens sexuality in advertisements partly form our gender stereotypes. For to get more information on this issue, I analyzed an article by Christina N. Baker, published in the Sex Roles: A Journal of Research in January 2005. The name of the article is Images of womens sexuality in advertisements: a content analysis of Black- and White-oriented womens and mens magazines. This article analyzes the stereotypes of womens sexuality given in advertisements, the differences of those stereotypes for the White and Black woman. It gives the peculiarities of images created for the representatives of different races, and analyzes the origins and the influence of stereotypes that appear due to the TV and magazine commercials. It has always seemed to me that people in our society share some distorted view of woman and their sexuality. They express the concepts about it that are sometimes totally ridiculous (like that a woman should not express her sexual desires, as it is socially disapproved). Those concepts are very widespread nowadays, and I have been interested for a long time already why people trust those stereotypes, why lots man judge the woman that surround them on the strength of those concepts. Later I understood that the media also have the considerable role on forming the gender stereotypes. Thus I felt I wanted to know more about the specific features of these stereotypes, and, about the mechanism of their functioning. The author developed three hypotheses about the portrayal of woman in media. The first was that sexual women will be portrayed with characteristics such as submissiveness and dependency in both womens and mens mainstream/White-oriented magazines. According to the review of literature the author made, we live in a patriarchal society, where man a considered to be superior to women, thus they put the criteria of sexuality for woman. For man †¦sexual attractiveness in women is associated with physical beauty. A sign of status for a man is to have a physically attractive woman by his side. The more physically attractive a woman is, the more prestige she will bring to her male partner/spouse. The woman portrayed in commercials, and on the pages of the magazines is bound to be submissive, as it is one of the demands of patriarchal society. The author also notes that some of the scientific findings hypothesize that the continuous showing in the media of women as submissive sex objects whose main goal is to satisfy mans desires, reinforces the gender hierarchy existing in the contemporary society. The second hypothesis is that sexual Black women are more likely than sexual White women to be portrayed as dominant and independent. The author noted that despite of the fact that all of the women are more likely to be portrayed as the sexual objects, White woman are seen as the etalon of beauty, thus they are portrayed as the sex objects more frequently than the Black women are. It is also the fact that Black women have always been depicted as dominant towards Black man. It is historically that Black man cant get a decent job, thus Black women often have to bring the bacon home. This is the reason why Black woman are often portrayed as the heads of the families in the advertisements. The author also noted that the two stereotypes that exist about black woman are Mommy – the matriarch of the big family, and the mother that is raising her child by herself. The stereotype also exists in the contemporary society that Black woman usually dont have a husband. The author adds that the Black matriarch is that is portrayed as deviant because she challenges the assumption of the patriarchal family. The third hypothesis is that Black-oriented magazines are more likely than White-oriented magazines to portray sexual women as dominant and independent. The literature review conducted by the author states that despite of the fact that television commercials that targeted Black audiences contained about as many stereotypical images of Blacks as did those directed toward Whites, the Blackoriented magazines portrayed women in more active and even aggressive role. It was also that in the magazines for the Blacks women were more often portrayed in the role of the mother than women in the magazines for the whites. The characteristic feature of the portrayal of woman in the Blackoriented magazines was that there woman were rather shown in an extended families than in nuclear one, which conforms to the matriarch stereotype. The last hypotheses said that black women will be portrayed with physical characteristics that conform to White standards of beauty. However, Black women are more likely to have European features in White-oriented magazines than in Black-oriented magazines. The research showed that nowadays Blackoriented magazines portray women which conform to the White standart of beauty. The color of skin of those woman is dark, but the features are thin, they are slender, and they usually have long and straight hair. In fact, the only phenotypic difference between Caucasian and Afro-American models is the color of skin. Blackoriented magazines dont consider the fact that the features portrayed are not typical for the Black woman, and dont respond to the African canons of beauty. The sexual attractiveness in our society is associated with Whiteness, thus the magazines try to fulfill the desires of their readers. The findings of the articles author coincide with the results of researches conducted by the psychologists, sociologists and psychologists during the last fifty years. For example, Poe, (1976), and Silverstein Silverstein,(1974) found that in most of the TV advertisements woman were less physically active that man were, and they were the recipients of the advice given by man. It confirms the first hypothesis of the articles author, the one which says that women are depicted as submissive to man. The persuasion is that the woman has to be weak for to be attractive.

Saturday, October 26, 2019

Ankle Sprains for the Dancer :: essay papers

Ankle Sprains for the Dancer Ankles are one of the many body parts that have the highest incidence of injury by the performance of dance. Ankle sprains are one of the most common sprains occurring to the dancer. Even though structurally the ankle may be considered a moderately strong joint, it is subject to sudden twists, especially when the dancer steps on some irregular surface. Serious injury occurring to joints or bones result initially from impact forces, with carelessness and fatigue playing a major role. Late in the practice day or just before an opening performance when the dancer is trying most for perfection, seems to be the time when most serious injuries occur. The older the dancer the more susceptible he or she is to serious joint and bone injuries. Many ankle injuries may be directly attributed to dancing on a too hard surface, or a too soft surface. Going to pointe before a dancer is ready can also be detrimental because if proper strength is lacking, sprained ankles can result. The sprain is primarily an injury to the ligamentous supportive structures of a joint. It seldom occurs without affecting muscle tendons crossing the joint. The sprain is categorized into first, second, and third degrees of intensity. The intensity of a sprain is best determined by the extent of the dancer^s disability as well as the tenderness elicited by feel or palpation and the amount of hemorrhage and swelling present. A dancer with a second or third degree sprain must routinely be referred to a physician for x-ray examination and diagnosis, because fracture is commonly associated with a twisted joint. A joint that has lost its ability to function for more than several minutes must be considered to have either a second or a third degree sprain. The highest incidence of injury is to the outside aspect of the ankle and is called inversion sprain of the ankle. This happens when the dancer turns the foot inward, placing an abnormal stretch on the outer ankle ligament. for the dancer with flat feet and/or pronated feet, inside sprains are more common and more serious. Usually a dancer has a high level of flexibility in the ankle region, and it takes a great deal of force to actually cause a sprain. If this force is great enough, ligaments will be torn and even a part of the outer ankle bone may be pulled away. Ankle Sprains for the Dancer :: essay papers Ankle Sprains for the Dancer Ankles are one of the many body parts that have the highest incidence of injury by the performance of dance. Ankle sprains are one of the most common sprains occurring to the dancer. Even though structurally the ankle may be considered a moderately strong joint, it is subject to sudden twists, especially when the dancer steps on some irregular surface. Serious injury occurring to joints or bones result initially from impact forces, with carelessness and fatigue playing a major role. Late in the practice day or just before an opening performance when the dancer is trying most for perfection, seems to be the time when most serious injuries occur. The older the dancer the more susceptible he or she is to serious joint and bone injuries. Many ankle injuries may be directly attributed to dancing on a too hard surface, or a too soft surface. Going to pointe before a dancer is ready can also be detrimental because if proper strength is lacking, sprained ankles can result. The sprain is primarily an injury to the ligamentous supportive structures of a joint. It seldom occurs without affecting muscle tendons crossing the joint. The sprain is categorized into first, second, and third degrees of intensity. The intensity of a sprain is best determined by the extent of the dancer^s disability as well as the tenderness elicited by feel or palpation and the amount of hemorrhage and swelling present. A dancer with a second or third degree sprain must routinely be referred to a physician for x-ray examination and diagnosis, because fracture is commonly associated with a twisted joint. A joint that has lost its ability to function for more than several minutes must be considered to have either a second or a third degree sprain. The highest incidence of injury is to the outside aspect of the ankle and is called inversion sprain of the ankle. This happens when the dancer turns the foot inward, placing an abnormal stretch on the outer ankle ligament. for the dancer with flat feet and/or pronated feet, inside sprains are more common and more serious. Usually a dancer has a high level of flexibility in the ankle region, and it takes a great deal of force to actually cause a sprain. If this force is great enough, ligaments will be torn and even a part of the outer ankle bone may be pulled away.

Thursday, October 24, 2019

Genocide :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  In the article, â€Å"Columbus’s Legacy: Genocide in the America’s,† by David E. Stannard, the theme can be identified as contrary to popular belief that the millions of native peoples of the Americas that perished in the sixteenth century died not only from disease brought over by the Europeans, but also as a result of mass murder, as well as death due to working them to death.   Ã‚  Ã‚  Ã‚  Ã‚  Stannard starts out the article by citing contemporary examples of U.S. press’s thought of â€Å"worthy and unworthy† victims. He gives examples of â€Å"worthy† victims in Cambodia, Bosnia, and Croatia and â€Å"unworthy† victims in East Timor. The author states that the native peoples of the Americas never have been labeled â€Å"worthy.† And recently, American and European denials of guilt for the most absolute genocide in the history of the world have assumed a new guise. The author quotes anthropologist Marvin Harris, describing the devastation through the West Indies and throughout the Americas as accidental, an â€Å"unintended consequence† of European exploration.   Ã‚  Ã‚  Ã‚  Ã‚  Epidemic disease undeniably contributed to the carnage, but in many volumes of testimony the European explorers detail their murderous intentions and actions. The slave drivers of the day calculated that it was cheaper to work people to death by the tens of thousands and then replace them than it was to maintain and feed a permanent captive labor force. The Europeans saw the Indians as block in the pathway to unlimited access to North America’s untouched bountiful lands. After the mass deaths due to epidemic, new settlers and explorers purged Indian villages, burn entire towns, and poisoned whole communities. They also engaged a farsighted genocidal tactic of preventing the population from recovering, by abducting the women and children and selling them into slavery in markets in the Indies. After about fifty years of this, the numbers in Indian nation had diminished significantly.

Wednesday, October 23, 2019

Crime and punishment morally ambigous character Essay

Several morally ambiguous characters played different vital roles in Crime and Punishment by Fyodor Dostoevsky. In fact, most characters illustrated in this twisted novel can be evaluated as possesing â€Å"good† and â€Å"evil† qualities. Sonia Marmeladov is especially ambiguous and important in this novel. Her contradicting social and moral statuses along with her contrasting roles as a saintly liberator and sinner allowed Sonia to play a crucial role throughout the novel. Not only that but her character further strengthens the theme of religious awakening. At times Sonia’s character becomes hard to categorize as â€Å"good† or â€Å"evil† because of her actions. The first descriptions the reader gets of Sonia are from her drunk father, Marmeladov. She has lived her life with little money, poor housing conidtions described as having â€Å"every sign of povery† (294). Sonia tries to make an honest living by making linen shirts but â€Å"do you suppose that a respectable poor girl can earn much by hard work? Not fifteen farthings a day can she earn†(15). Not merely enough to support a family along with her drunk father’s habits. So Sonia eventually becomes a prositute in order to to support her family and gains a â€Å"yellow ticket† (16) This is what gained Sonia her title as a sinner and which puts her character at question. However, Marmeladov explains to Raskolnikov how Sonia goes to them â€Å"mostly after dark, she comforts Katerina Ivanorna and gives her all she can†( 16). This part of Sonia’s character depicts her as a loving daughter willing to sacrifice herself to save her family. This portrayal in some ways resembles Christ as â€Å"He himself bore our sins† in his body on the cross, so that we might die to sins and live for righteousness. † He sarcrificed himself as she sacrifies herself. Does that change the fact that she is committing a sin? No of course not and that is exactly where the conflict of her morality takes place. The world sees her in â€Å"such an attire†(163)which puts her to shame in her â€Å"guady finery† (163) Yet the reader sees a young, timid girl who was pushed to take drastic decisions in her life. It is Sonia’s actions which are â€Å"evil† but her purpose and pure soul make her more saintly than most of the character’s in the novel. Because her character plays this role, it is her who helps Raskolnikov find his religious faith and who leads him to finally come clean later on in the book. Another circumstance where Sonya is morally ambiguous is where she has to decide to either have a relationship with Raskolnikov, or leave him out of the picture when he tells her that it is he who murdered the pawnbroker. Sonya knows that it is right to help Raskolnikov because he could be lost and go even deeper into his madness. However, Sonya knows that Raskolnikov is a killer and it would be wrong to be associated with somebody who knowingly commits sins as extravagant as murder. Sonya is also aware that Raskolnikov has issues and his madness could drive him to do other things that could lead to even worse consequences. Sonia does tell Raskolnikov that he must turn himself in and confess his sins but she also hugs him and kisses him as to comfort him. Her odd response is to tell Raskolnikov â€Å"I will follow you, I will follow you everywhere†¦Ã¢â‚¬ ¦ I’ll follow you to Siberia† (407). As she tries to find a valid excuse as to why he killed those women, she finds that there was no good intentions in his mind, yet she still sticks by Raskolnikov’s side. This response leaves the reader wondering whether Sonia is doing this to help a lost soul and play her role as a saintly liberator or does her love blind her and is she simply not caring that what Raskolnikov committed was murder. However, even though the last part of the book depicts Sonia as an accomplice to a morally wrong crime, the epilogue illustrates her as a saintly liberator. In Siberia, the image which she carried back in part one and part two of the book are stripped and she is loved by the prisoners in the camp. They even called her â€Å"little mother Sofya Semyonovna†(538), and although it is clearly stated that Sonia herself did nothing special to be liked, their preference for her depicts that they sensed her moral â€Å"goodness. † Without direct statement, Sonia herself was the reason why Raskolnikov felt in some way his religious reawakening. Through her unconditional love, she and her role made this â€Å"story of a gradual renewal of a man† (542) happen. Dostoevsky theme of religion was carried on and developed by Sonia’s character through her moral ambiguity. Though her character appears to be immoral in several cases, in the epilogue the reader sees how it all comes together and how Doestoevsky uses Sonya illustrates important social and political issues that were of concern to him, such as the treatment of women, the effects of poverty, the importance of religious faith, and the importance of devotion to family.

Tuesday, October 22, 2019

Free sample - Personal profiling. translation missing

Personal profiling. Personal profilingStewart, Andrew. Age: 43, a former drug addict. Dark haired, brown eyed male with an inclination to deep philosophical meditations and melancholy. The resident of a neighboring house, used to be a member of an adolescent gangster group. Accused several times of light drug possession, however was not sentenced into prison. The most significant is that he is the talented musician, plays bass guitar, can sing well. Used to play in a teen-age rock band. Had several prizes for the contribution into the fight against the blood cancer, as far as his younger sister still suffers from leucosis. In childhood used to suffer from dyslexia together with his sister. To overcome the disorder, he plunged into reading the classic literature, learning Latin, and playing hockey at the local skating rink. In childhood was quite an unsociable and self-contained, however, angel-like boy with exotic appearance. In adolescent years experienced the problems with the female sex due to his mo desty, shyness and uncertainty. Due to that was sometimes accused of homosexuality in his maturity years. Had the only one friend, with whom they shared drug affection and spent the best part of their youth years. After the friend’s death, caused by the drug overdose, became sullen and reserved. From time to time drank much and was often caught on the drinking spree. For many years he had no his own apartment, he was hiding from the entire world at his mother’s house or at hotels. The closest friends now are his mother and his ill younger sister. In addition, he is the left hander, though plays guitar with his right hand. Sometimes experience the attacks of depression and melancholy. He is not a verbose, but communicative and friendly person. Never talks badly about the people, always compliments his job partners and the leadership. This person is the workaholic in its extreme manifestation. According to the colleagues’ comments, he is considered to be the hard case of an ultimately disciplined workaholic perfectionist. He gets upset if something does not work. The point is that he likes to work and it saves him in the periods of his deepest depressions. Moreover, he always says whatever he considers to be right straightly, but really tactfully. Colleagues added that Andrew is equal to everyone, notwithstanding the fact that he possesses quite an ill temper and is strange enough. Close relatives claim him to be ultimately extreme person in relation to his major passions – motorcycles. Used to crash nearly to death, he still rides a motorcycle. He possesses three of them and has a car. This very person experienced numerous motorcycle accidents and, hence has many scars over his body. Used to get into an accident that resulted in dislocation of the cervical spine, however, he passed through the surgery successfully. According to the closest friend’s comments, he can cry without a reason or experience aggression in the case of abusing by calling him a homosexual. He is still a bachelor, though the claims of homosexuality are not warrant due to the fact that he had several beloved in his mature life. He neglects fashion, spends all money on his sister’s treatment. He does smoke, though he did not smoke while using drugs. The most significant is that Andrew managed to give up the deadly habit without any special rehabilitation. He gave up drug consumption after his friend’s death. That very moment of his life, according his own words, became the turning point and taught him a terrible lesson. However, his new addiction became speed and fast wind into the face on the motorcycle trip. He still suffers because of the sister’s disease and makes everything possible to prolong her life. He leads quite life and almost has no personal life. I believe he made an impression on the world by means of being a really extraordinary man, controversial and at the same time very diverse. He may be called a misanthrope. Nevertheless, he became an exquisite person with his own grief. I hope each of us can find something similar in our own lives; however, Andrew leads abnormal way of life. He is an example of anti stereotype and anti biased person

Monday, October 21, 2019

The World Of Undocumented Immigrants

The World Of Undocumented Immigrants In this day and age it is hard to believe that there are still so many undocumented immigrants living in the United States. Recently, President George W. Bush accepted a legislation that would give rights to undocumented immigrants already working in the United States. The majority of the undocumented immigrants are of Latino decent, many of which hold jobs that are often dangerous and humiliating.There are "9 million undocumented immigrants in the United States, and 80 percent of the immigrants are Latino" (Latina, 2004, p.92). Every person is connected to them in one way or another. They wash our clothes, sweep our floors, serve our meals, and pick the vegetables we eat. That is why these immigrants are so important to our society. These millions of Latino immigrants are like everyone else they are mothers and fathers, wives and husbands, daughters and sons, who are just trying to survive in hopes for a better future for them and their families.Immigration Debate at The Weissberg F orum For Disc...These immigrants have to work in harsh conditions, and are paid well below the minimum wage. This is because they have no social security card, or any other form of documentation, and are taken advantage of.It is hard to believe that in this country people are treated so unfairly, we must help to change the laws. We can volunteer to help in nonprofit organizations, such as the Mexican American Legal Defense and Education Fund. This group has helped strike down many propositions in California, which tried to deprived education, health care, and social services to all undocumented workers in the United States. This and many others are organization of a group of local immigrant, refugee that are challenging anti immigrant legislation.Most of the people who are born in this country do not...

Sunday, October 20, 2019

Google Corporation Challenges in China

Google Corporation Challenges in China The case study of china involving a powerful Google corporation is an interesting social responsibility considering their business mission declaration â€Å"Don’t Be Evil†. The biggest challenge Google has to face is the fact that china offers an enormous profitable market considering its populace. There has to be a dilemma regarding marketing and the legal, cultural or ethical challenges that may be involved.Advertising We will write a custom essay sample on Google Corporation Challenges in China specifically for you for only $16.05 $11/page Learn More Culturally the case has set up a stepping-stone for the human rights activists who seem gagged by the government’s rules and regulations. The government reminds all the companies especially those involved with the transfer of information to the outside world to ensure strict abidance with its rules. The state’s control of the cyber space may have been involved with the threats plac ed by Google forcing them to consider pulling out of its services. According to Google, sophisticated and targeted cyber attacks seem to originate from the Chinese government in their aim to preview emails of human rights activists as a security measure. The aim of the Chinese government is to try to filter some internet contents to maintain a strong grip on power. The attack also hits other companies such as Yahoo and Adobe. The ethical challenge Google has to face entails its decisions during the 2006 search engine launch regarding business undertakings in china, where it agreed the government pronouncement to censor the search engine â€Å"Google.cn†. Arguably, Google played a role in enhancing conditions for the attack by giving in to the rule that encourage bullying of human rights by the government. According to the users in china, by leaving China, Google leaves its clients in a sober mood but equally, it is more painful to learn that it went against its principle of à ¢â‚¬Å"Don’t Be Evil† when it agreed to venture into China on condition of accepting censorship in 2006. The Google top executives (co-founders) Larry Page and Sergey Bin face an uphill task over deciding the way forward. They have to analyse the possibility of bleaching their terms of trade with the Chinese government, which can as well result to legal charges. If their break on the contract concerning the agreement for the government to monitor content causes internal security risks, then legal settlement regarding the matter might be inevitable. The legal risk involves braking China’s sophisticated network used to monitor and limit information through the fight for human rights of expression. (U.S. Department of State, 2010)Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More As the saying goes, one’s man meat is another’s poison†. The agony G oogle managers’ faces in today’s global market has triggered their rival’s â€Å"Baidu† speculation of the move as a hypocritical and financially driven. According to the market research companies, financially they dismiss the move claiming Google’s failure to capture the market with an estimate of 15-30 percent of the users compared to the rival’s 70 percent. Arguably, Google may be aiming at a long-term strategy, where their opportunity lost will be the short-term revenue loss in China and the opportunity cost would be better and higher market penetration than the current situation. They would not wish to lose client’s trust totally, because the future endeavours to dominate the search and mail services. Their move therefore entails gaining people’s trust regarding mails, calls, storage of documents, pictures and other files as well as the web search services. The financial disaster can only be catalysed by lose of trust and not the short-term back off to strategize. A well-calculated move is the ultimate benefit. Considering the public snub of the Chinese authorities, Google risks other key U.S. companies and the government partnership in other business involvements in China. China is a potential exporter of a wide range of manufactured good for the U.S. consumers. References U.S. Department of State, Bureau of East Asian and Pacific Affairs, â€Å"Background Note: China,† Retrieved from https://www.state.gov/u-s-relations-with-china/

Saturday, October 19, 2019

Metropolis City Report Essay Example | Topics and Well Written Essays - 2500 words

Metropolis City Report - Essay Example All these come with occupational health and safety challenges. This article will explore the occupational health and safety challenges faced by rapidly developing cities with similar to Metropolis’ and explain a hazard and risk assessment plan that would enable these cities prepare for the public health risks that come with the exposure to environmental chemicals. Land contamination involves a wide array of conditions defined in the Environmental Protection Act (Environment Agency, 2010). The UK has had a long and varied industrial history and some of the industries that have been active at one time or the other being viewed as potential land pollutants. Much of the UK’s industrial activity, especially in the heavy industry sectors of iron and steel manufacture, chemical production and coal extraction took place before the modern systems of environmental pollution controls had been put in place. It was not until 1990 that the UK enacted a law to control land contamination (Hester et al., 2001). Metropolis faced several hazards resulting from land pollution from its former textile, coal and steel industries. Most of the land pollution that arose from the textile industry was as a result of the numerous chemical processes that raw materials pass through before turning into fabric. The textile industry processes such as dyeing, bleaching, printing, mercerization, scouring, sizing and washing require large volumes of water and result in equally large amounts of waste water which when released into the environment can cause land pollution (Darby, 1973). The waste water can not only contaminate ground water but can also interfere with the surrounding aquatic ecosystem. The waste generated from textile industries can be broadly categorized into four groups namely the toxic or hazardous wastes, high volume wastes, dispersible wastes and the difficult to treat wastes. The difficult to treat wastes are

Friday, October 18, 2019

Fundamentals of Reporting Essay Example | Topics and Well Written Essays - 1750 words

Fundamentals of Reporting - Essay Example Currently, Regent College teaches degree level courses on a variety of subjects. It has in its roll, a wide range of aspiring learners, many of whom represent the international student community, coming from diverse racial, ethnical and cultural backgrounds. However, their current enrolment falls short of 70 for each course. Clarifying the issue, the source further adds that once this enrolment level crosses the benchmark of 70, the college will be designated as a university. Ms Judith also boasts of specific plans of Regent College to further expand their academic focus on areas such as fashion design and law. The college authorities believe that these are core areas where a dearth is currently being felt for institutions offering quality higher education. This contention appears valid in terms of the recent surge in the demand of seats for these courses, as latest media reports indicate. The leading institutions in the locality, affiliated to Regent College, include European Busine ss School and Regent Business School, London, which core focus is on the area of business studies. Regent American College, London, Webster Graduate School London, School of Psychotherapy & Counseling Psychology, London School of Film, Media and Performance and the Inter-Nexus Language School are the other prestigious colleges in this area, being run under the Regent management. However, the community sustains a setback as there are no major colleges that offer any significant education in the fields of fashion designing and law. Recent trends identify these two branches of academics as potential areas for securing employment opportunities, both in England as well as in the other parts of the world. Besides, it also enhances the potential of attracting overseas students to this institution due to its popularity as a prestigious college with a renowned faculty. Ms Judith further mentions that the college envisages more developmental schemes in the near future. One of the priority ite ms in their agenda relates to the expansion of building and other infrastructure including high end technology, vast library facilities and provisions for better playgrounds, stadiums etc. Though this college is now one of the most respected private colleges in the UK, the management believes that they need to upgrade their facilities so as to provide their students with a state of the art learning environment. Regent currently comprises seven top notch schools plus a world class conference centre within their London campus, which offer their students the best avenues for potentials for personal and professional development. Therefore, the management’s aspiration for further improvement in these facilities is laudable. There is no doubt that elevating this group of institutions to the higher status of a university will go a long way in benefiting the students as well as the community in general. In this modern era, London needs more dignified institutions within its precincts to promote world class educational environment in this area. Besides, the quality education that Regent’s is capable of providing will attract not only students from overseas countries but also eminent academicians from all over the globe. Thus, when Regent becomes a university, it will comprise a diverse group of students as well

Arab Nationalism Essay Example | Topics and Well Written Essays - 2000 words

Arab Nationalism - Essay Example Quite simply stated, the Arab conquest of the region gave birth to the Arab World, to the notion of Arab unity and to the Arab peoples themselves. It took a diverse group of people and gave them a common language, culture, religion and, over time, a common identity. It is, thus, that the Arab conquest of the region stands out as one of the most significant turning points in the history of the Middle East and, indeed, the roots of Arab Nationalism can be directly traced to it (Hitti, 1943). Arab nationalism, tracing its roots to the Moslem conquest of north Africa and the Levantine, has survived over the millennia due to a complex set of historical and political circumstances. The concept of the Arab nation and of Arab nationalism is based on historical circumstances which have a strong psychological appeal. As argued by Karsh (2001) in "Misunderstanding Arab Nationalism," this concept represents the historical successes, and power that the Arabs had achieved when they were united as a single empire from the eleventh to the nineteenth century. Since the collapse of that Empire, however, the Arabs have achieved little and have, indeed, devolved into twenty-two third world nations which have little, if any, political and economic influence over world affairs (Karsh, 2001). Indeed, until recently, there was hardly a country in the Arab World which was not colonized and whose sovereignty was not in question. Even today, and despite the supposed collapse of colonialism, many of the Arab countries remain under the political, economic and military domination of Western powers. Iraq is occupied; Sudan suffers political and economic sanctions; parts of Lebanon and Syria are occupied by Israel and, most of Palestine has been lost, and the remainder is under Israeli occupation. As Baram (2003) contends, as they look at their present, the Arab people increasingly realise the extent of their weakness and tend to connect their present situation to their division, even as they relate their past glory to their historic unity. Comparisons between their past and present maintain the dream of Arab unity and ensure that the concept of Arab nationalism remains alive. Hence, if Arab nationalism is rooted in history, it also has its roots in the current reality of the Arab nations and populations. The psychological appeal and popularity of Arab nationalism are reflected in the ideologies that emerged from the Arab World following the collapse of colonialism. These ideologies, such as Baathism and Nasserism, were based upon the concept of pan-Arabism and Arab Unity. Baathism, developed in Syria in the 1930s as a specific response to the weakness of the Arab nation and their status as colonized countries (Baram, 2003). Baathism was based on the argument that the Arabs shared a common language, history, and culture making them one people. Accordingly, the natural condition for the Arabs was unity and strength and the unnatural condition was division and weakness (Baram, 2003). The significant point about Baathism is not just that it became the official ideology of Arab countries like Syria and Iraq, but that it was extremely popular among the Arab masses. Another popular ideology in the Arab World, Nasserism, emerged in the 1950s and similarly argued that Arab unity was the goal that all Arab countries should work to reach. As a matter of fact, it is possible to argue that the

Thursday, October 17, 2019

Best Practices Essay Example | Topics and Well Written Essays - 2000 words

Best Practices - Essay Example Moreover, as we all know that without contraries there is no progression. Thus, the notion of best practice becomes a deterrent for a progressive state and its citizens or employees. Thus programs, initiatives or activities which are considered leading edge, or exceptional models for others to follow, for achieving a minimum standard that are that are successful and sustainable in social and environmental terms and can be readily adopted by other individuals or organizations. Hence, it has basic links to Taylorism1, waste management, minimizing inefficiency and ultimately increasing labour output thus maximizing revenue. Another general aspect is about synthesizing an Organization's broad range of experience from programme, projects, and makes it widely available to all, from policy-makers to practitioners. Thus, "best practice" may be defined as a superior method or innovative practice that contributes to the improved performance of an organization, usually recognized as "best" by other peer organizations. However, in establishing something as a best practice, it raises serious issues about how we determine what is a best practice to begin with. Again, in understanding best practices in relation to Production and Operations Management industries one must first understand their core values with analogies. The assumptions about Production and Operations Management must be elaborated, first, to support or defy its stereotypical paradigms, by which they are established in the world of economics and corporate jargon. Production implies goods or services that must satisfy the human needs or requirement and by transforming resources to outputs in the form of goods or services by the means of physical resources or physically driven resources. But production management has intrinsic involvement with the value added processes by the productive use of resources. And management processes in case of high productivity always seeks to eliminate waste, use improved technology, better production and operations design, involve better leadership management, produce better quality of goods, reduce material input, improved utilization of resources, strategic reduction in working capital requirements, reduction in inventory size, and improvement in manpower skills through training to say the least. Thus, two main objectives of product and operations management involves are product selection and understanding the product life cycle within the organized unitary body of interacting components that are inter-dependen t and part of the suprasystem. This leads to process planning that assesses productibility. Nevertheless, management regarding best practices tends to value standardization against specialization. However, does true standardization restrict production Best practices are not always effective in every domain they are implemented. A related concern is that when network managers realize that multiple standards may be required to achieve their goals, they may become overwhelmed trying to discern the differences among popular frameworks and thus not effectively be able to implement best practices customized for their singular organization. Identification and implementation

HISTORY OF ISLAM 7th Century Essay Example | Topics and Well Written Essays - 1500 words

HISTORY OF ISLAM 7th Century - Essay Example Central to these developments was the conflict between Ali ibn Abi Talib and Mu’awiya. This paper will explore this chapter in Islamic history – outline the dynamic of such conflict and identify its effects. Because there is no formal hierarchy in place, issues of succession to the Islamic leadership ensues upon the death of a caliph, Muhammad’s successors. During the onset of the 7th century trouble started when the third caliph, Uthman, was murdered. Ali succeeded him, being the closest to the Prophet since he was a first cousin and a son-in-law to Muhammad. Uthman’s clan, called the Umayyads vowed revenge and would later support its own candidate to the Caliphate, which is Mu’awiya. One of Ali’s first edicts as the Islamic ruler was to replace all of Uthman’s appointees, particularly the governors - most of whom were Uthman’s kin. Mu’awiya was immediately covered by this decree as he was the governor of Syria. This factor along with Ali’s refusal to investigate and produce Uthman’s murderer led Mu’awiya to question the legitimacy of Ali’s rule. As a result, civil war broke between Ali and Mu’awiyaâ₠¬â„¢s forces. A first-hand account of this conflict was recorded by Sebeos, a 7th century bishop of Armenia. To quote: Now God sent a disturbance amongst the armies of the sons of Ismael, and their unity was split. They fell into mutual conflict and divided into four sections. One part [was composed of] those in the direction of India; one part, those who occupied Asorestan and the north; one part, those in Egypt and in the regions of the T’etalk; one part in the territory of the Arabs and the place called Askarawn†¦ The prince who was in the region of Asorestan, their prince called Muawiya†¦ When he saw what had occurred, he brought together his troops†¦ slew that other king whom they had installed, waged war with the army in the region of the Arabs, and inflicted great slaughter on them (Sebeos 154). Sebeos historical commentary

Wednesday, October 16, 2019

Best Practices Essay Example | Topics and Well Written Essays - 2000 words

Best Practices - Essay Example Moreover, as we all know that without contraries there is no progression. Thus, the notion of best practice becomes a deterrent for a progressive state and its citizens or employees. Thus programs, initiatives or activities which are considered leading edge, or exceptional models for others to follow, for achieving a minimum standard that are that are successful and sustainable in social and environmental terms and can be readily adopted by other individuals or organizations. Hence, it has basic links to Taylorism1, waste management, minimizing inefficiency and ultimately increasing labour output thus maximizing revenue. Another general aspect is about synthesizing an Organization's broad range of experience from programme, projects, and makes it widely available to all, from policy-makers to practitioners. Thus, "best practice" may be defined as a superior method or innovative practice that contributes to the improved performance of an organization, usually recognized as "best" by other peer organizations. However, in establishing something as a best practice, it raises serious issues about how we determine what is a best practice to begin with. Again, in understanding best practices in relation to Production and Operations Management industries one must first understand their core values with analogies. The assumptions about Production and Operations Management must be elaborated, first, to support or defy its stereotypical paradigms, by which they are established in the world of economics and corporate jargon. Production implies goods or services that must satisfy the human needs or requirement and by transforming resources to outputs in the form of goods or services by the means of physical resources or physically driven resources. But production management has intrinsic involvement with the value added processes by the productive use of resources. And management processes in case of high productivity always seeks to eliminate waste, use improved technology, better production and operations design, involve better leadership management, produce better quality of goods, reduce material input, improved utilization of resources, strategic reduction in working capital requirements, reduction in inventory size, and improvement in manpower skills through training to say the least. Thus, two main objectives of product and operations management involves are product selection and understanding the product life cycle within the organized unitary body of interacting components that are inter-dependen t and part of the suprasystem. This leads to process planning that assesses productibility. Nevertheless, management regarding best practices tends to value standardization against specialization. However, does true standardization restrict production Best practices are not always effective in every domain they are implemented. A related concern is that when network managers realize that multiple standards may be required to achieve their goals, they may become overwhelmed trying to discern the differences among popular frameworks and thus not effectively be able to implement best practices customized for their singular organization. Identification and implementation

Tuesday, October 15, 2019

Employee relations(Royal Mail) Essay Example | Topics and Well Written Essays - 2000 words

Employee relations(Royal Mail) - Essay Example It is at this time that the people started forming groups and placing their demands together. That is when the concept of union took birth and the people started getting unionized. The union started placing demand in the form of collective bargaining. There were other methods of negotiations too that were developed. It is in the following pages that this method of negotiation of conflict is discussed. the process of discussion follows the critical analysis of the success and effectiveness of the collective bargaining method from the view point of different researchers and then going on to study the other methods of negotiation. According to Aidt and Tzannatos, who studied the effect of collective bargaining on the macroeconomic environment, found that ceteris paribus the countries that have high levels of coordinated collective bargaining are accompanied by low levels of unemployment. It is found that in the countries where there is more coordinated bargaining the quality and the quantity of the job increase (Aidt and Tzannatos, 2002). In another paper the researchers argue that countries where there is high levels of bargaining there is poor performance on the economic front. However the adverse effects of the bargaining coverage can be covered by more coordinated effort towards bargaining. The researchers argue that the process of bargaining efforts is most important in times of economic growth rather than in stable economic conditions (Aidt, and Tzannatos, 2008). According to the researcher individual representation is fast becoming a fact to place ones demands in the private sector for a wide variety o f reasons. Thus the author argues that in case of modern private organization the significance of collective bargaining is on the decline (Troy, 2000).according to card the effectiveness of the collective bargaining mechanism or the fact about whether the collective

The Role Of Security Management Essay Example for Free

The Role Of Security Management Essay ABSTRACT Personal information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software, are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects related to maintaining enterprise security have received little attention from researchers and practitioners. Using Q-sort analysis, this thesis used students as end-users in a graduate business management security course to investigate issues affecting selection of personal firewall software in organizations. Based on the Q-sort analysis of end-users in relation to seven variables identified from review of the information security literature, three distinct group characteristics emerged. Similarities and differences between groups are investigated and implications of these results to IT managers, vendors of security software and researchers in information security area are discussed. ACKNOWLEDGEMENTS I would like to thank my supervisor Professor ____________ for his great supervision and guidance throughout the duration of my thesis project. I would also like to thank all colleagues for their help and support. Finally, I wish to thank my family for their continued support throughout the thesis. TABLE OF CONTENTS Page ABSTRACT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 ACKNOWLEDGEMENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..4 LIST OF ACRONYMS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.5 CHAPTER 1 – INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 †¢ Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 †¢ Research Question†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 †¢ Significance of the Research†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 †¢ Design and Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.10 Q-Sort Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.12 †¢ Organization of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 2- LITERATURE REVIEW†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 CHAPTER 3 – RESEARCH QUESTION FINDINGS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.18 Data Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..18 -Analysis of Results†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦26 -Limitations of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..29 Chapter 4- SUMMARY AND CONCLUSIONS Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦30 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.31 Recommendation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..33 REFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..34 LIST OF ACRONYMS Operational definition of these variables as it relates to the study are provided: Performance [PERF] : Refers to how well the software operates under various conditions (such as high traffic, types of data, port scans, etc.) Ease-of-use [EOU]: Refers to usability of the product (such as screen design and layout, access to features using tabs, buttons, etc.) Updates [UPDTS]: Refers to product updates at regular intervals after product has been installed and used Features [FEATR] : Refers to the number of program options and features available in software Reports [RPORT]: Refers to Intrusion Reports and log files generated by the firewall software Cost [COST]: Refers to price paid for the product (either as shrink wrapped package or as a download) Configuration [CONFIG]: Refers to setup and configuration after product has been installed Support [SUPPRT]: Refers to availability of online help and technical support either by phone or e-mail Installation [INSTLL]: Refers to initial installation of the product. Chapter 1 – INTRODUCTION Security describes a process of protection from any harm. It also describes the countermeasures put in place by that process. Harm may indicate a loss of confidentiality, integrity, and availability. Security management focuses on preventing harm resulting from both random acts of nature and intentional strategic actions (Schechter, 2004). Security is considered to be a very important issue while developing complex personal information systems (Mouratidis et al., 2002). Security is a major concern in todays digital era. The Internet offers a low cost, but insecure means of reaching people. Owing to the ubiquity of the Internet, it is difficult to control and trace intrusions or attacks by unauthorized people, hackers, etc. Electronic commerce applications need secure mechanisms for accurate user identification, accessing sensitive database, storing and transmitting sensitive information, etc. Personal identification numbers (PINs), passwords, smart cards and digital certificates are some of the means normally used for this purpose. However, these means do not really identify a person, but only knowledge of some data or belonging of some determined object (Sanchez-Reillo et al., 1999), e.g. public key infrastructure (PKI) cannot assure identity of the maker of a transaction, it can only identify the makers computer. An imposter can easily masquerade as a legitimate user and defraud the system. Information must be readily available in organizations for making decisions to support the organizational mission. Murphy, Boren, and Schlarman (2000) state that due to increased connectivity and the urgency to exchange information and data among partners, suppliers, and customers on a real time basis, the need to protect and secure computer resources is greater than ever. As a result, this has created the possibility of exposing sensitive corporate information to competitors as well as hackers who can now access organizational computer resources from remote sites. Statement of the Problem The potential loss of such information to an organization goes beyond financial losses and includes the possibility of corrupted data, denial of services to suppliers, business partners and customers, loss of customer confidence, and lost sales. Security in business processes (i.e., maintaining proper authentication, authorization, non-repudiation, and privacy) is critical to successful e-business operations. Enabling business functions over the Internet has been recognized as a major component for the success of businesses and, by mitigating risks in a cost-effective manner, security is now being viewed as a component of business operations (Deise, Nowikow, King, Wright, 2000). Decisions about information systems made by managers are vital to the success, and even survival, of a firm (Enns, Huff, Golden, 2003). Despite increased security threats, organizations have traditionally allocated very little of the total IT budget to information security. Forrester Research estimates that in Fortune 500 companies, the average amount of money as a percent of revenue that is spent on IT security is 0.0025 percent or slightly less than what they spend on coffee (Clarke, 2002). Organizations must evaluate and prioritize the optimum mix of products and services to be deployed for protecting confidentiality (maintaining privacy of information), integrity (maintaining information is not altered in transit), and availability (maintaining access to information and resources) of corporate assets. The decision to deploy certain technology is based on variables such as the organizational business model, level of risk, vulnerability, cost, and return on investment (Highland, 1993). There are several ways in which information can be protected. One method to safeguard information is by using controls. The concept of controls can be applied to financial auditing as well as technical computer security. General controls include personnel, physical and organizational controls as well as technical security services and mechanisms (Summers, 1997). Computer security controls can be hardware or software-based and may include biometric devices, anti-virus software, smart cards, firewalls, and intrusion detection systems that can be used to build the enterprise security infrastructure. Additionally, these controls may be preventive, detective, or corrective. Research Question This paper will focus on one such computer security control Personal Firewalls. Firewalls intercept traffic and make routing and redirection decisions based on policies. Some firewalls can also inspect packets and make transformation and security decisions; therefore, they are critical components in maintaining security in organizations. There are different types of firewalls, such as hardware, software, enterprise, and personal firewalls. Personal firewalls are client-based solutions that are installed on desktop/laptop computers and may be administered individually from a central location. Successful selection and adoption of firewalls (enterprise as well as personal) is based on various factors, some of which are technical while others may be behavioral. This exploratory study looks at the new genre of personal firewalls and, based on the review of the literature, attempts to answer the following research questions: 1) What are the factors that could result in successful selection of personal firewalls in organizations? 2) What are the empirical evidence to support deployment of firewall software? Significance of the Research The study hopes to shed light on behavioral aspects of information security, which may be tied to perceptions of end-users who may influence technology selection in their organization. This will provide empirical evidence to an area that has been identified as lacking in research (Dhillon Blackhouse, 2001 Troutt, 2002) and provide directions and guidance for future studies. Another significance of this study is to look at end-user perception is that it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Organization of Study The purpose of this paper is to investigate self-referent perceptions of end-users, and use Q-Sort analysis to investigate factors affecting deployment of security firewall software in organizations. The paper is organized as follows: review of research on information security is presented to the reader along with extraction of variables from the literature that may determine firewall deployment in organizations; The Q-Sort Factor Analysis method used for the study is explained and the research design is provided; Along with data analysis, results of the study are then explained, which is followed by discussion and applications to practice. Due to the nature of research design used in this study, limitations are also explained. Research Design and Methodology Subjects in this exploratory research study were 31MBA students enrolled in a security and Control of Information Systems course. The students came from different backgrounds, such as finance, liberal arts, nursing, and computer science. From a business perspective, the course examined implications of information security risks faced by organizations. Although technical issues of security, such as authentication, authorization, and encryption that make electronic commerce sites successful in processing business transactions securely were also explored in the course, the primary focus in the course was from a business perspective. There was no structured lab work during class, but to gain a better understanding of security issues, students were expected to complete hands-on exercises outside class. During initial weeks, topics covered included the PWC model, TCP/IP vs. OSI models, network, e-mail, database security, digital certificates and signatures, risk assessment, and privacy issues. Also, during Week 5, students had been previously tested on the topics using short-answer type questions to determine learning competency of factual information and applications related to information security in organizations. The test score counted towards 15% of overall course grade. With coverage of the aforementioned topics, it was safe to assume that students had knowledge of current security issues facing organizations in todays economy. Because there is no consensus on the common body of knowledge acceptable for all security professionals, and since this was an exploratory study, the study was conducted in a controlled environment with ahomogenous population of students to minimize confounding by extraneous variables. Using MBA students as surrogates for professionals or executives in reference to use and evaluation of technology has also been found to be acceptable (Briggs, Balthazard, Dennis, 1996). The hands-on firewall assignment in this course covered installation, configuration, and use of one standard personal firewall software (ZoneAlarm). After students had a chance to use the software, they were asked to participate in the study. No class discussion was conducted on results of the firewall tests in case it affected students perceptions about the software, which could have influenced their response. Therefore, the data reflected individual student perception without class discussions. Students were given instructions to visit a Web site that explained the nature of the study and provided information on how the Q-sort statements should be sorted. This was important since students are more used to completing questionnaires in a survey format that use Likert scale, open-ended, or closeended questions (such as those used during end of term class evaluation of instruction), but may not be familiar with the peculiarities of the Q-sort procedure. To reduce data errors and extract usable data, instructions were presented in detail before the respondents were shown the statements for the study. Q-Sort Analysis Q-sort analysis uses a technique for studying human subjectivity (Stephenson, 1953; Brown, 1980; McKeown Thomas, 1988). It is useful in exploratory research and a well-developed theoretical literature guides and supports its users (Thomas Watson, 2002). Q-sort methodology is suited for small samples and relies on theories in the domain area being researched to develop items for analysis. A disadvantage of the Q-sort methodology is that it is not suitable for large samples, and it forces subjects to conform to certain expectations (such as fitting responses within a normal distribution). Brown (1986) suggests that 30 to 50 subjects are sufficient for studies investigating public opinion. Q-sort uses an ipsative (self-referenced) technique of sorting participants statements about subjective conditions. It is a variation of factor analysis technique that uses Q-methodology theory to analyze correlation measure (Brown, 1980). Respondents to Q-sort studies are required to sort statements into predefined normal distribution type scale in which a fixed number of items fall under each category. The rankings provide clusters of perceptions of individuals consensus and conflict, which can be used to place individuals with similar characteristics into groups for further study, hi the past, the Q-sort technique used index cards for sorting, but now Web-based data collection programs (such as WebQ) are common. Initially the statements are presented to respondents in random order, and each respondent organizes statements into predefined categories. To view entered data, the respondent also can update statement rankings to see where the statements fall under each category. One advantage of using the WebQ method is that data submission errors are reduced since the program verifies that the statements are sorted according to predefined requirements. Figure 1. WebQ questionnaire Adapted from: Brown, 1980. In this personal firewall study, the statements were to be classified by respondents as Most Important (+2), Important (+1), Neutral (O), Less Important (-1), and Least Important (-2). To provide a forced distribution that is expected in the Q-Sort methodology, respondents were given instructions to identify one statement as Most Important, two statements each as Important and Less Important, and three statements as Neutral. The instrument used is shown in Figure 1 Chapter 2-LITERATURE REVIEW In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). Firewalls can be considered a last line of defense in protecting and securing information systems. Wood (1988) provided a context for information security systems planning and proposed that reactive and incremental improvement approaches to address security are harbingers of a more serious problem. Other factors identified in Woods model are the lack of top management support, information overload, insufficient staffing, and limited resources. Straub and Welke (1998) advocate using deterrence, prevention, detection, and recovery security action cycle to mitigate systems risk and use prioritized security controls. Data on computer crimes is often under-reported because companies are not willing to risk public embarrassment and bad publicity. Most companies choose to handle these incidents internally without keeping documentation or reporting to local, state or federal authorities (Saita, 2001). There is a need for unbiased empirical studies in the information security area that will provide insight into problems affecting todays technology dependent corporations and industries. With a strong need to collect and analyze computer security data, the CSI/FBI Computer Crime and security Survey is published yearly (see http:// www.gocsi.com). This study provides descriptive statistics but does not attempt to identify relationship between variables, as is expected in analytical surveys. Also, results reported in this annual survey have been identified by the publishers themselves to be potentially misleading due to the limited number of respondents and their accuracy as a result of anonymous nature of the surveys. These results have also been called into question because of lack of statistical or scholarly rigor and self-serving interest (Heiser, 2002). Despite these limitations, the CSI/FBI survey provides a useful role in comparison of yearly data for similar parameters. The area of human computer interface provides a link between the user and software applications. User satisfaction is a function of features, user interface, response time, reliability, installability, information, maintainability, and other factors.†If a products user interface catches a users attention and is simple to learn and use, and has the right price and features, then the product may gain competitive advantage (Torres, 2002, p. 15). The theory of user interface design and user involvement in completing task-based actions related to Internet and security software has been substantiated by two studies in which user interaction with peer-to-peer software (Good Kerkelberg, 2002), and PGP software (Whitten Tygar, 1999) were examined. Good and Krekelberg (peer-to-peer study) found that applications connecting to the Internet need better usability and software design to maintain integrity of information stored on a users computer. In this study, individuals assumed responsibility of keeping firewalls operational at all times. This contributed in large part to maintaining effective enterprise security. Whitten and Tygar (PGP study) found that user errors are a significant portion of computer security failures, and further concluded that user interfaces for security programs require a usability standard much different from other consumer software. (Although this study is not directly concerned with user satisfaction, but is more focused on factors that affect deployment rather than development of end-user software in a specific area, some factors may be directly tied to user satisfaction as will be shown by correlational analysis). Due to increasing mobile and off-site access by employees using cable modems, DSL connections, and wireless devices to access corporate resources, personal firewalls are a necessary component to maintain overall enterprise security in an organization. Because of the nature and availability of personal firewall software, most companies choose to acquire it rather than develop it in-house. Software acquisition that results in productivity gains and strategic advantage is of critical concern to organizations, and factors that relate to these benefits must be correctly identified and understood for software acquisition decisions (Nelson, Richmond, Seidmann, 1996). Purchase of commercial software includes identifying requirements, evaluating packages from different vendors, configuring, installing, and evaluating it either as server or client-based solution. This may further involve requirements acquisition that leads to product selection (Maiden, Ncube, Moore, 1997). As a method of selection, professionals in charge of evaluating personal firewall software could draft a feature requirements document, and evaluate vendor products by comparing available features as well as using demonstration versions of software. This would be followed by user experience with the software. As mentioned earlier, the need for user involvement in information systems has been considered an important mechanism for improving system quality and ensuring successful system implementation. It is further believed that the users satisfaction with a system leads to greater system usage (Baroudi, Olson, Ives, 1986). The requirements for software though must be as measurable as possible to enable product selection and may also use repertory grids in which stakeholders are asked for attributes applicable to a set of entities and values for cells in an entity-attribute matrix. This would produce representation of requirements in a standardized, quantifiable format amenable even to statistical analyses (Maiden, Ncube, Moore, 1997). In relation to the security area, Goodhue and Straub (1991) found company actions and individual awareness to be statistically significant in a study of perceptions of managers regarding controls installed in organizations. Chapter 3 – RESEARCH QUESTION FINDINGS Data Analysis Q-Sort analysis is a type of inverse factor analysis in which the cases (subjects) rather than statement variables (features) are clustered. As recommended by Brown (1980), a procedure that arranged statements based on responses of a single individual was used for data analysis. The responses involved statements of opinion (also called Q-sample) that individuals rank-ordered based on the feature requirements in personal firewall software. The arrayed items (Q-sort) from the respondents were correlated and factor-analyzed. The factors indicated clusters of subjects who had ranked the statement in the same fashion. Explanation of factors was then advanced in terms of commonly shared attitudes or perspectives. A review of security literature (Hazari, 2000; Northcutt, McLachlan, Novak, 2000; Scambray, McClure, Kurtz, 2001; Strassberg, Rollie, Gondek, 2002; Zwicky, Cooper, Chapman, Russell, 2000) was used to extract the following statement variables relating to requirements in persona l firewall software: performance, ease-of-use, updates, features, reports, cost, configuration, and support. Table 1. Participant ranked scores Variable Mean SD PERF 4.45 0.77 EOU 3.39 1.08 UPDTS 3.23 0.88 FEATR 3.03 0.93 RPORT 3.00 1.03 COST 2.97 1.20 CONFIG 2.55 0.85 SUPPRT 2.35 0.98 INSTLL 2.00 0.89 Prior to conducting the Q-sort analysis, ranked scores of all participants (before identifying factor groups) on each statement variable were calculated for preliminary descriptive statistics. These are shown in Table 1, where a mean score of 5 = Most Important and 0 = Least Important). Correlation between the nine feature variables shows a low level of correlation between statements. This indicates there is a high degree of independence between the statement categories as used in the analysis. This finding is important since it supports the assertion that the statements represent relatively independent factors obtained from the review of the literature. In the correlation matrix shown, Table 2 shows significant correlation (p 0.05) between cost and updates, cost and reports, ease-of-use and performance, ease-of-use and updates, and installation and support. Table 2. Correlation matrix between variables COST FEATR EOU PERF INSTLL UPDTS RPORT CONFIG SUPPRT COST 1.00 -0.21 0.27 0.18 -0.13 -0.43 -0.49 -0.08 -0.10 FEATR 1.00 -.29 0.35 -0.16 0.06 -0.17 -0.13 -0.25 EOU 1.00 0.44 0.00 -0.37 -0.27 -0.20 -0.04 PERF 1.00 -0.10 -0.11 -0.13 0.13 -0.14 INSTLL 1.00 -0.13 -0.04 0.18 -0.53 UPDTS 1.00 0.26 -0.15 0.17 RPORT 1.00 1.00 0.03 CONFIG -0.24 SUPPRT 1.00 As mentioned earlier, in Q-factor analysis, the correlation between subjects rather than variables are factored. The factors represent grouping of people with similar patterns of response during sorting (Brown, 1980; Thomas Watson, 2002). Following guidelines for Q-factor analysis, eight factors were initially identified with eigenvalues 1 (an eigenvalue is the amount of variance in the original variable associated with the factor). These factors and their percentage of variance are shown in Table 3. Table 3. Eigenvalues of unrelated factors Eigenvalues % Cumul.% 1 11.56 37.28 37.28 2 6.03 19.45 56.73 3 3.91 12.61 69.34 4 2.98 9.61 78.95 5 2.14 6.92 85.87 6 1.93 6.23 92.10 7 1.43 4.61 96.71 8 1.02 3.29 100.00 Factors selected were rotated to maximize the loading of each variable on one of the extracted factors while minimizing loading on all other factors. Factors selected for rotation are usually identified by taking those with eigenvalue greater than one (Kline, 1994). However, in this study, the more rigorous Kaiser rule of selecting factors whose eigenvalue is at or above the mean eigenvalue (in this case 3.85) was used. Factors 1,2, and 3, which represented almost 70% of total variance in data, were then subjected to principal component analysis with varimax rotation. Following rotation, a Factor Matrix indicating defining sort (i.e., respondents in agreement) identified three factor groups with similar pattern of responses. The correlation of individual respondents with factors is shown in Table 4 below. Table 4. Factor matrix of respondents (* indicates defining sort) Q-Sort 1 2 3 1 02386 -0.0398 0.8988 2 0.0227 0.1971 0.8158* 3 0.4975 -0.3790 0.5458 4 0.8575* -0.2912 0.0811 5 -0.2639 0.0196 0.7993* 6 -0.0614 0.7524* -0.2289 7 0.4014 -0.1587 0.4678* 8 0.1367 0.0728 0.9054* 9 0.5351 0.1183 0.6886* 10 0.5065 0.3263 01754 11 0.5351 0.3357 0.6886 12 0.8192* 0.7321* 0.1035 13 -0.6495* 0.3450 -0.0844 14 -0.0464 0.8598* 0.5845 15 0.6535 0.0127 0.3053 16 0.2052 0.2324 0.2452 17 -0.1340 0.4049 0.9512 18 0.7553* 0.5865 0.2987 19 0.2431 0.4049 0.6946 20 0.5983* 0.5865 -0.0334 21 0.4660 0.6533* 0.4573 22 0.5672* 0.1057 -0.3342 23 0.3501 -0.1001 0.8195 24 0.1008 0.9240* 0.0038 25 0.3329 0.0999 0.7194 26 0.2254 0.6545* 0.1329 27 0.7660* 0.1246 0.5677 28 -0.1210 -0.3611* 0.2308 29 0.3850 0.7032* 0.0144 30 0.4656 0.5605 -0.3196 31 -0.1987 0.8988* 0.2470 % explained variance 21 22 26 From Table 4 it can be observed that for Factor 1, respondents 4, 12, 13, 15, 18,20,22, and 27 were in agreement and are highly loaded on this factor. Similarly, respondents 6, 10, 14, 16, 21, 24, 26, 29, and 30 were in agreement in Factor 2, and respondents 5,7,8,9,11,17,19, and 23 were in agreement in Factor 3. The statements in which these three factor groups were ranked are shown in Table 5. Table 5. Ranked statement totals with each factor No. Statement Factor 1 Factor 2 Factor 3 1 COST 0.31 5 0.91 2 -1.45 9 2 FEATR -0.45 7 0.10 5 0.70 2 3 EOU 0.91 2 0.63 3 -0.55 6 4 PERF 1.26 1 1.72 1 1.80 1 5 INSTLL -1.92 9 -0.31 6 -0.63 7 6 UPDTS 0.52 3 -0.54 7 0.61 3 7 RPORTS 0.03 6 -1.28 8 0.55 4 8 CONFIG -1.07 8 0.12 4 -0.17 5 9 SUPPRT 0.41 4 -1.34 9 -0.87 8 Table 6 shows correlation between the factors. Similar to the findings earlier about variable independence, the factor groups also show a high degree of independence. Table 6. Correlation between factors Factor 1 2 3 1 1.0000 0.3218 0.2970 2 0.3218 1.0000 0.2298 3 0.2970 0.2298 1.0000 The normalized factor scores for each factor were examined next. This provided ameasure of relative strength of importance attached by a factor to each statement on the scale used during sorting. Tables 7(a), 7(b), and 7(c) show these scores. Table 7(a). Normalized Factor 1 score No. Statement z-score 4 PERF 1.258 3 EOU 0.910 6 UPDTS 0.542 9 SUPPRT 0.409 1 COST 0.314 7 RPORT 0.032 2 FEATR -0.454 8 CONFIG -1.071 5I INSTLL -1.922 Table 7(b). Normalized Factor 2 score No. Statement z-score 4 PERF 1.717 1 COST 0.905 3 EOU 0.626 8 CONFIG 0.116 2 FEATR 0.102 5 INSTLL -0.313 6 UPDTS -0.535 7 RPORT -1.276 9I SUPPRT -1.343 Table 7(c). Normalized Factor 3 score No. Statement z-score 4 PERF 1.805 2 FEATR 0.702 6 UPDTS 0.606 7 RPORT 0.553 8 CONFIG -0.170 3 EOU -0.547 5 INSTLL -0.632 9 SUPPRT -0.872 1I COST -1.446 From the Table 7(a) it can be seen that adherents of Factor 1 feel strongly in favor of statement 4 (Performance) and oppose statements 8 and 5. This indicates for Factor 1 group, performance is preferred over initial installation, setup and configuration of the product. The results of Factor 2 group are consistent with Factor 1; that is, performance of the product is the highest rated criterion. Ease-of-use also rated highly in Factors 1 and 2. Perceived ease-of-use in an information systems product has been shown to play a critical role in predicting and determining a users decision to use the product (Hackbarth, Grover, Yi, 2003). The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The results of Factor 3 are consistent with Factors 1 and 2 with Performance criteria once again being highly rated. The most dissension between Factors 2 and 3 involved statements 1 (Cost) and 3 (Ease-of-use). The most dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Analysis of Results The Q-sort analysis classified subjects into three groups. Eight subjects were classified under Factor 1, and 10 subjects each were included in Factors 2 and 3. There were three subjects in the study that were not distinguished in any group. These subjects were excluded from further analysis. The classification into factors gave a better idea of group characteristics. Since Factors 1 and 2 were similar and shown to include subjects who considered Performance, ease-of-use, and Availability of Online Help as the most important characteristics, this group can be considered to be comprised of non-technical users who place more emphasis on the product performing as expected in achieving goals for security. Factor 3 subjects emphasized technical characteristics and were more interested in number of features in the product, updates to the product on a regular basis, intrusion reports generated by personal firewalls, and setup/configuration of the product after installation. This group had c haracteristics of technical users. The normalized factor scores provided a measure of relative strength of importance attached by factors to each statement on the scale used during sorting. As mentioned earlier, adherents in Factor 1 felt strongly in favor of statement 4 (Performance) and opposed statements 8 (Setup/configuration) and 5 (Installation). The results of Factor 2 are consistent with Factor 1, that is, Performance of the product is the highest rated criterion. ease-of-use also rated highly in Factors 1 and 2. The largest dissension between Factor 1 and 2 groups involved statements 9 (Availability of Online Help), 7 (Intrusion Reports generated), and 6 (Regular Product Updates). The most dissension between Factors 2 and 3 involved Statements 1 (Cost) and 3 (Ease-of-use). Results of Factor 3 were consistent with Factors 1 and 2, with Performance criteria once again being highly rated. The largest dissension between Factors 1 and 3 involved statements 1 (Cost), 3 (Ease-of-use), and 9 (Availability of Online Help). Extreme differences between all factors appeared in Cost, Intrusion Reports generated, and Availability of Online Help. There was only one statement, Performance of the product, that showed consensus among all factors; that is, it did not distinguish between any pair of factors, which indicates Performance of the desktop firewall software is an agreed upon criterion irrespective of group characteristics. The managerial implications of this study can be assessed at the level of selecting appropriate software for use on computers in organizations to maintain security. There is evidence of user satisfaction being a useful measure of system success (Mahmood et al., 2000). While the end-user may not purchase individually preferred software for installation on company owned computers, the user can influence decisions for selection by making known to IS managers the features that would contribute to regular use of security software such as personal firewalls. Given access of these machines to corporate resources, appropriate and regular use of software would contribute to maintaining enterprise security. For technical professionals (e.g., programmers) who install firewalls on their desktop, programs could emphasize the statements that are defining characteristics shown in Factor 3. For an industry that has non-technical professionals (such as Factor 1 and 2), other non-technical characteristics of the product could be emphasized thus achieving maximum effectiveness in program deployment. Increased awareness should minimize user related faults, nullify these in theory, and maximize the efficiency of security techniques and procedures from the users point of view (Siponen, 2000). The results of this study could also benefit vendors who develop software for end-users. In this study it was found that performance of the software is the most important factor that affects selection of software, irrespective of group characteristics. Due to project deadlines and market competition, software is often shipped without being fully tested as secure, and standard industry practice is to release incremental service packs that address security issues in the product. In a case of security software, this may adversely affect the reputation of a vendor once its products have been shown to have high vulnerability to being compromised. The findings of this study could provide a better understanding of importance of personal firewall security software on organizational client computers. The decision to install an information system necessitates a choice of mechanisms to determine whether it is needed, and once implemented, whether it is functioning properly (Ives, Olson, Baroud i, 1983). More research needs to be done in the area of selection of software for implementation on users computers that are owned by corporations and given to employees for off-site work. This can include regular employees vs. contractors who may connect to employer and client networks from the same computer. If the findings are to have wider applicability, qualified industry professionals and security officers responsible for maintaining secure infrastructure in corporations should be included in the analysis. The study provides management and security professionals a basis for making decisions related to enterprise security. It provides personal firewall vendors an insight into feature requirements of the personal firewall market, and provides academic researchers interested in security, a more focused approach on various dimensions of security software from the behavioral perspective. Future studies could be industry and product specific in order to assess differences in selecting general- purpose software versus security specific products. In many cases, management has looked at the need for implementing information security programs and products as a necessary encumbrance, something akin to paying taxes or insurance premiums (Highland, 1993). But organizations are increasingly becoming aware of the potential for legal exposure via lawsuits, and are deploying countermeasures (such as personal firewalls) to reduce vulnerability and mitigate risk. The chief information security officer in todays organizations should have the responsibility of managing organizational risks by using empirical models and analysis to determine strategies for protecting corporate assets. Firewalls are the last line of defense in the corporate network and therefore play a critical role in information security. With personal firewalls being a new product genre, this study was conducted since there is no research available that specifically looks at determinants for selection of security software in a corporate environment to protect organizational assets. As the information security field evolves further, decisions for security software acquisitions need to be researched further. Selection and deployment of appropriate firewalls can make a significant difference in an organizations enterprise security strategy. It is therefore also important to understand the variables (as shown in this study) that may affect decisions to select and deploy personal firewall software in a corporate environment. Limitations of the Study Due to the exploratory nature of this study, there are several limitations. The sample used in the study comprised of all students enrolled in a security course at the same university, and was further limited to the firewall topic among a wide range of technical and behavioral information security topics. Students worked with only one type of firewall software and characteristics of this particular program may have heightened their awareness of certain strengths and weaknesses in the software. Since the purpose of information security implementation in an organization is to support business objectives of the organization, information security departments are sometimes placed under the chief financial officer recognizing the direct relationship between information assets and monetary assets. Software acquisition decisions may therefore be made by the finance department with limited input from the IT department. The purpose of this study was to explore an important topic for research on information security and determine operant subjectivity in a field where empirical research is severely lacking. The Q-sort technique itself is suitable for small sample populations (Thomas Watson, 2002), but the correlations obtained in smaller samples tend to have considerable standard errors (Kline, 1994). The exploratory nature of this study was not intended to prove some general proposition but to seek a better understanding of group characteristics that directly relate to maintaining a secure network environment (in this case by deploying personal firewalls to plug possible vulnerabilities that might exist in a network through use of computers by employees either on-site or at remote locations). The perceptions of end-users will therefore guide the selection and deployment of security technologies in an organization to provide a secure corporate environment. Chapter 4- SUMMARY and CONCLUSIONS Summary In the area of information security, research has often lagged practice. Dhillon Blackhouse (2001) have stressed the need for more empirical research to develop key principles for the prevention of negative events and therefore to help in the management of security. Despite known vulnerabilities in applications and operating systems, companies continue to deploy software to stay competitive, and steps taken to secure products and services are knee-jerk reactions to media stories that are more reactive than proactive in nature. Most IT managers lack a coherent framework and concrete methodology for achieving enterprise security. A security plan that includes technology, personnel, and policies would be a much better approach to developing an enterprise security strategy. One such model is the Enterprise security Framework Price Waterhouse Coopers (PWC) model. The PWC model is comprehensive because it addresses the entire enterprise of security architecture. The model emphasizes information security strategies within the organization using a holistic rather than apiecemeal approach. The framework is based on four pillars: security vision and strategy, senior management commitment, information security management structure, and training and awareness. Within the pillars are decision drivers, development, and implementation phases. Firewalls are placed in the development phase since they are used to provide interpretation of corporate standards at the technical level. For a detailed discussion of the PWC model, the reader is referred to Murphy, Boren, and Schlarman (2000). So it is important reason to look at end-user perception as it may affect how well the user does his or her part in staying vigilant to combat threats posted by hackers to organizational assets. The end-user may be a conduit to organizational data being compromised. Proper software selection as well as positive user attitude and motivation for using the software are therefore important to ensure ongoing use of personal firewall software. Kettinger and Lee (2002) address the fact that the proliferation of personal computing and individualized software, and popularity of the Internet in organizations have resulted in users playing an important role in driving IT implementation. Their study found that for users selecting their own IT applications (such as desktop software programs), there is greater user satisfaction after implementation. Grantham and Vaske (1985) also state that positive user attitudes are important predictors in continued system use. This is especially important for personal firewall use because computers are at risk at all times when connected to the Internet. In reference to software selection, Chiasson and Lovato (2001) emphasize: Understanding of how users form perceptions of software innovation would help software designers, implementers and users in their evaluation, selection, implementation and ongoing use of software. However, with the exception of some recent work, there is little research examining how a user forms his or her perceptions of innovation overtime (p. 16). The area of information security as it relates to maintaining confidentiality and integrity of data stored on personal computers can benefit from identification of factors that would make it possible to safeguard corporate assets that are at risk as a result of remote data access by employees. Software selection for deployment on company computers cuts across different user levels in terms of knowledge and level of expertise of the user. Selection of software therefore must be done to accommodate all types of users ranging from novices to experts. The latter category of users may have higher tacit knowledge of tasks to be able to compensate for the interface without realizing it (Gery, 1997). Conclusions In this study, Q-methodology was used to define participant viewpoints and perceptions, empirically place participants in groups, provide sharper insight into participant preferred directions, identify criteria that are important to participants, explicitly outline areas of consensus and conflicts, and investigate a contemporary problem relating to desktop firewalls by quantifying subjectivity. Similar to other IT areas, security software selection and deployment in todays environment faces many challenges, such as staying current with new threats, project deadlines, implementation issues, and support costs. Quality drives customer satisfaction and adoption of software. Human factors are important in contributing to successful software deployment in organizations, especially when it relates to desktop software applications. Organizations are now viewing security and controls as business enablers and desktop firewall technology plays a critical role in safeguarding corporate assets. In a fast-paced area where the new generation of applications and services are growing more complex each day, it is critical to understand characteristics that affect selection of end-user security products in enterprises. This study addresses a small but important area of safeguarding enterprise information security by using personal firewalls. As has been previously noted, limited research exists beyond the current study that explores behavioral aspects of information security. This study holds importance for professionals tasked with evaluating and selecting security products for company wide deployment. As the area of information security gains increased importance due to the strategic role of technology in organizations, and current events impact areas such as disaster recovery and enterprise continuity planning, a study of end-users to determine their perceptions about selection of technology controls in organizations is critical for protecting organizational assets. More research needs to be done in the area of perception of users towards other security software (such as anti-virus, intrusion detection, virtual private network software, and encryption products), and, due to varying security needs in different industries, studies could also be industry and product specific. While the findings should be considered preliminary, the results raise interesting observations about issues uncovered regarding security perceptions of feature requirements in personal firewalls. Information security is a dynamic area and, in this environment, this exploratory study contributes to evolving research by identifying variables from theoretical literature and using an empirical technique to study issues that affect safeguarding vital assets of an organization from internal and external threats. Recommendation It is recommended that in order to provide better evidence of factors that affect deployment of technology tools that create awareness of security issues and produce better informed employees, research into behavioral factors also needs to be conducted to gain insight into programs and processes that will lead to the development of a robust enterprise security strategy. Information security awareness research has been mostly descriptive and has not explored the possibilities offered by motivation/behavioral theories, or the related theory of planned behavior and the technology acceptance model, specifically in the information security domain (Mathieson, 1991 ; Siponen, 2000; Legris, Ingham, Collerette, 2003). Since security has been deployed at the perimeter of electronic network and on servers by system administrators, the area of information security has ignored users of information systems since software developers are far removed from how the user will interact with security software. Human compliance with information security rules require an understanding of how people work and think (Highland, 1993). Lane (1985) considers the human factor to be the first and most important component of security and a critical part of the risk analysis process. This is especially true in personal firewall software since the burden of maintaining a secure environment is being shared by the user and the system administrator. REFERENCES Baroudi, J., Oison, M., Ives, B. (1986). An empirical study of the impact of user involvement on system usage and information satisfaction. Communications of the ACM, 29(3), 785-793. Briggs, R.O., Balthazard, P.A., Dennis, A.R. (1996). Graduate business students as surrogates for executives in the evaluation of technology. Journal of End-user Computing, 8(4), 11-17. Brown, S.R. (1980). Political subjectivity: Applications of Q methodology in political science. New Haven, Connecticut: Yale University Press. Brown, S.R. (1986). Q-technique and method: Principles and procedures. In W.D. Berry M.S. Lewis-Beck (eds.), New Tools for Social Scientists: Advances and Applications in Research Methods. Beverly Hills, CA: Sage Publications. Chiasson, M., Lovato, C. (2001). Factors influencing the formation of a users perceptions and use of a DSS software innovation. ACM SIGMS Database, 32(3), 16-35. Clarke, R. (2002, February). Forum on technology and innovation: Sponsored by Sen. BillFrist (R-TN), Sen. Jay Rockefeller (D-WV), and the Council on Competitiveness. Retrieved October 28,2003, from hap:/ /www. techlawjournal, com/security/ 20020214.asp Deise, M., Nowikow, C., King, P., Wright, A. (2000). Executive s guide to e-business: From tactics to strategy. New York: John Wiley Sons. Dhillon, G., Blackhouse, J. (2001). Current directions in IS security research: Toward socio-organizational perspectives. Information Systems Journal, 11(2), 127-153. Enns, H., Huff, S., Golden, B. (2003). CIO influence behaviors: The impact of technical background. Information and Management, 40(5), 467-485. Gery, G. (1997). Granting three wishes through performance-centered design. Communications of the ACM, 40(7), 54-59. Good, N., Krekelberg, A. (2002). Usability and privacy: A study of Kazaa P2P file-sharing. Retrieved November 12, 2003, from http:// www. hpl. hp. com/shl/papers/kazaa/ Goodhue, D.L., Straub, D.W. (1991). security concerns of system users: A study of perceptions of the adequacy of security measures. Information Management, 20(1), 13-27. Grantham, C., Vaske, J. (1985). Predicting the usage of an advanced communication technology. Behavior and Information Technology, 4(4), 327-335 Hackbarth, G., Grover, V, Yi, M. (2003). Computer playfulness and anxiety: Positive and negative mediators of the system experience effect on perceived ease-of-use. Information and Management, 40(3), 221-232. Hazari, S. (2000). Firewalls for beginners. Retrieved December 17,2003, from http://online.securityfocus.com/ infoc Heiser, J. (2002, April). Go figure: Can you trust infosecurity surveys? Information security, 27-28.us/1182. Highland, HJ. (1993). A view of information security tomorrow. In E.G. Dougall (ed.), Computer security. Holland: Elsevier. Ives, B., Olson, M., Baroudi, J. (1983). The measurement of user information satisfaction. Communications of the ACM, 25(10), 785-793. Kettinger, W., Lee, C. (2002). Understanding the IS-User divide in IT innovation. Communications of the ACM, 45(2), 79-84. Kline, P. (1994). An easy guide to factor analysis. London: Rutledge Lane, YP. (1985). security of computer based information systems. London: Macmillan. Legris, P., Ingham, J., Collerette, P. (2003). Why do people use information technology? A critical review of the technology acceptance model. Information and Management, 40(3), 191-204. Mahmood, M.A., Burn, J.M., Gemoets, L.A., Jacquez, C. (2000). Variables affecting information technology enduser satisfaction: Ameta-analysis of the empirical literature. IntemationalJournal of Human-Computer Studies, 52, 751-771. Maiden, N., Ncube, C., Moore, A. (1997). Lessons learned during requirements acquisition for COTS systerns. Communications of the ACM, 40(12), 21-25. Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 3(2), 173-191. Murphy, B., Boren, R., Schlarman, S. (2000). Enterprise security architecture. CRC Press. Retrieved November 2, 2003, from http://www.pwcglobal.com Nelson P., Richmond W. , Seidmann A., (1996). Two dimensions of software acquisition. Communications of the ACM, 39(1), 29-35. Northcutt, S., McLachlan, D., Novak, J. (2000). Network intrusion detection: An analysts handbook (2nd ed.). IN: New Riders Publishing. Saita, A. (2001, June). Understanding peopleware. Information security, 72-80. Siponen, M.T. (2000). A conceptual foundation for organizational information security awareness. Information Management security, 5(1), 31-41. Strassberg, K., Rollie, G., Gondek, R. (2002). Firewalls: The complete reference. NY: Osborne McGraw-Hill. Straub, D.W., Welke, RJ. (1988). Coping with systems risk: security planning models for management decision making. MS Quarterly, 22(4), 441-469. Zwicky, E., Cooper, S., Chapman, D., Russell, D. (2000). Building Internet firewalls (2nd ed.). CA: OReilly.