Friday, September 6, 2019
My Grandparents and me Essay Example for Free
My Grandparents and me Essay My parents are both busy that is why I grew up with my grandparents and because of this, I know my grandparents very well and most of all I love them so much. Unfortunately, my grandfather passed away two years ago and that time I went to Cambodia for community service. Before I left for Cambodia, he even promised me that he would fight his illness for him to be still alive until I come back. Then one day, as I was working hard to assist poor Cambodians, I got a phone call about his death. Right away, I booked a flight to be able to attend to his funeral. When I arrived there, I cannot help but be in pain as I saw my grandfather lying dead. For this assignment, I called my grandmother to ask a few questions. She was honest enough that she has some differences with my generation. First, since Korea was conquered by Japan for 36 years, she still speaks Japanese with her friends. In significantly, she has some Japanese culture mind such as Japanese are usually more conservative and traditional than most of Koreans. Second, my generation is more used to high technology and adventure. My grandmother has her cell phone, which is twice bigger than what I have and she still does not know how to use computer. My growing society and my grandparentââ¬â¢s society are totally different. I am earning the worldââ¬â¢s best education in United States. But my grandparents were learning education while Korea was conquered by Japan. After independence from Japan, she also experienced difficulty from Korean War. She probably had the most difficult life than anyone else. He grew up in the poorest politics, society and economy. Her life is totally different than the life that I have. If I grew up in her generation, I will be really depressed and my life will always be in danger. As I compare my life with my grandmother, I can say that I more happy than her, and I am more blessed because I have not experienced such difficulties that she had especially during the times when Japan conquered Korea and the Korean War.
Thursday, September 5, 2019
Organisational Theory Essay Example for Free
Organisational Theory Essay Apple is a global giant whose success has been built on outsourcing to a range of other organisations located across the world. How can different organizational theory perspectives assist us in acquiring different understanding of Apple, its organizational network and influence? In this essay you must use at least two perspectives to analyze Apple. Introduction In this revolutionised world, changes occur rapidly, be it in an organized or disorganized way (Henry Veltmeyer 2008). Organisations are dealing with more complex systems and concepts. The study of organisational theories gradually gains importance because it involves the study of abstract issues relating to organisations. It is essential as it benefits in analyzing and discovering new meanings to life both inside and outside the organisation (Hatch and Cunliffe 2006). Appleââ¬â¢s innovative story has been told and retold all around us. Its success is largely due to the late co-founder, Steven Paul Jobs. With the passing of Steve Jobs, Apple Inc is still prospering and currently the most admired company is the world (Fortune 2012). In organisational theory, the success of Apple can be analysed into two perspectives that vary extremely; Modernist and Post-Modernist. The modernist attributes Appleââ¬â¢s success to its unique organisation chart and ââ¬Ëknowledge is powerââ¬â¢ organisation culture. Post-modernist give credits to Appleââ¬â¢s acknowledgement of discourses and environment influences related to the organisation. Appleââ¬â¢s ability to churn out great quantities of products to meet the demand and its consistent engagement with stakeholders showed the efforts to be competitive in the industry. It is also a significant contribution to its success. However, Appleââ¬â¢s way of achieving success is a cause of debate due to its pathological relationship with its stakeholders. This essay aims to provide an exploration into Appleââ¬â¢s Inc organisation; perspectives of its stakeholders and how the relationship towards its environment. The context of the essay will be separated into two parts. Part A and B. Part A will touch on the meta-theoretical assumptions of modernist and post-modernist and how it relates to organisationââ¬â¢s power, control and the environment. Part B will apply the assumptions and definitions in part A to analyze modernism and postmodernism perspectives on Apple. The focus will be on the ways that Apple demonstrates power and how it influences its environment and network which includes stakeholders. Part A Ontology Ontology is defined as the science or study of reality (McAuley, Duberley Johnson 2007). It seeks to clarify what are the reality and the phenomena we take to constitute aspects of the reality. Modernistââ¬â¢s ontological assumption is described as objectivism. It claims that social world and reality is in order and that the reality is in a rational, structured manner regardless of our knowledge (Boisot Mckelvey 2010). They view the existent of time is real regardless of the humanââ¬â¢s awareness because of humans develop hypothesis and propositions that showed the reality of time. On the other hand, there is no clear stance on the ontological assumption of postmodernism. It is developed in reaction of modernism position (Moore 2001). Postmodernist rejects and challenge the modernist view and argue that time is ââ¬Ëcreatedââ¬â¢ through the discourses of human because it provides meaning and assurance to humans. Epistemology Epistemology is the study of the criteria we set and how it justifies the belief. It seeks to clarify how beings create knowledge to claim the world is justified. Modernist takes a positive point of perspectives in viewing the world in search for knowledge. Modernistââ¬â¢s epistemological assumption is positivism, whereby rational hypotheses and practices of knowledge will define reality and understand nature(Hatch and Cunliffe 2006). They sees ââ¬Ëtruthsââ¬â¢ to be the discovery of the humanââ¬â¢s accurate hypothesis and conceptualization to be analyzed with the reality found in objective world. Nonetheless, postmodernism rejects modernismââ¬â¢s notion of ââ¬Ëtruthsââ¬â¢. It describes reality as an illusions created by languages and discourses. It refers to the subjective means by which humans organise what they perceive. Discourses are thoughts, written or spoken or any mediums that construct a particular phenomenon, they are in a social and politically linguistic framework that influences humans experience and understanding of it (Crowther Green 2004). Instead, postmodernist aims to provide an alternative explanation/meaning through the use of discourses. Methodology influence on Organisation Modernist Continuing from the epistemology of modernism, it sees apprehension of knowledge means understanding all aspect of an organisation functions. Ways of solving and analyzing organisation issues are developed to better manage and create profitability for the company. Modernism and the methodological term, positivism, underpin the structures and episteme legitimacy in this ââ¬Ënoisyââ¬â¢ world. Post-modernist Post-modern methodology lies in ââ¬Ëanti-positivismââ¬â¢, where language, discourse and deconstruction are the main influences. Language can have different meaning and different significance when combined with other words (Moore 2001). The construction that could be produce may vary extremely in different circumstances. Postmodernists call this idea the Ludwig Wittgensteinââ¬â¢s notion of language games. Knowledge creates and reproduces discourse that exercise power and distort the reality that modernist assumes. The concept of discourse emerges in ââ¬Ëpoststructuralist linguistics as a means of discussing the collective process that constructs and shapes language in use.ââ¬â¢ Deconstruction ââ¬Ëis a way of reading and rereading texts using different contexts in order to expose their fundamental instabilities and multiple interpretations.ââ¬â¢ Organisation Power and Control Organisations require power. Power in organisations has to operate on the phenomena of changing organisation practices and changing the ways in which organisation theorist have theorized the practices (Hatch and Cunliffe 2006). Max Weber suggested that power is making decisions according to planned results where the social actor gets to decide the means and ends of action. Political scientist, Robert Dahl further resides the relationship of the actor by suggesting that actors may be individuals or collective which leads to different instruments of power (Clegg, Courpasson Phillips 2006). ââ¬ËAââ¬â¢ can get ââ¬ËBââ¬â¢ to do something that ââ¬ËBââ¬â¢ would not otherwise do, just like the abstract ideology of billiard where the significant lies more on the strategy and gamesmanship behind the cue rather than final position of the balls. Anthony Giddens, expanded Weberââ¬â¢s definition of power stating that power involves a set of capabilities that intervene a given set of events by 2 distinct types of resources; allocative and authoritative. In modernist organisations, Weber argued, formal rationality would be best established and where dominance will be most complete. Modernism views power in organisations as a structure to coordinate activities in the pursuit of organisation goals. It seeks to impose order on the chaos and to integrate the competing interest and agendas so that a single, harmonious vision and a consistent set of premises govern the conduct of participants. The instrument of power is seen to resolve conflicts through negotiation and maximize control of operations. Modernist views controlling individuals in organisation necessary because employee possesses self-interest that will hinder organisation interest. The modernist control theories of bureaucracy, clan and agency will be applied on Apple. In contrast, Postmodernism theorist argues that unified goals can arise only when dominant actors delegitimize alternative interpretations and rationalities. It emphasizes the central role of power in shaping social institutions. The connection of power and knowledge is assumed to be inseparable and thus knowledge loses a sense of innocence and neutrality (Scott 2003). Postmodernist insist that the rational formal structure must be set alongside various informal systems that represent attempts to resist any single vision of order (Hassard 1995). Foucaultââ¬â¢s theories pointed out that resistance towards domination is inevitable as power comes from everywhere. Any form of resistance will just reinforce them (Clegg et al. 2006). It views power as a multi-dimensional because it is like a network that dispersed throughout social, political and organisational world. Organisation Environment and Network Organisational environment is anything residing outside the boundaries of organisation that may impact upon the organisation. The organisation needs to adapt well to its environment and vice versa for the relationship to operate in an ideal prospect (Hatch and Cunliffe 2006). Modernist believes there is boundary between organisation and the external environment. Environment relates the factors such as inter-organisational network and its stakeholders. Networks are defined as stakeholders, consumers, environmental groups, competitors and so on. Modernist theorist assumes that there are inputs and outputs between the organisation and environment. The environment empowers and constrains an organisation; it impacts upon organisational goals and needs to be managed. Stakeholder theory refers to any actor that is vital for the survival or success of the organisation, and because of the boundary, other factors does not concern. As the focus is explaining how environmental influence operates, modernist researchers developed theories to analyze the environment. The Environmental contingency and resource dependent theory will be applied on later on. On the other hand, postmodernist deconstruct the dominant assumptions such that organisations and the environment are two distinct entities where there is no fixed boundaries; organisations are part of the environment (Boisot and Mckelvey 2010). By deconstructing, it aims to better serve the societyââ¬â¢s needs and desires. Postmodernist theorist believes discourses used to define organisation-environmental relations are served to reinforce authority and inequality between an organisation and those ââ¬Ëexternalââ¬â¢ to the organisation. Its stakeholder theory examines the ethics of constructing our organisations in ways that acknowledge the rights of those whose lives are influenced by the organisation. Compared to modernist, the definition is wider because it has a boundary less organisation and environment. It includes actor that affects or is being affected by the organisation, therefore even factors outside of the organisation are being considered. Part B Appleââ¬â¢s Organisation Power Control This part of the essay aims to analyze and understand Appleââ¬â¢s organisation in different perspectives in terms of its organisation power and structure. In modernism, the notion of power is based on authority. This is where the CEO, has the right to exercise his power. Steve Jobs has been always at the center of attention for being ruthless in unsuccessful projects. For example, the failed venture of MobileMe in 2008 caused the disbanding of the team (Lashinsky 2011). This rationalization is what modernism lean towards as they believe bureaucratic justification will lead to technical efficiency. Modernist researchers analyze that positivism exist in Apple. Appleââ¬â¢s philosophy of only choosing the best of the best candidate during interviews mirrors Steve Jobs statement of ââ¬ËA worker hires A worker, B worker will hire C workerââ¬â¢ (Lashinsky 2012). It displays that only rational hypothesis of hiring and trusting talented employee through tried and tested results in the business world that will bring Apple success. In terms of output and behavior control of the employees, it is difficult to measure at times. Modernist theorist uses few methods of control theories to sought control over employees so as to maximize organisational interest. In modernist view, these theories can be applied to Apple accordingly. Bureaucratic and Clan theories aim to achieve a desirable corporate culture within the rules and authority among the employees. In Apple, there is a top down management where it all begins with the CEO, then to the executive team. They have a unique organisation circular structure where the CEO is at the center and the network of executives spread out from there. Late Steve Jobs also instilled a concept that the employeesââ¬â¢ working style are own task-oriented, which creates differentiation and departmentalization. The corporate culture also became more united and there is no more fiefdom. The successes of the products are credited to Steve Jobs ability to instill the ââ¬ËApple Wayââ¬â¢ strategy to give the organisation clear directions, individual accountability, sense of urgency and the change of focus to products instead of profits. Agency theory focuses on ensuring that the executives perform in the best interest of the organisation. The focus turns to performing for the organisation, therefore controlling outputs become more important. Performing employees gets to attend the famous Top 100 meeting which the CEO will personally invite them. This theory also emphasizes the success of secrecy working in a modernist perspective where Apple controls the information that concerns their products to height up the hype and gain more profits. Alternatively, postmodernist deconstruct power and control, rebutting the single dimension and views power presence throughout social, political and organisation world. Appleââ¬â¢s tip top secrecy organisation is well known (Lashinsky 2012). Postmodernists look at secrecy as a form of imposing a multidimensional power on its employees by the top management. Inside Apple, employees cannot have any resistant to the secrecy culture. Any resistant will result in greater power. Greater power comes in the sense of punishment; employees may get sacked (Clegg et al. 2006). More precautions will be also taken to minimize the chances of it happening again. Therefore, instead of seeing secrecy as a form of increasing efficiency and profits for the Apple, postmodernism argues that itââ¬â¢s a form of power that gives the top management control over the organisation. Another aspect of multidimensional power analyzed was the ability of Apple not making any indication to stop the global group who wants to boycott Apple products due to the massive suicides rate and pressure to increase workersââ¬â¢ wages at its main supplier, Foxconn. Postmodernist argues that in a one dimensional power situation (modernist perspective), Apple will find means to ââ¬Ëkillââ¬â¢ the enemy (the boycott group) with its powerful influence in the business world. Here, Apple is using a second dimension by not ââ¬Ëkillingââ¬â¢, but proving to the rest of the people that Apple is still an ethical and superior organisation. This way, Apple silently gets an army of ally to do the job to influence the boycott group to change its mindset. From another point of view, on the contrary, there is an increasing sign of fresh debates concerning postmodernism theory on whether is resistance really forbidden. The suicides cases at Foxconn and significant rise of terrorism in the past decade do post a serious question to postmodernist researchers (CCTV 2010). These extremes examples show signs that resistance might have, in fact, the ability to affect power positively. The suicides cases have indirectly forces Foxconn to reconsider its management styles and most importantly increasing the workersââ¬â¢ wages (Chan Pun 2010). Appleââ¬â¢s Environment and its Network Influence Appleââ¬â¢s relationship with the environment is a two way situation. The following theories will analyze how Apple operates under the environment and its network. In modernism, it can be argued that Apple seems to go against the environmental contingency theory. Apple has a vision to avoid over complicating by manipulating its environment and structure. Steve Job has been making his organisation to be simpler in every ways, from the responsibilities of the executives to its consistency simplicity of its store layouts (Froud et al. 2012). Its product variety is also purposely concentrated to a few. With the limitation of variety, Apple countered this shortcoming by introducing a multi-dimensional model which minimize cost and increase its revenue. This substantial amount of revenue also includes introducing Itunes and the unique operating system. This counterabilty of its shortcoming is related to the next theory; resource dependency (Fortune 2008). As modernist views organisation are dependent upon the environment for inputs and outputs. Theorist Pfeffer and Salancik emphasize that organisation are under the restriction of their environment hence the resource dependence theory was developed. The aim was to find counter-dependencies to prevent the organisation from over reliant on the market. Appleââ¬â¢s need for the analysis for its resources is due to its vulnerability in the environment and the power that environment holds. The environment has the power to make demands on the organisation, for example, increasing competitions and thus resulting in competitive prices, product differentiation and efficient organisational structures and processes. Appleââ¬â¢s relationship with its supplier, Foxconn, is a prominent example of appleââ¬â¢s ability to navigate the harsh world of environmental challenges to find ways of getting cheaper labour. The jobs created in China are twice compared to USA, but the differential in salary showed USA has a significant larger share of the payout (Freeland 2011). Apple also created counter dependency by having joint ventures with Samsung Electronics to have them make the processor chips and alliances with companies like Google and Youtube to make use of their world map and video applications. By inventing their own operating systems and programs, it also provides Apple with increase efficiency because they do not need to rely on the environment to react if they have any new ideas or concepts. Critics have argued that Apple has been adopting a narrow view on the perspective of stakeholder theory because they will neglect the factors that are indirectly connected to the organisation. This interpretation mirrors modernism due to its creation of the boundary of the ââ¬Ëoutsideââ¬â¢ world and its stakeholders. The comparison made earlier with the jobs created in China and USA suggested that Apple is adept at avoiding the social obligations to provide secure, internal, high quality employment for its own nation, USA. This generates another thought on business ethics that Apple is actually prioritizing on getting the highest profit margin (their average profit is already approximately 70% of selling price) instead of the reason of the competitive industry. On the other hand, postmodernist claims that stakeholder theory is an integration of the organisation and stakeholders, thus they see Apple actions to affect anyone who are affected even if it is indirect. In Appleââ¬â¢s website, they have the environmental responsibility page to ensure its stakeholders are assured that Apple do consider every factor that relates to its organisation to be taken care of (Apple 2012). Postmodernist also argued that by creating boundary between organisation and environment, there will be negative externalities. Appleââ¬â¢s ability to entice consumers with the introduction of Iphone 5 is a cause of negative externalities. Externalities such as driving the consumption rate of the society when Iphone 4s still have a long product lifespan, this creates another issue of environmental repercussions and increasing workload/stress issues at Foxconn. Appleââ¬â¢s does produce positive externalities in the process of unveiling their products. For example, consumer did not have to bear the cost of intense advertising by Apple because Appleââ¬â¢s strategy of using multi-dimensional power to influence the public to do the ââ¬Ëadvertisingââ¬â¢ for them worked. Blogs, video parody and even news were heavily speculating and discussing about the new products, thus bringing in ââ¬Ëfreeââ¬â¢ advertising as a form of positive externality to the consumers. Conclusion The modernist and postmodernist theories thus assist us in analyzing Apple in a different light. It has shown the different perspective of Apple in terms of power, control and its environment. It showed that power can be multi-dimensional and formidable. On the contrary, questions are being asked of postmodernismââ¬â¢s resistance stance and environmental contingency theory. Although this essay cannot attribute its success to a single perspective, it did make an conscious effort to explore and improve Appleââ¬â¢s organisation as a whole. Reference List Apple 2012, ââ¬ËSupplier Responsibilityââ¬â¢, USA, viewed 4 September 2012, http://www.apple.com/supplierresponsibility/code-of-conduct/environmental-impact.html. Boisot, M and Mckelvey, B 2010, ââ¬ËIntergrating Modernist and Postmodernist Perspectives on Organizations: A Complexity Science Bridgeââ¬â¢, Academy of Management Review, Business Source Complete, EBSCOhost, viewed 7 September 2012. CCTV 2010, ââ¬ËFoxconn Suicides Eng Subââ¬â¢, online video, viewed 4 September 2012, http://www.youtube.com/watch?v=Kz2U2R1ehvIfeature=watch_response%20foxconn%20suicides. Chan J, and Pun, N 2010, ââ¬ËSuicide as protest for the New Generation of Chinese migrant workers: Foxconn, Global Capital and the Stateââ¬â¢, The Asia Pacific Journal, 13 September, viewed 4 September 2012,https://equella.rmit.edu.au/rmit/items/d672ebbc-eca6-6b5c-4a53-a1392211693c/1/31259010341480.pdf?.hb=true. Clegg, SR, Courpasson, D and Phillips, N 2006, ââ¬ËPower and Organizationsââ¬â¢, SAGE, London. Clegg, SR, Hardy, C, Nord, WR and Lawrence, T 2006, ââ¬ËThe Sage handbook of organization studiesââ¬â¢, Sage Publications, London. Crowther, D and Miriam, G 2004, ââ¬ËOrganisational Theoryââ¬â¢, CIPD Publishing, London. Fortune, 2012, ââ¬ËWorldââ¬â¢s most admired companiesââ¬â¢, CNN Money, 19 March, viewed 1 September 2012, http://money.cnn.com/magazines/fortune/most-admired/2012/snapshots/670.html. Fortune, 2008, ââ¬ËSteve Jobs speaks outââ¬â¢, CNN Money, 7 March, viewed 4 September 2012, http://money.cnn.com/galleries/2008/fortune/0803/gallery.jobsqna.fortune/8.html. Freeland, C 2011, ââ¬ËHow the ipod explains globalizationââ¬â¢, The New York Times, 30 June, viewed 4 September 2012, http://www.nytimes.com/2011/07/01/world/asia/01iht-letter01.html. Froud, J., Sukhdev, J., Leaver, A., and Williams, K 2012, ââ¬ËApple Business Model: Financialization across the Pacificââ¬â¢, CRESC Working Paper Series, Vol. 111 , viewed 4 September 2012, http://www.cresc.ac.uk/sites/default/files/WP111%20Apple%20Business%20Model%20%28April%202012%29.pdf. Hassard, J 1995, ââ¬ËSociology and Organization Theory: Positivism, Paradigms and Postmodernityââ¬â¢, Cambridge University Press, Cambridge. Hatch, MJ and Cunliffe, AL 2006, ââ¬ËOrganization Theory: modern, symbolic, and postmodern perspectivesââ¬â¢, 2nd edn, Oxford University Press, New York. Lashinsky, 2011, ââ¬ËHow Apple works: Inside the worlds biggest startupââ¬â¢, CNN Money, 25 August, viewed 2 September 2012, http://tech.fortune.cnn.com/2011/08/25/how-apple-works-inside-the- worlds-biggest-startup/. Lashinsky, A 2012, ââ¬ËInside Apple : how Americas most admired-and secretive-company really worksââ¬â¢, Business Plus, New York. Marinaccio, MJ 2007, ââ¬ËOrganization Structure and Its Impact on the Power/politic Dynamic: A Mixed Method Exploration of Senior Management Perceptions of Formal and Virtual Organizationsââ¬â¢, Capella University School of Business, ProQuest Dissertations and Theses, viewed 1 September 2012, Proquest. McAuley, J, Duberley, J and Johnson, J 2007, ââ¬ËOrganization theory: challenges
Preventing Cyber Breaches
Preventing Cyber Breaches Jacob Malone The digital universe is growing at an astonishing 40% every year. With this kind of growth cyber security is more import today than any time in history. Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access (Rouse, 2016). In 2015 the global cybersecurity market hit $75B and is expected to reach over $170B by 2020. Cyber risk has become an international priority due to fears that cyber-attacks or security failures could lead to a global economy collapse. Cyber crime costs the global economy over US$400 billion per year, according to estimates by the Center for Strategic and International Studies. In 2013, some 3,000 companies in the United States had their systems compromised by criminals, the Center reports (Gabel, Liard, Orzechowski, 2015). These cyber-attacks fall into two main categories: breaches in data security and sabotage. A security breach can be anything from targeting personal data to gaining trade secrets to information pertaining to bids or mergers. On the other hand attackers my send denial of service attacks in order to sabotage the infrastructure in order to gain information. Since the late 1980s there have been several critical cyber-attacks. In 1989 the first computer worm was created by Robert Morris that spread so hastily that it shut down the majority of the internet. Fast forward to 2008 and Heatland Payment Systems suffered suffered from one of the largest credit card information breaches in history. It is estimated that over 130 million records were compromised. Their system was corrupted by malware that was inserted into their network that recorded credit card data as it was received from retailers. Finally, in 2015, China attacked the federal government in which they stole PII for over four million federal employees spanning almost every government agency. Officials said the thieves broke in by using stolen contractor logins and passwords (Nakashima, 2015). Once the attackers gained access to OPMs network they installed a malware package the created a backdoor. From there they were able to escalate their rights and privileges in order to access more of OPMs network. The hackers got away with names, birth dates, home addresses, and Social Security numbers (Castelluccio, 2015, p. 79). Almost a year passed before OPM realized they had a problem that discovered irregular SSL traffic by using a decryption tool that was install a few months earlier. Once discovered they reported the discovery to DHS U.S. Computer Emergency Readiness Team which began the investigation. The discovery of a threat to the background investigation data led to the finding two days later, on April 17, of a risk to the personnel records. US-CERT made the discovery by loading data on the April 15 incident to Einstein, the departments intrusion-detection system. On April 23, US-CERT spotted signs of the Dec. 15 exfiltration in historical netflow data, and OPM decided that a major incident had occurred that required notifying Congress. (Lyngaas, 2015) After a thorough investigation it was undetermined how the hackers acquired the credentials from the contractor KeyPoint Government Solutions. In the wake of the disaster OPM deployed a predictive malware prevention across their network in order to sever the attackers network access. In addition, the agency used an advanced host-based security tool to discover, quarantine and eliminate [the] malware (Lyngaas, 2015). In the end, the Chinese government arrested the hackers that were responsible for the attack. OPMs network was protected by one major Department of Homeland Security (DHS) program called Einstein. The Einstein system, which DHS began deploying in 2005, focuses on the perimeter of federal networks by installing sensors at Web access points and sifting through that data for vulnerabilities (Lyngaas, 2015). This system is only a first line of defense with nothing else to help back it up in case of an intrusion. In order to have avoided this attack or minimize the devastation these programs needed to be accompanied with tools such as masking, redaction, and encryption. OPM could have also used data masking or redaction and encryption techniques to minimize the damage done by the attackers. Data masking obfuscates sensitive data by replacing it with other data typically characters that will meet the requirements of a system designed to test or still work with the masked results. Masking ensures vital parts of personally identifiable information (PII) (Simpson, n.d.). This is commonly used in organizations that work with sensitive data like PII. The sensitive data is masked or redacted in order to protect the information since it passes through so many hands. For example, the first five digits of a social are typically covered or masked is Xs in order to protect the information leaving only the last four digits legible. This process, once completed, is irreversible. Data encryption involves converting and transforming data into scrambled, often unreadable, cipher-text using non-readable mathematical calculations and algorithms. Restoring the message requires a corresponding decryption algorithm and the original encryption key (Simpson, n.d.). This process is used in organizations where data needs to be transferred between networks or computers. During this process the data is converted to non-legible gibberish like ciphertext. The only real way to gain access to this data is to have a special key or password that only authorized users have access to. Encryption Masking Reversible Highest security Trusted with security proofs Realistic data Format-preserving and partial reveals Range and value preserving De-centralized architectures Format-preserving and partial reveals Complex No performance impact on usage Key management Zero need for authentication and authorization and key management Useless without robust authentication and authorization Not as well marketed Data value destruction Not reversible Table 1 Given the scenario of OPMs data breach encryption would not have prevented the breach or loss of data. This is largely due to the fact that the perpetrators had valid user credentials and would be able to access the network just like any other user. The best way to have prevented this attack would have been the timely detection of the intrusion. It can take days or weeks for an intruder to navigate their way around a system and successfully compromise data. During this point if you can identify a breach you can contain the infiltrator before he can accomplish his mission. This could mean the difference between a catastrophic breach and unauthorized user access. Since the attack DHS developed the Continuous Diagnostics and Mitigation (CDM) program. It focuses on endpoint security and identity management. Furthermore, it provides a dashboard to allow network administrators to view vulnerabilities and provides continuous monitoring. Finally, it also has the ability to identify bad sectors of the network once an attacker is through the perimeter. Also, President Obama signed an Executive Order to create the Information Sharing and Analysis Organizations (ISAOs) to buffer between government and industry. The Order presented a framework for enhanced information sharing with the purpose of encouraging private sector companies to work together and work with the federal government to identify cyberthreats (Russo Rishikof, 2016, p. 427). In conclusion, it is highly unlikely that OPM could have completely prevented this attack. However, there are steps they could have taken in order to mitigate the devastation that was caused. Although if encryption techniques were used it would not have protected the information due to the fact the intruders were operating under valid credentials. However, if the data was masked then a limited amount of PII would have been available. Furthermore, if there was a more timely detection of the attackers the damage would have been significantly less. Finally, with the new Executive Order signed by President Obama is a step in the right direction to strengthen cyber security and prevent future attacks. References Castelluccio, M., (2015). The biggest government hack yet. Strategic Finance, 97(8), 79-80 Gabel, D., Liard, B., Orzechowski, D. (2015, July 01). Cyber risk: Why cyber security is important. Retrieved March 07, 2017, from https://www.whitecase.com/publications/insight/cyber-risk-why-cyber-security-important Lyngaas, S. (2015, August 21). Exclusive: The OPM breach details you havent seen. Retrieved March 07, 2017, from https://fcw.com/articles/2015/08/21/opm-breach-timeline.aspx Lyngaas, S. (2015, June 5). Security experts: OPM breach shows Einstein isnt enough. Retrieved March 07, 2017, from https://fcw.com/articles/2015/06/05/opm-einstein.aspx Nakashima, E. (2015, July 09). Hacks of OPM databases compromised 22.1 million people, federal authorities say. Retrieved March 07, 2017, from https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/?utm_term=.976d563a63f2 Rouse, M. (2016, November). What is cybersecurity? Definition from WhatIs.com. Retrieved March 07, 2017, from http://whatis.techtarget.com/definition/cybersecurity Russo, K., Rishikof, H., (2016). Cybersecurity: Executive Orders, Legislation, Cyberattacks, and Hot Topics. Chapman Law Review, 19(2), 427. Simpson, J. (n.d.). Data Masking and Encryption Are Different. Retrieved March 07, 2017, from http://www.iri.com/blog/data-protection/data-masking-and-data-encryption-are-not-the-same-things/
Wednesday, September 4, 2019
AXI Case Study :: essays research papers
Income Disparities of women in the Workplace The existence of male-female income and gender discrimination in the workplace has been noted in countless countries. Over the past few decades, laws barring discrimination in education and employment have helped give workingwomen many opportunities that our mothers never had. Because of these opportunities, women began working in many different fields, each requiring different skills and experience with different pay wages. Although these opportunities has opened many doors for working women all over the world, the doors for pay discrimination still remains tightly shut for women in the workplace. While significant progress has been attained in furthering gender discrimination between men and women in the workplace, countries such as the United Stated and Japan still seems to be reluctant, to grant true income equality in towards women compared to their male counterparts. Thirty years ago women earned just over half the pay of their male counterparts. This was supposed to be resolved with the passage of the federal Equal Pay Act of 1963. Under this act, employers must pay women the same as men for work that is "substantially equal." Additionally, Title VII of the Civil Rights Act of 1964, which covers employers with 15 or more workers, prohibits pay differences based on gender and bars discrimination against women in hiring, promotion, training, discipline and other job aspects . Despite the existence of such laws, unfortunately workingwomen continue to earn less than men. It's extremely obvious that women have come a long way in the labor force ever since the 19th century. At present time, women account for nearly half the nation's workforce, but due to pay discrimination there has been a wage gap that does not seem to close between men and women. For instance, the typical workingwomen in Japan earns 63 percent of the average manââ¬â¢s pay . While in the United States, the average American woman earns about 74 cents for every dollar the average man earns . In comparing these figures, Japanese women are at even more of a disadvantage in the workplace than their peers in the United States. As stated above, laws have been in placed for years that strictly prohibit any type of discrimination in the workplace. So why does the wage disparity persist? In Japan, it is because of traditional expectations that women marry young and devote themselves to child rearing. This factor is always usually the case with Japanese women, however number of women who continue careers after marriage is growing, but companies have been slow to accommodate their needs for child care or maternity leave .
Tuesday, September 3, 2019
Moral or Immoral Essay -- Martin Luther King Essays
Moral or Immoral In Martin Luther King Jr.ââ¬â¢s essay, A Letter from Birmingham Jail he compares the issues of Moral acts verses Immoral acts. This essay was written in response to a letter some clergymen had written after a direct action march Dr. King had participated in. In their letter the clergymen had praised the local police officers and media for the nonviolent and calm manner in which the situation was handled. It was this praise that prompted Dr King to write: ââ¬Å"I have tried to make clear that it is wrong to use immoral means to attain moral ends. But now I must affirm that it is just as wrong or perhaps even more so, to use moral means to preserve immoral ends.â⬠The beginning of this statement refers to the idea of using violence to get the result that you feel you deserve. The second part to this statement refers to doing the right thing to ensure that an injustice will prevail. It is this issue of moral verses immoral that Doctor King bases. The first example of the morality issue Dr. King raises is a just law, verses an unjust law. In his essay Dr King describes to his readers the difference between the two. ââ¬Å"A just law is a man-made code that squares with the moral law or the law of God. An unjust law is a code that is out of harmony with the moral law." Here Doctor King is defending his belief that there is a moral issue in some laws. He defends his statement by giving an example of Germany during the Nazi rule. King discusses what Hit...
Monday, September 2, 2019
Great Expectations, Little Dorrit Essay -- Great Expectations Essays
Charles Dickens used his own personal experiences and views to create the setting in his novels, as it is seen in Great Expectations, Little Dorrit, and Bleak House. The role of the setting in each book is to create the mood and support the characters. (Davis 350) In Dickensââ¬â¢ novels the setting helps the reader better understand the time period and the problems the people of London faced with the political and social structure in place at the time. It also gives insight into the lives of the people through the intricate detail. Many times in Dickens novels, the setting becomes a character itself and without it the story would be incomplete. Dickens attention to detail is part of what makes his novels so unique and original. In order to see the influence Dickensââ¬â¢ experiences had in his books, first one must know a little of his history. Charles Dickens was born on February 7, 1812 to John and Elizabeth Dickens. (Kaplan 18) During most of his childhood they lived in London and this is where most of his settings come from. John Dickens had a hard time living within his means and when Charles was 12 his father was sent to the debtorsââ¬â¢ prison, known as the Marshalsea. (Kaplan 39) While John was in prison Elizabeth and their other children lived at the Marshalsea with him, but Charles was sent to work in a factory to help support the family and pay off his fatherââ¬â¢s debt. (Kaplan 41) This time in Charlesââ¬â¢ life would always be a haunting memory for him and it influenced many of his stories. After a year Johnââ¬â¢s mother died, leaving him enough money to pay off his debts and he was released from the Marshalsea. Even after his fatherââ¬â¢s release from prison, Dickens mother made him continue to work at the factory. This time caused him to be b... ...d distinct. Many of the settings in Great Expectations and Little Dorrit come from Dickensââ¬â¢ childhood experiences, such as the dock yard, the Marshalsea and working in the factory. He paints vivid pictures with words to show the reader exactly how he saw things. Bleak House shows his strong beliefs and views about the political system of England during this time. He uses the story to show exactly how unorganized and corrupt the political system was at the time. These novels are great examples of how the setting plays a role in the story, by creating the mood and helping the reader better see into the lives of the people living during that time. The major role the setting plays in these stories is the insight into the beliefs of the author and the experiences he had growing up in and around London in the nineteenth century, as it is portrayed by him in his works. Great Expectations, Little Dorrit Essay -- Great Expectations Essays Charles Dickens used his own personal experiences and views to create the setting in his novels, as it is seen in Great Expectations, Little Dorrit, and Bleak House. The role of the setting in each book is to create the mood and support the characters. (Davis 350) In Dickensââ¬â¢ novels the setting helps the reader better understand the time period and the problems the people of London faced with the political and social structure in place at the time. It also gives insight into the lives of the people through the intricate detail. Many times in Dickens novels, the setting becomes a character itself and without it the story would be incomplete. Dickens attention to detail is part of what makes his novels so unique and original. In order to see the influence Dickensââ¬â¢ experiences had in his books, first one must know a little of his history. Charles Dickens was born on February 7, 1812 to John and Elizabeth Dickens. (Kaplan 18) During most of his childhood they lived in London and this is where most of his settings come from. John Dickens had a hard time living within his means and when Charles was 12 his father was sent to the debtorsââ¬â¢ prison, known as the Marshalsea. (Kaplan 39) While John was in prison Elizabeth and their other children lived at the Marshalsea with him, but Charles was sent to work in a factory to help support the family and pay off his fatherââ¬â¢s debt. (Kaplan 41) This time in Charlesââ¬â¢ life would always be a haunting memory for him and it influenced many of his stories. After a year Johnââ¬â¢s mother died, leaving him enough money to pay off his debts and he was released from the Marshalsea. Even after his fatherââ¬â¢s release from prison, Dickens mother made him continue to work at the factory. This time caused him to be b... ...d distinct. Many of the settings in Great Expectations and Little Dorrit come from Dickensââ¬â¢ childhood experiences, such as the dock yard, the Marshalsea and working in the factory. He paints vivid pictures with words to show the reader exactly how he saw things. Bleak House shows his strong beliefs and views about the political system of England during this time. He uses the story to show exactly how unorganized and corrupt the political system was at the time. These novels are great examples of how the setting plays a role in the story, by creating the mood and helping the reader better see into the lives of the people living during that time. The major role the setting plays in these stories is the insight into the beliefs of the author and the experiences he had growing up in and around London in the nineteenth century, as it is portrayed by him in his works.
Sunday, September 1, 2019
Michael Jackson : 30th Anniversary Special and Product Design
Republic of the Philippines TECHNOLOGICAL UNIVERSITY OF THE PHILIPPINES Office of the Vice President for Academic Affairs Industrial Relations and Job Placement Ayala Boulevard, Ermita, Manila NARRATIVE REPORT ON SIT PROGRAM Product Design and Development Technology (PDDT) Work Stations: Product Design and Development Center of the Philippines (PDDCP) ââ¬â CCP Complex Christmas Decor Producers and Exporters Association of the Philippines (CDPEAP) ââ¬â CITEM Compound Chamber of Furniture Industry of the Philippines ââ¬â Cebu (CFIP-Cebu) ââ¬â ManilaFAME 2013 at SMX Convension CenterFrom November 12, 2012 to March 25, 2013 TABLE OF CONTENTS I. Introduction II. Jobs Performed in the Company a. TINUKIB ââ¬â Iloilo Showroom and Souvenir Shop i. Modular Designs for Shelving ii. Space Planning iii. 3D Rendering using ââ¬Å"Google SketchUpâ⬠and ââ¬Å"Vrayâ⬠iv. Floor Plan (autoCAD) v. Working Drawings of displays (autoCAD) b. TINUKIB ââ¬â Iloilo Cafe i. 3D Rendering using ââ¬Å"Google SketchUpâ⬠and ââ¬Å"Vrayâ⬠c. Technology Updating Workshop i. Bleaching and Dyeing of Fibers ii. Palm Frond Making iii. Hand papermaking iv. Papier Macheââ¬â¢ v. Finishing for Furniture vi. Finishing for Gifts and House Wares ii. Finishing for Paper and Paper Products viii. Lamination of Palm Husk and Seed d. Design Talks i. Rey Soliven ââ¬â ii. Sionil Jose ââ¬â National Artist for Literature e. Lectures i. Benjamin ââ¬â Trends and Forecast Sources ii. Rowe Requejo ââ¬â Full Sizing and Furniture Aesthetics iii. Ben Bacamante ââ¬â Creative Thinking f. CDPEAP Christmas Decor Designs g. CDPEAP-PDDCP-DTI Source Book in Indigenous Materials ââ¬â New Design Team with Mr. Robert Alejandro of Papelmeroti i. Product Design ii. Product Development iii. Product Design Expansion iv. Book Layout v. Layout Cover vi. Prototype Supervising ii. Product Photo-shoot h. Ikenobo-Ikebana Society of Manila 30th Anniversary Celebration à ¢â¬â Organizer with Dr. Romeo Balderama Jr. from CDPEAP i. Event Wall ii. Event poster for Shangri-La Plaza iii. Sarilikha Leaflets iv. Abaca Atelier Association Leaflets v. Anniversary Book Design vi. After Party Invitations i. Vina Domingo-Roy Exibit i. Opening Committee j. Manila FAME ââ¬â PDDCP Booths and PDDCP Employees, ââ¬â Next One Now with CFIP-Cebu, Leslie Mejares, Rey Soliven and Joey Yupangco ââ¬â OTOP with Joanna Raymundo, Ryan Tresvalles and Jinggoy Buensuceso i. The OTOP Marketplace (Ingress) i. The OTOP Marketplace ââ¬â Visual Merchandising Team iii. Next One Now Design Awards CFIP-Cebu ââ¬â Assistant Judge for Lesti iv. PDDCP Information Booth v. PDDCP Booth ââ¬â Color Trends 2013 vi. The OTOP Marketplace (Egress) III. Experiences a. Knowledge i. Applied from School ii. Learned from Training b. Skills i. Applied ii. Developed c. Values i. Learned ii. Applied d. Human Relationships i. Observed ii. Applied IV. Problems a. School b. Company V . Suggestions and Recommendations VI. Requirements a. Daily Work Activities b. Time Records c. Evaluation Sheet d. Certificate
Subscribe to:
Posts (Atom)