Friday, November 15, 2019

Principles And Practices Of Teaching

Principles And Practices Of Teaching Learning is a process of acquiring knowledge, wisdom, development of skills and altering behavior and attitude. Learning starts at home, from the birth and ends with our life, a continuous process which helps to facilitate growth. According to Kolb (1984), learning is the process whereby knowledge is created through the transformation of experience. Knowledge results from the combination of grasping experience and transforming it. Learning is an unremitting and hence after completing my diploma, I always wanted to rejoin AKUSON for my higher studies i.e. for my Post RNBScN program. After, almost 4 years of my clinical experience, this program gave me a platform to accomplish my ambition. However there were some predisposing thoughts which made me apprehensive with some courses such as Health assessment, CHS, Teaching learning and reflective writing but as the semester went on, my thoughts changed. At the beginning of the semester, I found that we have different students from different background, countries, culture, different age and experiences. I found it beneficial as it is a great opportunity for me to exchange knowledge with them. We also learnt about the critical thinking on a great deal. The orientation mainly taught us about critical thinking, reasoning, and rationalizing, this was continued throughout the semester. I never use critical thinking as much as I used it after entering into the program. Besides orientation I learnt this skill in English, teaching learning course, culture health and society and of course in life sciences. I realized that critical thinking changed my views towards life. It gave me a different perspective and helped me to clarify my goals and ambition in life. It made me realize that my goal does not end with higher studies.By the end of the semester my whole world turns up in why, what and how, from the CHS reflection to book review and analytical paper, also from the 1st log of teaching learning to the final project. Strategy plays an important role in learning. According to the Anderson, 2008, p7, I hear and I forget. I see and I remember. I do and I understand. Everyone has different learning style and the teaching strategies which helped me to enhance my learning in last four months are lectures, AV materials, healthy discussions between faculty and students has augmented my cognitive learning. According to Basavanthappa, (2003) Psychological studies on learning and retention reveal that 80 percent of information and its retention is through auditory and visual senses. Because of the sensory appeal of audio-visual aids, the retention span of learning increases considerably. Reflective logs writing, project based presentation has increased my affective learning and role plays has improved my psychomotor learning. These strategies help me to gain and retain knowledge. On the other hand, there are some of the factors that have some effects on learning. Affective factors are emotional factors which influence learning. They can have a negative or positive effect. (Swan,M. n.d.), such factors can be internal and external motivation, beliefs and expectations, these factors at times encouraged me to work hard as my family motivated me, their expectations and beliefs lead me to this program but then an unexpected death of my grandmother brought an emotional breakdown to me and my family which affected my learning and my studies for a brief period. However, coming to school and keeping myself busy with projects and assignments helped me to divert my mind and cope up with tragedy. Besides affective factors there are other factors as well. Positive learning environment plays an important role in learning and grasping. For the development and fostering of active learning, environments using appropriate technological and other instructional tools in order to motivate and facilitate student learning. (Lee Zeleke, n.d. pg 2). AKUSON promotes positive learning environment by providing well equipped class rooms with latest audio visual aids, learning resource center with free internet access, library with wide variety of educational books etc. These resources allowed me to enrich my learning. Based on my needs, I used different instructional medium to enhance my knowledge and skills. Post RN-BScN is a very well-designed and organized program. Mostly it does not burden me with loads of assignments. Courses are planned in advance including the material, invitation of guest speaker, objectives, assignments and evaluation. This helps me to prepare in advance and improve my organization and time management skills. Conversely there were some of the reasons that inhibit my learning; the foremost was the use of moodle. At the beginning of the orientation I use to hear from faculties about the self directed learning or adult learning through moodle, this can be understand by means of Andragogy. Andragogy consists of learning strategies focused on adults. It is often interpreted as the process of engaging adult learners with the structure of learning experience.(Wikipedia,2011). It involves the major role of a student for active learning and problem solving. Use of moodle, was directed for self learning. In the beginning I had difficulty understanding this method as it was something new for me but eventually as I was able to grasp it. I found that it very beneficial as all the pre reading material were posted but not for all the subjects There were some discussion forums which can be utilized as healthy conversation. Beside this other factors that hindered my learning ability were the competition among the students, financial burden of the tuition fee and fear to fail a course. CHS course terrified me initially but through proper guidance and hard work I was able to achieve good marks in logs. It was not the end of my fear though; it increased with the next assignment. The assignment was an analytical paper, which constituted 40% of the marks. Unfortunately, it was during that time I lost my grandmother. On the contrary, I was motivated by my teaching learning group as they supported me in that crucial situation. They worked extra hard in my absence till I rejoin the teaching learning project again. This project facilitated me to identify my potentials, enable me to integrate my knowledge and work on the areas that I need to improve. I believe that this project has enriched my learning skills. It has enhanced my ability to identify the needs of my community and/or patients which will enable me to provide teaching/care more effectively. At the end of the semester when I look back, I realize that the position I have attained so far is not just because of my hard work but also because of the support of my faculties, my class mates, my friends and my family. Each day I learn a message to implement and improve my life style.

Tuesday, November 12, 2019

Ode To The West Wind :: essays research papers

" Ode to the West Wind" was written by Percy Bysshe Shelley shortly before his death in 1822. Shelley spent the majority of his life in England where he was born to an upper class family. He attended Eton for his primary education and Oxford University until he was expelled for the publication of The Necessity of Atheism. Shortly after being expelled, Shelley married a commoner named Harriet Westbrook , which upset his family because of his wife’s low social standing. The marriage was short lived and Shelley quickly fell in love with Mary Godwin. Shelley continued writing throughout his life and his most notable works include "Ozamandias", "Laon and Cythna", and "Rosalind and Helen". Mary Shelley, Shelley’s wife who was also involved in literature, wrote Frankenstein. In 1822 Shelley drowned in a boating accident in the Gulf of Spieza. Shelly is mainly noted as the most passionate of the Romantic writers and for his usage of expe rimental styles in poetry. "Ode to the West Wind" was written by Shelley on a day when the weather was unpredictable and windy, the poem reflects the mood of the weather and expresses Shelley’s desire for creativeness and intellect. The first section of the poem focuses on the description of the colorful autumn leaves being stirred by the wind. The line " Wild Spirit, which art moving everywhere; Destroyer and preserver.." shows the relationship between Shelley’s desire to create and nature’s force. The second section of the poem tells about the clouds in the sky that are forewarning " the locks of the approaching storm". The fierce storm clouds represent Shelley’s frustration in his lack of original ideas. The third section relates the winds effect on the waves in the sea, which Shelley describes as ".. Grey with fear and tremble and despoil themselves†¦". In the fourth section of the poem Shelley shows his desire to be the autumn leaves, tempest clouds, and turbulent waves so that he to can be effected by the wind and nature the way the objects are.

Sunday, November 10, 2019

How iCloud provides advantages to Apple Inc. Customers Essay

Innovations in Information Technology expanding rapidly and synergistic with the development of modern society that has the characteristics of high mobility, look for a flexible service, easy-paced and satisfying. The need for systems and methods reliably to the individuals or companies are increasing due to globalization where the business movement is growing so fast. Apple included in the top 25 company in forbes magazine The assessment is based on their Rankings for sales, profits, assets and market value. In 2012, Apple posted quarterly revenue of $36.0 billion and quarterly net profit of $8.2 billion, or $8.67 per diluted share. International sales accounted for 60 percent of the quarter’s revenue. During the quarter, the company sold 26.9 million iPhones, 14 million iPad, 4.9 million Macs and 5.3 million iPods. iCloud is a cloud computing based technology of apple which seamlessly integrated into devices that allows users to synchronize data such as photos, music, and documents into an iPhone, iPad, iPod Touch, Mac and the computer automatically at the same time. Users can access anywhere and anytime without the need to back up data manually. Furthermore, the system will automatically sync music or applications that have been purchased through Apple’s iTunes on all devices connected to the account. Not only that, iCloud also stores all the data of purchase on iTunes. It allows users to download music or apps back ever purchased using any device without having to buy back. During the fourth-quarter of 2012, Apple announced that iCloud has 190 million users, which increased significantly from 150 million users in July and the 125 million in April. In terms of accessing iCloud, Apple customers just need to register or sign up iCloud with their Apple ID and password, and then a free storage of 5GB will be theirs unconsciously. This storage space can be use for anything that customers want from hottest music’s, latest photograph, articles, and eBooks. Users who need more can purchase $20 per year for 10GB of additional storage (for a total of 15GB), $40 for 20GB and $100 for 50GB. Similarly there are also numerous advantages that are security, easy of access even situated in remote places as long as you have your ID and password, trouble-free development, and most of all friendly to the surroundings or environment. Besides that, iCloud is also eco-friendly which helps you to cutback the operating cost of electrical energy. Based on Porter’s Three Generic Strategies, iCloud system for apple devices adopted differentiation competitive advantage. Apple strong echo-system of cloud sharing and product integration could guarantee success, as apple products is unchallanged by its competitors. Apple Inc. key success is every product that apple release compliments the next with great sinergy, so innovation not only create excitement of long lines at new product launches, but also can become foundations for entire ecosystems. In terms of 5 Forces, Apple Inc. has a power to bargain with suppliers (games and application developers, etc.) and buyers as well. Buyer power influences the price that firms can charge, and also the cost and investment, this is due that powerful buyers demand costly services. As for the RBVF analysis, Apple has position itself as the leader in technology industry by influences a firms demand curve with the loyalty of their customers. Peter and Barney, 2003, said that A firm that has conquered a competitive advantage has created economic value than its competitors which shown by create greater benefit at the same cost compared to competitors (differentiation-based competitive advantage). The competitors for iCloud are Microsoft Windows Azure, Amazon-Aws, and Google Cloud.

Friday, November 8, 2019

Port Security

Port Security Despite the tremendous efforts in the field of port security, U.S. ports remain vulnerable to the threat of the terrorist attacks due to the complexity of their functional systems and the wide range of stakeholders responsible for the different aspects of safety measures development and implementation.Advertising We will write a custom essay sample on Port Security specifically for you for only $16.05 $11/page Learn More The following discussion will analyze and critique the safety and emergency management structures in the port environment. In addition, it will address the supporting plans and programs and the legislative policies developed to prevent and respond for a WMD attack at a major port. The safety and emergency management structure found in the port environment can be evaluated as quite effective with some considerable issues that still remain. The weak points include the following omissions: (1) vessel identification system is not available for e very port; (2) omissions are identified in port security assessment procedures; (3) security issues related to foreign vessels; (4) IT technical issues in the port security systems; and (5) inconsistence of emergency management practices in some ports to the general guidelines and regulations provided by the government (U.S. General Accounting Office, 2003a; U.S. General Accounting Office, 2003b). The supporting plans and programs typically found in a major port operation complex structure of ports amount to ensuring that the brought to ports cargo is safe (U.S. General Accounting Office, 2005). The major components of these plans and programs include the principle of â€Å"reporting about every cargo assessment result within the 24-hours period† and â€Å"integrated training for all port security workers to ensure their professionalism as for the technical aspect of protection systems† (U.S. General Accounting Office, 2004). Evaluating the legislative policies develop ed to prevent, prepare for, respond to, and recover from a WMD attack at a major port, considerable progress since the year 2001 is noted. Legislators did not fail to notice the limitations the port security systems had. Since the terrorist attack on September 11, 2001, the government systematically draws closer to the exalted objective to secure safety in ports. The remarkable achievements include refining the Automated Targeting System regulations and designing the national standards for the port security workers’ attestation (Congressional Research Service, 2004; U.S. General Accounting Office, 2004). However, as far as I am concerned, the current legislative security policies are insufficient to secure and protect US ports due to the complicated system of port authority distribution between the public and private stakeholders, and interference from multiple governmental and private agencies. The reality of a terrorist nuclear threat to America’s seaports is high. T he situation is getting worse because of the sheer size of cargo being operated in ports every day and absence of the well-designed system of the central authority overseeing the maritime system (Cruise et al., 2013).Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a final point, the vulnerability of the U.S. ports to the terroristic threats remains of high concern to the government and commercial institutions due to a variety of complex issues connected with the port security. The most complicated issues relate to the complexity of ports authority. Analysis of facts demonstrates that there are too many stakeholders involved in the process of port security control. These stakeholders have problems with implementing the unified security systems developed by the governmental agencies and, as a result, some of the major ports appear vulnerable to a WMD attack due to the existing un ifying protection violations. References Congressional Research Service. (2004). Border and transportation security: Overview of congressional issues. A Report to Congress. Web. Cruise, R. J., DErman, V. J., Grillot, S. R. (2013). Protecting Our Ports: Domestic and International Politics of Containerized Freight Security. New York, N.Y.: Ashgate Publishing, Ltd. U.S. General Accounting Office. (2003a). Homeland security: Preliminary observations on efforts to target security inspections of cargo containers. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2003b). Maritime security: Progress made in implementing maritime transportation security act, but concerns remain. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2004). Homeland security: Summary of challenges faced in targeting ocean-going cargo containers for inspection. U.S. General Accounting Office. Web.Advertising We will write a custom essay sample on Port Security specif ically for you for only $16.05 $11/page Learn More U.S. General Accounting Office. (2005). Homeland security: Process for reporting lessons learned from seaport exercises needs further attention. U.S. Government Accountability Office. Web.

Wednesday, November 6, 2019

Human and Technical Intelligence in Countering Terrorism

Human and Technical Intelligence in Countering Terrorism Introduction Both human and technological systems continue to become more complicated by the day. In some cases, technology has proven so complex that even experts involved in various fields may not amicably understand their areas of specialisations (Clutterbuck 2013, p. 271).Advertising We will write a custom essay sample on Human and Technical Intelligence in Countering Terrorism specifically for you for only $16.05 $11/page Learn More Too often, when we tackle this subject, we focus on a broad area of specialisation that involves computational ambience, machinery, the internet, and the wherewithal. However, many other factors continue shape this discourse in ways that transform humanity in its endeavours. How modern technology can be instrumental in counter terrorism continue to dominate debate with opinions split as to whether this might have negative or positive impacts on either side of the divide. Primakov (2004, p. 245) notes that the world currently relies on both human and technical intelligence to counter detect, deter, and thwart acts of terrorism before they strike. However, as much as human and technical intelligence is effective in combating terrorism, terror groups equally benefits from these opportunities to extend their hegemony. This paper seeks to explore the magnitude to which modern human and technical intelligence is instrumental in combating terrorism. Human and technical intelligence Technical or artificial intelligence refers to the brainpower exhibited by machines in dissimulation through action, thinking skills, reasoning, and behavior. As a study in an academic field, artificial intelligence developers’ attempts to equip objects with animate abilities to imitate humans and even execute some of the duties performed by man (Sandin 2003, p. 34). Mechanical engineers seek training in a wide range of technicalities that attempt to offer problem solving to which robot-like objects espouse such domineering intelligence to match human thinking skills (US Department of Mechanical Engineering 2013). It is still subject to debate as to whether these developments will ultimately culminate into a perfect art that can always take a place of the human mind. With increased technology, computational proficiency guarantees mechanical engineers with the rare capacity to design and offer an insight into principles of integration and control especially for machinery equipment. This knowledge seeks to give robotic objects some air of human intellect capable of executing human orders.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More As Sandin (2003, p. 75) observes, this science delves much in feedback mechanism, signal sensing and processing to efficiently design and integrate human accuracy with automated systems such as robots. For many, robots are merely objects that imitate insects, animals, and human beings. However, in military science they could be effective gadgets for countering terrorism. While much these artificial animate objects capture our imagination, their designers dwell much on developing them to help intelligence authorities in executing some specific activities that could be risky for humans to undertake (Shi 2011, p. 56). Many developers are already contemplating giving these objects enough intelligence to enable them interact reliably with the dynamics that are in common practice. In most cases, these objects have the endowment of doing some of the things deemed as too dangerous, boring, difficult to execute, or just extra ordinary in some way such as fighting terrorism. Technical intelligence is common in most objects found in automotive, manufacturing industry, medical implements, and space exploration gadgets. Over a million different types of object-like robots exist within modern science with greater tendency to work with greater intelligence capable of detecting and fighting terror groups (US Department of Mechanical Engineering 2013). Some robotic objects such as the Mars Exploration Rover, the Caribou, and drones have been used to assist the intelligence personnel in learning about possibilities that are either too dangerous or practically unsafe to explore (US Department of Mechanical Engineering 2013). Fighting terrorism is a high calling that sometimes extend to areas where there is biological attack. Since robot-like gadgets do not breathe, it is easy for such gadgets to explore such regions and launch an attack or take photos. Objects with technical intelligence have features that enable them to perform their duties optimally. These characteristic consists of movement, energy, sensory, and intelligence analogous to that in human beings. For an object to have artificial intelligence, it has to exhibit some animate qualities. Whether propelled by thrust, walking on human-like legs, or rolling on wheels, these objects have been instrumental in aiding human capacity to fight terrorism. For these objects to function, they have in-built human capacities that put them at par with human intelligence.Advertising We will write a custom essay sample on Human and Technical Intelligence in Countering Terrorism specifically for you for only $16.05 $11/page Learn More Unlike human beings, that have innate body power, an object that displays technical intelligence needs to power itself effectively and perform its functions as desired. A robot for example, must derive its power from electric charges, solar power, or battery (Shi 2011, p. 145). Furthermore, the ways these objects get their energy always depend on their designated function. Unlike human beings, to function in the capacity desired, a robot for instance, needs a fair degree of smartness. In essence, a great deal of software design becomes a necessity in the assembly of robotic objects. Unlike human beings that have natural se nsory nerves, for robots to perform well, they must have the software to help them sense their immediate surroundings and act as programmed (Dick Kandel 2005, p. 56). While giving robotic objects sensory abilities such as chemical sensors (nose), light sensors to emulate the eyes, pressure, or touch sensors to emulate the hands), hearing sensors to emulate ears, and taste sensors (tongue) has the likelihood of giving robots human qualities. It must however, come out clearly that singularity with humanity as to take special parallelism with the human making is still far from reality. Contribution of human and technical intelligence to counter-terrorism operations The increased attention and use of drones, or perhaps aerial vehicles continue to spark debate about their widespread application and effectiveness in fighting terrorism (Stanford/NYU Report 2012). Much of the debate, according to Cavoukian (2012), centres on their state application for surveillance and warfare or at times by the media to grope raw photo footage of a particular event. The application of drones especially in military airstrike and photo surveillance have all been great feats in combating terrorism (Cavoukian 2012). Moreover, anti-terror agencies equally use them for surveillance to enable them detect and deter terrorism. However, the varying applications of drone technology necessitate the need for best practices to ensure the terror groups do not find use them for their advantage. The application of technical intelligence for the public good has to prioritise on several factors including human welfare in assisting the authorities in detecting and combating terrorism. Terrorism continues to evolve with increase in technology. Today, terror groups such as Al-Qaida, ISIS, Al-Shabaab, and Boko Haram continue to device various means of survival to stay relevant. Armed aerial gadgets with technical intelligence make camera technology to be useful in tracing terror networks around the globe (Finn Wright 2012).Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Technical intelligence come with enhance flexibility since these gadgets have are not limited in their ability to go places. This flexibility gives way to a new task for intelligence agencies to fight terrorism without being intercepted by the terror groups (Stanford/NYU Report 2012). As camera technology becomes more pronounced, the emergence of armed aerial gadgets suggest a wide range of concerns, ranging from relief supply, digital imaging, device development, to mobile airborne tracking (Finn Wright 2012). Drones particularly, have been instrumental in play board delivery, and a police crackdown on terror groups or monitoring their activities around the globe. Some drones have special uses with a radioactive monitoring device while others are effective in protecting wildlife or tracing lost games. As concerns public policy and human privileges watch, the contemporary debate on the recent uses of drone culminating in the military strikes on civilians have narrowed down the deba te to ethical and legal issues. As Cavoukian (2012) argues, the legality of using drones to deliver military weapons for air strikes has been an emergent factor that questions its use by ordinary surveillance group such as the fourth estate (Finn Wright 2012). It is no doubt that this issue has given rise to a critical debate giving way to tentative and unprecedented legality tussle. If used in ways that project technology in bad light such as infringing on the rights of citizens, or in attacking the armed civil populations, then drones will be less effective in delivering their potentials. Sophisticated policymaking as well as legal considerations is necessary in preventing the state from making military use of drones to be legitimate (Last 2005, p. 45). In addition, strict and firm measures regulating the commercial uses of drones are a necessity. Furthermore, restricting its use by the civil society will make drones to be an effective approach to embracing camera technology. Man y people, especially the civil society deem drones harmful, especially considering their recent uses in military air strikes, this notion is reversible if there is effective implementation if rules for its use. Moreover, its ability to take secret photos is nothing less than an infringement on the privacy of the citizens. The civil society groups consider the widespread use of drones as watering down the privacy right of citizens, and the authorities must come with strict regulations to curb this phenomenon. Combating terrorism in America Securing the United States’ borders including land, air, and sea from illegal entry by immigrants, and contraband such as weapons and drugs has been the face of America security structure especially in the wake of increased terror threat (Weintrit 2013, p. 5). The United States’ Patriot Act, was officially instituted in 2001 as the most sweeping enactment to counter terrorism following the 9/11 attack (Etzioni 2004, p. 75). At the beh est, the presumption of the act lies on its uniting and strengthening ability to provide among other things, appropriate tools necessary to intercept and thwart terrorism. As an effective homeland security commitment to ensure the safety of the American people, the Patriot Act instituted the use of technical intelligence for surveillance and rapid tracking response including seizures and detention of suspected terrorist agents. In the aftermath of the 9/11 attack, Hoffman (2015, p. 76) notes that President Bush together with the Attorney General John Ashcroft effectively rallied the Congress to increase police and military powers of search, seizures, surveillance to use relevant intelligence to detect, arrest and detain terror suspects. Among the key features of the Patriot Act included the Roving Wiretaps, which allowed the federal agency to use technical gadgets to wiretap any telephone conversations that terror suspects and agents might use to penetrate the security systems. In t he course of all these developments, Etzioni (2004, p. 125) notes that the federal agency became more consistent in the use of internet tracking as a means of fast tracking internet communication. The law enforcement authorities therefore had the capacity to interfere directly in the personal accounts of individuals using the internet without necessarily having to obtain warrants for such impersonations. The Patriot Act also guaranteed the federal authorities the right to order for business records for private and public companies for litigation scrutiny and auditing by the federal authorities. In so doing, federal investigators were able to access information and communications from consumer purchases, bank records, credit cards, libraries as well as schools, and colleges. Moreover, the Act instituted a special Foreign Intelligence Surveillance Court with the capacity to issue search warrants at the request of an investigator to launch terrorist investigation on foreign visitation to America (Hoffman 2015, p. 76). In addition, the Aliens Reporting and Detention Act authorises the Federal authorities to obtain personal documentations by foreign persons vising America and those found to be in America illegally risked detention and arrest without warrant. Within the tenets of keeping with the traditions of the Patriotic Act, the federal authorities could seize the property or obstruct such logistics of suspected terrorists. Individuals whose property fall victim of the rule bear the duty of proof that the property in question was not for the purpose of terrorism and the provision also guaranteed no claim. The detention as Etzioni (2004, p. 215) observes laws allowed the federal authorities to detain suspected terrorists and agents for lengthy periods during which interrogation and effective investigation for such persons will take place. The federal authorities became effective in fast tracking the indigenous American citizens from terrorist connections. Patriot Act instituted prohibition against harbouring terrorists as a duty to thwart the emergent terrorist networks in America and other parts of the world. Harbouring individuals who have committed a felony amounting to terror and or are about to commit such acts of terrorism therefore became highly constrainable by the federal authorities. In retrospect, the Patriot Act unleashed a tall order for the various institutions charged with the security of the American populations. In achieving the objectives of the Patriot Act, the American citizens became more involved in ensuring the smooth passage of the Act by showing a commitment to thwart terrorism by any means necessary including technical intelligence. Terror suspects and agents by contrast carry the greatest responsibility for their crimes as provided for by the Patriot Act. Terrorism and counter terrorism When it comes to terrorism and counter terrorism, the intelligence becomes a powerful tool used in spreading information to a wid e and expansive audience. The web particularly acts as both important facets of both human and technical facets of countering terrorism. Intelligence could be useful for security agencies to relay messages effectively in their explicit forms. However, terror groups could as well use it to inspire a powerful revolution through dispensing information, disinformation, or misinformation to their affiliations to mount an insurgence (Johnson 2015, p. 5). Studies hold that when it comes to terrorism and counter terrorism, intelligence becomes a powerful medium to arouse the authorities to the occasion. In most parts of the world, Kahl and Lynch (2013, p. 43) note that security agencies have used both human and technical intelligence as their campaign medium to put terror groups on toes. The trend according to Fluri (2005, p. 261) has been that the security agencies that use both of these forms of intelligence to fight terrorism have received wide acclaim. In recent cases, the intelligence has been effective in denouncing governments seem inclined to support terrorist activities. Through intelligence, the web primarily fuelled revolutions such as those witnessed in the Arab spring. Opponents of these unpopular regimes used intelligence amicably to arouse the masses and call them to a duty of nationhood. However, while the intelligence is such an empowering tool, concerns about cyber-crime are on the rise as fraudsters continue to seek a lifeline by expediting clandestine activities through the web. The web therefore, hosts several things, some of which are beneficial to fighting terrorism while on the other hand aid their activities. Technical intelligence has become so much part of human intelligence, not only in America, but also in other parts of the world especially in the advent of fighting terrorism (Kahl Lynch 2013, p. 45). Because of its rare ability to transform humanity, it is always easy to imply that the intelligence will always form part of the society a nd remain an open medium for human empowerment. Most security systems as Dick and Kandel (2005, p. 245) note will always want it to remain an item to explore the world and bring great opportunities that technology offers. Away with the regulatory policy duties, through the intelligence, security agencies can always have the endowment to access any permissible content they want and this in turn has the capacity to help the security personnel to stay informed. While it is true that some form of technical intelligence might warrant censorship, the onus should be on the security detail to guard their contents jealously. Through this, the security personnel are likely to build a robust network capable of combating terror groupings. With increased terrorist activities taking place in most parts of the world, the society looks upon the security agencies to use any form of intelligence necessary to combat terrorism from all corners of the world. With the growth in technological inventions, information flow especially through the web continues to empower security agencies in their effort to combat terrorism. In the course of these progresses, Johnson (2015, p. 10) notes that the world continues to grow into a global society in combating terrorism. The increased use of technology to thwart terrorism has greatly influenced human resource capacity to make business blossom, while effectively aiding in the effective administration of and coordination of government operations (Kahl Lynch 2013, p. 48). Both human and artificial intelligence continue to be empowering tools that offer greater prospect to security personnel to share information with broader audiences who are almost, always invisible. In the present, humanity devotedly uses the web to get across their ideas to millions of audiences elsewhere in an effort to stay informed and put terror groups on notice. The application of intelligence by the security personnel according to Meara (2003, p. 67) continues to transf orm lives while extending an olive branch to technological advancements for human safety. Through technology, governments with different terrorism concerns interact and by so doing, they use technical intelligence to transform the social and cognitive skills of their personnel in the effort of fighting terrorism (Johnson 2015, p. 12). The foundation of the proposition for the efficacy of human and technical intelligence emanates from the fact that the intelligence is an empowering medium that is ordinary in essence and dear to human empowerment by fact. More than anything, intelligence is an intrinsic embodiment for technological expansion, and for that matter, its supremacy in fighting terrorism is unalterable. Terrorism compromises the security of the world With the security of the world under threat, humanity continues to live in peril and this reflects negatively on the socio-economic and political progress in areas subdued by the terror groups. Esfandiary and Tabatabai (2015, p . 8) suggest an urgent need for mobilisation between the security agencies in different countries and the international players to trace the foothold of terror groupings. Different security agencies across the world understand the enormity of tackling terrorism menace from its very foundations in various parts of the world. Moreover, most security agencies are optimistic that the solution to the threats posed by terrorism must begin with thorough realignments for both the human and technical intelligence to counter the possible threat posed by terror groups. Security agencies according to Kahl and Lynch (2013, p. 50) use both technical and human intelligence to volunteer a rich account of the strategies that these groups employ to survive counter terror attacks. Through intelligence, security agencies are optimistic that the very tricks that the terror groups employ to launch attacks could be useful in smothering them. Security agencies hold that the first step in seeking solutions to terrorism menace is to understand the actions of the groups’ from their very point of view, which essentially is all that intelligence seeks to exploit. Esfandiary and Tabatabai (2015, p. 12) absolve the Muslim world of blame and warn that generalisations might be imprudent approach in the effort to counter terrorism. Intelligence makes it easy to separate terrorists from ordinary civilisations that may be victims of the situation by either religious creed or ethnic orientations. However, Farwell (2014, p. 49) strongly suggest intelligence could be useful in expediting strong action on governments that perpetuate the terrorism activities. Different terror organisations such as Al-Qaeda and ISIS have a strong backing from several Islamic states that give them a lifeline in their operations. Intelligence offers an insight into the survival mechanisms of terror groups from using the Islamic state machineries to media fronts in perpetuating their propaganda and agenda. The med ia particularly, has been a formidable platform in the growth of ISIS and Al-Qaeda. According to Farwell (2014, p. 50), the groups’ public relations infrastructures seem more inclined in building their credibility while seeking to justify their legacy. Farwell (2014, p. 52) argues that while the media has been instrumental in promoting the ideals of these heinous groups, it can as well be effective in negating the gains they have achieved over time. The same sentiments are echoed by Klausen (2015, p. 5) in his article arguing that the Islamic extremist seem to have a well-coordinated IT experts and social media administrators that help in extrapolating the groups vendetta through social media platforms such as Facebook, twitter handle, Skype, and the You tube. While Farwell (2014) gives a detailed account of how social media has propelled the legacy of ISIS particularly, he warns of an impending danger in possible cyber terrorism that ISIS might soon deploy. Klausen (2015, p. 8) notes that to sensitise its following, ISIS uses great intelligence to inspire psychological warfare in propagating religious and political propaganda to recruit prospective members into the fighting squad. Notably, intelligence agencies opine that the first step in defeating terrorism is to extract the Muslim thinking that it has built around it. There is need to tell the world that ISIS is a terror squad that uses religious undertones to justify its crimes. Klausen (2015, p. 12) and Farwell (2014, p. 53) concur that governmental intelligence must be stepped up to track terror groups’ airwaves and destroy their networks in all parts of the world. Religious extremism is the baseline of the terror networks in all parts of the world today. Various intelligence agencies have sought to trace the origin of Jihad that seems to be the core of terrorism. In so doing, they find a rich link between the modern day Islamic religious Jihad and the rise of terror networks as having clo se links with religious extremism. Gerges (2014, p. 339) takes on this perspective and volunteers a glimpse into the historical context of Islamic extremism under the guise of Jihad. Islamic religious aggression is not something new to intelligence agencies across the world; it has its genesis from the Quran Jihad (Gerges 2014, p. 340). The same observation is presented by Hecan (2014), who traces the origin of Al-Qaeda to its rich ties with the ideological conflicts in Middle East and rise of the Cold War. Different intelligence groups give separate evidence of the atrocities already committed by the Al-Qaeda in Iraq, Syria, Afghanistan and Saudi Arabia as attributions for the group’s discontent with the current state of affairs in regions in which it operates. Al-Qaeda particularly has always been in existence for many years and it has evolved over time to give rise to other sub terror groups such as ISIS, Boko Haram, and Al-Shabaab. Having gone through an arduous metamorph osis, Gerges (2014, p. 342) opines that dealing with the terrorism is not an event but rather a process that must involve insightful human and technical intelligence. Terror groups have invested much time in seeking harmony with the Muslim faith to justify their Jihadist extremism, hence the need to use greater human and technical intelligence to diffuse such propaganda. Conclusion In today’s technological world, information and communication technology has created room for empowerment. Different groups and individuals use this noble cause in different ways including negative ones such as cyber-crimes and terrorism. Intelligence has been instrumental in fighting terrorism as well as in aiding the operations of terror groups around the world. Security agencies employ both human and technical intelligence to detect, intercept, and thwart terrorism while on the other hand terror groups use this enablement in reaching out to their audiences to carry out terror activities in targe t areas. However, both human and technical intelligence has handled security agencies around the world a powerful weapon in hacking the administration records of terror groups to seek information pertinent to their operations and counter their activities. References Cavoukian, A 2012, Privacy and drones: Unmanned aerial vehicles. ipc.on.ca/images/Resources/pbd-drones.pdf Clutterbuck, R 2013, Terrorism, Drugs Crime in Europe after 1992, Taylor and Francis, Hoboken. Dick, S., Kandel, A 2005, Computational intelligence in software quality assurance, World Scientific, New Jersey. Esfandiary, D., Tabatabai, A 2015, ‘Irans ISIS policy’, International Affairs, vol. 91, no. 1, pp. 1-15. Etzioni, A 2004, How patriotic is the Patriot Act? Freedom versus security in the age of terrorism, Routledge, New York. Farwell, J 2014, ‘The media strategy of ISIS’, Survival, vol. 56, no. 6, pp. 49-55. Finn, R. Wright, D 2012, ‘Unmanned aircraft systems: Surveillance, e thics and privacy in civil applications’, Computer Law Security Review, vol. 28, no. 2, pp. 184-194. Fluri, P 2005, The evolution of civil-military relations in South East Europe continuing democratic reform and adapting to the needs of fighting terrorism, Physica-Verlag, a Springer, Heidelberg. Gerges, F 2014, ‘ISIS and the third wave of Jihadism’, Current History, vol. 113, no. 767, pp. 339-343. Hecan, M 2014, Iraq steads against the deployment of foreign ground troops within its territories says Iraqi foreign minister at USAK, http://connection.ebscohost.com/c/articles/99424135/iraq-steads-against-deployment-foreign-ground-troops-within-territories-says-iraqi-foreign-minister-usak Hoffman, B 2015, ‘A first draft of the history of America’s ongoing wars on terrorism’, Studies in Conflict Terrorism, vol. 38, no. 1, pp. 75-83. Johnson, L 2015, ‘A conversation with James R. Clapper, Jr., the director of National Intelligence in the Unit ed States’, Intelligence National Security, vol. 30, no. 1, pp. 1-25. Kahl, C. H., Lynch, M 2013, ‘U.S. Strategy after the Arab uprisings toward progressive engagement’, Washington Quarterly, vol. 36, no. 2, pp. 39-60. Klausen, J 2015, ‘Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq’, Studies in Conflict Terrorism, vol. 38, no. 1, pp. 1-22. Last, M 2005, Fighting Terror in cyberspace: Series in Machine Perception and Artificial Intelligence, World Scientific, New York. Meara, M 2003, History behind the headlines the origins of conflicts worldwide, Gale Group, Detroit. Primakov, E 2004, A world challenged fighting terrorism in the twenty-first century, Nixon Center and Brookings Institution Press, Washington, D.C. Sandin, P 2003, Robot mechanisms, and mechanical devices, McGraw-Hill Companies Inc., New York. Shi, Z 2011, Advanced artificial intelligence, World Scientific, Singapore. Stanford/NYU Report 2012, Living under drones: death, injury, and trauma to civilians from US drone practices in Pakistan, livingunderdrones.org/report/ US Department of Mechanical Engineering 2013, Trends in mechanical engineering careers, http://me.eng.sunysb.edu/index.php?option=com_contentview=articleid=60%3Atrends-in-mechanical-engineering-careers-Itemid=83 Weintrit, A 2013, Marine navigation and safety of sea transportation, CRC Press, Hoboken.

Sunday, November 3, 2019

How can companies use 'social networks' to maximise their competitive Dissertation

How can companies use 'social networks' to maximise their competitive advantage - Dissertation Example Business competitive leveraging is just within a finger tips. The advent of information technology and the thriving of cyberspace communities within social networks made it easy to exchange goods with customer around the world or within the domestic market. Corporations and companies are now accessible in this era where everyone lurked within the information superhighway. But while business analysts and organizations see these as infinite opportunities, there remain a necessity for all web-based organizations to develop its internal policy on Information Management System to ensure that while its undergoing business competitive leveraging, it’s still able to maintain and respect internal policies, rules, and secrecy of corporate information, such as, the fiduciary relation with clients or customers and those internal corporate trade policies (Khan & Blair, 2004, pp.1-241; Badaracco ,1991, pp. 6-10).  Some tips on how to preserve corporate integrity in this information and so cial network era are recommended by the researcher too. Table of Contents I. Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 a. Aims †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 b. Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 II. ... 11 d. Social media: Bases for business decision-making†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 e. Conclusion and Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...16 Introduction The use of social network for business leveraging is currently an essential value in business management. The advancement of information technology and development of software for web-based collaboration has turned data management as a strategic asset that is imperative as knowledge-economy becomes a trend of the decade’s economic paradigm. This paper aims to explore and discuss the significance of social network use for business leveraging. In delving into this topic, the researcher will answer the question how companies use social networks to maximize their competitive advantage? The researcher will use a qualitative method in exploring and explicating the topic. This method seeks to explore a phenom enon using flexible iterative style of generating responses to questions through semi structured in-depth interviews, focus group discussions and observation to describe and explain relationships and experiences of a group (Cassell & Symon, 1994, pp 10-25; Cassell & Symon, 2004, pp. 1-4; Creswell, 2003, pp. 4-6; Easterby-Smith, Thorpe, & Lowe, 2002, pp. 10; Fischer, 2007, Mayon-White, 2004, p. 28; Neuman, 2006, pp. 12-15; Polonsky & Waller, 2005, pp. 10). It’s an open ended research type and most of evidences are textual sourced from secondary and primary sources (Cassell & Symon, 1994, pp 10-25; Cassell & Symon, 2004, pp. 1-4; Creswell, 2003, pp. 4-6; Easterby-Smith, Thorpe, & Lowe, 2002, pp. 10; Fischer, 2007, Mayon-White, 2004, p. 28; Neuman, 2006, pp. 12-15; Polonsky & Waller, 2005, pp. 10). Ethical considerations in the conduct of this study are seriously noted in

Friday, November 1, 2019

Interview Essay Example | Topics and Well Written Essays - 750 words - 15

Interview - Essay Example The interview perused on issues relating to team management for instance, how I ever managed a team project in the past, difficulties I encountered, decisions I undertook, how I managed the group members, how I met deadlines, and organized the team to work as one. In preparation of the team building questions will give me confidence when going for the interview. I also believe that there are a number of questions which I did not find relevant in the mock exam, for instance, the question asking about situations when I missed deadlines while carrying projects and what I could have done different. I believe such a question is irrelevant in this content. I felt more prepared when questions relating to goals was asked. Ever since I was a young person, I had always been taught about the value of always planning ahead, through having short and long term goals. In addition, I was more prepared when it came to team project management issues since I had experience with it. In school, we used to be grouped in groups of 8 and each group accorded group leader in rotation for each task. As a group leader and project manager, I managed to get some skills in relation to how to make a team stronger and more focused. I felt least prepared in the question which talked about describing some aspects about the company, since i had not research about it well. I also found the question about the most difficult course that I took in school absurd, because I found all to be equally easy. I learnt a lot about myself after the mock interview. I realized that I had a lot to learn and prepare for the real exam. First of all, I realized I would get an average or a fail based on the level of prepared at the mock interview. In order to score highly for the real interview with the company, means I have to prepare well. I also realized the value of being prepared all round as some questions are not directly related to class work, but come as practical examples, like for