Monday, September 30, 2019

Generally, Laggard High School is a safe place for students.

The buildings and classrooms are well-structured and convenient for both teachers and students. I feel safe inside these classrooms since they are complete with the facilities and materials we need for teaching and learning. Moreover, I also feel safe in school because of the presence of the fire service. Probable fire incidents, as well as other untoward emergencies that may happen in the building, can be easily prevented because of an efficient and effective fire service just across the street. Being bounded by an ivy-league university like the Baylor University creates a positive influence on the part of the students as well as the community. Since high school students see what university students do, they pretty much have an idea of what life in the university is, which could lead them to pursue their own education, if not in Baylor, then in other colleges or universities in the city or in another state. It is a good thing that Baylor is there because as early as freshman in high school, a student can already be influenced to think about what course or study to pursue. Furthermore, since Baylor is a Christian school, particularly the largest Baptist university in the world in terms of enrollment, it fosters a caring and sensitive atmosphere not just for the students in Baylor but also for the whole of the community. Baylor University’s presence generates a sense of safety and security on my part, because I do not have to worry much about Laggard High School’s students’ future. However, not all areas in and around Laggard High School foster a friendly and safe ambiance. Since numerous cars enter through the main entrance and students need to stay behind the main door until 8:30 in the morning, possible accidents may happen. Students flock near the main entrance to wait for time as cars come and go. This could be a trouble area especially for students entering the school and those closest to the car park, who are consumed with their conversations that they do not notice the cars coming in and out of the school premises. This somehow unsafe and trouble area can be fixed by having someone monitor or guard the students coming in as well as the cars that enter and leave the school premises. Also, a conducive and comfortable waiting area, where students who come in early can stay, should also be designated. Another possible solution is letting the students enter 10 minutes before the time so that they can settle and be safe inside their classrooms. In addition, some cars entering the main entrance can use the entrance near Central Avenue so that the number of cars entering along with the students via the main entrance will be lessened, thus less accidents are avoided. Another area I do not feel safe in is the cafeteria. This could be another possible trouble spot because the area lacks adequate monitoring. There should be someone designated to monitor the hall. Monitoring would include watching over the behavior of the students to avoid any untoward trouble among them, as well as restricting the students to go from the cafeteria to the playground. Some students use the cafeteria to sneak out and play in the playground. And since the school lacks sufficient monitoring on some areas and on students’ behavior, we do not know if they could be safe in their playing. Moreover, since they have easy access to the playground, they are influenced to stay there longer than they are supposed to. We do not want this because our real focus is their learning inside the classroom. Students should be advised to know their time for study and their time for play. The Laggard High School is generally a very conducive and safe place for students, but then it also faces monitoring problems that need to be studied so that students, teachers, and parents would feel much safer.

Sunday, September 29, 2019

Essay on John Keats

Endymion is one of Keat’s early adventures in poetry.   The poem reflects Keats’ attitude to beauty.   Endymion is a youth renowned for his beauty and his perpetual sleep.   As he slept in Mount Latmus in Caria, his beauty warmed the cold hearts of Seleue (the Moon) who came down to him, kissed him and lay by his side.   His eternal sleep on Latmus is assigned to different causes but it is generally believed that Seleue had sent him to sleep that she might be able to kiss him. Keats has certainly made use of the myth of Endymion to explore his own way to realize the truth that is beauty (Hewlett, 1949).   But the myth remains only the framework.   Keats invents quite a lot.   Aileen Ward (1963) in this connection says:â€Å"the legend of Endymion’s winning immortal youth through the love of the Moon – Goddess was only the beginning or rather the ending; he had to fill up his four books with living characters, set them moving in a world of th eir own and breathe new meaning into the old legend.†And this meaning he does, indicate at the beginning of the poem:â€Å"A thing of beauty is a joy of ever;Its loveliness increases: it will neverPass into nothing; but still will keepA bower quite for us, and a sleepFull of sweet dreams, and health and quite breathing.†The theme of the poem is love, beauty and youth.   He starts this marvelous adventure laden with exotic scenery, in mid April and locates it aptly in the Isle of Wight:â€Å" †¦ So I’ll beginNow while I cannot hear the cities’ dire;Now while the early hudders are just new,And run in mazes of the youngest hewAbout old forests; while the willow trailsIts delicate ambrer; and the dairy pailsBring home increase of milk†¦Ã¢â‚¬ There are certainly inspired pieces in the first book as Hymn of Pan.   It begins after a description of the Festival of the God, which held on a lawn in a forest on a slope of Mount Latmus.   The whole a ssembly is addressed by the old priest who tells the worshippers of the bounties which Pan has heaped upon them.   The imagery is well chosen to explain the manifestation of God’s energy.   All the objects are described in happy phrases.   The God is associated with the objects of nature, every aspect which imagination, hunting for the objectively mysterious, can comprehend.   The Hymn ends in the lines in which Pan is:â€Å"†¦ The unimaginable lodgeFor solitary thinkings; such as dodgeConception to the very Bourne of HeavenThen leave the naked brain†¦.†The style of Endymion is largely that of â€Å"I Stood Tip-Toe† and â€Å"Sleep and Poetry.† This is luscious, half–feminine and often beautiful (Roe, 1997).   There is a distinct growth, of course, in craftsmanship but the most important point about Keats at this state is his depth and breath of philosophic apprehension of myth.   If we try to search for the meaning of the poe m in the organism of the structure, the divided self of Keats might be clearer, though it will affirm his inclination on the realistic side even at this stage.   The control in certain portions of the poem is uncertain partly because Keats was a young and undisciplined artist (Steinhoff, 1987). Up to the last moment, the hero as well as the poet till the last moment of his life is subject to conflicting desires.As a matter of fact, there is ambiguity in the poem.   The poem’s ending is presented in highly ambiguous way and it could be interpreted on two different levels.   On the mythological level, the maid – Indian Maiden – is only the Goddess in a disguise to test Endymion’s fidelity.   This is a fairy tale device.   So when Endymion seems to give up human love and asserts his devotion to â€Å"things of light† the maiden turns back into the Goddess and rewards him with the â€Å"immortality of passion† promised in the myth (Hew lett, 1949).To conclude, the real significance of the poem lies in search of truth, through the â€Å"bare-circumstance† of this legend.   Keats was the first poet in English who found a human meaning in the myth.   He did not fit myths into an allegorical pattern as Elizabethans did or did not only use them to decorative effect as the 18th Century people did.   Keats’ contribution lies in finding that the Greek myths were relevant to our inner experiences.ReferencesHewlett, Dorothy. 1949. â€Å"A Life of John Keats,† Hurst & Blackett, pp.325-326.Roe, Nicholas, 1997. â€Å"John Keats and the Culture of Dissent†, Oxford Clarendon Press.Steinhoff, Stephen. 1987. â€Å"Keats’s Endymion: A Critical Edition,† The Whitston Publishing Company, Troy, New York, pp.295-300.Ward, Eileen. 1963. John Keats: The Making of a Poet, New York.

Saturday, September 28, 2019

The End of the Affair

ABC DFG English 1B March 12 2013 A Man’s Love Graham Green wrote the beautiful love story The End of the Affair. The content is about the four characters the novelist, Maurice Bendrix; the couple Henry and Sarah Miles; and the priest Richard Smythe. Maurice meets Sarah and they fall in love deeply. The more Maurice loves Sarah, the more he realizes that there is an indestructible obstacle, which prevents him possessing all Sarah’s love. Maurice’s love affair ends, he lives in hatred and torment because Sarah staying away from him. Maurice has no more doubt when he finds out Sarah’s thought after reading her journal.The time he comes to her again, it is too late; Sarah can no longer enjoy true love with Maurice; she dies. After Sarah’s death, Maurice lives in regret and sorrow. Maurice considers himself a master of love in The End of the Affair because he shows desire to possess all of Sarah’s love and throughout the story he acts like a love starving person that seeks for it. Maurice’s personality has a big impact on his very own decision that drives his life in chaos. He wants to have the superiority in relationship, especially with women. Maurice stays â€Å" I had no idea whatever or falling in love with her.For one thing, she was beautiful, and beautiful women, especially if they are intelligent also, stir some seep feeling of inferiority in my [†¦] but I have always found it hard to feel sexual desire without some sense of superiority, mental or physical. † (17) . Maurice really shows us he is the man of desire, the desire to possess. When we take a look at a group of gorillas, there is one leader. The white-back-mature gorilla is always the leader of the group which he has the right to mate to all the others females. Maurice feels superior because he knows that if he could own Sarah, that where he feel the power of the top male.Maurice feels jealous with Henry who officially gets married to Sara h. When a man has something, he wants to completely possess it. And in this case, Sarah, a woman who delivers love, Maurice is thirsty for it. He is supposed to suck all the love from Sarah like a vampire sucks all the blood from its victim. The more he loves Sarah, the more love he requires her to deliver. Henry is the main wall that stops Sarah from delivering him more love that what causes him to think â€Å" his desire was simply for companionship†. Maurice is a jealous man. jealousy, or so I have always believed, exist only with desire† (31). He totally he his right to be jealous, which is natural. First Sarah was married to Henry. He is upset because he does not own Sarah. Second, when the Sarah and Maurice make love occasionally but Sarah comes back to Henry afterward. This situation is irony. Finally, Maurice could hate Henry because â€Å"while he still owned her presence at the table, the sound of her feet on the stairs [†¦] the kiss on the cheek. † (32) , he has nothing. Maurice could be a good novelist but he is just a human, and humans have flaws.Even though love is one of the most important things in Maurice’s life but he cannot take what love has given him. Maurice starts everything in pride. He says â€Å" I measured love by the extend of my jealousy, and by that standard of course she could not love me at all† (43). He thinks his jealousy is the tool, which he can use to measure someone’s dignity. He was wrong, and he regrets afterward. Maurice admitted â€Å" I’ve been a bad lover, Sarah† (105). However, at some point it is not wrong to use jealousy to measure ourselves. As we have known Maurice is struggle at love.First, he loves Sarah but he cannot have her. Second, he sees that Sarah is stuck with Henry, by their marriage. That could be one of the wall that inhibit him to love Sarah without doubt and jealousy. Like what mentioned in Sarah’s journal â€Å" he is jealous of the past and the present and the future†. The situation looks like Maurice had a bad headache that no medicine could fix. Of course he is one of the two partners in his love affair, he should have the instinct. Maurice feels that it would be going to be somewhat, he said â€Å" I became aware that our love was doomed† (25).Moreover, the aspiration to possess seems obsessed him, Maurice said moodily â€Å" I would fan myself into anger and remorse† and he can’t help changing the situation, he feels helpless â€Å" I was pushing, pushing the only thing that I loved out of my life†. Unsuccessful possession transforms into hatred and anger. Maurice says â€Å" but if love had to die, I wanted it to die quickly. It was as though our love were a small creature caught in a trap and bleeding to death: I had to shut my eye and wring its neck† (25) bitterly.We can assume that whatever Maurice has taken look like the heat, which uses to boil water. All the heat in the vase just wants to blast out. Love turns in to hate. Maurice said â€Å" more than anything in the world I wanted to hurt Sarah† (45). And he even acts like an upset kid behaving with his friend; he just wants to stop the game. Maurice mockingly told Sarah â€Å" we had good time together, we’re adults, we know it had to end some time. Now, you see, we can meet like friends and talk about Henry† (23). That should have hurt Sarah a lot.He simply revenges the person has given him the pain and the headache. When taking about Maurice, we cannot omit his obsession of love. Sarah’s love seems never enough for him. The depression grows awfully, he thought â€Å" and I began quite seriously to think of suicide†. In short, Maurice puts his entire mind toward Sarah. He loves her for two reasons, for her beauty and for the superiority in their relationship. However, assuming that his inner world seems struggle. His deeds keep moving around in a circle of loving and receiving love painfully.Maurice seems a hateful person because his head is full of pain and hatred but deep inside that nasty man there is a very usual man, a lovable man. Being left behind by Sarah, Maurice keeps thinking about what she could have done with another man. He becomes a true lover, or he admits himself so. Since the desire to possess Sarah, who carries a loved soul and beautiful body, so significant Maurice imaged Sarah with other man â€Å" Sarah making love, Sarah with X, doing the same things that we had done together† (59). Maurice is a doubtful man, he trusts no one and that sorrows him.The best moment is his life is when he realizes he was enlightened by Sarah’s unconditional love. He thought when he read Sarah’s journal â€Å" there’s enough left for our two lives, and I thought of that day when she had packed her suitcase and I sat here working, not knowing that happiness was to close, I was glad that I hadnà ¢â‚¬â„¢t known and I was glad that I know. I could act now† (101). That moment is a big change in his mind, it goes from totally doubt to doing whatever to love her unconditionally. It is also the moment that he perceives his biggest mistake ever, doubting ignoring Sarah’s love.He can be forgiven. When people realize their mistakes, they would either fix them or confess them. Bendrix said â€Å" the slowly growing pain in my upper arm where her weight lay was he greatest pleasure I had ever known† (105). He feels relieved because there is no more jealousy, no more doubt or hatred. At this point he forgives himself. He opens his spirit in order to touch what Sarah would offer him. Maurice shows us what his world of love looks like; it is filled with courage to move forward for the loved one and with passion to never stop loving. His personalities exist in a very special way.If there were an inner world Maurice would be without hesitation showing off his feeling su ch as interests or boredom to someone and if there were an outer world he would show off desire to love, to hate. Since there is a part in Maurice exists which always asks for more love, he is sort of lost. He is lost because he doesn’t now much love he needs. I have learned what is true love from Maurice. I can see love sometimes needs a boundary, which divides many parts. Where will be my limit to ask for love or where will be the limit the loved ones could offer me. Work Cited Greene, Graham. The End of the Affair. U. S: Penguin books, 2004. Print.

Friday, September 27, 2019

Conflict Resolution at General Hospital Case Study

Conflict Resolution at General Hospital - Case Study Example It has been recognized that cultural changes has been initiated by Mike Hammer which seemed to be relatively ineffective for the overall organization. The analysis of the case study is aimed at providing answer to various problems faced by General Hospital in order to increase its efficiency. Table of Contents Abstract 2 Introduction to the Case Study 4 Conflict Management Styles 4 Hammer’s Leadership Style 5 Change Approach Used 7 Conclusion and Recommendation 9 References 10 Bibliography 11 Introduction to the Case Study The case study is all about the General Hospital that has been facing problems and the performance of the organization has been declining. Therefore, the hospital required certain high-speed solution so that the operations of this organization could be improved. It was noted that the CEO of the hospital Mike Hammer identified that the cut in the cost of operation was of top priority and thus increase in the revenues could be the ultimate solution to fix the problem so that the current services could be expanded and the new services could have been added in those areas where the General Hospital could have competed successfully. Conflict Management Styles There are various conflict management styles such as competing/controlling, accommodating, avoiding, collaborating and compromising. Competing conflict management style is generally understood as being assertive and uncooperative. It might be understood as protection of one’s position which is believed to be correct or at this management style the person tries to win. Accommodating is just the opposite of the competing. In case of accommodating the individual tends to gratify the problems of the other people whilst sacrificing his personal concerns. Avoiding is the style of managing the conflict where the individual doesn’t pay due attention towards the conflicts and thus doesn’t makes any attempt to solve it (AFC-ISPI, n.d.). Compromising is an attempt made by the individual to resolve the conflict by means of identifying the solution that is accepted to both the parties to certain extent but not fully satisfactory to any one of them. Collaborating aims at cooperating with the other party for their concerns to be realized and thus enabling to express ones own concern with the aim towards finding a mutually and completely satisfactory solution (Wright State University, n.d.). After having analyzed the case study, it can be revealed that the collaborating conflict management style is practiced to resolve the problem that was pertaining in the organization. Collaborating involves working closely with other person in order to find a feasible solution to the problem fully satisfying the concerns of both the persons. In the case study, Mike Hammer hired Marge Harding in order to work together on the matters. In addition to this, by doing so the concerns of both (Hammer and Harding) would be satisfied since Mike Hammer’s aim was to reduce th e cost and Mage Harding wanted to take up the challenge since the work could provide her the chance to get the CEOs position after few years. This makes it evident that the collaborative conflict management style has been applied in the case study. Hammer’s Leadership Style Leadership style is a process whereby the direction is provided, plans are implemented and thus the people are motivated to work in an organization. It is worth mentioning that the leaders might not use one particular style when executing the above functions. Various styles are used; most of them may even use multiple styles. The diverse leadership styles as exercised by the leaders are authoritarian, democratic and laissez fair. In case of authoritarian leadership styles,

Thursday, September 26, 2019

Modernization Of Infrastructure, Architecture, And Education In The Essay

Modernization Of Infrastructure, Architecture, And Education In The UAE - Essay Example Studying at the Masjid is really an honor but sometimes my teachers are not very understanding. They are strict when it comes to learning math. I have been trying to keep up with the other students but the numbers just will not stick in my head. I remember being good at math when I was young, but now that I am 14, I am having trouble with algebra. I do not understand how it is possible to mix together all of the different numbers and letters. This is confusing to me. I feel as though I know the lesson and then when I try to do my work at home, I cannot remember what I have learned. At least I have my Holy Quran classes to look forward to. I am much better with words than with numbers. I know I should not complain. I could be working on the farm like all of my siblings. Since I am the oldest son, I know I have the responsibility to get a good education and for this I am grateful. This entry shows that education was very different for my grandfather. He was the only child that was able to attend school. This was before oil was discovered and developed, so people were much poorer than they are now. There were only two classes as well in those days. Education focused on math and the Holy Quran. Today, all children can go to school and they have access to computers, televisions and all sorts of technology. They learn about science, reading, history, and math. Education has really changed in the UAE since my grandfather’s time. This is one of the most exciting days of my life. My education is now complete and I am a fully certified architect. I am excited and sad because I will be leaving my small farm by the oasis. I will miss my father and mother, but there is no work for an architect in our little village.

Out group culture experience Movie Review Example | Topics and Well Written Essays - 250 words

Out group culture experience - Movie Review Example I am a Chinese national and would very often compare my socio-cultural with what happens in United States of America. Every year from the movie, many people hope to land in the USA from Southern as well as Central America to evade poverty implications in their countries. They experience a jungle of a nightmare while traveling along a stretch of the desert of ‘death corridor’. Many migrants have perished at this place. The in-group culture identity would range from religion (Islam, Christianity, Buddhism, Taoism), arts (Kung Fu, traditional dance, acrobatic,) and immigration policies. The Chinese government regulates the issue of immigration; favoring skilled labor to unskilled labor (Diestro-Dopido 2014). The unique hukou system of China distinguishes Chinese internal migration from migration in other developing countries; China founded the global hukou system, which restricted the mobility of the people. It aims to tie farmers to land, secure agricultural supply.The in-group experience is more pleasing and reliable. The cultural activities in China enhance peace and harmony in the soc iety because people meet very often to participate. There are many advantages of in-group because of a common language- a contributor to unity (Pedzich

Wednesday, September 25, 2019

Conflict in Intensive Care Unit Assignment Example | Topics and Well Written Essays - 750 words - 1

Conflict in Intensive Care Unit - Assignment Example The researcher states that the players in this situation are the nurses as well as the nurse manager. Each nurse is involved, because he or she will have to decide on his or her shift, and the nurse manager is heading up the issue. The nurse manager appears to not be taking enough initiative to sort the issue out amongst the other nurses, and this can be a huge problem. This can easily result in the nurses becoming angry with each other and this can cause serious implications in the healthcare field. For instance, if a patient is very ill and the nurses are bickering amongst themselves about a scheduling problem, will the client get the proper care? This would need to be addressed immediately. There are two categories of nurses here that have different goals and values. The first category is the nurses who wish to keep their 8-hour shifts, and most of those nurses have worked in the department for 15 years or more. These are the more seasoned, veteran nurses, who have formed their li ves around their current schedules, and are very used to eight-hour shifts. Thus, they feel most comfortable proceeding where they are at. This group of players thus wants to stay with the 8-hour shift schedule. The second category of nurses are those that wish to work 12 hours shifts and thus have more days off. There is no mention of these nurses’ working records, but it appears that these are the nurses who do not have as much veteran status and probably have more flexible schedules as well. The researcher will try a peace negotiation strategy for conflict resolution. His hope would be to attain some type of compromise. The researcher would first approach the veteran nurses and ask them for more information about their planned activities, in order to gauge how important, the situation is to them.

Tuesday, September 24, 2019

Alcan Case Study Essay Example | Topics and Well Written Essays - 1250 words

Alcan Case Study - Essay Example In this era of computerization, IT is playing a key role in the management and reporting of exceptions so that pertinent issues could be highlighted and addressed before assuming alarming proportions. In the present case, Robert Ouelette the new CIO has three main concerns: (1) how to co-ordinate the IT functions across different countries and continents; (2) converting the IT governance function into a centralized one; and (3) monitoring the cost of IT, controlling wasteful expenditure and overseeing the usefulness of output produced by the IT function in the enterprise. The Accenture IT Governance Model Weill and Ross in their book ‘IT Governance’ define the term as â€Å"specifying the decision rights and accountability framework to encourage desirable behavior in the use of IT.† (Weill & Ross, 2004, 7 ). Some IT professionals and laymen at large seem to confuse the IT governance model with the way that IT is implemented and managed in an organization. We need to establish at the outset that IT governance does not give us the means to manage the IT department- rather it is the model through which the business manages its use of IT. Accenture has developed an IT governance model framework in which they classify industries based on (1) the pace of technology changes that they face and (2) their basis for competitive advantage, this being either product differentiation or cost. Accordingly they have identified four business classifications: (A) Efficient Predictable Operators (B) Information Integrators (3) Responsive Solution Providers and (4) New Capability Enablers. Which Quadrant Does Alcan Fall In & Why In the above stated framework, Accenture define an efficient predictable operator as one whose industry experiences a slow rate of change and competes on the basis of its operational efficiency. This is a common picture of the aluminum and allied industry where there is vertical integration among the top firms in order to take advantage of lower production costs based on volumes produced of various outputs, and very high production capacities are used to break-even point. Secondly, with the high costs of running electrolytic processes, there is a dire need for constant and reliable sources of cheaply available power. Alcan has managed to set up factories, refineries and mines at various places along the globe so that the cost of production is minimized or can be controlled to some extent, while supply of various outputs such as cans, sheets, ingots etc. is maintained. Now that the industry has overcome the lean period of the worldwide recession of the 1990s and the Russian oversupply shock that sent the price careening in a downward spiral, the price of aluminum per ounce has been increasing steadily and stands at $2,520 per tonne in 2007. I would put Alcan in the quadrant reserved for an Efficient Predictable Operator. Weill & Ross Model of IT Governance Weill and Ross have identified three questions that must be answered in order to achieve effective IT governance (Weill & Ross, 2004, 10). These are as follows: (1) What are the decisions that need to be made in order to ensure effective management and use of IT? (2) Who will need to make these decisions? (3) How will these decisions be made and monitored? In the course of their

Monday, September 23, 2019

Fine Tuning Essay Example | Topics and Well Written Essays - 4750 words

Fine Tuning - Essay Example The key findings will demonstrate how ‘Accounting Ratios’ for August, ‘Analysis of History’ and ‘Recommendations’ on improving the situation can positively impact the company. It will have three main bodies such as Accounting Ratios, History, and Recommendations. The structure of the assignment envisages a main body, which will be divided into different sections based on the topic to be covered and each section will be arranged under a separate subheading. This way, it will become clear as to who is required to read the report. Activity 2 encompasses an analytical and in-depth research on accounting ratios for December. This has then been compared and contrasted with data pertaining to August. An analytical review of the history of trading from August-December has been conducted with the aid of graphs, tables and the relevant evidence has been shown by referring back to the graphs and tables. Subsequently, based on the recommendations endorsed in Activity 1, clear evidence is presented to show the effectiveness of the action plan was. This, again, will be divided into three main bodies including Accounting Ratios, History, and the evidence of successful Action Plan. An investigation of this nature will help the company to determine its current organisational and operational anomalies that have contributed to a fall in their profitability. An analysis of various accounting ratios spanning over several months, which is one of the aims of this study, will help them to identify problems that have contributed to this phenomenon. In addition, it will also enable them to pinpoint the source of the problems so that they can take appropriate measures to address them adequately. Therefore, this study envisages a thorough analysis of various financial statements of the company right from January to June by applying an analysis of various ratios. Once the relevant ratio analyses are undertaken

Sunday, September 22, 2019

The Scarlet Ibis Essay Example for Free

The Scarlet Ibis Essay Answer the following questions honestly and thoughtfully. Be sure to write in full sentences and completely answer each question. Save your answers in your Network folder as Scarlet Ibis Questions. 1. How did you feel at the end of the story? Elaborate and explain in detail. 2. Does Doodle and or his brother remind you of anyone real or in other stories youve read or films you might have seem? Explain why or why not. 3. Have you had any personal experiences which help you to relate to this story? Describe an example from your life or another person’s. 4. What is a caul? Why did Aunt Nicey think the caul was important? Explain and support your answer. 5. What is significant about Doodle’s interaction with the bird the scarlet ibis. Find specific quotes from the text to support your answer. 6. In what way does the narrator’s pride help and also hurt Doodle? Provide textual evidence of both from the text. 7. The author, James Hurst, grew up in the southern part of the United States. How can we tell that the story took place in the South? Use at least two quotes from the story to support your answer. 8. What literary devices does Hurst use to tell his story? How do these devices help make the story effective? Offer textual support. 9. Does the story end the way you expect it to? Why does the author choose this ending? What effect does this conclusion have on the reader? 10. How would you like to have seen the story conclude? Be specific.

Saturday, September 21, 2019

Credit Risk Management in the UK Banking Sector

Credit Risk Management in the UK Banking Sector Background 3 Literature Review 7 Ascertaining why and how banking credit risk exposure is evolving recently 8 Seeing how banks use credit risk evaluation and assessment tools to mitigate their credit risk exposure 11 The steps and methodologies used by banks to identify, plan, map out, define a framework, develop an analysis and mitigate credit risk 13 Determine the relationship between the theories, concepts and models of credit risk management and what goes on practically in the banking world 17 Ascertain the scope to which resourceful credit risk management can perk up bank performance 19 To evaluate how regulators and government are assisting the banks to identify, mitigate credit risk, and helping to adopt the risk-based strategies to increase their profitability, and offering assistance on continuous basis 20 Research Methodology 21 Analysis 23 Ascertaining why and how banking credit risk exposure is evolving recently 23 Seeing how banks use credit risk evaluation and assessment tools to mitigate their credit risk exposure 25 The steps and methodologies used by banks to identify, plan, map out, define a framework, develop an analysis and mitigate credit risk 31 Determine the relationship between the theories, concepts and models of credit risk management and what goes on practically in the banking world 35 Ascertain the scope to which resourceful credit risk management can perk up bank performance 38 To evaluate how regulators and government are assisting the banks to identify, mitigate credit risk, and helping to adopt the risk-based strategies to increase their profitability, and offering assistance on continuous basis 40 Primary Survey 45 Conclusions 46 Recommendations 50 Bibliography 56 Background The sub-prime mortgage meltdown that hit the global banking sector in 2007, was a result of circumstances, actions and repercussions that began years earlier (Long, 2007). It, the sub-prime mortgage crisis, was based on unsound ground from its inception. Sub-prime mortgages represent loans made to borrowers that have lower ratings in their credit than the norm (investopedia, 2007). Due to the lower borrower credit rating, they do not qualify for what is termed as a conventional mortgage due to default risk (investopedia, 2007). Sub-prime mortgages thus carry a higher interest rate to off set the risk increase, which helped to fuel the United States economy through increased home ownership, and the attendant spending that accompanies it (Bajaj and Nixon, 2006). Implemented by the Bush administration in the United States to get the economy rolling after the recession fuelled by the September 11th air attacks, the entire plan began to backfire as early as 2004 as a result of the continu ed building of new housing without the demand (Norris, 2008). The new construction glutted the market bringing down house prices. This, coupled with a slowing economy in the United States resulted in layoffs, as well as many subprime mortgage holders defaulting on their loans, and the crisis ballooned. Some attribute the over lending of subprime mortgages to predatory lending (Squires, 2004, pp. 81-87) along with the underlying faults of using it as an economic stimulus package that did not control the limits on new housing (Cocheo, 2007). That set of circumstances represented the cause of the subprime mortgage crisis that spread globally as a result of the tightening of credit due to defaulted loan sell offs and restricted banking lending ceilings caused by the Basel II Accords (Peterson, 2005). The complexity of the foregoing shall be further explained in the Literature Review section of this study. The preceding summary journey through the subprime mortgage crisis was conducted to reveal the manner in which banking credit crunches can and do occur. The significance of the foregoing to this study represents an example to awaken us to the external factors that can and do cause banking credit crisis situations, thus revealing that despite good management practices such events can m anifest themselves. It is also true that poor or lax banking practices can have the same effects. Credit risk management represents the assessing of the risk in pursuing a certain course, and or courses of action (Powell, 2004). In addition to the foregoing U.S. created subprime mortgage crisis, the appearance of new forms of financial instruments has and is causing a problem in credit risk management with regard to the banking sector. As the worlds second largest financial centre, the United Kingdom is subject to transaction volumes that increase the risks the banking sector takes as so many new forms of financial instruments land there first. McClave (1996, p. 15) provides us with an understanding of bank risk that opens the realm to give us an overview of the problem by telling us: Banks must manage risk more objectively, using quantitative skills to understand portfolio data and to predict portfolio performance. As a result, risk management will become more process-oriented and less dependent on individuals. Angelopoulos and Mourdoukoutas (2001, p. 11) amplify the preceding in stating that Banking risk management is both a philosophical and an operational issue. They add: As a philosophical issue, banking risk management is about attitudes towards risk and the payoff associated with it, and strategies in dealing with them. As an operational issue, risk management is about the identification and classification of banking risks, and methods and procedures to measure, monitor, and control them. (Angelopoulos and Mourdoukoutas, 2001, p. 11) In concluding, Angelopoulos and Mourdoukoutas (2001, p. 11) tell us that the two approaches are in reality not divorced, and or independent form each other, and that attitudes concerning risk contribute to determining the guidelines for the measurement of risk as well as its control and monitoring. The research that has been conducted has been gathered to address credit risk management in the United Kingdom banking sector. In order to equate such, data has been gathered from all salient sources, regardless of their locale as basic banking procedures remain constant worldwide. References specific to the European Union and the United Kingdom were employed in those instances when the nuances of legislation, laws, policies and related factors dictated and evidenced a deviance that was specific. In terms of importance, credit risk is one of the most important functions in banking as it represents the foundation of how banks earn money from deposited funds they are entrusted with. This being the case, the manner in which banks manage their credit risk is a critical component of their performance over the near term as well as long term. The implications are that todays decisions impact the future, thus banks cannot approach current profitability without taking measures to ensure that decisions made in the present do not impact them negatively in the future (Comptroller of the Currency, 2001). A well designed, functioning and managed credit risk rating system promotes the safety of a bank as well as soundness in terms of making informed decisions (Comptroller of the Currency, 2001). The system works by measuring the different types of credit risk through dividing them into groups that differentiate risk by the risk posed. This enables management as well as bank examiners to mon itor trends and changes to risk exposure, and this minimise risk through diversifying the types of risk taken on through separation (Comptroller of the Currency, 2001). The types of credit risks a bank faces represents a broad array of standard, meaning old and establishes sources, as well as new fields that are developing, gaining favour, and or impacting banks as a result of the tightness of international banking that creates a ripple effect. The aforementioned subprime crisis had such an effect in that the closeness of the international banking community accelerated developments. The deregulation of banking has increased the risk stakes for banks as they now are able to engage in a broad array of lending and investment practices (Dorfman, 1997, pp. 67-73). Banking credit risk has been impacted by technology, which was one of the contributing factors in the subprime crisis (Sraeel, 2008). Technology impacts banks on both sides of the coin in that computing power and new software permits banks to devise and utilise historical risk calculations in equating present risk forms. However, as it is with all formulas, they are only as effective as the par ameters entered (Willis, 2003). The interconnected nature of the global banking system means that bank risk has increased as a result of the quick manner in which financial instruments, credit risk transfer, and other systems, and or forms of risk are handled. The Bank for International Settlements led a committee that looked into Payment and Settlement Systems, which impacts all forms of banking credit risk, both new forms as well as long standing established ones in loans, investments and other fields (TransactionDirectory.com, 2008). The report indicates that while technology and communication systems are and have increased the efficiency of banking through internal management as well as banking systems, these same areas, technology and communications systems also have and are contributing to risk. The complexity of the issues that arise in a discussion of credit risk management means that there are many terms that are applicable to the foregoing that are banking industry specific to this area. In presenting this material, it was deemed that these special terms would have more impact if they were explained, in terms of their context, as they occur to ease the task of digesting the information. This study will examine credit risk management in the UK banking sector, and the foregoing thus will take into account banking regulations, legislation, external and internal factors that impact upon this. Literature Review The areas to be covered by this study in relationship to the topic area Credit Risk Management in the UK Banking Sector entails looking at as well as examining it using a number of assessment and analysis points, as represented by the following: Ascertaining why and how banking credit risk exposure is evolving recently. Seeing how banks use credit risk evaluation and assessment tools to mitigate their credit risk exposure. The steps and methodologies used by banks to identify, plan, map out, define a framework, develop an analysis and mitigate credit risk. Determine the relationship between the theories, concepts and models of credit risk management and what goes on practically in the banking world. Ascertain the scope to which resourceful credit risk management can perk up bank performance. To evaluate how regulators and government are assisting the banks to identify, mitigate credit risk, and helping to adopt the risk-based strategies to increase their profitability, and offering assistance on continuous basis. The foregoing also represents the research methodology, which shall be further examined in section 3.0. These aspects have been included here as they represented the focus of the Literature Review, thus dictating the approach. The following review of literature contains segments of the information found on the aforementioned five areas, with the remainder referred to in the Analysis section of this study. Ascertaining why and how banking credit risk exposure is evolving recently. In a report generated by the Bank for International Settlements stated that while transactional costs have been reduced as a result of advanced communication systems, the other side of this development has seen an increase with regard to the potential for disruptions to spread quickly and widely across multiple systems (TransactionDirectory.com, 2008). The Report goes onto add that concerns regarding the speed in which transactions occur is not reflected adequately in risk controls, stress tests, crisis management procedures as well as contingency funding plans (TransactionDirectory.com, 2008). The speed at which transactions happen means that varied forms of risk can move through the banking system in such a manner so as to spread broadly before the impact of these transactions is known, as was the case with the subprime mortgage crisis debt layoff. One of the critical problems in the subprime crisis was that it represented a classic recent example of the ripple effect caused by rapid interbanking communications, and credit risk transfer. When the U.S. housing bubble burst, refinance terms could not cover the dropping house prices thus leading to defaults. The revaluation of housing prices as a result of overbuilding forced a correction in the U.S. housing market that drove prices in many cases below the assessed mortgage value (Amadeo, 2007). The subprime mortgage problem was further exacerbated by mortgage packages such as fixed rate, balloon, adjustable rate, cash-out and other forms that the failure of the U.S. housing market impacted (Demyanyk and Van Hemert, 2007). As defaults increased banks sold off their positions in bad as well as good loans they deemed as risks as collateralised debt obligations and sold them to differing investor groups (Eckman, 2008). Some of these collateralised debt obligations, containing subprim e and other mortgages, were re-bundled and sold again on margin to still another set of investors looking for high returns, sometimes putting down $1 million on a $100 million package and borrowing the rest (Eckman, 2008). When default set in, margins calls began, and the house of cards started caving in. Derivatives represent another risk form that has increased banking exposure. The preceding statement is made because new forms of derivatives are being created all of the time (Culp. 2001, p. 215). Derivatives are not new, they have existed since the 1600s in a rudimentary form as predetermined prices for the future delivery of farming products (Ivkovic, 2008). Ironically, derivatives are utilised in todays financial sector to reduce risk via changing the financial exposure, along with reducing transaction costs (Minehan and Simons, 1995). In summary, some of the uses of derivatives entail taking basic financial instruments as represented by bonds, loans and stocks, as a few examples, and then isolating basic facets such as their agreement to pay, agreements to receive or exchange cash as well as other considerations (financial) and packaging them is financial instruments (Molvar, et al, 1995). While derivatives, in theory, help to spread risk, spreading risk is exactly what caused t he subprime meltdown as the risk from U.S. mortgage were bundled and sold, repackaged, margined, and thus created a raft of exposure that suffered from the domino effect when the original house of cards came crashing down. Other derivative forms include currency swaps as well as interest rate derivatives that are termed as over the counter (Cocheo, 1993). The complexity of derivatives has increased to the point where: auditors will need to have special knowledge to be able to evaluate the derivatives measurement and disclosure so they conform with GAAP. For example, features embedded in contracts or agreements may require separate accounting as a derivative, while complex pricing structures may make assumptions used in estimating the derivative s fair value more complex, too. (Coppinger and Fitzsimons, 2002) The preceding brings attention to the issues in evaluating the risks of derivatives, and banks having the proper staffing, financial programs and criteria to rate derivative risks on old as well as the consistently new forms being developed. Andrew Crockett, the former manager for the Bank of International Settlements, in commenting on derivatives presented the double-edged sword that these financial instruments present, and thus the inherent dangers (Whalen, 2004) When properly used, (derivatives) can be a powerful means of controlling risk that allows firms to economize on scarce capital. However, it is possible for new instruments to be based on models, which are poorly designed or understood, or for the instruments to give rise to a high degree of common behaviour in traded markets. The result can be large losses to individual firms or increased market volatility. The foregoing provides background information that relates to understanding why and how banking credit risk exposure has and is evolving. The examples provided have been utilised to illustrate this. Seeing how banks use credit risk evaluation and assessment tools to mitigate their credit risk exposure. As credit risk is the focal point throughout this study, a definition of the term represents an important aspect. Credit risk is defined as (Investopedia, 2008): The risk of loss of principal orloss of a financial reward stemming from a borrowers failure to repay a loan or otherwise meet a contractual obligation. Credit risk arises whenever a borrower is expecting to use future cash flows to pay a current debt. Investors are compensated for assuming credit risk by way of interest payments from the borrower or issuer of a debt obligation. Risk, in terms of investments, is closely aligned with the potential return being offered (Investopedia, 2008). The preceding means that the higher the risk, the higher the rate of return expected by those investing in the risk. Banks utilise a variety of credit risk evaluation and assessment tools to apprise them of credit risk probabilities so that they can mitigate, and or determine their risk exposure. There are varied forms of credit risk models, which are defined as tools to estimate credit risk probability in terms of losses from banking operations in specific as well as overall areas (Lopez and Saidenburg, 2000, pp. 151-165). Lopez and Saidenberg (1999) advise us that the main use of models by banks is to provide forecasts concerning the probability of how losses might occur in the credit portfolio, and the manner in which they might happen. They advise that the aforementioned credit risk model projection of loss distribution is founded on two factors (Lopez and Saidenberg, 1999): the multivariate, which means having more than one variable (Houghton Mifflin, 2008) distribution concerning the credit losses in terms of all of the credits in the banks portfolio, and the weighting vector, meaning the direction, characterising these credits. As can be deduced, the ability to measure credit risk is an important factor in improving the risk management capacity of a bank. The importance of the preceding is contained in the Basel II Accord that states the capital requirement is three times the projected maximum loss that could occur in terms of a portfolio position (Vassalou, M., Xing, Y., 2003). Risk models and risk assessment tools form and are a structural part of the new Basel II Accord in that banks are required to adhere to three mechanisms for overall operational risk that are set to measure and control liquidity risk, of which credit risk is a big component (Banco de Espana, 2005). The key provisions of the Basel II Accord set forth that (Accenture, 2003): the capital allocation is risk sensitive, separation of operational risk, from credit risk, vary the capital requirements in keeping with the different types of business it conducts, and encourage the development and use of internal systems to aid the bank in arriving at capital levels that meet requirements An explanation of the tools utilised by banks in terms of evaluation as well as assessment will be further explored in the Analysis segment of this study. The steps and methodologies used by banks to identify, plan, map out, define a framework, develop an analysis and mitigate credit risk. The process via which banks identify, plan, map out, define frameworks, develop analyses, and mitigate credit risk represent areas as put forth by the Basel II Accord, which shall be defined in terms of the oversight measures and degrees of autonomy they have in this process. In terms of the word autonomy, it must be explained that the Basel II Accord regulates the standard of banking capital adequacy, setting forth defined measures for the analysis of risk that must meet with regulatory approval (Bank for International Settlements, 2007). This is specified under the three types of capital requirement frameworks that were designed to impact on the area of pricing risk to make the discipline proactive. The rationale for the preceding tiered process is that it acts as an incentive for banks to seek the top level that affords them with a lowered requirement for capital adequacy as a result of heightened risk management systems and processes across the board (Bank for International Settl ements, 2007). The foregoing takes into account liquidity (operational) risk as well as credit risk management and market risk. The risk management active foundation of the Basel II Accord separates operational risk from credit risk, with the foundation geared to making the risk management process sensitive, along with aligning regulatory and economic capital aspects into closer proximity to reduce arbitrage ranges (Schneider, 2004). The process uses a three-pillar foundation that consists of minimum capital requirements along with supervisory review as well as market discipline to create enhanced stability (Schneider, 2004). The three tiers in the Basel II Accord, consist of the following, which are critical in understanding the steps, and methodologies utilised by banks to identify, plan, map, define frameworks, analyse and mitigate risk (Bank for International Settlements, 2007): Standardised Approach This is the lowest level of capital adequacy calculation, thus having the highest reserves. Via this approach risk management is conducted in what is termed as a standardised manner, which is founded on credit being externally assessed, and other methods consisting of internal rating measures. In terms of banking activities, they are set forth under eight business categories (Natter, 2004): agency services, corporate finance, trading and sales, asset management, commercial banking, retail banking, retail brokerage, payment and settlement The methodology utilised under the standardised approach is based on operational risk that is computed as a percentage of the banks income that is derived from that line of business. Foundation Internal Rating Based Approach (IRB) (Bank for International Settlements, 2007) The Foundational IRB utilises a series of measurements in the calculation of credit risk. Via this method, banks are able to develop empirical models on their own for use in estimating default probability incidence for clients. The use of these models must first be reviewed and cleared by local regulators to assure that the models conform to standards that calculate results in a manner that is in keeping with banking processes in terms of outcomes and inputs to arrive at the end figures. Regulators require that the formulas utilised include Loss Given Default (LGD), along with parameters consisting of the Risk Weighted Asset (RWA) are part of the formulas used. Banks that qualify under this tier are granted a lower capital adequacy holding figure than those under the first tier. Advanced Internal Rating Based Approach (IRB) (Bank for International Settlements, 2007) Under this last tier, banks are granted the lowest capital adequacy requirements, if they qualify by the constructing of empirical models that calculate the capital needed to cover credit risk. The techniques, personnel and equipment needed to meet the foregoing are quite extensive, requiring a substantial investment of time, materials, funds, and personnel to accomplish the foregoing, thus this measure generally applies to the largest banks, that have the capability to undertake these tasks. As is the case under the Foundation Internal Rating Based Approach, the models developed must meet with regulator approval. Under this aspect of the Basel II provisions for this tier, banks are permitted to create quantitative models that calculate the following (Bank for International Settlements, 2007): Exposure at Default (EAD), the Risk Weighted Asset (RWA) Probability of Default (PD), and Loss Given Default (LGD). The above facets have been utilised to provide an understanding of the operative parameters put into place by Basel II that define the realm in which banks must operate. These tiers also illustrate that the depth of the manner in which banks identify, plan, map out, define frameworks, analyse and mitigate credit risks, which varies based upon these tiers. Under the Standardised Approach the formulas are devised by the regulators, with banks having the opportunity to devise their own models. Graphically, the preceding looks as follows: Chart 1 Basel II Three Pillars (Bank for International Settlements, 2007) Determine the relationship between the theories, concepts and models of credit risk management and what goes on practically in the banking world. The Basel Committee on Banking Supervision (2000) states that the goal of credit risk management is to maximise a banks risk adjusted rate of return by maintaining credit risk exposure within acceptable parameters. The foregoing extends to its entire portfolio, along with risk as represented by individual credits, and with transactions (Basel Committee on Banking Supervision, 2000). In discussing risk management theories, Pyle (1997)/span> states it is the process by which managers satisfy these needs by identifying key risks, obtaining consistent, understandable, operational risk measures, choosing which risks to reduce, and which risks to increase and by what means, and establishing procedures to monitor the resulting risk position. The preceding statement brings forth the complex nature of credit risk management. In understanding the application of risk it is important to note that credit risks are defined as changes in portfolio value due to the failure of counter parties to m eet their obligations, or due to changes in the markets perception of their ability to continue to do so (Pyle, 1997). In terms of practice, banks have traditionally utilised credit scoring, credit committees, and ratings in an assessment of credit risk (Pyle, 1997). Bank regulations treat market risk and credit risk as separate categories. J.P. Morgan Securities, Inc. (1997) brought forth the theory that the parallel treatment of market risk and credit risk would increase risk management by gauging both facets would aiding in contributing to the accuracy of credit risk by introducing external forces and influences into the equation that would reveal events and their correlation with credit risk. Through incorporating the influence and effect of external events via an historical perspective, against credit risk default rates, patterns and models result that can serve as useful alerts to pending changes in credit risk as contained in Pyles (1997)/span> statement that ended in due to changes in the markets perception of their ability to continue to do so. The Plausibility Theory as developed by Wolfgang Spohn represents an approach to making decisions in the face of unknowable risks (Value Based Management, Inc., 2007). Prior to the arrival of the Plausibility Theory, Bayesian statistics was utilised to predict and explain decision making which was based upon managers making decisions through weighing the likelihood of differing events, along with their projected outcomes (Value Based Management, Inc., 2007). Strangely, the foregoing this theory was not applied to banking. The Risk Threshold of the Plausibility Theory assesses a range of outcomes that may be possible, however it does focus on the probability of hitting a threshold point, such as net loss relative to acceptable risk (Value Based Management, Inc., 2007). The new Basel II Accord employs a variant of the foregoing that is termed as Risk Adjusted Return on Capital which is a measurement as well as management framework for measuring risk adjusted financial performance and for providing a consistent view of profitability across business (units divisions) (Value Based Management, Inc., 2007). The foregoing theory of including external events in a calculative model with business lines credit risks is yet to be fully accepted as the variables from external predictive models to result in scenarios along with credit risk models is a daunting set of equations. Ascertain the scope to which resourceful credit risk management can perk up bank performance. In equating how and the scope in which resourceful credit risk management can improve bank performance, one needs to be cognizant that credit risk represents the primary type of financial risk in the bank sector as well as existing in almost all areas that are income generating (Comptroller of the Currency, 2001). From the preceding it flows that a credit risk rating system that is managed and run well will and does promote bank soundness as well as safety through helping to make and implement decision making that is informed (Comptroller of the Currency, 2001). Through the construction and use of the foregoing, banking management as well as bank examiners and regulators are able to monitor trends as well as changes occurring in risk levels (Comptroller of the Currency, 2001). Through the preceding, management is able to better manage risk, thus optimising returns (Comptroller of the Currency, 2001). The improvement of credit risk management in terms of identification and monitoring, the process when operated effectively can improve bottom line performance through laying off risk identified as potentially being problematic in the future (KPMG, 2007). Zimmer (2005) helps us to understand the nuances of transferring credit risk by telling us: A bank collects funds and originates loans. It might only be able to attract funds if it holds some risk capital that finances losses and saves the bank from insolvency if parts of its loan portfolio default. If the bank faces increasing costs of raising external finance, CRT has a positive effect on the lending capacity of the bank. Providing the bank with additional risk capital, CRT lowers the banks opportunity cost of additional lending and increases its lending capacity. As has been covered herein, credit risk represents a potential income loss area for banks in that default subtracts from income, thus lowering a banks financial performance. The Bank for International Settlements (2003) advises that the principle cause of banking problems is directly related to credit standards that are lax, which is termed as poor risk management. The preceding reality has been documented by the The Bank for International Settlements (2003) that advises that poor credit risk management procedures and structures rob banks of income as they fail to identify risks that are in danger of default, and thus taking the appropriate actions. A discussion of the means via which resourceful credit risk management enhance bank performance in delved into under the Analysis segment of this study. To evaluate how regulators and government are assisting the banks to identify, mitigate credit risk, and helping to adopt the risk-based strategies to increase their profitability, and offering assistance on continuous basis. In delving into banking credit risk management in the United Kingdom, legislation represents the logical starting place as it sets the parameters and guidelines under which the banking sector must operate. The Basel II Accord represents the revised i

Friday, September 20, 2019

Psychological Aspects of Cybersecurity

Psychological Aspects of Cybersecurity Human Factors, Threats, Culture and Liability: Psychological Aspects of Cybersecurity Introduction In today’s society, cyber intrusion and attacks is becoming more prevalent. No one really knows the motivation behind such attacks. In some cases, it may be psychological and in others it could be a way to attain an adrenaline rush by invading a high-level security system. While cyber attacks has increased, our nation is putting execution actions in place to safeguard our critical infrastructure. With all of that being said, Congress has a responsibility to the people/nation to protect and secure their freedom. Cyber attacks are malicious acts that target information systems, infrastructures, and computer networks. Normally, the sources of the attack are unknown and the reasons of the attack are unclear. In many cases, the attacks are labeled as cyber warfare or cyber terrorism. In the same fashion, the people who commit these crimes are described as communist, cyber terrorist, and black hat etc. However, when Congress is the focus of the attack normally the target of attack is our infrastructure. Descriptive Labels Applied to Cybercrime The descriptive label that would be applied to cybercrime is data security breach or cyber terrorism. Further explanation of â€Å"Data Security Breach Notification Act 2012, mandates that companies have reasonable security measures to protect personal information and establish a uniform breach notification law (S. 3333 (112th): Data Security and Breach Notification Act of 2012, 2012).† Cyber terrorism is when a computer is used as the weapon for attack. In some cases you will find that cyber terrorism is the way to seek revenge or used as a method to intimidate or coerce one. An example of a cyber-terrorism perhaps could be hacking into aircrafts system and changing the coordinates of the flight. In 1996, President Bill Clinton created a Commission of Critical Infrastructure Protection. Congress new that the nation was at risk of cyber attacks. Therefore, to heighten awareness and maintain economic stability the board felt it was necessary to protect critical infrastructure. This was a mixture of electricity, computer networks, communication etc.; because all of these elements were vulnerable of cyber-warfare. With this in mind, the government was also thinking of protecting the public and private industries from such attacks. They were completely oblivious of the dangers how much or daily lives rely on computers. Notwithstanding the dangers and vulnerabilities they subjects themselves to when using the computer. Another issue is finding out who are the perpetrators and how the attack were initiated. The board felt it would be most helpful if they adequately protected critical system from intrusion. That meant ensuring the proper firewalls were enabled and the system was bein g monitored (http://csciwww.etsu.edu/gotterbarn/stdntppr/). Threat Factors In reality, if the United States Infrastructure comes under attack the enemy could cripple our defenses depending on how sophisticated the attacker is. The possible intent behind attacking our infrastructure, would be to target our water supply, transportation, telecommunication, energy, and last but not least finance. Our way of living depends on critical infrastructure; if we were to lose these vital roles we would be vulnerable to the enemy. These operations are important and we have become dependent on these networks. The lost of electricity, telecommunications, transportation, energy, and water would render us helpless. Such an attack would disrupt our day-to-day life and cause mass panic and fear. Therefore, in order to prevent such an act from occurring, Congress has created a new executive branch to merge 22 government agencies that were already in existence. The goal was to secure the nation and preserve freedom. In addition, have the ability to fence off attacks and be prep ared for unexpected disasters. To accomplish this task, the Department of Homeland Security had to unify the department in order to strengthen the components. Policy tells us that through partnership with other departments and operators of critical infrastructure would improve cyber security sharing information, which is ideal for the nation. Water Supply Attacking the water supply would be the most critical attack on the infrastructure. The water supply is controlled by computer systems, which is why it poses the most security risk. If the enemy was able to bypass the security features, they could release large amounts of water in any particular area. Destruction of large dams could unleash large amounts of water resulting in catastrophic flooding, loss of life and damage to property. Another vulnerability would be the sewer system. The sewage system protects public health and the environment; while providing a series of treatment that clean the water supply. Raw sewage has harmful bacteria and viruses that could be life threatening to human or animas if exposed to it. â€Å"Bioterrorism or chemical attacks could deliver widespread contamination with small amounts of microbiological agents or toxic chemicals could endanger public health (Terrorism and Security Issues Facing the Water Infrastructure Sector, 2006 ).† (http://fpc.state.gov/documents/organization/68790.pdf).† Energy The second most important infrastructure that could be attacked is energy. Energy is described in two separate classifications one being electricity and the other being natural gas. Electricity is used in everywhere i.e. houses, cities and regions. It is needed for day-to-day living such usage of machines and life saving mechanisms. For example, cyber terrorist has the ability to gain access to daily power report data. The report shows the flow of electricity in different regions. As a result, a cyber terrorist would have the ability to know what the busiest sections of the grid were. It is important to realize with this information they could shut down the power gird at the busiest time of the day and cause hysteria, backflow, and confusion. Without power the United States, defenses are down. â€Å"There have been incidents or credible intelligence to indicate that a potentially well organized, disruptive cyber attack is imminent against the electrical utility industry in general or BPA specifically, or Terrorist activity, either physical or cyber, has been perpetrated against civilian or government sites within the boundaries of the United States†¦ (Threat Conditions, n.d.).† http://info.bpa.gov/Emergency/ThreatConditions.aspx Not only is electricity important to infrastructure but natural gas is too. Cyber terrorist can halt the use or redirect gas flows. Keeping the energy a float is important for maintaining the safety and economic success in the United States. The White House Initiative has an Executive order, which is led by the Department of Energy and the Department of Homeland Security. Their job is to ensure electric companies and grid operators have working knowledge of cyber security potentials and prioritize their actions and investments to improve cyber security. In addition their â€Å"industry stakeholders in the energy sector, are also contributing to the development of the Cyber security Framework, which was announced as part of Executive Order 13636 on â€Å"Improving Critical Infrastructure Cybersecurity. (http://energy.gov/articles/energy-department-announces-new-investments-over-30-million-better-protect-nation-s).† Transportation A disturbance in the transportation system would cause a chain of economic disruption. By interfering with transportation it hinder citizens and would progressively degrade the economy over time span. It would impede on scheduling as well as accessibility. In like manner, these methods would have a negative impact on cargo being transported from place to place. Moreover, cyber terrorist can target railroad operations by taking controls of the switches, additional they could take over flight software to divert aircraft. Sapphire or Slammer worm spread quickly through the Internet attacking millions of computers and overwhelming them with data due to a flaw in a Microsoft program. (CONSUMER PRIVACY DEVELOPMENTS, n.d.).† Transportation is important to critical infrastructure. In order to maintain a since of balance, proactive measures must be in place to strengthen and secure critical infrastructure. It is important to have the necessary assets including but not limited to networks and public confidence. Needless to say, the infrastructure must be secure in order to withstand and promptly recoup from an attack. Finance Telecommunication Company Liabilities Reducing vulnerabilities through effective internal cybersecurity policy controls Conclusion The threat of cyber crime has risen in the United States. Congress is having more debates on the nations ‘s cyber security, terrorism, and breaches within our national systems. It was said by the â€Å"******* that we were in trouble because cyber attacks have resulted in the greatest transfer of wealth in history. (*****).† Although, Legislation have been proposed to govern the laws the bills have not been enacted. This is mainly due to the fact; the government and private industries have issues with the federal data security bills. Currently, the United States has a cyber security Executive Order in place. The purpose for this order, is to protect their United States from cyber contusion and the attacks against the nations critical infrastructure. A threat to the infrastructure is major to national security. Our nation relies on the infrastructure to keep the mainframe secure and efficient against intrusion. As stated earlier, cyber attacks are becoming more vigilant therefore, the government had to make changes to the executive branch. In 2002, a new executive department was put into place called the Homeland Security Act. Homeland Security Act 2002, was created to â€Å" prevent terrorist attacks within the United States; reduce the vulnerability of the United States to terrorism; and minimize the damage, and assist in the recovery, from terrorist attacks that do occur within the United States. (Homeland Security Act of 2002) References Anonymous. (2011). Data breach and electronic crime: the Sonys case. Retrieved from gcsec.org: http://www.gcsec.org/blog/data-breach-and-electronic-crime-sonys-case Anonymous. (2013). Managing CyberSecurity Risk. Retrieved from Protiviti: http://www.protiviti.com/en-US/Documents/Newsletters/Board-Perspectives/Board-Perspectives-Risk-Oversight-Issue44-Managing-Cybersecurity-Risk-Protiviti.pdf Anonymous. (n.d). About Sony Electronics Life at Sony. Retrieved from http://discover.store.sony.com/: http://discover.store.sony.com/sonyjobs/pages/about/life.html Anonymous. (n.d). Corporate Mission. Retrieved from neimanmarcus: http://www.neimanmarcuscareers.com/story/mission.shtml Anonymous. (n.d). Mission Values. Retrieved from About Target: https://corporate.target.com/about/mission-values Anonymous. (n.d). Throught the Years. Retrieved from Target.com : https://corporate.target.com/about/history Aspan, M. (2011). Citi says 360,000 accounts hacked in May cyber attack. Retrieved November 23, 2011, from http://www.reuters.com/article/2011/06/16/us-citigroup-hacking-idUSTRE75F17620110616 Bavisi, S. (2009). Penetration Testing. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. Bodhani, A. (2013). Bad†¦In a Good Way. Engineering Technology, 7(12), p64-68. Campbell, Q., Kennedy, D.M. (2009). The psychology of computer criminals. In Bosworth, et al., (Eds.), Computer security handbook. New York, NY: John Wiley Sons. Chen, C.; Shaw, R.; Yang, S. (2006). Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system. Information Technology, Learning Performance Journal, 24(1), p1-14. Chen, T.; Walsh, P. (2009). Guarding Against Network Intrusions. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. DATALOSSdb Open Security Foundation (2014). Data Loss Statistics. Retrieved from http://datalossdb.org/statistics Dittrich, D., Himma, K.E. (2006). Hackers, crackers and computer criminals. In H. Bidgoli (Ed.), Handbook of information security (Vol 2). New York, NY: John Wiley Sons. Elgin, B., Lawrence, D., Riley , M. (2014, February 21). Neiman Marcus Hackers Set Off 60,000 Alerts While Bagging Credit Card Data. Retrieved from businessweek.com: http://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data Ethical Issues. (2013). Retrieved from http://cps182cyber-crime.wordpress.com/ethical-issues/ Finklea, K.M., Theohary, C.A. (2012). Cyber-crime: Conceptual issues for congress and U.S. law enforcement. Journal of Current Issues in Crime, Law and Law Enforcement. 5 (1/2), 1-27. Retrieved from http://web.a.ebscohost.com.ezproxy.umuc.edu/ehost/detail?vid=3sid=79df209d-d6a2-4fd7-9761-f40b899a23e1%40sessionmgr4002hid=4209bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=i3hAN=88850916 Frizell, S. (2014, January 29). Holder: Feds Investigating Target Breach. Retrieved from Time.com: http://business.time.com/2014/01/29/feds-investigation-target-security/ Germano, S. (2013, December 27). Target’s Data-Breach Timeline. Retrieved from Wall Street Journal: http://blogs.wsj.com/corporate-intelligence/2013/12/27/targets-data-breach-timeline/ Goldman, G. (2011). Mass e-mail breach: Just how bad is it? Retrieved November 23, 2011, from http://money.cnn.com/2011/04/06/technology/epsilon_breach/index.htm Harris, E. A., Perlroth, N., Popper, N. (2014, January 23). Neiman Marcus Data Breach Worse Than First Said. Retrieved from New YOrk Times: http://www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.html Hassan, A.B., Lass, F.D., Makinde, J. (2012). Cyber-crime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology. 2(7), 626-631. Retrieved from http://www.ejournalofscience.org/archive/vol2no7/vol2no7_11.pdf Heavey, S., Finkle, J. (2014, March 13). Target says it declined to act on early alert of cyber breach. Retrieved from Reuters. Com: http://www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313 ITU. (2012). Understanding cyber-crime: Phenomena, challenges and legal response. Retrieved from www.itu.int/ITU-D//cybersecurity//Cyber-crime%20legislation%20EV6. pdf Kaiser, D. (2007). Insurance options vary as much as cyber attacks. Business Insurance, 41(21), 24. Katz, K. (2014, February 21). Security info. Retrieved from www.neimanmarcus.com: http://www.neimanmarcus.com/NM/Security-Info/cat49570732/c.cat?icid=topPromo_hmpg_ticker_SecurityInfo_0114 Krebs, B. (2014, 02 14). Target Hackers Broke in Via HVAC Company. Retrieved from krebsonsecurity.com: http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ Lewis, J. (2013). Raising the Bar for Cybersecurity. Center for Strategic International Studies. Retrieved from http://csis.org/files/publication/130212_Lewis_RaisingBarCybersecurity.pdf Mansoor, B. (2009). Intranet Security. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. McAfee (2014). McAfee Labs Threats Report: Fourth Quarter 2013. McAfee Labs. Retrieved from http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdf Metz, C. (2005). identity theft is out of control. (cover story). PC Magazine, 24(14), 87 Sales, N. (2013). REGULATING CYBER-SECURITY. Northwestern University Law Review, 107(4), 1503-1568. Shackleford, D. (2013). New Pathways to Network Security. Information Security, 15(6), p10-15. Sherr, I., Wingfield, N. (2012, May 7). Play by Play: Sonys Struggles on Breach. Retrieved from Wall Street Journal : http://online.wsj.com/news/articles/SB10001424052748704810504576307322759299038 Warner, J. (2011). Understanding cyber-crime in Ghana: A view from below. International Journal of Cyber Criminology. 5(1), 736-749. Retrieved from http://www.cyber-crimejournal.com/warner2011ijcc.pdf Waugh, D. (2001). Computer crime and ethics. Retrieved from http://homepage.ntlworld.com/woofy/ethics/ethics.pdf Williams, M. (2011, May 01). PlayStation Network Hack Timeline. Retrieved from pcworld.com: http://www.pcworld.com/article/226802/playstation_network_hack_timeline.html Wolf, J., Maclean, W. (2011). IMF cyber attack aimed to steal insider information: Expert. Retrieved November 23, 2011, from http://www.reuters.com/article/2011/06/12/us-imf-cyberattack-idUSTRE75A20720110612 Youderian, A. (2013, August 08). LulzSec Hacker Gets Year in Prison for Sony Attack. Retrieved from courthousenews.com: http://www.courthousenews.com/2013/08/08/60130.htm

Thursday, September 19, 2019

Human Rights in Brazil Essay -- Human Rights Essays

Human Rights in Brazil The population in Brazil consists of 144 million people. Brazil is one of the fastest-growing nations in the Western Hemisphere. Its population is increasing at the rate of about 2 % a year. The constitution of Brazil gives the president tremendous powers. For example, the president may intervene in affairs of Brazil's states. The chief executive may even create new states from existing ones. Brazil has three main ethnic groups-whites, blacks, and people of mixed ancestry. Most of the whites are from Europe. According to the Brazilian government whites make up about 60% of the nation's population, and people of mixed races form about 30%. However, the government of Brazil counts many lightskinned people of mixed ancestry as white. Brazil's ethnic groups generally get along well with one another. Racial discrimination in Brazil if far less widespread than that in many other countries with people of several races. But Brazilians of European descent have had better educational opportunities. As a result, they hold most of the higher jobs in government and industry. Many of the non-Europeans, particularly blacks, have excelled in the arts, entertainment and sports. Brazil's prison system system is in crisis. Four years ago, in its 1990 urban violence report Amnesty International described the prisons as being at breaking point, holding double their official capacity in "inhuman" conditions. Four years later the situation has not improved. In some respects, it has deteriorated. Overcrowding, lack of medical and legal assistance, torture and ill-treatment of inmates and harassment of visitors are endemic. A frightening and rising proportion of prisoners carry the HIV virus. In the Women's Prison of Soo Paulom, around 33% of the inmates are infected with the virus, while in the male prison the figure reaches 27% of the prison population. A study published in 1994 shows that the majority of prisoners are yourn, poor, and black. agroup of inmates in the Desembargador Vidal Pessoa Central Prison of Manaus, Amazonas held a peaceful protest against conditions in es called in military police shock-troops. They reportedly beat the inmates, who had taken refuge in their cells, with batons, as well as hitting and kicking them. Subsequently they locked the inmates in their cells and threw tear gas grenades in after them. For pris... ...cial vulnerability. These constitutional provisions have been further developed in the basic law known as the "Statue for Children and Adolescents." This Statue, enacted in 1990, has been praised by UNICEF as one of the moset comprehensive in the world. Government programs, including the installation of hundreds of Centers for Comprehensive Child Care, address basic needs such as education, distrubution of nutritious meals, health care and the promotion of children's rights. The "Pact for the Children", co-signed by the President of Brazil and 24 state governors, set up a "Plan of Action" which is intended to fully implement the constitutional and legal provisions that provide for protection of children and adolescents. Several fedrral agencies oversee the execution of government programs for children and adolescents designed to give to Brazilian yourth opportunities for a better life, education, shelter, and love. Moreover, as mandated by law, 21 states and 1,654 municipalities have established special Councils for Children's Rights. Several hot-lines are operating throughout Brazil making it easier for children to seek help and report instances of violence, neglect or abuse. Human Rights in Brazil Essay -- Human Rights Essays Human Rights in Brazil The population in Brazil consists of 144 million people. Brazil is one of the fastest-growing nations in the Western Hemisphere. Its population is increasing at the rate of about 2 % a year. The constitution of Brazil gives the president tremendous powers. For example, the president may intervene in affairs of Brazil's states. The chief executive may even create new states from existing ones. Brazil has three main ethnic groups-whites, blacks, and people of mixed ancestry. Most of the whites are from Europe. According to the Brazilian government whites make up about 60% of the nation's population, and people of mixed races form about 30%. However, the government of Brazil counts many lightskinned people of mixed ancestry as white. Brazil's ethnic groups generally get along well with one another. Racial discrimination in Brazil if far less widespread than that in many other countries with people of several races. But Brazilians of European descent have had better educational opportunities. As a result, they hold most of the higher jobs in government and industry. Many of the non-Europeans, particularly blacks, have excelled in the arts, entertainment and sports. Brazil's prison system system is in crisis. Four years ago, in its 1990 urban violence report Amnesty International described the prisons as being at breaking point, holding double their official capacity in "inhuman" conditions. Four years later the situation has not improved. In some respects, it has deteriorated. Overcrowding, lack of medical and legal assistance, torture and ill-treatment of inmates and harassment of visitors are endemic. A frightening and rising proportion of prisoners carry the HIV virus. In the Women's Prison of Soo Paulom, around 33% of the inmates are infected with the virus, while in the male prison the figure reaches 27% of the prison population. A study published in 1994 shows that the majority of prisoners are yourn, poor, and black. agroup of inmates in the Desembargador Vidal Pessoa Central Prison of Manaus, Amazonas held a peaceful protest against conditions in es called in military police shock-troops. They reportedly beat the inmates, who had taken refuge in their cells, with batons, as well as hitting and kicking them. Subsequently they locked the inmates in their cells and threw tear gas grenades in after them. For pris... ...cial vulnerability. These constitutional provisions have been further developed in the basic law known as the "Statue for Children and Adolescents." This Statue, enacted in 1990, has been praised by UNICEF as one of the moset comprehensive in the world. Government programs, including the installation of hundreds of Centers for Comprehensive Child Care, address basic needs such as education, distrubution of nutritious meals, health care and the promotion of children's rights. The "Pact for the Children", co-signed by the President of Brazil and 24 state governors, set up a "Plan of Action" which is intended to fully implement the constitutional and legal provisions that provide for protection of children and adolescents. Several fedrral agencies oversee the execution of government programs for children and adolescents designed to give to Brazilian yourth opportunities for a better life, education, shelter, and love. Moreover, as mandated by law, 21 states and 1,654 municipalities have established special Councils for Children's Rights. Several hot-lines are operating throughout Brazil making it easier for children to seek help and report instances of violence, neglect or abuse.

Wednesday, September 18, 2019

Essay --

From my previous journal I stated that I was very interested in finishing the rest of the books in the Odyssey. Well I have finished all of them and got some of my questions answered in class and I got some question that I did not know I did not understand answered too. In book 4 I left off with wondering why Athena protects Telemachus when she’s still upset with. When finishing up the rest of the Odyssey there are many things that are many happening. You have everything from; â€Å"all of the gods are accepting that Poseidon has gathered again on Mount Olympus to discuss Odysseus’s fate† in book 5. To â€Å"Athena makes the Ithacans forget the massacre of their children and recognize Odysseus as king, and making Peace being restored† in book 24. How one man goes through all of this is amazing to me. The Odyssey is nothing more than Odysseus telling us his story and all the things that he had gone through. Odysseus encounters many things that people do not believe to be true because all of his crew is dead and no one had ever don’t anything like he is saying that he has. Because his crew is dead there is no one to help tell all of the great adventures that they endeared. The main question I feel that never truly gets answered in the reading is that of wither or not the stories are true. Does it really take someone who loves his family 20 years to make it home? To return to his wife and son? And are the wife and son still there waiting for him to return. We know in the reading that they are but how does he know this? Is it because that’s how it was back then or why? Why did it take him the seven years for him to build a boat to leave the island of Cyclopes and start to make is way back home. When he finally manages to get the boat made to ... ... I keep saying this but I really don’t know wither or not I can take this story ad being true I things some of the things could have happened but not all of them. I’m not sure why I find it so hard to believe but I do. While reflecting on this reading I have really stopped to think about what I am reading and if I believe it to be true or not. Could the Odyssey be written different so that it’s more understandable? Or should we already be able to understand the text? I feel that the book could take a whole semester to cover it we were to truly take the time to truly read it not just read it and go on. I can see myself rereading the books and trying to understand more and looking for things that I have missed the first time though. Works Cited Brian Wilkie, J. H. (2001). Lliterature of the Western World Vol. 1. New Jersey: Prentice Hall. The Odyssey, pages 273-594

Tuesday, September 17, 2019

Assessment Methods Essay

Diagnostic assessment is a pre assessment that determines a difficulty for the student in a precise area. This type of assessment provides teachers with information of the student’s previous awareness of the topic, their interest and attitude before instructing a lesson (McMillan 2011, p 6). Diagnostic assessment information can be collected from Summative assessments of the previous lesson. It is important to note the expectation of what the students should know, understand and be able to do at the end of the lesson as this is an integral part of an effective lesson (McMillan 2011, p 8). Formative assessment occurs during instructions, giving feedback to students on their work to assess their level and determine the next level of work activities (McMillan 2011, p 6). This type of assessment takes place during learning and helps to improve the lesson as the learning is monitored and the progress of the student is noted (McMillan 2011, p 8). The student has the opportunity to improve learning during the lesson through the feedback and send them in the right direction of learning. Learning problems are able to be distinguished during the lesson and actioned accordingly, and instructional adjustments can be made (McMillan 2011, p 8). Summative assessment takes place at the completion of the lesson to determine the student’s level of understanding, their knowledge and can physically do (McMillan 2011, p 6). This is the aim of the lesson to decide if the teaching has been positive and that the students have achieved at the anticipated level of learning. Students are graded, teachers and lessons are evaluated to assess the effectiveness of the plan (McMillan 2011, p 8). The three assessment types that form the assessment cycle are an integral part of a primary classroom learning structure. Students with learning disabilities need to be assessed in the early stages of their learning to determine the techniques of tailored learning to be applied. Using Diagnostic assessment â€Å"effective teachers were found to have tailored instruction to students’ unique needs and interests, finding just the right materials to reach their students† Robinson, G. (2008). Teaching numeracy skills a Formative assessment is then used to improve learning throughout the lesson. A summative assessment is then required to determine the student’s numeracy capabilities. Assessment is an important part of the education curriculum, to enable an effective learning environment for the students. It also allows the teacher to ensure the lesson is tailored to the students learning disabilities and there needs to achieve the learning result desired. References McMillan, J. H. (2011).

Monday, September 16, 2019

Revlon Case Study

Revlon is known as one of the best cosmetic companies of all time and is considered to be one of the worlds largest. The primary core products of Revlon are specialty skin products, salon-quality beauty and hair products to include its drugstore line of makeup. Revlon is based in New York and traded publicly. Their goal and vision has been to consistently provide quality beauty aids and products at a reasonable price. In the last few years Revlon has been struggling. With a debt almost at $2. 3 billion it has required the cosmetic giant to try and figure ways to reduce this debt.The research and development of Vital Radiance, a line of cosmetics for older women was announced on January 2006, this roll out was suppose to help revitalize sales and profit. The roll out of this product did not fare well and was not received by the market. The already existing competition had lower prices for their cosmetic products. These were being sold by major retailers like Wal-greens and Wal-mart, w hom already had other Revlon products on its shelves. This being the case the product line was suspended nine months after being introduced. It is projected that this set back is going to cost the company in the $100 millions.In addition to the Vital Radiance launch, there had been plans to release a new fragrance in 2006 also. This was delayed until the debt that was incurred from their cosmetic introduction could be restructured. After issuing a $185 million in stock to attempt to raise money to lessen the debt, MacAndrews & Forbes Holdings agreed to purchase stock and also agreed to purchase any stock not bought by current stakeholders. The following paragraphs below we will discuss how the future of Revlon is going to be determined by changes in demographic changes, social trends and how the competition adjust to the urrent economy and the response of internal factors that contribute to the success of the company. The demographic composition of the United States has impacted the cosmetic and personal care industry. A couple of major changes which have occurred that need to be considered, are the aging population and ethnic and racial population changes which are responsible for a major shift change. The period between 1946 and 1964 approximately 75 million Americans were born in the U. S. this number is extremely symbolic for the cosmetic industry.These Americans are referred to as the baby boomers and the major dilemma with the baby boomers they do not like to spend money. Research has determined that the baby boomer generation have not changed how they spend money and the women from this era are working longer than in past years. A couple of other factors to consider is the U. S. teen market along with the ethnic and racial make-up. According to data collected the teen market is expected to be at around 20 million by 2010, this teen market consist of teenagers between the ages of 12 and 19.Along with this growth is the African Americans which is the larg est of the ethnic groups is quickly being surpassed by the Hispanic population and this ethnic group is expected to be the largest by 2010 and should surpass 40. 5 million individuals. In addition to this multi-cultural growth being experienced throughout the United States, the non-hispanic is expected to shrink 68% by 2010. If Revlon can take advantage of this growth and expand to the foreign markets where analysis has shown that there will be a lot of opportunities for potential sales of cosmetic and personal care products throughout the world.Obviously with when there are positive aspects in business, there is always some type of negative influence that could potentially affect the overall business climate and growth of a company. In regards to Revlon, people are more socially, morally and fiscal conscious more than ever before. Older people unfortunately are a negative affect because they typically have limited less disposable income and have a less desire for look good items, t hey are set in their ways. Gas prices affect how people spend also and lastly the industry has always been under scrutiny for the abuse of animals that are used in cosmetic testing.So companies like Revlon have to always be very aware that consumer watch groups are constantly monitoring what companies like Revlon are doing. Knowing this and maintaining social responsibility, will prevent companies like Revlon from being run through the courts thereby ruining their reputation and any potential growth to get out debt. Considering all these factors it behooves Revlon to really push the world markets so as not to limit themselves to U. S. sales, which currently is experiencing a recession which has decreased the dollar value throughout the world, so by taking advantage or global business and maintaining U.S. sales Revlon should be able to show a positive net income in the near future. Revlon like many other cosmetic and skin care firms face competition in this industry that is out of th is world. So many companies want a piece of this market, that it appear to be saturated with all types of cosmetic companies. Women, obviously the largest consumer in the industry with men now desiring to maintain their youth prefer to shop at local drugstores, super values stores like Wal-mart and Kmart.Additional companies like Avon and the internet have made it easier for the consumer to save time and money by using these types of sales. For Revlon, not only do companies, home shopping and door to door type cosmetic firms, represent competition, but the major competitors such Procter and Gamble, Avon, Estee Lauder and L’Oreal are significant, that capture U. S. sales and foreign market sales. Others like specialty stores Sephora and Body Shop to include Victoria Secret’s and the Gap to name a few represent additional challenges.To add to the challenges currently facing Revlon, there is competition for the African market. Famous models and singers alike have develope d their own brands and capturing portions of the African market and advertise to the African American community. By studying and analyzing the cosmetic market it is essential for Revlon to look to other avenues to make themselves more attractive to the consumer. By investing into the company increasing their visibility in the social realm will be significant in attracting a larger consumer base.Revlon invested a great deal of money on research and how to provide better services to women. More than $25 million dollars has been spent thus far. Additionally by using familiar faces to assist in amplifying Revlon’s commitment to social responsibility they are attracting more people. Singers like Sheryl Crow, who actively participates on a board for Revlon that is responsible for research cures for cancer in addition Ms Crow being associated with the National Breast Cancer Coalition, which is also supported by Revlon truly magnifies the maturity of the firm to help the ommunity. Re vlon is committed to events that sponsor fund raising opportunities to find cures in addition to supporting agencies like the National Council of Negro Women, and New York Women in film is indicative to the commitment to social responsibility. The reorganization of management to save money annually has been implemented by David Kennedy who is the CEO and was selected in 2006. His previous experience as Coca-Cola executive and the previous CFO for Revlon made him a perfect fit for a company under stress.His plan to cut 8% of the Revlon workforce, which equates to about 250 positions, which is intended to save the company approximately $34 million dollars a year. By consolidating different functions throughout the company and reducing middle management allows for eht reduction in personnel. However, without a doubt when a company plans to save money, they have to spend money to get there. It is estimated that it will cost about $29 million dollars to restructure but as previously stat ed it is intended to save the company $34 million dollars annually thereafter.Once implemented it is essential to go after the market by changing or reorganizing marketing techniques. Marketing and advertising are key to the survival of Revlon. Revlon primary customers are the large merchandisers and chain drug stores. Although the debt is high Revlon has still maintained the development side of its organization and is still is main objective. Without changing, developing and designing they would fall behind the major competitors. In 2006 Revlon spent a little over $24 million dollars on research and development, but most importantly hired 170 people to accomplish this.Even through trying times, advertising continues to be the way to go and promote the company. Investing in popular faces to be spokespersons such as Halle Berry, Julianne Moore and Eva Mendez, etc. , is attractive to the consumer and by using a variety of women of different ages markets their products to young and mid dle aged alike. The current manufacturing and distribution of Revlon has allowed the company to pull their resources and consolidate facilities.By reducing the amount of distribution facilities has allowed for spoke and hub operations, which allows a company to cover more locations from a single vantage point. With its current locations Revlon is well suited to manage its distribution points. The financial outlook during the restructuring period did not fare well with a net loss of $50 million dollars due to this the restructuring program is ongoing. Revlon’s commitment to build a solid brand and improve their organizational commitment abilities is their life line.