Friday, December 27, 2019

Consciousness Among African Americans Women Essay

Consciousness Among African Americans Women Samantha Venturina Middlesex County College Abstract Race and ethnicity play a crucial role in one’s life. Communities worldwide were developed around diverse racial and ethnic identities whom proffer internal sources of resilience to others in the community. However, these aspects can consist of adverse social consequences that influence an individual’s chances of receiving quality medical care, getting a job offer or loan, and/or being falsely accused by authoritative figures. In addition to these hostile effects, one would ponder if it has a detrimental effect a person’s own self-esteem. Recall the racial, class, and social inequality in the United States of America in the 1960s (Eaton, Livingston, McAdoo, 2008). Those who were considered minorities, such as the Chinese, Japanese, Indian, and various other races, dealt with the earliest form of discrimination back in the days. For an elongated time, African Americans were especially susceptible to the harsh and cruel discrimination in America as described in hi story classes. Given the prolonged exposure to such negativity, numerous social scientists were puzzled on whether the psychological health of African Americans was possible. While there were several studies that found race-related attitudes to be positively related to healthier psychological outcomes in African Americans; there were only an insufficient amount of reports that endeavored to assess what factors precedeShow MoreRelatedThe Harlem Renaissance1209 Words   |  5 Pagesï » ¿The Harlem Renaissance represents the rebirth and flowering of African-American culture. Although the Harlem Renaissance was concentrated in the Harlem district of New York City, its legacy reverberated throughout the United States and even abroad, to regions with large numbers of former slaves or blacks needing to construct ethnic identities amid a dominant white culture. The primary means of cultural expression during the Harlem Renaissance were literature and poetry, although visual art, dramaRead MoreDu Bois : A n Important American Thinker1744 Words   |  7 PagesW. E. B. Du Bois was an important American thinker, philosopher, poet, economic historian, social critic, and sociologist. His work challenges our own categorization and how we see each other in society. The article focuses merely on Du Bois contribution to philosophy. The reader must keep in mind throughout reading the article that Du Bois is more than a philosopher he is a countless social leader. His extensive efforts all seem to come down to one common goal in the article, the equality of coloredRead MoreThe Memos On Women During The Civil Rights Movement Essay1554 Words   |  7 Pagesboth races. Two Memos on Women Women learned from their involvement with the civil rights movement to â€Å"think radically about the personal worth and abilities of people whose role in society had gone unchallenged before.† These thoughts, naturally, became part of how women began to place themselves within the civil rights movement and to truly start to think about what being a woman in a civil rights organization, like SNCC meant. In a way SNCC acted similarly to the radical abolitionists of theRead MoreCaribbean American Women1256 Words   |  5 Pagesfrom the reality of upcoming scholars having to laboriously quote Euro-American male scholars in order to establish them within their field. Under this standard what we find is that in the constant referencing of these European scholars the racial and cultural hierarchy of western society is sustained. Boyce suggests that common favoring of European scholarly contributions reinforces structural biases towards the consciousness of those in the periphery . As a result, western epistemology continuesRead MoreThe Portrayal Of Hip Hop Music991 Words   |  4 Pages It’s obvious that a lot of African American men and women, especially young men and women, get a lot, if not most of their gender messages from hip hop music. Especially those messages and ideas that revolve around sex, friendship, love, and marriage. It’s in my opinion that hip-hop music is more misogynistic to black girls and women than any other form of media consumed by this demographic. The derogatory lyrics, the soft-porn visuals. and the attitudes and behaviours of the industry are embeddedRead MoreWashington, Dubois, And Douglas1513 Words   |  7 PagesWashington, DuBois, and Douglas What was Washington urging African Americans to do? What was he urging white Americans to do? Washington s plea for people to cast down buckets where you are How does this relate to his view of his new era? Booker T Washington was a social activist who advocated for increased rights of African Americans in the South. In Booker T Washington s speech he was urging African Americans to have patience with White Americans and accept discrimination from the white men and toRead MoreThe Dangers Of Blaxploitation Films Essay1520 Words   |  7 Pagesmovies in American society were at an all time high in the 1970’s. They gained popularity during and after the civil rights movement due to the influence African Americans were having on society. The movie Coffy, directed by Jack Hill and release in 1973, is a great example of how Blaxploitation movies reinforced the stereotypes that already exist about black men and women. Young African American filmmakers, made lots of these types of movies in order to appeal to the young African American crowd. Read MoreResponsibility And The Black Artist1654 Words   |  7 Pagesand moral responsibility to use their art to improving and uplifting Afric an Americans and their culture. Wright believed that black artists should use their work to advocate for their race and to help address social issues and make changes for the better. Wright also believed that black artists were too caught up in trying to appeal to white audiences. Wright wanted African American artists to create work for African Americans instead. Wright’s stance on black art being made for a black audienceRead MoreCommunication Between African American Mothers and Their Daughters1740 Words   |  7 PagesAfrican American Mothers and Their Daughters Introduction A girls communication and relationship with her mother are influential to her development and well-being. Communication between mother and daughter entails sending, receiving and comprehending each other intended message. According to Belgrave (2009), majority of girls report positive relationships with their mothers. Most girls learn from their mothers. This is because mothers teach and socialize with their daughters regarding any facetRead MoreThe Beliefs Of Misconceptions And Gender, Race, And Sexuality1472 Words   |  6 PagesCollins approaches the beliefs of misconceptions already existent towards multi social groups’ underlying different issues mostly affecting African Americans. These issues highlighted by Collins include, â€Å"a set of ideas and social practices shaped by gender, race, and sexuality that frame Black men and women’s treatment of one another, as well as how African Americans are perceived and treated by others† (p.7). These ideas encaps ulate a false understanding of the issues surrounding the persecutions the

Thursday, December 19, 2019

Epistolary Novels and Mimetic Devices - 1256 Words

CHAPTER FIVE: Epistolary Novels And Mimetic Devices We have seen how the use of mimetic devices contributed to Still Alice and Turn of Mind. In Chapter FIVE I explore the possibility of using Facebook, (a twenty first century mode of communication), as a mimetic device to augment conventional prose fiction. In this chapter I want to show how mimetic devices such as letters, bank statements and reports have already been used in epistolary fiction so that I can consider their use as models for my own work. I touch briefly on the history of the use of mimetic devices in the epistolary novel and go on to discuss how mimetic devices in So Much For That , House Mother Normal and Flowers for Algernon allow us to hear different voices and create texture. In SMFT chapters are headed with a bank statement showing how illness drains people’s savings. In HMN, each character is preceded by a clinical report which includes their cognitive ability. FFA uses a diary or â€Å"progris report† to tell the story. I discuss how these mimetic devices contribute to the story. In the 18th century, letter writing took on great importance as a new mode of communication. (Studying the Novel 2001) In Pamela by Richardson, letters between Pamela and her family are used to tell the story of Pamela’s resistance to seduction by her employer. The reader is puzzled by the sudden cessation of Pamela’s family’s replies to her letters, only to find that this is because Pamela’s employer has insisted onShow MoreRelatedHumanities11870 Words   |  48 PagesImpressionism and Post Impressionism. National Gallery of Art. Abbeville Press Publishers, New York. MAJOR AREAS OF ART ~Literary Arts Are those presented in the written mode and intended to be read.   These include prose and poetry.  (e.g. novels, short stories, sonnet, ballad, epic, essay) ~Visual Art Are those forms perceived by the eyes.   These include painting, sculpture,  and  architecture   ~Audio Visual Art   Ã‚  Ã‚  Ã‚   Are those forms perceived by both ears (audio) and

Wednesday, December 11, 2019

Accounting Compliance and Regulation free essay sample

In the recent years Redlands Manufacturing, Inc. has been audited and subjected to constant fiscal penalties due to fraudulent financial reporting on the companies part. Due to the following incorrect procedure the company has had to paid a tremendous amount fines: Channel Stuffing: Incorrect Practice: For financial gain, Redlands Manufacturing, Inc. shipped equipment to vendors with out a full merchant agreement and agreed to except returned merchandise back if it was not sold by yearend. This can inflates the sales figures which will increase your assets. By Redlands not recognizing the allowance for the merchandise when the products are returned, this results in false reporting of assets and cash flow. If accounting records of the company are reporting false monetary, then the company may over extend themselves. This is poor management and can be detrimental to the company. Vendor Dinging: Incorrect Practice: Redlands made a false claim to some of their suppliers. We will write a custom essay sample on Accounting Compliance and Regulation or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Stating the merchandise supplied by the supplier was damaged and in exchanged for customer satisfaction the supplier gave Redlands a discount on the merchandise order. In reality the merchandise was not damage but was used for regular company production. Redlands received merchandise at discounted rates, which will alter accounting records because it is not an accurate account of supplies being used for manufacturing and sold at the cost of production. Again, this will show an increase in cash flow which is not accurate. Capitalizing Revenue Expenditures: Incorrect Practice: Redlands reported multiple expenses as 1-time expense on balance sheets as long-term assets instead of an expense for the current fiscal year. Some items were recognized a current expenses, which was refer to as depreciation. If the company continues to file documentation in this fashion then the company is allowing depreciation for incorrect expenses showing a higher capital gain. Special Purpose Entities (SPEs): Incorrect Practice: Redlands deliberately did not record liabilities to its balance sheet because the debt was financed through a third party (SPE), which, consisted of businesses established by Redlands executives. When setting up a SPE, there are certain standards that need to be applied. If standards are not meet, Redlands could hide losses and fabricate earnings like the Enron scandal. Redlands should report any liabilities on their balance sheet especially since Redlands executives new what was going on. Round Tripping: Incorrect Practice: Improperly documentation of revenue and expense. In exchange for company expenses (internet, television, etc. ), Redlands would provide company products to these companies. Redlands reported the financial revenue saved by not paying for the expenses but did not report company expenses. This portrayed a facade for the company as having more money then original possessed. Also, you will not be able to determine which type of advertisement was beneficial to the company. If you don’t document your expenses it will give a false calculation for your profit and loss for the year. The revenue recognition principle dictates when revenue is recognized and reported as income. My purpose of this correspondence is to inform and educate Mr. Bacon about these inappropriate transactions and how specific practices of accounting that are set forth by the federal government to properly comply with all business in the US need to be followed. The accounting department provides organizational stakeholders with financial data about it’s operations, investments, and financing activities. Financial accounting provides information about the company to investors, creditors, and the public, if improper practices such as these acts stated above are reflected in company history then the Redlands can jeopardize the reputation of the company and lose potential and current investors. Redlands has altered financial statements, which monitor the company’s cash flow, if information such as round tripping and vendor dinning occur then, the tracking of inflow and outflow of cash is incorrectly being monitor eaving huge room for error and fraudulent transactions by the company. My recommendation is that the following fraudulent financial transaction be corrected immediately and update records so that they comply with all federal regulation and state laws. Also, I would fire each management that let these types of transaction continue. Each one of theses arrangements are inexcusable, you don’t have to be an accountant to know that they are wrong.

Tuesday, December 3, 2019

Mernissi Essays - First Fitna, Sahabah, Arab Muslims, Quraish

Mernissi Mernissi makes the claim that "Any man who believes that a Muslim woman who fights for her dignity and right to citizenship excludes herself necessarily from the umma...is a man who misunderstands his own religious heritage, his own cultural identity" (Mernissi viii). She goes about supporting this claim by delving into the very detailed documentation of Islam history. She attributes misogyny in the past and present Muslim culture to the male elite. She gives many examples of how Muhammad and Islam have only supported equality of the sexes and also how the male elite used false hadiths and very narrow interpretations of the Koran and true hadiths for their purpose. She begins by describing how the male elite started running things right from the onset of Muhammad's death. When a successor to Muhammad was picked, it did not involve the people of the community at all or any women. It was done by a small group of followers which were very close to the prophet, a sort of elite group. This sort of leadership in Islam continued in the same manner as only the elite were involved. This helped preserve what they thought was essential and according to the interests of the participants the essentials varied. The fabrication of false hadiths by the male elite was probably the first and most popular way for them to protect their interests. The people governing knew how important it was to "seek legitimacy in and through the sacred text" (Mernissi 43). Mernissi talks about al-Bukhari, who methodically and systematically collected and verified true Hadiths. He was exiled from his native town because he refused to bring the knowledge of the Hadith to the governor of the town and have it corrupted. He knew that the invitation from the governor was made only for him to probably fabricate some Hadith which would benefit the politicians. Many did not follow al-Bukhari's example but allowed themselves to be bought for a price and fabricated Hadiths for the politicians. Even Companions of the Prophet fabricated Hadiths in order to promote their own personal views. In the case of the Hadith which states, "Those who entrust their affairs to a woman will never know prosperity", Mernissi argues that this Hadith was never uttered by the Prophet and probably made up for personal reasons of Abu Bakra, who claimed to have heard the Hadith spoken by the Prophet. First, she finds out from research that he must have had an excellent memory because he recalled the Hadith about twenty-five years after the Prophet supposedly uttered it. At the same time "the caliph `Ali retook Basra after having defeated `A'isha at the Battle of the Camel" (Mernissi 50). This leads Mernissi to wonder if Abu Bakra made up the Hadith to give reason for not supporting `A'isha in the fitna. Mernissi also attacks the morals of Abu Bakra and finds out that he had been found to give false testimony in a case to the caliph `Umar. So with the improbable case of extraordinary memory and lying in other areas of his life, Mernissi gives reason to reject Abu Bakra as a reliable source of Hadith. Mernissi discounts another Hadith made by Abu Hurayra, "The Prophet said that the dog, the ass, and woman interrupt prayer if they pass in front of the believer, interposing themselves between him and quibla." (Mernissi 64) First, Mernissi finds that when `A'isha heard of this Hadith, she rebuked it by saying that she had seen the Prophet saying his prayers while she was lying on the bed between him and quibla (Mernissi 70). History also gives Abu Hurayra a very anti-feminine personality. He had a nickname given to him by the Prophet which he disliked because of the trace of femininity in it. This lead him to say "..the male is better than the female" (Mernissi 71). He is also an object of distrust because even al-Bukhari stated that "people said that Abu Hurayra recounts too many Hadith" (Mernissi 79). He even confessed and retracted his words completely about a Hadith concerning sex and fasting. Mernissi again uses `A'isha's refutings and the tainted personality of the individual claiming the Hadith to reject it. I agree and like the way Mernissi goes about the finding wrong the Hadiths that put women down. It is pretty hard to argue with her method and its validity. She finds the background to the person, time, and events that the Hadith came from and sheds new light on it. Also by exposing to the public `A'isha's responses to the Hadiths helps her drive her point home. No wonder `A'isha is hidden in history

Wednesday, November 27, 2019

Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks The WritePass Journal

Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks INTRODUCTION: Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks INTRODUCTION:GROWTH OF INTERNET BANKING:Rise of Security Attacks in Internet Banking:Various types of possible Security Attacks: Phishing: Malware, Botnets and DDoS Attacks:Viruses:Spyware and Adware:Insider Attacks:Existing counter measures and why they are not effective? :Anti-Phishing Counter measure:Malware, Botnets and DDoS Counter Measures:Viruses, Spyware and Adware Counter Measures:Summary: References:Related INTRODUCTION: The purpose of this literature is to identify whether Bio-metric technologies are capable of providing the secured way of identification and personal activities to overcome the security issues in the process of Internet banking in banks. This literature also discusses about the possible security threats which most affect the online banking and the progress of counter measures taken to overcome the security issues. The main aim of this research is to analyse the capability of Bio-metric technologies and also about the benefits of using Bio-metric technologies for the security purpose in Internet banking. GROWTH OF INTERNET BANKING: According to Aravind Duraiswamy (2009), traditional way of banking requires their customers to visit the banks every time even to perform their basic banking needs like checking their bank account balance. As the usage of Internet becomes popular banks came up with the concept of Internet banking where customers could perform most of the transactions from their homes or anywhere for that matter. The Internet banking application has features that help to meet most of the banking needs of a bank account holder over the internet. A recent paper (Hisamatsu et al, 2010) mentioned that the concept of online banking started in the 1980s and it first became available for client use in 1995. Since then, the number of banks offering online banking services as well as demand for the service has increased. In the UK alone, the number of people using online banking has increased by 174% in just 5 years from 2001 to 2006. In the US, 53 million people, or one out of every 4 adults, used online banking in 2005. According to Lee (2008, p.130-141) However, despite the fact that  online banking provides many advantages, such as faster transaction speed and lower handling fees, there are still a large group of customers who refuse to adopt such services due to uncertainty and security concerns. Binshan et al. (2010) indicates that trust is the â€Å"heart of the system† for online banking. Thus, we can say that internet banking is susceptible to greater sense of insecurity than older banking services and thereby importance of trust is also relatively higher in adoption of internet banking. A review by Michal et al. (2009) mentions that, a high level of perceived risk is considered to be a barrier to propagation of new innovations. Influenced by the imagination-capturing stories of hackers, customers may fear that an unauthorized party will gain access to their online account and serious financial implications will follow. Rise of Security Attacks in Internet Banking: A paper (Zakaria et al, 2009) reported that information security means the protection of information and information systems from illegal and unauthorized access, use, destruction or modification of data or information. However at the same time, information security issues are considered as the major factors affecting the growth of online banking as the fraudulent activities are prominently increasing. Also it has been reported that one-third of account holders who had signed up for e-banking had stopped using it due to unsatisfactory security service or the complexity of using the service. A review by Laerte et al. (2011) indicates that the number of malware and exploits focused on online banking systems vulnerabilities has been steadily growing during past years. Recent reports indicate that banking Trojans were among the 50 main security threats in 2009. While Brazil figures as the source and destination of most of those attacks performed in Latin America. Rachwald (2008, p.11-12)argues that in the physical world attackers are limited by their ability to manipulate physical items like making an extra copy of your account number. In the online world attackers are essentially unlimited in the resources they can bring to bear. A review by Francisco et al. (2010) mentions that, Banking is considered a highly dynamic business, even more so when price reductions or better conditions are offered to customers contracting services over the internet. However some groups of customers are reluctant to use such services. Regarding electronic commerce in general, consumers show more concern about the use of banking services when the amount of money potentially exposed to fraud is significantly larger, than with other types of services or organizations. Various types of possible Security Attacks: Most internet banking fraud occurs in a two-step process. First, the offender must get their hands on the customers account information, like their username and password. Second, the offender will use that information to move his victims money to another account or withdraw it to make fraudulent purchases, which can be found online (Internet Banking Fraud: Why is Online Banking so Popular, 2009). These fraud schemes include, Phishing: Hossain et al. (2011) argues that, Phishing is a web-based attack that allures end users to visit fraudulent websites and give away personal information (e.g., user id, password). The stolen information is the beginning point of many illegitimate activities such as online money laundering. Phishing attacks cost billions of dollars in losses to business organizations and end users. A recent paper (Pravin et al, 2011) argues that, although phishing is a simple social engineering attack, it has proven to be surprisingly effective. Hence, the number of phishing scams is continuing to grow, and the cost of the resulting damages is increasing. One of the main reasons why phishing attacks are possible is because mails can be spoofed easily. Butler (2007, p.517-533) found that a White Paper on Phishing explains that use of the term â€Å"phishing† originates in the term â€Å"password harvesting fishing†. Phishing attacks are popular, as they are relatively inexpensive to launch, while the potential returns for the phisher could be significant. Phishers succeed in their attacks as consumers are not adequately informed about the risks of disclosing their personal details. A review by Gerald et al. (2008) indicates that the term ‘phishing’ has its origins from the analogy that identity thieves are using lures usually in the form of e-mails to ‘fish’ for passwords and financial data from the ‘sea’ of Internet users. As users are getting more aware of the modus operandi of phishing attacks over the Internet, identity thieves are taking measures to deceive the public and to continue harvesting stolen identities online. A variant of phishing that is yielding potent results to these perpetrators is spear-phishing which is more targeted and specific if compared to its predecessor. A review by Petr et al. (2010) mentions that in the Phishing kind of attack, the attacker tries to obtain victims private information like credit card number, passwords or account numbers. It is based on sending bogus e-mails, which pretend to be an official request from victims bank or any other similar institution. These e-mails requests to insert victims private information on referenced page. This page looks similar to official internet banking and the user fills in all requested fields in good faith that all his information will be safe, which leads to the compromising of all of his information. Malware, Botnets and DDoS Attacks: According to Wajeb et al. (2011) nowadays, there is a huge variety of cyber threats that can be quite dangerous not only for big companies but also for an ordinary user, who can be a potential victim for cybercriminals when using unsafe system for entering confidential data, such as login, password, credit card numbers, etc. Among popular computer threats it is possible to distinguish several types depending on the means and ways they are realized. They are: malicious software (malware), DDoS attacks (Distributed Denial-of-Service), botnets. Shrutiet al. (2010) argues that Botnets are the network compromised machines under the control of a human operator. Using botnet attacker can perform various attacks like distributed denial of service (DDoS), email spamming, key logging, click fraud etc. DDoS attack is used to perform overloading in a network or system, so that an authorized user cannot use the service. Starting a distributed denial of service attack needs a whole bunch of machines. According to various sources, its very easy to compromise a computer. As soon as a computer is compromised it can be used to engage in malignant activities. A so called â€Å"Bot is created. One bot as itself cannot be very harmful but as a user gathers a collection of bots and binds them together, the user is creating a â€Å"BotNet which has a much high bandwidth capability. The communication between the bots is using a specific control channel which is owned by the bot herder or bot master (Burkhard et al., 2011, p.22). Malware infects PCs, waits for the user to log onto a list of targeted banks and financial institutions, and then steals their credentials which are sent to a remote server in real time (Gendron, 2010). A recent paper (Shih-Yao et al., 2009) indicates that malware is designed specifically to expose confidential information, such as system data, confidential files and documents, or logon credentials that are stored on the infected computer. With the widespread use of online shopping and Internet banking, the compromises of this nature results in significant financial loss, particularly if credit card information or banking details are exposed. Viruses: Online banking customers are being targeted by international cyber criminals who are using sophisticated computer viruses to empty their accounts. A new version of a well-known Trojan virus has stolen  £675,000 from about 3,000 online customers of an unnamed British bank, according to an internet security company (Griffiths and Harvey, 2010). The cash has been remotely transferred out of the accounts, held by businesses and individuals. The virus checks to see how much money is in the accounts, steals it and shows the customer fake bank balances to cover its tracks, the company said. It uncovered the scale of the theft after penetrating the criminals command-and-control server, which is based in Eastern Europe. The company said that it had informed the financial institution concerned and the police two weeks ago and the attack appeared to be continuing. Zeus v3 is one of a new wave of viruses that often invade consumers machines when they visit legitimate websites, in what is termed a drive-by infection (Griffiths and Harvey, 2010). Burton (2008) identified a Trojan virus labelled SilentBanker. SilentBanker is aptly named because this virus embeds itself on home computers after users have visited random websites and it has the ability to redirect money from customer’s accounts during a normal Internet banking session, all without any outward signs that a virus is at work. And most worrisome of all is that the usual indicators of a secure website; the locked padlock symbol and the letter â€Å"s† in a website address (https :), no longer guarantee that a website is secured. Spyware and Adware: Clutterbuck (2010) highlighted that, Spyware has been described as a software paradigm designed to illicitly collect and distribute targeted consumer information. â€Å"It is difficult to define spyware with precision. The working definition proposed was software that aids in gathering information about a person or organization without their knowledge and which may send such information to another entity without the consumer’s consent, or asserts control over a computer without the consumer’s knowledge.† In the analysis of Aycock (2010, pp.2) Adware can be considered a somewhat less harmful and usually more obvious form of Spyware. Spyware is covert; adware is overt. Just as for Spyware, there are behaviours that could be thought of as being characteristic of adware. Janice et al. (2008) defines Adware, a type of spyware, delivers specific advertisements and offerings, customized for individual users as they browse the web. These advertisements can take the form of pop-up or pop-under ads, web banners, redirected webpages, and spam e-mail. Some adware however, may alter a homepage by hijacking a web browser, or add URLs to bookmarks, to persistently present a competitors website or a look-alike site, disallowing the user web access for his own purposes. According to Janice et al. (2008) personal information such as financial data, passwords, and identification-tagged downloads can be transmitted, without the users knowledge or consent, to the spyware author or third-party sites. These sites can â€Å"phish† for data from user inputs while surfing, banking, and making purchases. The data could then be used to promote gambling, pornography, or fraudulent schemes, such as identity theft, to unsuspecting users. Insider Attacks: (Hui et al., 2010) defines insider and insider threat as â€Å"An insider is a current or former employee, a contractor or a business partner who has or had authorized access and intentionally exceeded that access in a manner that negatively affected the confidentiality, integrity or availability of the organization’s information or information systems’. Fyffe (2008, p.11-14) argues that, In response to the increase in data breaches and the need to monitor and prevent attacks at every level, security professionals are proactively seeking ways to combat the insider threat. Despite this increased focus, internal attacks remain difficult to prevent. The motivation of those behind the breaches can be difficult to identify and the perpetrators often hide in plain sight. In many cases, insider attacks are premeditated and deliberate, but organisations must also recognise that non-malicious insiders can inadvertently access and distribute sensitive information. Existing counter measures and why they are not effective? : (Paget, 2009) argues that financial fraud often starts with the diversion of personal information. A trash or recycling bin, a telephone conversation, or a poorly protected computer can be the starting point for fraud. Businesses are often vulnerable as well. Stolen laptops and data loss can lead to lasting damage to its brand image and heavy financial consequences for the company itself or its customers. In this respect, banks find themselves on the front line. Although it is impossible to completely eliminate the chance of becoming a victim of identity theft, individuals can effectively reduce their risk by following some commonsense recommendations. Anti-Phishing Counter measure: A recent paper (Abdullah and Malcolm, 2009) indicates that there have been different proposed anti-Phishing solutions to mitigate the problem of Phishing. Security toolbars have been used to prevent Phishing attacks such as SpoofStick. There are also anti-Phishing approaches that make users aware of Phishing emails and websites and how to avoid them. The most basic approach is publishing guidelines for the Internet users to follow when they go online. According to (Abdullah and Malcolm, 2009) Anti-Phishing training will make the end-user aware and it will erect an effective barrier against Phishing attempts. Anti-Phishing awareness was shown to have a great positive effect in mitigating the risk of Phishing. There is a variety of anti-Phishing training approaches to make users aware of Phishing emails and websites and to learn how to avoid them. People are vulnerable to phishing attacks because spoofed websites look very similar to legitimate websites. People have trouble identifying phishing sites even in tests in which they have been alerted about the possibility of such attacks. Furthermore, when phishers personalize their emails, they can further increase the likelihood that the attack will be successful. Researchers have developed several technical approaches to countering phishing attacks, including toolbars, email filters, and verified sender addresses. However, these approaches are not foolproof. In a recent study of 10 anti-phishing tools, only one tool was able to correctly identify over 90% of phishing websites, and that tool also incorrectly identified 42% of legitimate websites as fraudulent. Furthermore, while automated phishing detection is improving, phishers continuously adapt their attack techniques to improve their chances of success (Johnny, 2007). According to (Cranor, 2008) with so much of money at stake, the computer security community has been scrambling to develop tech ­nologies to combat phishing, such as filters for e-mail and Web browsers that flag phishing at ­tempts. Although such software has helped stop many attacks, phishers are constantly evolving their tactics to try to stay a step ahead of such technologies. Since phishing plays on human vul ­nerabilities, a successful attack requires a victim to succumb to the lure and take some action and it is also not strictly a technological problem. A review by Ponnurangam et al. (2010) indicates that most anti-phishing research has focused on solving the problem by eliminating the threat or warning users. However, little work has been done on educating people about phishing and other semantic attacks. Educating users about security is challenging, particularly in the context of phishing, because users are not motivated to read about security in general and therefore do not take time to educate themselves about phishing for most users, security is a secondary task (e.g. one does not go to an online banking website to check the SSL implementation of the website, but rather to perform a banking transaction) and it is difficult to teach people to make the right online trust decision. Malware, Botnets and DDoS Counter Measures: Traditional ways of counter-measuring botnets is generally restricted to spotting a central weak point in their infrastructure that can be manipulated, disrupted or blocked. The most common way is to cooperate with an Internet service provider to gain access and shut down the central component, resulting in a loss of control for the botnet owner: The botnet cannot be commanded anymore. Such actions are often performed during emergency response to an ongoing incident like a DDoS attack (Felix et al., 2009). According to (Felix et al., 2009) the most promising approach is to remove the base of a botnet, which is the CC server. Pulling the plug of the command-and-control host allows to extinguish the whole botnet in one go. Unfortunately this is only possible if all of the following conditions are met: 1. The botnet uses a centralized structure 2. The location of the CC server is known 3. The provider cooperates If any one of those conditions is not met, the CC server cannot be removed. A review by Muththolib et al. (2010) mentions that Static Passwords, also the most common type of authentication method used in e-banking websites. It is based on proof knowledge. This type of mechanisms is prone to all type of attacks and usually attacks like capture, replay, guessing or phishing are common and effective attacks. Soft-token Certificate/SSL-TLS,this mechanism conducts mutual authentication between the user terminal and internet banking server, based on the certificates stored on the user’s web browser. The mechanism is prone to malicious software attacks such as key logger screen captures and also allows access to the user’s certificate stored on the browser which would also result in identity theft Muththolib et al. (2010). Hard-token Certificate/SSL-TLS:in this mechanism it uses a token for the authentication process. This mechanism is prone to token attack tools, malicious software attacks and also these tokens can be stolen. One-time Password/Time-b ased Code Generator: in this mechanism a one-time password is generated by a random calculator, using a seed that is pre shared between a PIN protected user’s device and the Internet Banking Server. This mechanism is also prone to number of attacks including device theft. Viruses, Spyware and Adware Counter Measures: (Miko, 2010) argues that using trusted HW deviceslikeHW calculators, HW password generators, smart cardreaders, mobile phonewill help to block the viruses. Assume that the computer is under attacker control (e.g. via Trojan Horse). Using alternate channel (OOB – out of band) SMS messages, phone calls will help to overcome from the attack. Assume that all the communication computer ↔Internet is under attacker control. According to (Kishore, 2009) to protect the systems against Trojan horses, users should use virus scanners and be careful with downloaded software or e†mail attachments. However usage of one-time passwords (OTP) solves only credential stealing and the confirmation codes are not linked with authorising transaction which made more vulnerable to the viruses. Summary: Finally, from the above discussions we can understand that the bank industries faces an enormous growth with the help of   Internet banking facilities and also we can realize that how Internet banking becomes a negative aspect for the banking industry in the means of security issues which cannot be able to completely prevented with the use of existing counter measures. In the next step we can find out and analyse whether Bio-Metric technology is capable of providing a secured way of authentication in Internet banking to overcome the security threats. References: (Butler, 2007; Johnny, 2007; Burton, 2008; Cranor, 2008; Fyffe, 2008; Gerald Goh Guan Gan, 2008; Janice C. Sipior, 2008; Lee, 2008; Rachwald, 2008; Internet Banking Fraud: Why is Online Banking so Popular? , 2009; Abdullah Alnajim, 2009b; a; Aravind Duraiswamy, 2009; Felix Leder, 2009; Kishore, 2009; Paget, 2009; Shih-Yao Dai, 2009; Zakaria Karim, 2009; Michal Polasik, 2009 ; Aycock, 2010; Binshan Lin, 2010; Clutterbuck, 2010; Francisco Muà ±oz-Leiva, 2010; Gendron, 2010; Griffiths, 2010; Hui Wang, 2010; Miko, 2010; Muththolib Sidheeq, 2010; Petr Hanaeek, 2010; PONNURANGAM KUMARAGURU LORRIE FAITH CRANOR, 2010; Shruti Singh, 2010; Hisamatsu, 2010 ; Burkhard Stiller, 2011; Hossain Shahriar 2011; Laerte Peotta Jr, 2011; Pravin Soni, 2011; Wajeb Gharibi, 2011) Abdullah Alnajim, M. M. (2009a) An Approach to the Implementation of the Anti- Phishing Tool for Phishing Websites Detection, 2009 International Conference on Intelligent Networking and Collaborative Systems. IEEE. [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05370926 (Accessed: 30 March 2011). Abdullah Alnajim, M. M. (2009b) An Evaluation of Users’ Anti-Phishing Knowledge Retention, 2009 International Conference on Information Management and Engineering. 18 June 2009. IEEE. [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5077029 (Accessed: 30 March 2011). Aravind Duraiswamy, S. (2009) Security Testing Handbook for Banking Application. Cambridgeshire: IT Governance. Aycock, J. (2010) Spyware and Adware. [Online]. Available at: http://books.google.co.uk/books?hl=enlr=id=UKNgoM3nLe0Coi=fndpg=PR7dq=spyware+and+adwareots=ISwyV-b5-ssig=EmiqG3ChX6bB5CZKkm_Lnc4cTKs#v=onepageqf=false (Accessed: 21 March 2011). Binshan Lin, A. Y.-L. C., Keng-Boon Ooi, Boon-In Tan (2010) Online banking adoption: an empirical analysis, International Journal of Bank Marketing,   28 (4), pp. 267-287   [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Online+banking+adoption%3A+an+empirical+analysisrft.jtitle=International+Journal+of+Bank+Marketingrft.au=Binshan+Linrft.au=Alain+Yee-Loong+Chongrft.au=Keng-Boon+Ooirft.au=Boon-In+Tanrft.date=2010-01-01rft.pub=Emerald+Group+Publishing+Limitedrft.issn=0265-2323rft.volume=28rft.issue=4rft.spage=267rft.epage=287rft_id=info:doi/10.1108%2F02652321011054963rft.externalDBID=n%2Farft.externalDocID=10_1108_02652321011054963 (Accessed: 17 March 2011). Burkhard Stiller, H., Fabio Hecht,Guilherme Machado,Andrei Vancea,Martin Waldburger (2011) Economic and Technical Analysis of BotNets and Denial-of-Service Attacks. Zurich University of Zurich [Online]. Available at: http://csg.ifi.uzh.ch/publications/ifi-2011.0001.pdf#page=19 (Accessed: 20 March 2011). Burton, J. (2008) Internet banking virus threatens bank accounts – consumers need to fortify home computer security. Burnaby: BC Crime Prevention Association [Online]. Available at: bccpa.org/bccpa/newsroom/latest/Feb_14_08_SilentBanker_trojan.pdf (Accessed: 27 March 2011). Butler, R. (2007) A framework of anti-phishing measures aimed at protecting the online consumers identity, The Electronic Library,   25 (5), pp. 517-533   [Online]. Available at: emeraldinsight.com/journals.htm?issn=0264-0473volume=25issue=5articleid=1634496show=html (Accessed: 20 March 2011). Clutterbuck, P. (2010) Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating Applications, 2010 10th IEEE International Conference on Computer and Information Technology : (CIT 2010). Brisbane IEEE. [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5578087 (Accessed: 21 March 2011). Cranor, L. F. (2008) Can Phishing be Foiled? Carnegie Mellon University [Online]. Available at: cs.virginia.edu/~robins/Can_Phishing_be_Foiled.pdf (Accessed: 30 March 2011). Felix Leder, T. W., Peter Martini (2009) Proactive Botnet Countermeasures – An Offensive Approache. Germany: University of Bonn [Online]. Available at: http://net.cs.uni-bonn.de/fileadmin/user_upload/leder/proactivebotnetcountermeasures.pdf (Accessed: 31 March 2011). Francisco Muà ±oz-Leiva, T. L.-M., Juan Snchez-Fernndez (2010) How to improve trust toward electronic banking, Online Information Review,   34 (6), pp. 907-934   [Online]. Available at: emeraldinsight.com/journals.htm?issn=1468-4527volume=34issue=6articleid=1896453show=html (Accessed: 19 March 2011). Fyffe, G. (2008) Addressing the insider threat , Network Security,   2008 (3), pp. 11-14   [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Addressing+the+insider+threatrft.jtitle=Network+Securityrft.au=Fyffe%2C+Georgerft.date=2008-01-01rft.issn=1353-4858rft.volume=2008rft.issue=3rft.spage=11rft.epage=14rft_id=info:doi/10.1016%2FS1353-4858%2808%2970031-Xrft.externalDBID=n%2Farft.externalDocID=10_1016_S1353_4858_08_70031_X (Accessed: 21 March 2011). Gendron, M. (2010) Trusteer Warns Financial Malware is Attacking; Leading US Banks Using Visa and MasterCard Hoax Trojan Injects Enrollment Screen for Verified by Visa and MasterCard SecureCode Security Programs during Online Banking Sessions, M2 Presswire, 14 July [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=newsrft.atitle=Trusteer+Warns+Financial+Malware+is+Attacking%3B+Leading+US+Banks+Using+Visa+and+MasterCard+Hoax+Trojan+Injects+Enrollment+Screen+for+Verified+by+Visa+and+MasterCard+SecureCode+Security+Programs+during+Online+Banking+Sessionsrft.jtitle=M2+Presswirerft.date=2010-01-01rft.pub=Normans+Media+Ltdrft.externalDBID=n%2Farft.externalDocID=231533464 (Accessed: 26 March 2011). Gerald Goh Guan Gan, T. N. L., Goh Choon Yih Uchenna Cyril Eze (2008) Phishing: A Growing Challenge for Internet Banking Providers in Malaysia, Journal of Internet Banking,   5, pp. 133-141   [Online]. Available at: ibimapublishing.com/journals/CIBIMA/volume5/v5n17.pdf (Accessed: 20 March 2011). Griffiths, M. H. K. (2010) Online banking hit by new trojan virus: Criminals plunder accounts without trace, The Times August 11, p. 3. [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=newsrft.atitle=Online+banking+hit+by+new+trojan+virusrft.jtitle=The+Timesrft.au=Katherine+Griffithsrft.au=Mike+Harveyrft.date=2010-08-11rft.issn=0140-0460rft.spage=3rft.externalDBID=TOFLrft.externalDocID=2106969741 (Accessed: 21 March 2011). Hisamatsu, A. P., D. Nishantha, G.G.D. (2010) Online banking and modern approaches toward its enhanced security, Advanced Communication Technology (ICACT) 2010 : The 12th International Conference onPhoenix Park 7-10th February IEEE Xplore pp. 1459 1463 [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tparnumber=5440305 (Accessed: 17 March 2011). Hossain Shahriar , M. Z. (2011) Trustworthiness testing of phishing websites: A behavior model-based approach, Future Generation Computer Systems,   [Online]. Available at: sciencedirect.com/science?_ob=MImg_imagekey=B6V06-5265S47-1-1_cdi=5638_user=122879_pii=S0167739X11000045_origin=gateway_coverDate=02%2F16%2F2011_sk=999999999view=cwchp=dGLbVlW-zSkWAmd5=244583ca30474732386b5fab04504a2fie=/sdarticle.pdf (Accessed: 19 March 2011). Hui Wang, D. H., Shufen Liu (2010) Research On Security Architecture MSIS For Defending Insider Threat, Proceedings of the Third International Symposium on Computer Science and Computational Technology : (ISCSCT ’10). China 14-15 August. China: academy publisher.com pp. 389-392. [Online]. Available at: http://academypublisher.com/proc/iscsct10/papers/iscsct10p389.pdf (Accessed: 21 March 2011). Internet Banking Fraud: Why is Online Banking so Popular?.   (2009) [Online]. Available at: spamlaws.com/onlinebanking-fraud.html (Accessed: 26 March 2011). Janice C. Sipior, B. T. W. (2008) User perceptions of software with embedded spyware, Journal of Enterprise Information Management,   21 (1), 2008, pp. 13-23   [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=User+perceptions+of+software+with+embedded+spywarerft.jtitle=Journal+of+Enterprise+Information+Managementrft.au=Janice+C.+Sipiorrft.au=Burke+T.+Wardrft.date=2008-01-01rft.pub=Emerald+Group+Publishing+Limitedrft.issn=1741-0398rft.volume=21rft.issue=1rft.spage=13rft.epage=23rft_id=info:doi/10.1108%2F17410390810842228rft.externalDBID=LIMrft.externalDocID=10.1108%2F17410390810842228 (Accessed: 27 March 2011). Johnny (2007) Does Anti-Phishing Training Work?   [Online]. Available at: cs.cmu.edu/~jasonh/publications/apwg-ecrime2007-johnny.pdf (Accessed: 30 March 2011). Kishore, K. L. (2009) E Banking(CS05B034 )   [Online]. Available at: http://netlab.cs.iitm.ernet.in/cs648/2009/assignment1/cs05b034.pdf (Accessed: 31 March 2011). Laerte Peotta, M. D. H., Bernardo M. David, Flavio G. Deus, Rafael Jr, T. d. S. (2011) A FORMAL CLASSIFICATION OF INTERNET BANKING ATTACKS AND VULNERABILITIES, International Journal of Computer Science Information Technology (IJCSIT),   3 (1) [Online]. Available at: http://airccse.org/journal/jcsit/0211ijcsit13.pdf (Accessed: 18 March 2011). Lee, M.-C. (2008) Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , Electronic Commerce Research and Applications,   8 (3), pp. 130-141   [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Factors+influencing+the+adoption+of+internet+banking%3A+An+integration+of+TAM+and+TPB+with+perceived+risk+and+perceived+benefitrft.jtitle=Electronic+Commerce+Research+and+Applicationsrft.au=Lee%2C+Ming-Chirft.date=2009-01-01rft.pub=Elsevier+B.Vrft.issn=1567-4223rft.volume=8rft.issue=3rft.spage=130rft.epage=141rft_id=info:doi/10.1016%2Fj.elerap.2008.11.006rft.externalDBID=LCRPrft.externalDocID=000266272200003 (Accessed: 17 March 2011). Michal Polasik, T. P. W. (2009) Empirical analysis of internet banking adoption in Poland , International Journal of Bank Marketing 27 (1), pp. 32 52 [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Empirical+analysis+of+internet+banking+adoption+in+Polandrft.jtitle=International+Journal+of+Bank+Marketingrft.au=Tomasz+Piotr+Wisniewskirft.au=Michal+Polasikrft.date=2009-01-01rft.pub=Emerald+Group+Publishing+Limitedrft.issn=0265-2323rft.volume=27rft.issue=1rft.spage=32rft.epage=52rft_id=info:doi/10.1108%2F02652320910928227rft.externalDBID=IJBrft.externalDocID=10_1108_02652320910928227 rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Empirical+analysis+of+internet+banking+adoption+in+Polandrft.jtitle=International+Journal+of+Bank+Marketingrft.au=Tomasz+Piotr+Wisniewskirft.au=Michal+Polasikrft.date=2009-01-01rft.pub=Emerald+Group+Publishing+Limitedrft.issn=0265-2323rft.volume=27rft.issue=1rft.spage=32rft.epage=52rft_id=info:doi/10.1108%2F02652320910928227rft.externalDBID=IJBrft.externalDocID=10_1108_02652320910928227 (Accessed: 17 March 2011). Miko, K. (2010) Internet Banking Attacks. Prague: DCIT [Online]. Available at: dcit.cz/cs/system/files/CEPOL_Internet-Banking-Attacks.pdf (Accessed: 31 March 2011). Muththolib Sidheeq, A. D., Geetha Kananparan (2010) Utilizing Trusted Platform Module to Mitigate Botnet Attacks , International Journal of Advancements in Computing Technology,   2 (5), pp. 111-117   [Online]. Available at: aicit.org/ijact/ppl/12_IJACT6-187020.pdf (Accessed: 31 March 2011). Paget, F. (2009) Financial Fraud and Internet Banking: Threats and Countermeasures. California: McAfee [Online]. Available at: mcafee.com/us/resources/reports/rp-financial-fraud-int-banking.pdf (Accessed: 30 March 2011). Petr Hanaeek, K. M., Jiri Schafer (2010) E-banking security A comparative study, IEEE,   25 (1), pp. 29-34   [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5442151 (Accessed: 26 March 2011). Ponnurangam Kumaraguru, S. S., ALESSANDRO ACQUISTI, LORRIE FAITH CRANOR, J. H. (2010) Teaching Johnny Not to Fall for Phish, ACM Transactions on Internet Technology,   10 (2), pp. 1-31   [Online]. Available at: http://delivery.acm.org/10.1145/1760000/1754396/a7-kumaraguru.pdf?key1=1754396key2=0657261031coll=DLdl=ACMip=192.173.4.219CFID=16000505CFTOKEN=34623913 (Accessed: 30 March 2011). Pravin Soni, S. F., B. B. Meshram (2011) A Phishing Analysis of Web Based Systems, ICCCS 11 : Proceedings of the 2011 International Conference on Communication, Computing Security New York New York: ACM, pp. 527-530. [Online]. Available at: http://delivery.acm.org/10.1145/1950000/1948049/p527-soni.pdf?key1=1948049key2=9596401031coll=DLdl=ACMip=192.173.4.213CFID=15108157CFTOKEN=79387292 (Accessed: 20 March 2011). Rachwald, R. (2008) Is banking online safer than banking on the corner?, Computer Fraud Security,   2008 (3), pp. 11-12   [Online]. Available at: http://jr3tv3gd5w.search.serialssolutions.com/?ctx_ver=Z39.88-2004ctx_enc=info%3Aofi%2Fenc%3AUTF-8rfr_id=info:sid/summon.serialssolutions.comrft_val_fmt=info:ofi/fmt:kev:mtx:journalrft.genre=articlerft.atitle=Is+banking+online+safer+than+banking+on+the+corner%3Frft.jtitle=Computer+Fraud+%26+Securityrft.au=Rachwald%2C+Robrft.date=2008-01-01rft.issn=1361-3723rft.volume=2008rft.issue=3rft.spage=11rft.epage=12rft_id=info:doi/10.1016%2FS1361-3723%2808%2970045-9rft.externalDBID=n%2Farft.externalDocID=10_1016_S1361_3723_08_70045_9 (Accessed: 19 March 2011). Shih-Yao Dai, Y. F., Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo (2009) Holography: A Hardware Virtualization Tool for Malware Analysis, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing. Shanghai 16-18 Nov. 2009 Taiwan IEEE, p. 263. [Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5370996 (Accessed: 26 March 2011). Shruti Singh, M. G. (2010) Analysis of Botnet Behavior Using Queuing Theory, International Journal of Computer Science Communication,   1 (2), pp. 239-241   [Online]. Available at: csjournals.com/IJCSC/PDF1-2/49..pdf (Accessed: 20 March 2011). Wajeb Gharibi, A. M. (2011) Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies , IJCSI International Journal of Computer Science,   8 (1), pp. 236-241   [Online]. Available at: ijcsi.org/papers/IJCSI-8-1-236-241.pdf (Accessed: 20 March 2011). Zakaria Karim, K. M. R., Aliar Hossain (2009) Towards secure information systems in online banking, Internet Technology and Secured Transactions, 2009 : ICITST 2009. International conference for London9-12 Nov, 2009. pp. 1-6[Online]. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=5402619 (Accessed: 18 March 2011).

Sunday, November 24, 2019

California Recall Of The Gray Davis Election essays

California Recall Of The Gray Davis Election essays An election held recently to recall California's former governor Gray Davis indeed proved to be a landmark event in the history of the United States of America. Not only was the former governor dismissed from his office but he was ousted by the legendary movie star Arnold Schwarzenegger. "A recall has been part of California's political system since 1911. It provides a mechanism for the public to attempt to remove elected public officials from office before the end of their term of office" (FAQs About According to Kevin Shelly, administrator of the recall, "Election officials from the state's 58 counties reported more than 1.3 million valid signatures, more than the 897,158 needed to trigger the first recall of a governor in California history" (John Mercurio, California Recall Bid For many months people had thought of ousting the governor from his office since he had mismanaged the finances of the state and hid the true dimensions of the problems when he ran the reelection last fall. But the recall soon morphed into something broader an expression of misgivings about the governor and grievances toward the state's In Davis, the recall forces found a vulnerable target. He is widely leader who stumbled badly in the two major tests of his tenure: the and the budget crunch. Through both crises, Davis made time to raise money at a record pace, much of it from donors who stood to profit And after nearly five years in power the governor is associated as vitriolic campaign ads as any of the health and education initiatives (Peter Nicholas And Jeffrey L. Rabin, Los Angeles Times Focuses On Gray Davis was viewed as an indecisive leader since he had performed badly on the two major tests of his career, namely the energy sho...

Thursday, November 21, 2019

A Critical Analysis of Hemingway's A Clean, Well-lighted Place Essay

A Critical Analysis of Hemingway's A Clean, Well-lighted Place - Essay Example Ernest Hemingway’s 1954 Nobel Prize winner â€Å"A Clean, Well-lighted Place† effectively illustrates human beings’ different answers of the mostly asked question: â€Å"What is the meaning of life?† From toddlerhood to late adulthood, as people grow mature, their response to this question gets influenced with their life’s experiences whether good or bad. They either turn out to be hopeful amidst life adversities or become cynical of life’s real meaning. In a much closer look, Hemingway’s work undoubtedly reflects his own experiences (Ernest Hemingway). He himself has committed suicide in the year 1961(Redouane, Abouddahab, 2). And as a result, most critical analyses of his works become mostly biographical in nature. Hemingway’s work undoubtedly reflects a considerable amount of his life’s experiences as a soldier, writer, and reporter. It can be also noted that most of the criticism of Hemingway’s works is ideolog ically based and is greatly influenced by the accumulated facts about his life and work. His works usually present male personas whose characters evolve around the themes on â€Å"losing hope and faith† (Ernest Hemingway). This short story â€Å"A Clean, Well-lighted Place† somehow progresses on the same theme: of losing hope and faith to live, and of nursing the moments of despair to finding that something that will push one to continue living. These themes were well illustrated by three characters of different walks of life, three people who see life in different perspectives: the young waiter, the old waiter and the old-drunk man. They have different stories to tell and only in the clean, well-lighted cafe that their mind-sets get exposed to the readers’ critical scrutiny. In Erickson’s Psychosocial Theory, he pointed out that in each stage of a person’s life one experiences psychosocial crisis represented by two opposing dispositions also terme d by Erickson as â€Å"contrary dispositions†. If one can successfully manage each stage, he/she can get through the rest of the stages. On the other hand, If one failed, he may develop â€Å"reduced ability to complete further stages† (Saul McLeod). In relation to this, the young waiter represents those in the young adulthood stage, the sixth stage of Erickson’s Psychosocial Theory of Human Development, who views life with much positivity and idealism while the old-drunk man and the old waiter who sympathizes with the former represent those in the late adulthood stage, the last stage of Erickson’s Psychosocial Theory. They are the ones who are caught between developing ego integrity and wallowing up the feeling of despair. The story, set in a clean, well-lighted cafe somewhere in Spain, opens with an old man drinking brandy and sitting on his favourite spot in the cafe, â€Å"in the shadow of the leaves of the tree made against the electric light† . The two waiters in the cafe were talking about the old-drunk man as he drowns himself with his liquor. Their conversation wound up with the latter’s attempted suicide to the significance of a clean, well-lighted cafe of which young waiter finds no difference with other bars and bodegas. The young waiter who seems oblivious of the old-drunk man’s personal issues finds the attempt ridiculous because for him the latter â€Å"has plenty of money† and that there’s no reason why should the old man try to end his life. On one hand, the old waiter feels what the old man was exactly feeling as he understands what â€Å"it† feels like. He confesses that, he himself needs a clean, well-lighted place once in a while. As the story progresses, the young and old waiter, both representations of two different generations, demonstrate the different worldviews

Wednesday, November 20, 2019

Alien Relative by Amy Tann Essay Example | Topics and Well Written Essays - 250 words

Alien Relative by Amy Tann - Essay Example Although the narrator tells immigration that Hulan is her sister, she is not actually related to the narrator, just like the â€Å"grandmother† Hulan and her husband leave Feng-Yi Frank with â€Å"was not even the real grandmother† (Tan, 1993, p.622). Hulan, her husband, and her two remaining children leave Formosa the same night they leave Feng-Yi Frank with his grandmother and fly to America, assuming they will be able to send for Feng-Yi Frank right away (Tan, 1993). The fake grandmother takes him back to China and it winds up taking them eleven years to arrange for him to come to America (Tan, 1993). When he arrives, he is no longer the six year old boy they left behind, but a young man of seventeen years (Tan, 1993). He is an alien to the country he has just arrived in and an alien to his family, having been separated from them for so many years. Although Hulan does not recognize her son, â€Å"he stared right at his mother, nobody else†, a familiar stranger , remembering that his parents had left him behind although he does not discuss it (Tan, 1993, p.624). Reference Tan, A. (1993). Alien Relative. In D. Roen, G. Glau, & B.

Sunday, November 17, 2019

Ethics and Religion Essay Example | Topics and Well Written Essays - 1000 words

Ethics and Religion - Essay Example This paper approves that speaking about ethics and religion it is impossible to ignore the notion of theology. Theology itself is a science about spirits and God. Theology analyses all the religious features and makes the interpretation of it into a simpler knowledge, it discusses the main religious issues. One of the main tasks of the theology is to define the difference between the religious traditions of every culture, to point out the main factors which determined the formation of the ethical norms in these cultures, to define the reasons of the difference using the historical background of a nation. Speaking about ethics as about a branch of theology we should pay attention to the fact that theology is strongly connected with the mentality of every nation and with the special features of its religion. Theological history of every religion has a great impact on the way of formation of the ethical norms and categories. It proves that these two sciences are interdependent and influ ence each other. According to Robert Gascoigne â€Å"any discussion of the relationship between religion and ethics has to come to terms with misunderstandings that have developed over the centuries, which Christians themselves are often responsible for because of a fundamentalist use of the Bible or because of other aspects of Christian tradition†. This essay makes a conclusion that it is worth saying that the problem of ethics and religion is impossible to solve and to come to a certain points. The process of interconnection of these two notions is developing.

Friday, November 15, 2019

Leadership And The Competing Values Management Essay

Leadership And The Competing Values Management Essay This chapter has two parts: a management theory part of leadership and the competing values framework that puts the topic of research in context; and the second part provides a background insight on the applied field of research which is newspapering in Yemen. This part of the literature review chapter represents an attempt to dive into the ocean-deep literature on leadership is exerted to provide a theoretical background on this heavily studied domain in management. This argumentative collection and discussion of leadership literature will attempt to provide a quick overview of leadership different definitions and the associated theories that enrich leadership literature. A quick reference to the most important models and tools used in leadership studies will be made and discussed. From the various models, the selected theoretical framework of leadership the (Competing Values for Leadership) by Quinn (1983, 1993, 2006) will be subject of more focused presentation and discussion. The reasons of selecting this model not any other will be explained. This part concludes with reference to effective leadership and the role of leadership in the overall organizational effectiveness. 2. 2.2. Leadership 2.2.2.1 Leadership as an Area of Research Due to the extensive attention, leadership is one of the most extensively researched  areas  in organizational contexts for the significance role leadership play in organizations or at a larger scale in nations. Early studies and theories of leadership provided theoretical frameworks which were used as basis for the following eras of studies. Historically, leadership was studied from different perspectives and the following chronology of major studies and resulted theories: the Personality Traits (1841-1927); the Power and Influence of a Leader (1928-1956); the Behavioral Leadership (1955- 1983), where famous Managerial Grid Model was first presented by Blake and Mouton in 1964; the Situation theory (1943-1978) with a new research model: Open-Systems Model presented by Kats and Kahn in 1978; the Contingency approach to leadership (1964-1989) during which the situational theory presented by Hersey and Blanchard, 1969-1977); the Transactional model (1958-1979);and finally the Transformational approach (1977-1989). This volume of theoretical work is categorized under four generational groups. These are in chronological order: Trait theories, Behavioral theories, Contingency theories, and Transf ormational theories. Across sectional, leadership becomes an interdisciplinary field with contributions from political science, psychology education, history, agriculture, public administration management, community studies, law, medicine anthropology, biology, military sciences, philosophy and sociology. In many of these disciplines, leader ship is now an established subfield (Goethals, et al., 2004 p. xxxiv). These different approaches to leadership across management and organizational literature particularly the researches made in the second half of last century call for different leadership styles, and competencies. However, Hofstede (1980) argued that most process leadership theories share a common factor which is their advocacy for à ¢Ã¢â€š ¬Ã‚ ¦participation in the managers decisions by his/her subordinates participative management' (Hofstede, 1980 p. 56). As referenced above, the past century witnessed a remarkable change in the field of leadership research and the major in-depth wave of studies started in seventies and eighties. Two features stand out when the current situation is compared to that of today. These two features are the greater optimism about the field and its greater methodological diversity (Bryman, 2004). However, the evolution of leadership theories did not stop at this stage, a new era emerged in which researchers attempt to develop a more integrated approach to leadership (Vilkinas, et al., 2006). One of the most important theoretical advancement toward this result is the Competing Values Framework (CVF) for leadership (Quinn, et al., 1981, 1983), (Denison, et al., 1993), (Cacioppe, 1998), (Vilkinas, et al., 2006). 2.2.2.2 Definition of leadership Different scholars come up with different theories and consequently introduce their definition to the term leadership based on their respective areas of study. Leaderships guru, Bernard M. Bass (1990) for instance, considers leadership as one of the worlds oldest preoccupations and that its understanding has figured strongly in the quest of knowledge. Leaders of organizations or nations who were described as effective leaders did not have necessarily the same traits, which poses a challenge to the traits theory, especially when it come to the secondary attributes. Researchers traced the lives of these leaders and came up with general characteristics that distinguish leaders from subordinates. John Gardner, in his book On Leadership by Free Press in 1989, studied a large number of North American organizations and leaders and came to the conclusion that there were some qualities or attributes that did appear to mean that a leader in one situation could lead in another. These characteristics included: Physical vitality and stamina; Intelligence and action-oriented judgment; Eagerness to accept responsibility; Task competence; Understanding of followers and their needs; Skill in dealing with people; Need for achievement; Capacity to motivate people; Courage and resolution Trustworthiness; Decisiveness; Self-confidence; Assertiveness; and finally Adaptability/flexibility (Doyle, et al., 2001). On the contrary, leadership gurus Bass and Stogdill conceive leadership as the focus of group processes, as a matter of personality, as a matter of inducing compliance, as the exercise of influence, as particular behaviors, as a form or persuasion, as a power relation, as a instrument to achieve goals, as an effect of interaction, as a differentiated role, as initiation of structures, and as many combinations of these definitions. Under each phrase above, scholars define leadership, and the handbook defines leadership as à ¢Ã¢â€š ¬Ã‚ ¦ an interaction between two or more members of a group that often involves a structure or restructuring of the situation and the perceptions and expectations of the members. Leaders are agents of change-persons whose acts affect other people more than other peoples acts affect them, (Bass, 1990 pp. 20-21) Bass and Stogdill (1990) present above a competency-based definition, which comes after an extensive digest of the various concepts and approaches of organizational leadership. This definition goes along with Chemers (200) who defines leadership as process of  social influence  in which one person can enlist the aid and support of others in the accomplishment of a common task (Chemers, 2002). As leadership is a process not a person; involves influence; occurs in groups; and involves a common goal, Northouse (2010) defines leadership as à ¢Ã¢â€š ¬Ã‚ ¦ a process whereby an individual influences a group of individuals to achieve a common goal (Northouse, 2010 p. 3). Following the same path yet in a wider scope, John W. Gardner (1993) defines leadership as à ¢Ã¢â€š ¬Ã‚ ¦the process of persuation or example by which an individual (leadership team) induces a group to pursue objectives held by the leader or shared by the leaderand his/her followers (Gardner, 1993 p. 1) Another example of the process perspective leadership is found in Burns book Leadership (1978), in which he introduced two types of leaders: transformational leader and transactional leader, presenting a new approach to leadership literature. Burns (1978) said, à ¢Ã¢â€š ¬Ã‚ ¦ transforming leadership ultimately becomes moral in that it raises the level of human conduct and ethical aspiration of both leader and the led, and thus it has a transforming effect on both. (Homrig, 2001). However, these two types are deemed as modern leadership styles in the organizational contexts. The argumentative set of definitions brought above are built on the interaction between a leader and follower, rather than the personality traits or behaviors of a leader, although leadership traits approach suggests otherwise. This approach suggests that if these traits are truly present in a person, they will manifest themselves almost without regard to the situation in which the person is functioning (Gardner, 1993 p. 6). The researched confidently can argue that a leader is identified by followers/subordinates as well as an organization or any collective effort with a common goal that provides situational context in which he/she practices leadership. However, having those traits identified in a person, but without people of context, the traits will make of him/her a leader just for the sake owning them. In conclusion, it can be inferred that leadership is process of complex behavior whereby a person is set to inspire, and motivate his/her followers toward achieving common goals that are not effectively achievable otherwise. 2.2.2.3 Leadership vs. Management Both leadership and management are used in organizational context with little sensitivity to the terms especially when the right balance is maintained among all organizational elements that include people, processes, design, system, and technology. However, Doyle, et al. (2001), argued that not all managers, for example, are leaders; and not all leaders are managers. An attempt to make a distinction between managing and leading, one risk of this separation is that management is pushed into the background. Technically there is an overlap of domains and activities between management and leadership and thus in literature you will find managerial leadership (Gosling Mintzberg, 2003). Although leadership is not confined to management, there is wide agreement that the most successful organizations have strong, effective leaders. Most organizations contain both formal and informal leaders, some of which are in management positions, some are not (Albarran, 2006). To lead is to take risks on behalf of purpose and the greater good.   To manage is to mitigate risk on behalf of the bottom line.   A successful organization does both as well as a successful executive. A valuable employee at any level of the organization does both too (McBride, 2010). Although Gardner (1993) believes that leaders perform managerial jobs, he made several points to differentiate managers from leaders. The manager is more tightly linked to an organization than is the leader. Although he stresses on the interchangeable roles of leaders and managers, he argues that leaders do not necessarily have organizations and used Ghandi who was a leader before he had an organization (Gardner, 1993 p. 4). This leads to the term managerial leadership which is more practical in terms of leadership development and training. 2.1.2.4 Leadership Models and Tools As highlighted above, leadership has been studied extensively and dimensionally for more than a century (Seters, et al., 1990). The remarkable change and dimensional development in leadership research resulted in the introduction of several models and frameworks on leadership. Some researchers combine more than one theoretical framework to come up with a unique approach based on the scope of their studies. Yet, each approach is based on a theoretical framework whether it examines leaders personality traits, and behaviors or examine leadership as a process of interaction. Numerous tools and instruments have been developed to examine, study, and evaluate the impact of leadership in search of developing effective leaders (Ladyshewsky, 2007). Over the last decade the 360-degree review process has become a very popular tool in evaluating the impact of Leadership Development programs. The 360-degree assessment is now replacing the traditional performance appraisal (Toegel, et al., 2003). Despite its growing popularity, is not without its weaknesses. Some of these weaknesses include collusion to promote self-interests and selection of raters who will influence results positively. This reduces the value of the 360-degree review because the opportunity for receiving accurate feedback is lessened. Managers, peers and subordinates may also ground their responses using different perspectives because of their relationship to the ratee. These tools give a comprehensive understanding of the roles, and behaviors of leaders/managers One of the recent popular tools is The Leadership Circle Profile (TLCP), which contributes effectively to major advances on the best 360 instruments. As a validated tool, TLCP is designed to measure a battery of key leadership competencies. The Leadership Circle Profile is designed to integrate many of the best theoretical frameworks from the leadership, adult development, psychological and spiritual bodies of knowledge. Few, if any, 360 tools have a theoretical framework to complement their research base. TLCP has a rich and integrated theory base. This allows practitioners to use multiple frameworks that help the client connect the data to deeper insight (Anderson, 2006). Bryman (2004) concludes that leadership research is dominated by a single kind of data gathering instrument-the self-administered questionnaire. The field is replete with countless studies that employ questionnaires within the context of experimental, cross-sectional, and longitudinal designs. The Ohio State LBDQ scales, Fiedlers LPC scale, and more recently the Multifactor Leadership Questionnaire (MLQ), which exemplify respectively the style, contingency and new leadership phases of the fields development, are emblematic of this feature. The questionnaire has become the instrument of choice for researchers working in a variety of different theoretical traditions and within different research designs. The Full Range Leadership Development Theory provides the backbone for analyzing the leadership style of each manager by using the MLQ (Saad, 2008). The different tools and models create more confusion for organizations, leaders/managers, and researchers which is more valid or more appropriate as each assumes and defines different set of competencies (Cacioppe, et al., 2000). Regardless of the confusion between these models and framework in the leadership literature, none can argue if one particular framework to be right while others are wrong. Rather, the most appropriate frameworks should be based on empirical evidence, should capture accurately the reality being described (in other words, they should be valid), and should be able to integrate and organize most of the dimensions being proposed (Cameron, et al., 2006). One of the most popular leadership-management assessment instruments that integrates several aspects of leadership and previous models is the Competing Values Framework (CVF) introduced by Quinn and colleagues in 1981 and 1983. The CVF has been the subject of several organizational studies ever since. In all previous studies, it achieved high level of reliability and validity (Yu, et al., 2009) based on all empirical studies structured around the concept of organizational effectiveness (Quinn and Rohrbaugh, 1983; Quinn  et al., 2003; Belasen, et al., 2008; (Cameron, et al., 2006); (Denison, et al., 1993) (Ladyshewsky, 2007) (Quinn, 2006) (Vilkinas, et al., 2006) (Vilkinas, et al., 2009). The CVF instrument is developed to study the behavioral complexity of leaders (Denison, et al., 1993) and a later stage the CVF, which was developed in the early 1980s as a tool to examine the organizational culture and its variables was introduced as a framework of leadership effectiveness (Cameron, et al., 2006) (Belasen, et al., 2008). 2.1.3 The Competing Value Leadership 2.1.3.1 Theory and Definition The Competing Values Framework was developed initially from research conducted on the major indicators of effective organizations (Cameron, et al., 2006, p 33). It was developed as a result of empirical research on the question of what makes organizations effective (Quinn, et al., 1981) followed by studies of culture, leadership, structure, and information processing (Denison, et al., 1995) (Cameron, et al., 2006). Those conducting the preliminary research asked certain key questions like: What are the main criteria for determining if an organization is effective or not? What key factors define organizational effectiveness? When people judge an organization to be effective, what indicators do they have in mind? A spatial model was developed from the judgment data. It indicated that three value dimensions, focus (taskpeople), structure (controlflexibility), and time (short-termlong-term) underlie conceptualizations of organizational effectiveness. Furthermore, the model suggested some fundamental criteria of organizational effectiveness that differentially reflect these three value dimensions (Quinn, et al., 1981). However, Quinn and Rohrbaugh (1983) conducted further analysis and came up with two major dimensions; (a) one that differentiates a focus on flexibility, discretion, and dynamism from a focus on stability, order, and control; and (b) a second that differentiates a focus on an internal orientation, integration, and unity from a focus on an external orientation, differentiation, and rivalry (Cameron, et al., 2006, p 34). Figure 1: The Competing Values Framework Together these two dimensions form four quadrants, with four different organizational cultures. Figure 1 illustrates the relationships of these two dimensions to one another. What is notable about these four core values is that they represent opposite or competing assumptions: flexibility versus stability and control, internal versus external. The upper left quadrant, for example, identifies values that emphasize an internal, organic focus, whereas the lower right quadrant identifies values that emphasize an external, control focus. Similarly, the upper right quadrant identifies values that emphasize an external, organic focus, whereas the lower left quadrant emphasizes internal, control values. The competing or opposite values in each quadrant give rise to the name for the model, the Competing Values Framework. The resulted quadrants are labeled to distinguish their most notable characteristics-clan, adhocracy, market, and hierarchy, which were derived from the scholarly literature. They also match key management theories about organizational success, approaches to organizational quality, leadership roles, and management skills (Cameron, et al., 2006, p 35-37). 2.1.3.2 The Competing Values Approach to Leadership The Competing Values Framework (CVF) has been named as one of the forty most important models in the history of business (Cameron, 2010). The framework was developed as a result of extensive empirical researches focusing on organizational effectiveness (Quinn, et al., 1983). It predicts that balancing the full range of leadership roles should help managers perform their job effectively; yet, limited cognitive and emotional resources constrain employment of the full range of roles (Belasen, et al., 2008). 2.1.3.3 The CVF Leadership Quadrants In keeping with the emphasis of this model on behavioral complexity and leadership as a portfolio of capabilities, the eight roles in the model are defined in terms of a set of skills necessary to perform each role (Denison, et al., 1993 p. 6). The figure 2 below highlights the rights managerial leadership roles. Figure 2 Eight CVF roles of managerial leadership (Denison, et al., 1993 p. 6 27) Figure 2 suggests a spatial model with eight separate roles presented in terms of two underlying dimensions, with a specific set of relationships among these roles. The roles should take the form of a circle within these two dimensions, such that some pairs of roles (such as the monitor and the coordinator) should be very closely related, while other pairs of roles (such as the mentor and the producer) should be far less closely related. Opposite roles are presumably more contradictory and adjacent roles are more similar. One might expect, for example, that a leader who was highly proficient as a mentor would also have facilitator skills in their behavioral portfolio, but might be somewhat less likely to be highly proficient as a director or producer (Denison, et al., 1993 p. 9). 2.1.3.4 The CVF Leadership Roles As we have seen above the CVF has four quadrants with four types of cultures, the Competing Values leadership model divides each of its four quadrants into two leadership roles (Quinn, et al., 1983), (Denison, et al., 1993), (Cameron, et al., 2006), (Belasen, et al., 2008), (Cameron, 2010). The CVF leadership quadrants and roles are explained below (Denison, et al., 1993, pp. 6-8). The upper-right quadrant, which the effectiveness framework links to open-systems theory and the process of adaptation to the organizations external environment, defines two leadership roles: Innovator Role The innovator is creative and envisions, encourages, and facilitates change. Broker Role The broker is politically astute, acquires resources and maintains the units external legitimacy through the development, scanning, and maintenance of a network of external contacts. Moving clockwise to the lower right quadrant, labeled the rational goal model in the effectiveness framework, two more leadership roles are specified. These roles emphasize the rational pursuit of goals external to the group, and the leaders role in defining and motivating the attainment of those goals. Producer Role The producer is the task-oriented, work-focused role. The producer seeks closure, and motivates those behaviors that will result in the completion of the groups task. Director Role The director engages in goal setting and role clarification, sets objectives, and establishes clear expectations. The lower left quadrant is referred to in the effectiveness framework as the internal process model and places primary emphasis on internal control and stability. Two additional leadership roles are specified in that quadrant. Coordinator Role The coordinator maintains structure, does the scheduling, coordinating, and problem solving, and sees that rules and standards are met. Monitor Role The monitor collects and distributes information, checks on performance, and provides a sense of continuity and stability. The upper left quadrant is referred to in the framework as the human relations quadrant, placing primary emphasis on human interaction and process. Two final leadership roles are defined within that quadrant. Facilitator Role The facilitator encourages the expression of opinions, seeks consensus, and negotiates compromise. Mentor Role The mentor is aware of individual needs, listens actively, is fair, supports legitimate requests, and attempts to facilitate the development of individuals. 2.1.3.5 Leadership Effectiveness Extensive research by management scholars has identified critical competencies that characterize the most effective leaders and the most effective organizations worldwide. Quinn and Cameron (2006) introduced an instrument that assesses 20 key areas of leadership competency based on the Competing Values Framework. The leadership skills being assessed were not arbitrarily selected, but were derived from more than a dozen studies of leadership effectiveness. Figure 3 The Competing Values Framework culture, leadership, value drivers, and effectiveness. The focus of this study is to identify the competing values leadership roles of the chief editors of the participant newspapers, rather than assessing their competencies. Therefore, the suggested leadership competency assessment by Quinn, et al. (2006) will not be used in this study. However, it is of paramount significance to get a comprehensive view of the CVF different instruments. The congruence of leadership competencies and organizational culture leads to effectiveness, according to Quinn and Cameron (2006). To create value, managers competencies must be congruent with their organizations dominant culture. Demonstrating leadership competencies in the quadrants that dominate the organizations culture is associated with higher levels of success for the leader (Cameron, et al., 2006, p. 160). The management guru, Drucker (2006) in his book Effective Executive argued that effective executives should be able to manage time; choose what contributed to the organization; know where and how to mobilize strength for best effect; setting the right priorities; and knitting all of these together with effective decision-making. 2.1.3.6 CVF Model Application Though the framework is most often thought of as a leadership tool it has shown to have many important advantages. The CVF can be used for all aspects and levels in organizations. For example, It can be applied to personal style, yet the same framework can also be used to assess communication, leadership, organizational culture, core competencies, decision making, motivation, human resources practices, quality, employee selection, organizational capabilities, organizational change patterns, strategy, financial performance and many others (Cameron, 2010). The CVF is an approach to thinking that is, to interpreting or making sense of complex phenomena as well as to developing a repertoire of competencies and strategies that address the complexities being encountered (Cameron, et al., 2006). Criticism Development of the CVF Model Beyond the organizational effectiveness, the CVF has been studied and tested in numerous organizations for the past 25 years by scholars and professional experts not only in the United States but also in China (Vilkinas, et al., 2009); Australia (Vilkinas, et al., 2006); Malaysia (Yiing, et al., 2009); Yemen (Al-Marhadhi, 1996) and elsewhere. As a tool, the CVF is not only used in academic research, but also in as an assessment tool in the service industry (Degraff, et al., 2010). Although the model has been widely used in management and leadership research and development, it receives some criticism and further development by other researchers. Hooijberg (1996)  questioned the two dimensions of the CVF model and some of the questionnaire items that measure the leadership role distributed across the model. According to Cacioppe et al (2000), who reference the work of Hooijberg (1996) the CV framework, for instance, does not adequately capture vision or customer orientation roles or competencies that are fundamental to many models of leadership and management. As a result, Cacioppe and Albrecht developed a framework that used several of the aspects of the CV model supported by research with modifications to a number of roles and question items (Cacioppe, et al., 2000). Further application and empirical testing of the CVF led to further advancement. In response to developing researches, Quinn and colleagues developed the model further. In Australia, for instance, the Integrated Competing Values Framework (ICVF) was approached by Vilkinas and her co-authers who introduced the Integrator, as the ninth leadership role (Vilkinas, et al., 2006). Why the CVF? The Competing Values Framework provides a theory of effective leadership through managing tensions, which is the subject of this research. It includes predictions that congruence among disparate elements in organizations leads to success, paradoxical management is required for effectiveness, and comprehensive strategies and tactics representing all parts of the are needed to create value. (Cameron, et al., 2006, p.158-159). The selection of the CVF as a framework for this research is not because it is the best model or framework, but rather because of the significance it has left on leadership and organizational effectiveness, through hundreds of studies around the world. Moreover, the simplicity of the model; and its relevance to the internal and external competing environments of newspapering in Yemen represent supportive factors for selection. Besides, the CVF as a model can be applied as a multi-purpose model to assess leadership effectiveness; leadership managerial competencies, organizational culture, and overall organizational effectiveness. The abundance of literature on CVF, its measurement tools, research questionnaires, and analysis frameworks contribute positively to be the chosen model for this research. The CVF has been adopted in various organizational contexts as an assessment as well as a development tool. According to Quinn and Cameron (2006), the CVF is valid and significant for organizational and personal contexts alike. Chapter II: Literature Review Part 2 Yemeni Newspaper Industry 2.2.1 Introduction This part of the literature review is dedicated to the newspaper history, background and industry in general. A discussion of the environment, newspapers exist is given with examples and citations from existing literature. The overall part aims to present a comprehensive view of newspapering in Yemen with existing merits and challenges. 2.2.2 Background The Republic of Yemen embarked on democracy, political plurality and public freedoms in 1990 after northern and southern parts of the country were reunified. The reunification gave birth to a national constitution which guarantees political and social rights and public freedoms including freedom of the press. The emerging democracy in Yemen and plurality of the political system necessitated the plurality of media as one of the main pillars of a healthy democracy. Although the state continues to control the broadcast media including TV and radio until today, a wide spectrum of print media outlets exists. Although, Yemen has known journalism as early as 1872 when the Turks established a printing press and issued Yemen and then Sanaa newsletters in both Arabic and Turkish (The Evolution and Development of Journalism in Yemen, 2008) Free press plays a key role in sustaining and monitoring a healthy democracy, as well as in contributing to greater accountability, good governance, and economic development. People need to be able to watch the performance of their government and public authorities through a free and independent coverage of relevant news and events. Media as an educational tool is supposed to contribute to raise peoples awareness about their rights and duties. It is assumed that the news media can best fulfill its functions in a democracy if there is a rich and pluralistic information environment that is easily available to all citizens. There is a large body of American literature which suggests that if TV has taken over from the press as our main source of news this may limit our capacity to learn about public affairs; newspapers are believed to be far more effective than television at conveying detailed information necessary to understand complex and detailed policy issues (Norris, Fall 2000). In Yemen today, there are three major types of media: broadcast (TV and Radio); print (newspapers and magazines); and electronic (internet). 2.2.3 Classification of Print Media in Yemen The print media, which includes newspapers and magazines, in Yemen is categorized into three categories from ownership perspective: public or state-run newspapers, political or partisan newspapers, and privately owned newspapers (Al-Asaadi, 2007, Raja, 2010). However, Hassan Mansour (2009) added a fourth category that includes newspapers published by civil society organizations or trade unions, which I believe shoul

Tuesday, November 12, 2019

Biblical References in Haydn Middletons The Lie of the Land :: Middleton Lie of the Land Essays

Biblical References in Haydn Middleton's The Lie of the Land "This is how the birth of Jesus Christ came about: his mother Mary was pledged to be married to Joseph, but before they came together, she was found to be with child through the Holy Spirit (Matthew 1: 18)." Throughout The Lie of the Land, Haydn Middleton creates "David's Story" through a series of biblical references. These references allow for the speculation of David Nennius as the son of God. This speculation comes about as a result of the rape of his mother by a stranger, the figure of God. Through the use of these references, Middleton allows the reader to see the obvious correlation between the conception and birth of David Nennius, and that of Jesus Christ. Mary is described as "bookish and dried-up," a virgin unscathed by the touch of another male (Middleton 71). Mary returns home one day to find an intruder. "She never worked out exactly how the intruder had got in. He took her arm from behind, quite gently (72)." Though the presence of an intruder, would certainly be enough to strike any woman with certain fear, Mary is seemingly unafraid, almost as if there is something about the presence of this man which comforts her in a way in which words could not express. Throughout his presence, Mary remains unafraid, "it was as if the hideous fact of his presence was shedding its own brilliant light (72)." The use of "brilliant light" suggests the presence of a divine being, almost as if a halo of light is surrounding him as that which surrounds God. Though the actual conception of Jesus did not occur on a physical level in the story set forth by the Bible, Middleton insists on displaying the creation of Jesus through the actual sexual acts of two people. This is interesting from the standpoint that the intruder, though depicted as a powerful and gentle being, is never seen through the eyes of Mary as particularly strong. She speaks of the "weakness" behind his smile; a weakness which overcomes any male when faced with the prospect of sexually satisfying a woman (74). God is, in a sense depicted as having the weaknesses of a normal, immortal male. Like any man, he too has yearned for what only a woman could give him. This becomes the weakness which is so apparent to Mary at the time of conception. Biblical References in Haydn Middleton's The Lie of the Land :: Middleton Lie of the Land Essays Biblical References in Haydn Middleton's The Lie of the Land "This is how the birth of Jesus Christ came about: his mother Mary was pledged to be married to Joseph, but before they came together, she was found to be with child through the Holy Spirit (Matthew 1: 18)." Throughout The Lie of the Land, Haydn Middleton creates "David's Story" through a series of biblical references. These references allow for the speculation of David Nennius as the son of God. This speculation comes about as a result of the rape of his mother by a stranger, the figure of God. Through the use of these references, Middleton allows the reader to see the obvious correlation between the conception and birth of David Nennius, and that of Jesus Christ. Mary is described as "bookish and dried-up," a virgin unscathed by the touch of another male (Middleton 71). Mary returns home one day to find an intruder. "She never worked out exactly how the intruder had got in. He took her arm from behind, quite gently (72)." Though the presence of an intruder, would certainly be enough to strike any woman with certain fear, Mary is seemingly unafraid, almost as if there is something about the presence of this man which comforts her in a way in which words could not express. Throughout his presence, Mary remains unafraid, "it was as if the hideous fact of his presence was shedding its own brilliant light (72)." The use of "brilliant light" suggests the presence of a divine being, almost as if a halo of light is surrounding him as that which surrounds God. Though the actual conception of Jesus did not occur on a physical level in the story set forth by the Bible, Middleton insists on displaying the creation of Jesus through the actual sexual acts of two people. This is interesting from the standpoint that the intruder, though depicted as a powerful and gentle being, is never seen through the eyes of Mary as particularly strong. She speaks of the "weakness" behind his smile; a weakness which overcomes any male when faced with the prospect of sexually satisfying a woman (74). God is, in a sense depicted as having the weaknesses of a normal, immortal male. Like any man, he too has yearned for what only a woman could give him. This becomes the weakness which is so apparent to Mary at the time of conception.