Thursday, December 26, 2019

The Wasat Party in Egypt Promoting a Liberal Political...

The Wasat Party has slowly become an important opposition party throughout the years that promotes a more liberal political environment in Egypt. The article explains that before the Wasat Party had the legal status of an official party, the foundation was being formed secretively by young leaders of the Muslim Brotherhood. The young leaders of the Muslim Brotherhood were considering democratization to be a better option because of the positive impacts in had on other countries around the world. Moreover, the young leaders didn’t desire the repression they had to go through because of the strict interpretation of the Shari‘a, the Islamic law. The Shari‘a condemned aspects Therefore, the young leaders of the Muslim Brotherhood had to keep their intentions of their aspiring new political party secret until it was exposed to the regime. The Wasat Party offered more liberal interpretation of the Shari’a as well as provides different ideas of what undermined the Islamic core values the differed from the Muslim Brotherhood. There are three important ideological principles that characterize the Wasat Party that differ from the Muslim Brotherhood. The first ideological principle is the interpretation of the Shari‘a and its role in politics. For the Muslim Brotherhood the Shari‘a is a set of binding rules that have a major role in politics. They are fully bound by the rules and provide various measures of repression to any violators of such rules. In contrast, the Wasat Party

Wednesday, December 18, 2019

The Effect of Information Technology on Human Life

How Information Technology Has Effected Each Part Of Human Life 1.1 Introduction: Present day information era has given lots of freedoms to the citizens, which was not probable without the arrival of this age. The users of Information Systems have willingly available information, for example, full Encyclopedia Britannica in one CD with all types of sà ¸ °Ã  ¸â€¢arch fà ¸ °Ã  ¸â€¢aturà ¸ °Ã  ¸â€¢s is availablà ¸ °Ã  ¸â€¢, pointing towards corrà ¸ °Ã  ¸â€¢ct information within thà ¸ °Ã  ¸â€¢ right timà ¸ °Ã  ¸â€¢. Picture doing this with the book version of the Encyclopedia, sieving through several pagà ¸ °Ã  ¸â€¢s looking out for thà ¸ °Ã  ¸â€¢ information alphabà ¸ °Ã  ¸â€¢tically and still may not bà ¸ °Ã  ¸â€¢ ablà ¸ °Ã  ¸â€¢ to rà ¸ °Ã  ¸â€¢trià ¸ °Ã  ¸â€¢và ¸ °Ã  ¸â€¢ it. Another benefit of Information System is the accessibility of real time information on any area. For example, users can login to their banks website, credit card site, or share markà ¸ °Ã  ¸â€¢ts for any onlinà ¸ °Ã  ¸â€¢ transactions. No doubt, this providà ¸ °Ã  ¸â€¢s conv à ¸ °Ã  ¸â€¢nià ¸ °Ã  ¸â€¢ncà ¸ °Ã  ¸â€¢ but it also comà ¸ °Ã  ¸â€¢s with its own pricà ¸ °Ã  ¸â€¢ of managing thà ¸ °Ã  ¸â€¢ sà ¸ °Ã  ¸â€¢curity of thà ¸ °Ã  ¸â€¢ transactions. Crimà ¸ °Ã  ¸â€¢s against Information systà ¸ °Ã  ¸â€¢ms is a growing concà ¸ °Ã  ¸â€¢rn amongst thà ¸ °Ã  ¸â€¢ Cybà ¸ °Ã  ¸â€¢r sà ¸ °Ã  ¸â€¢curity à ¸ °Ã  ¸â€¢xpà ¸ °Ã  ¸â€¢rts and Fà ¸ °Ã  ¸â€¢dà ¸ °Ã  ¸â€¢ral Law agà ¸ °Ã  ¸â€¢ncià ¸ °Ã  ¸â€¢s as this has thà ¸ °Ã  ¸â€¢ potà ¸ °Ã  ¸â€¢ntial to bring down a systà ¸ °Ã  ¸â€¢m and opà ¸ °Ã  ¸â€¢ration which otherwise would run smoothly. 1.2 Background: Information Technology (IT) is a broad based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new,Show MoreRelatedEffects of Rising Technology1196 Words   |  5 PagesEffects of Rising Technology In the twenty first century, evolution and constant use of technology have greatly impacted humans, and their ways to approaching media. Many people believe that technology has improved the quality of life of the people at a great depth, while others see it as a force that has escaped from human control. Modern technology such as Internet, may help people solve problems or gather information faster than an ordinary human being is capable of. At theRead MoreTechnology And Its Effect On Human Development888 Words   |  4 PagesMemory, as the most basic mode of information transfer in human experience, has shaped identity and created continuity through time throughout history. Historically, technology has provided memory-aid devices to assist human’s interactions with information. However, with the prevalence of computers and digital technologies today, there are modern concerns about whether the use of technology is to assist human activity and that to replace h uman intelligence. While current debates rage on about theRead MoreThe Pros And Cons Of Technology1591 Words   |  7 PagesYes: In the world we live in, technology is advancing everywhere from software to machines and even cooking utensils. Improvements to our lives, by technology, include electricity, medical technology, fast productions and, Access to information and education. Without technology the world would be different and it would leave us at a disadvantage. Imagine a world without internet where your teacher assigns you an essay to research nuclear fission. Without the internet, you would have to go toRead MoreTechnology has Effects in Our Lives The development of technology has significantly changed700 Words   |  3 PagesTechnology has Effects in Our Lives The development of technology has significantly changed society. An endless number of People all over the world use and benefit from modern technology, and the incredible opportunities it provides play a significant role in almost all fields of human life. Technology has simplified the access to many necessary tools people need in education, industry, medicine, communication, transportation, and so on. However, excessive usage of technology has its drawbacksRead MoreThe Internet s Effect On State Society Relations979 Words   |  4 Pagesabout social effects of the internet and technology existed in the past and today’s situation is not different. Internet, similar to telephone in the past raised some questions regarding the social effects but we don’t have to worry. It opposes the main concept of all other sources regarding effects of technology. The seventh article is, â€Å"Weighing the Scales: The Internet s Effect on State-Society Relations† by Daniel W Drezner the article explains the effect of the internet (technology) on the relationshipsRead MoreThe Need for Policy Makers to Regulate Human Genetic Engineering1255 Words   |  6 PagesHuman genetic engineering (HGE), a prevalent topic for scientists in research, is the process of manipulating genes in the human genome. Potentially, scientists can use the process of HGE to alter many biological and psychological human traits by gene modification. Currently, however, there is a large deficiency in information regarding HGE and its effects to the human body; creating a need for scientists to conduct more research and tests. Because of the many unknowns involving HGE it is necessaryRead More The Impact of Internet on Users and their Way of Thinking Essay1204 Words   |  5 Pagesusers spend most of their life online. One of the recent trends is the development of social networks, which encourage the creation of realistic communities. In such a situation, the question concerning the impact of Internet on human being, especially on human brain and behavior arises. In this concern, views on the impact of Internet vary consistently. On the one hand, Internet is recognized as a valuable intermediate, which helps users to share and broadcast information easily. But, another viewRead MoreTechnology Is A Useful Servant, But A Dangerous Master866 Words   |  4 Pagesâ€Å"Technology is a useful servant, but a dangerous master.† – Christian Lous Lange. BrainyQuote.com. Xplore Inc, 2015. 28 October 2015. Technology has been a debating topic since it has become a key part of the modern lifestyle. Technology developed around human life in various ways which have caused diverse effects on people. Despite the fact that technology have done tremendous things that assisted humankind to gain the possibility of developing rapidly an advanced way of life, technology haveRead MoreThe Transformation Of Collective Learning898 Words   |  4 PagesHumans kept learning and inventing new technologies associated with agriculture, and slowly kept building their knowledge through the process of collective learning. As populations were increasing in size and the domestication of certain animals made work easier and gave humans the ability to travel ever further more information was being shared and new technologies traded between societies. This increase in populations created a need for leadership and gave rise to cities and states being formedRead MoreCause Of Social Media Essay702 Words   |  3 Pagesimpact into human life. Social media is channels or means of social interaction online in cyberspace (internet). Social media users communicate, interact, send messages, and share, and build networks (romelteamedia). Until now, all on this earth are already using social media. Why social media is important? Social media is important to people because social media can connect us with many people. Now, people using social media for texting, video call, messaging, and et cetera. Humans use social

Tuesday, December 10, 2019

Graft and Corruption free essay sample

It refers to the acquisition of gain in dishonest or questionable manner. CORRUPTION has been defined as the misuse or abuse of public office for private gain both in government and the private sector. It comes in several illicit forms, including bribery, extortion, fraud, nepotism, graft, speed money, pilferage, theft, embezzlement, falsification of records, kickbacks, influence peddling and campaign contributions. is the perversion or destruction of integrity or fidelity in discharging public duties and responsibilities by bribery or favor. It entails the use of public power for private advantage in ways which transgresses some formal rule of law. It involves participants from within and outside of the bureaucracy. it ? refers to the use of public office for private gain or the betrayal of public trust for private gain, (National Anti-Corruption Framework and Strategy, 2000). rottenness: putrid matter: impurity: bribery. Source- Chambers Dictionary According to common usage of term ? Corruption? Sometimes also the act of the officials offering such gifts or other tempting favors is implied in the concept. Extortion, i. e. demanding such gifts or favors in the execution of public duties, too, may be regarded as ? Corruption.? Indeed, the term Page 1 of 31 pages is sometimes also applied to officials who use the public funds they administer for their own benefit; who, in other words, are guilty of embezzlement at the expense of a public body. In most instances, reference to corruption is made in connection with other subjects, such as crime or public administration. Many works referring to corruption do not attempt a conceptual and actual analysis. The commonly held perception amongst most people of corruption is that of something that is debased, impure, or acts of criminality. Indeed, corruption as it relates to human behavior can be all of those things and more. Innate in the human psyche, irrespective of race or religion, is a sense of morality, of what is right and wrong. As innate as this sense of morality, is the desire to gain advantage over others. A conflict of good and evil. Thankfully most people display more of the good, and some display extraordinary feats of humility and selflessness. Yet others sway to the easy path of seeking advantage, wherever they can get it. Self and self gratification are their main motives. These individuals it could be said are corrupt or corruptible. Corruption weakens the fabric of societies and leads to the society becoming dysfunctional. The 1987 Constitution of the Philippines provides the basis of ethical and accountable behavior in the public sector. Section 1 of Article XI states that: Public office is a public trust. Public officers and employees must at all times be accountable to the people, serve them with utmost responsibility, integrity, loyalty, and efficiency, act with patriotism and justice, and lead modest lives. This provision requires every public official and employee to exhibit and live certain values while in government service. In addition, the State has been mandated by the Constitution to ? maintain honesty and integrity in the public service and take positive and effective measures against graft and corruption?. In 1989, the Philippine legislature passed Republic Act No. 6713, a law embodying the Code of Conduct and Ethical Standards for Public Officials and Employees. The Code spells out in fine detail the do‘s and don‘ts for government officials and employees in and out of the workplace. These do‘s and don‘ts are encapsulated in the eight norms of conduct to be observed by all government officials and employees. These norms or standards are: †¢ †¢ †¢ Commitment to public interest Professionalism Justness and sincerity Page 2 of 31 pages †¢ †¢ †¢ †¢ †¢ Political neutrality Responsiveness to the public Nationalism and patriotism Commitment to democracy Simple living The Code, likewise, introduced some reforms in the administrative systems like giving heads of agencies the responsibility of ensuring there is a value development program for their employees; continuing studies on work systems and procedures with the end in view of improving the delivery if public services; and, mandating the designation of a resident Ombudsman in every department, office and agency. Incentives and rewards system has also been put in place. Another comprehensive law passed to address and curb the commission of malfeasance in government is Republic Act No. 3019 or the Anti-Graft and Corrupt Practices Act. In Section 1 of this law, it states that: It is the policy of the Philippine Government, in line with the principle that a public office is a public trust, to repress certain acts of public officer and private persons alike which constitute graft and corrupt practices which may lead thereto. This law specifies eleven (11) instances of corrupt practices in addition to acts or omissions already penalized by existing laws: In addition to acts or omissions of public officers already penalized by existing law, the following shall constitute corrupt practices of any public officer and are hereby declared to be unlawful: (a) Persuading, inducing or influencing another public officer to perform an act constituting a violation of rules and regulations duly promulgated by competent authority or an offense in connection with the official duties of the latter, or allowing himself to be persuaded, induced, or influenced to commit such violation or offense. Directly or indirectly requesting or receiving any gift, present, share, percentage, or benefit, for himself or for any other person, in connection with any contract or transaction between the Government and any other part, wherein the public officer in his official capacity has to intervene under the law. Directly or indirectly requesting or receiving any gift, present or other pecuniary or material benefit, for himself or for another, from any person for whom the public officer, in any manner or capacity, has secured or obtained, or will secure or obtain, any Government permit or license, in consideration for the help given or to be given, without prejudice to Section thirteen of this Act. Page 3 of 31 pages (d) Accepting or having any member of his family accept employment in a private enterprise which has pending official business with him during the pendency thereof or within one year after its termination. Causing any undue injury to any party, including the Government, or giving any private party any unwarranted benefits, advantage or preference in the discharge of his official administrative or judicial functions through manifest partiality, evident bad faith or gross inexcusable negligence. This provision shall apply to officers and employees of offices or government corporations charged with the grant of licenses or permits or other concessions. Neglecting or refusing, after due demand or request, without sufficient justification, to act within a reasonable time on any matter pending before him for the purpose of obtaining, directly or indirectly, from any person interested in the matter some pecuniary or material benefit or advantage, or for the purpose of favoring his own interest or giving undue advantage in favor of or discriminating against any other interested party. (g) Entering, on behalf of the Government, into any contract or transaction manifestly and grossly disadvantageous to the same, whether or not the public officer profited or will profit thereby. Directly or indirectly having financial or pecuniary interest in any business, contract or transaction in connection with which he intervenes or takes part in his official capacity, or in which he is prohibited by the Constitution or by any law from having any interest. (i) Directly or indirectly becoming interested, for personal gain, or having a material interest in any transaction or act requiring the approval of a board, panel or group of which he is a member, and which exercises discretion in such approval, even if he votes against the same or does not participate in the action of the board, committee, panel or group. Interest for personal gain shall be presumed against those public officers responsible for the approval of manifestly unlawful, inequitable, or irregular transaction or acts by the board, panel or group to which they belong. (j) Knowingly approving or granting any license, permit, privilege or benefit in favor of any person not qualified for or not legally entitled to such license, permit, privilege or advantage, or of a mere representative or dummy of one who is not so qualified or entitled. Divulging valuable information of a confidential character, acquired by his office or by him on account of his official position to unauthorized persons, or releasing such information in advance of its authorized release date. Page 4 of 31 pages The Constitution of 1987 provides six grounds as basis for initiating impeachment proceedings against high ranking government officials, among which are graft and corruption. Philippine laws rarely distinguish graft from corruption; these may even be used inter-changeably to refer to dishonest means or questionable activity or taking advantage of one‘s authority or position. Ivan Hill, formerly the Ethics Center at Washington D. C. , believes that honesty increases efficiency and productivity both in business and in government. The inference is that where there is dishonesty, there is the corresponding decrease of efficiency and productivity. Applied to public management, there will therefore be inefficient and poor delivery of  service, and if the segment of the bureaucracy infested is a revenue collecting entity, like the Bureau of Customs and the Bureau of Internal Revenue, this could only mean a much depreciated revenue collection. The identity or similarity of their consequences, notwithstanding, In the Bureau of Internal Revenue, graft takes the form of falsification and manipulation of financial documents and other records and delay in forwarding remittance collections. Contract graft in public works construction may take the form of sealed bids which are but a formality because there already is a pre-arranged winner of the bid. The use of substandard construction materials is also another form of graft. BRIEF HISTORY OF GRAFT AND CORRUPTION IN THE PHILIPPINES Colonial roots The use of public office for private ends by government officials and private businessmen has been evident since the Spanish colonial period. A summary report by Elizabeth Medina of the conference proceedings of the Asociacion Espanola de Estudios del Pacifica (November 1997) discusses the kinds and causes of corruption in 19th-century Philippines. Medinas report said: The most important practices were falsification of accounting documents. The evidence of embezzlement of funds was destroyed and the cabezas de barangay were obliged to sign blank financial statements. Corrupt governors hid monies from the administration in Manila. They also found ways to discourage the natives from working so they would be thus liable to fines. Taxes and fees were arbitrarily set and excessively high, and illegal fines were often collected. Governors could embezzle the salaries of public officials and often demanded gifts from their hosts when they made official visits. Gifts were also necessary so that false documents would not be issued. The reasons for corruption were many: the governors had Page 5 of 31 pages executive, legislative and judicial powers. No checks and balances were built into the system, and when they were, they were unenforceable. There was a vague limit between what were public goods and what were private ones†¦ The salaries of public officials were low†¦ There was monetary crisis in the 19th century†¦ The laws were so complex as to easily hide misappropriations and fraud†¦ Finally, the common people had no idea of the law and submitted meekly to the injustices and abuses†¦ Many Filipinos today believe that corruption was negligible during the American colonial era. However, as suggested in Medinas report, corruption in the provinces was not altogether eradicated. According to Alfred McCoy (1994), the Americans even used the term cacique to describe the provincial elites who combined local office with landed wealth to gain extraordinary control over the countryside. The US colonial authority similarly tried to restrain rent-seeking by an emerging national elite. And although it was penetrated and manipulated by these elites, the colonial bureaucracy managed to maintain its influence until the 1930s. Although American colonial rule tried its best at eradicating corruption, there were incidents that already indicated its prevalence. Paul D. Hutchcroft (1998), for example, cites the solvency problems faced by the Philippine National Bank less than five years after its establishment in 1917. Loans were given out without consultation and went to well connected agricultural families, directors or interests controlled by directors. In 1921, an accounting firm reported that the PNB had squandered the entire capital stock contributed by the government as well as half of all government deposits in the bank. American legacy American colonial rule also helped develop another building block for the national spread of corruption. It maintained and expanded a big and interventionist government within a democratic framework. At the start, the colonial administrators promoted an economy led by private enterprise, and big business in particular, following the trend in the United States at the time. However, beginning in 1913, the government took an active role in the promotion of economic growth. Then, in 1916, the colonial administrators increasingly interfered in business. The consequent growth of government, as leader, large-scale development promoter and employer, laid the ground for massive and systematic corruption later in the countrys history. With this legacy came expanded opportunities for corruption. These included granting individuals and organizations of special favors, policy changes, licenses, business contracts, and even employment (which in a patron client system redound to personal gain). Such practices effectively destroyed the development of a merit system in the Philippines. After political independence in 1946, writers like nationalist Renato Constantino bewailed the pervasiveness of corruption in Philippine society. Daily, in the halls of Congress, through the Page 6 of 31 pages printed word and over the airwaves, our politicians and our civic leaders expose, denounce, or deplore this or that governments anomaly. During election time the principal issue is always graft and corruption. No wonder public concern is almost exclusively centered on malfeasance in government. But with every change of administration, the problem only becomes aggravated. The panaceas and the grandiose promises fizzle out. The accusers become the accused; the halo of righteousness changes heads. The list of dishonor is different but corruption remains the same. Graft and corruption persist, like a cancer gnawing at our entrails, showing no signs of abatement and consigning us to a state of helplessness and hopelessness. The Marcos government has been often regarded as the most systematically corrupt of all government administrations in the Philippines. This was not surprising considering the concentration of state powers in the President at the time. Unlike in previous administrations that more or less observed the independence of the executive, legislative, and judicial branches of government, Marcos effectively controlled these three branches. Eventually, crony capitalism reached its zenith with the centralization of political power and the realignment of concentrated economic power from the old elites to favored Marcos associates. Although the Marcos government has been considered as the most corrupt of all, succeeding political administrations had their own share and have not effectively controlled the problem. In fact, with the return to democracy after the EDSA Revolution, the perception is that the floodgates of corruption have been opened for more people at various levels of government and society. The vacuum left by the Marcos regime has been filled and even widened; opportunities have simply become available to a broader population. Characteristics of Corruption The characteristics of corruption are as follows: (a) Corruption always involves more than one person. This is need not be the case with stealing, for instance, or embezzlement. The lone operator is corruption is virtually nonexistent, and such cases usually fall under fraud. One instance is making a false declaration of traveling expenditure or hotel bills. But even here there is often a silent understanding between officials who practice such frauds to let the situation prevail. (b) Corruption on the whole involves secrecy, except where it has become so rampant and so deeply rooted that some powerful individuals or those under their protection would not bother to hide their activity. But nevertheless, even here the corrupt motive is kept secret. (c) Corruption involves an element of mutual obligation and mutual benefit. The obligation or benefit need not always be pecuniary. Those who practice corrupt methods usually attempt to camouflage their activities by resorting to some form of lawful justification. They avoid any open clash with the law. Page 7 of 31 pages (e) Those who are involved in corruption are those who want definite decisions and those who are able to influence those decisions. (f) Any act of corruption involves deception, usually of the public body or society at large. (g) Any form of corruption is a betrayal of trust. (h) Any form of corruption involves a contradictory dual function of those who are committing the act. When an official is bribed to issue a business license by the party who offers a ? gift? , the act of issuing the license is a function of both his office and his self-interest. He acts in a dual contradictory function. The same may be said of the party offering the bribe. Applying and receiving of license is a function of his lawful business interest, but resorting to bribery is not. (i) A corrupt act violates the norms of duty and responsibility within the civic order. It is based on the deliberate intent of subordinating common interest to specific interest. The above list of characteristics of corruption could be extended. For an act to be classified as corrupt it has to contain all the above characteristics. The only possible exception is where corruption is difficult to distinguish from criminal extortion, where the party who bribes was compelled to do so, grudgingly and resentfully, and where the bribery was not considered as a necessary outlay for future gain. In such cases the victims kept no secrecy. Opportunities for corruption abound in the absence or lack of order, transparency and accountability. Possible Causes of Graft and Corruption Ledivina V. Carino believes that corruption results from individual, organizational and societal causes. 1. individual — this results from low morality of both bureaucrats and clients 2. organizational — the weaknesses arising from the system may be due to unrealistic compensation, inadequate controls in areas not susceptible to corruption; lack of explicit standards of performance for individual employees and organizational units; poor recruitment and selection procedures and government red-tape. The inability of the organization to provide adequate services to cope with the volume of demand breeds black market operations for government subsidized services. Poor public relations could result to public ignorance of what the organization does. This whets employee appetite for corruption. Poor working conditions and office facilities, weak organizational leadership and bureaucratic politization are other contributory factors. 3. societal — these are causes which are primarily attributed to the culture of a society. The open tolerance of the public of undesirable and inefficient employees has bred an employee psychology of recalcitrance and lack of fear of being censured or criticized Page 8 of 31 pages because of the assurance given to them by their political ? backers? , all because of the â€Å"padrino system† or political patronage. The negative role model played by superiors creates an atmosphere of incompetence and defiance rather than efficiency and discipline. The â€Å"pakikisama† system puts heavy pressure upon the new employee to join his peers in the workplace as to perpetuate the legacy of administrative ineffectiveness. The Filipino is further beset by extreme familism and personalism which generate inefficient delivery of services. The expected behavior of the Filipino is arrayed against cultural norms most of which are anchored on personalism. In the Philippines, people who practice graft and corruption are often put on the pedestal; they attain respectability while those who do not engage in such practices are branded as â€Å"tanga for not taking advantage of their position and power. Behavior that is legally unacceptable may be ideal and acceptable depending upon the political culture of a society. The bureaucrat is expected to deal equally with everyone, whether relatives or strangers. They are not supposed to receive gifts in any form. However, this expected behavior often clashes with the personal way Filipinos get on terms with one another. The practice of taking care of their kin is a deeply ingrained trait which could result in partiality and preferment in his official dealings. He gives priority to the transactions of his family however down the file these may be. Such personalism is not limited only to blood relations but extends to all those sanctified by  ritualistic ties like the compadre system, including neighbors, friends and other persons with whom, one interacts. All these practices explain the persistence of the social evils in our society. Social tolerance of these negativistic practices is complemented by passage of legislation without sufficient study of implications; the difficulty of proving graft and corruption cases; lack of political will to wage a determined anti-corruption campaign; poor educational orientation of the citizenry and clannishness and parochialism which destroys the merit system. There are three critical focal points of corruption in the bureaucracy. There is undervaluation when an importer depreciates his imported goods very much below the actual cost. For instance, a sardine importer brings in a million cans. He pays P2. 00 per can before taxes. Sardines are subject to 20% customs duty, as of January, 1991, or 40 centavos per can. If the importer is dishonest, he undervalues the importation to P1. 00 per can before taxes and therefore pays only 20 centavos instead of 40 centavos as customs duty. With millions of cans of sardines, and with the number of importers doing this, government is defrauded by the millions of pesos. Customs appraisers check the value of the imported goods against the official customs published values. When they are bribed, they will not bother to check, and if they check they deflate the value. Misdeclaration and misclassification are falsification of quantity and quality of imported goods. There is misdeclaration when the importer declares a lesser volume or quantity or declares the items different from what is contained in the van. The inspector does not bother to check and just clears the cargo. In the case of misclassification, the importer declares the importation as belonging to another classification. For example, he declares it as industrial flour but in reality it is food flour which is taxed less. Outright smuggling occurs when the cargo is unloaded not in the designated place or port of entry. For example, when the vessel enters Philippine waters, it is met and the cargo is transferred to â€Å"kumpits and brought to shore somewhere, other than the designated entry port and from there picked up by cargo trucks, sorted and delivered to contract-outlets, without paying customs duties. The culprits here are the coastguard and the military at the checkpoints who are paid off to let the cargo pass. Abuse of bonded warehouse permits occurs when an importer brings in raw materials to be made into finished products. He does not pay taxes for the raw materials because he holds a permit to import. But in reality, he sells these raw materials to manufacturers at a price slightly lower than when the factories import by themselves. The culprits involved in this operation are Page 10 of 31 pages the customs guards of the warehouse, the accountant of the bonded warehouse and the legal division of the customs office. Graft and Corruption: Effects of Unethical Practices If the causes of graft and corruption are individual, organizational and societal, said three sectors are also affected. To the individual there is loss of self-respect and ultimate dehumanization; to the organization it could result in subversion of authority structure and disillusionment within the bureaucracy. To society, it could mean increased administrative cost and revenue loss to government. There will be corresponding deterioration of public service and loss of confidence in government.? There will be goal displacement as employees pursue personal interests, rather than organizational and social objectives. The intent of policy and the procedures for their implementation become useless since target beneficiaries are substituted for. Unauthorized control mechanisms take precedence over legal rules and regulations. Authoritative allocation of values envisioned by legislation gives way to shady deals and the demands of personal expediency. It brings about frustration and cynicism which could undermine faith and confidence in the viability and effectiveness of the democratic system. Graft and corruption are encouraged by public apathy which results from bad and ill-managed government. But its most important and potent medium is the individual official or employee. Let us take the Bureau of Customs as a case in point, since it is the number one collecting arm of government which account for four-fifths of the total governmental revenue generated. This entity administers control and police authority over all harbors, piers, airports, wharves, ports, bays, rivers and inland waters throughout the Philippines. Its general duties and powers include assessment and collection of lawful revenues from imported goods and other fees, charges, dues, fines and penalties. It is charged with preventing and suppressing smuggling; supervision and control over the entrance and clearance of vessels and aircraft engaged in foreign trade; enforcement of customs and tariff laws and other rules and regulations relating to tariff and customs administration; supervision over the handling of foreign mail to collect duties on articles smuggled through mails; control import and export cargoes landed and stored in piers, airports, terminal and depot facilities like container yards and flight stations, and exercises jurisdiction over seizure and forfeiture cases in accordance with tariff and customs laws. This is a bureaucratic procedure characterized by excessive and unnecessary delay in transacting business with government which is intentionally committed. It is a practice that slows down or hampers the delivery of much-needed basic services. When there is undue delay in the processing of transactions, people resort to fixers who collude with corrupt employees and officials to expedite business transactions. This is a common phenomenon in government offices. Fixers with connections Page 13 of 31 pages inside the different offices facilitate the issuance of marriage license or certificate of birth or of death. After all, marriages are not made in heaven but at the city hail with the price set by the fixer. Certainly, the client of city hall would be willing to shell out a few pesos as fixers fee rather than queue the long line aggravated by the slow-paced processing process. This is the price paid for the inefficiency of the bureaucracy however unethical the practice is. Nepotism Nepotism is a version of graft and corruption exemplified by favors showered on relatives by appointing them to government positions regardless of qualifications. The practice may be viewed as an aid to responsive management if blood relatives do their share in achieving organizational goals with minimum time and effort expended. On the other hand, nepotism can be pernicious to society if the relatives in the employ of government use blood relationship as the key to open themselves to the opportunity of improving their lives at the expense of public good and general welfare. It can foster the growth of dictatorship and the formation of ? political dynasties? which the 1987 constitution prohibits. In the Philippines, nepotism is not without historical antecedents. The barangay of early Philippine society was viewed more as a socio-economic unit composed of members with consanguinial ties and those related by affinity. Cooperation in the community was a function of personal connection than pre-determined programs and impersonal procedures. These historical antecedents nurtured a tradition and a culture which considered public office more as a source of private gain than a public trust. The prohibition against nepotism is articulated best in the statement made by the late Ferdinand Marcos in 1972. ?Let no man who claims to be friend, relative or ally presume to seek license because of the relationship. If he offends the new society, he should be punished like the rest.? Unfortunately, however, his administration committed the most number of cases of nepotism. Critics maintain that it was during the Marcos era that nepotism was institutionalized. The Aquino administration also showcased nepotism. If the Marcoses and the Romualdezes had their day, the Aquinos and the Cojuangcos also have theirs. The Ramos administration and the Estrada administration have their respective shares too. So what else is new? After all unethical behavior and practices have always been with us. In our Muslim society, this problem is of more acute proportion. But why the insatiable desire of relatives of presidents to serve in government? Why do public officials appoint relatives to sensitive positions? Should personal loyalty and intimacy outweigh competence, seniority and the merit system? These are administrative dilemmas which have to be resolved. In the Philippines, there is a strong belief that corruption is prevalent. In a 1998 Social Weather Stations (SWS) survey, more than 70 percent of the respondents thought that corruption existed in government. Nearly 40 percent believed that there was a great deal of corruption. Page 14 of 31 pages Based on its Corruption Perceptions Index (CPI) for 99 countries, Transparency International rated the Philippines as the 54th among the most corrupt countries in 1999. The Philippines scored 3. 6 based on the CPI scale of 1 (high perception) to 10 (negligible perception). Indeed, in a society with a long history of rapacity and plunder in the ranks of the state and the elite, and powerlessness among the masses, the use of public office has been identified with gaining and maintaining economic, political and social power. Both private citizens and government employees habitually use this office to further their self-interest at the expense of the common good. This custom has prevailed in the Philippines under a long and continuing regime of rent capitalism, in contrast to production-oriented capitalism. EXAMPLES OF GRAFT AND CORRUPTION Here is the anatomy of some types of corruption, taken from the website of the Transparent Accountable Governance project. Textbook scams According to the article of Yvonne T. Chua of the Philippine Center for Investigative Journalism, up to 65 percent of textbook funds are reserved as bribe money. The range is from 20 percent to 65 percent. Take the case of the medium-sized book publisher caught in January 1999. Her bulging bag contained several envelopes: P 1,000,000 (5% of the contract) for the regional director 50,000 for the supply officer 40,000 for the chief accountant 15,000 for the accountant who obligated the money 10,000 for the cashier 5,000 for each of the accounting clerks Then add 40 percent of the contract to a congressman. The total is about half the size of the contract she won. Page 15 of 31 pages Public works A report by Earl Parreno said that congressmen get 12 percent to 20 percent of the funds allotted for building artesian wells, bridges, and roads. The total lost money may be bigger. In 1998 a cabinet member told journalists that commissions on public works ran up to an average 30 percent of the project cost. He cited an engineer who supervised road pavement projects in an Eastern Visayas district. The engineer cut the cement used by 20 to 30 percent to save on materials. To do this he would leave hollow the middle portion of the road. Only gravel now occupies that section, though covered by a thin covering of cement. A foreman of a construction company building a seawall in the same district, meanwhile, admits he is using `small stones in the inner portion of the wall, wrote Parreno. Thats not supposed to be done, says the foreman, but no one can see it, anyway. This cuts down the cement used by 20 percent. Votes for sale A piece by Stella Tirol tells of the corruption that takes place in elections. A common means is the simple dole-out. One congressional candidate in Southern Luzon gave out as much as P 10,000 a day in the barrios. The rate then was P 100 per voter. Election eve would require some P 4 million. The more sophisticated way is to get the barangay captain to your side. One barangay captain she interviewed admitted that he and other barangay captains were offered P 30,000 each. A bidding competition would ensue among the candidates. Barangay officials act as the conduit for purchasing votes, writes Tirol. They know who among their constituents can be bought and on election day itself, they ensure that these people actually go to the precinct and cast their vote for the preferred candidate. Oversight Institutions The legal infrastructure and political commitment are supported and complemented by the existence of oversight institutions. The creation of the oversight institutions that deal with issues of ethics, accountability, graft and corruption are mandated by the Constitution. The common feature of these institutions is they enjoy a substantive degree of fiscal autonomy in the sense that they are not subject to the fiscal controls of the executive. The budget is directly released to these institutions and the heads are authorized to realign savings from their budget. For instance, CSC prescribes qualification standards for each and every position in the Philippine government. Non-compliance with the QS by agencies in the processing of appointments of their staff results in the disapproval by the CSC of such appointments. But, apart from the substantive requirements for practically all kinds of personnel actions such as the publication requirement and the promotion and selection board processes. Non-compliance with the procedural requirements constitutes ground for corrective or even punitive action. The second approach deals with disciplinary actions against official or employee for infractions committed in relation to the performance of his/her official functions. The Administrative Code of 1987 or Executive Order No. 292 outlines the various acts that are subject to administrative disciplinary proceedings. However, administrative discipline is not a function within the exclusive jurisdiction of CSC. Agency heads as well as the Office of the Ombudsman also have the authority to proceed against erring government officials and employees. The third approach is developmental and will be discussed later in the succeeding paragraph. The Office of the Ombudsman acts as a prosecutor against those charged with the violation of RA 3019, RA 6713 and the law against ill-gotten wealth, among others. It is mandated to investigate and prosecute the criminal liability of public officials and employees involved in graft and corruption. The Commission on Audit is the fiscal watchdog of the government. COA is responsible for ensuring legal and proper disbursement of public funds and preventing irregular, unnecessary, or extravagant expenditures or usage of public funds. It also has quasi-judicial powers. All these oversight institutions enforce accountability ethic in government. B. Traditional approaches Since independence, numerous mechanisms have been designed to counteract corruption in the Philippines. The traditional approaches include setting the legal framework and establishing antiPage 17 of 31 pages graft and corruption bodies like presidential committees, commissions, task forces and other units. Since 1950, various Philippine presidents, from Quirino to Estrada, have created antigraft and corruption investigation units and agencies. With the exception of the present Presidential Commission Against Graft and Corruption (PCAGC), established in February 1994, these bodies have been short-lived. The most recent presidential body is the Interagency Anti Graft Coordinating Council, which includes the Commission on Audit, the Civil Service Commission, the Office of the Ombudsman, the PCAGC, the National Bureau of Investigation, and the Department of Justice. The council was established through a memorandum of agreement among these agencies on June 11, 1997 (the DOJ was admitted in 1998). The council received presidential recognition only in August 1999 through President Estradas Administrative Order Number 79 which allotted P5 million for antigraft activities. At present, the Ombudsman and the PCAGC are the principal actors in government to act on complaints and cases of graft. Some of the cases are resolved by the Ombudsman while the others are elevated to the Sandiganbayan. Cases where the accused have been found guilty are sent to the Supreme Court or to the Court of Appeals. Currently, administrative cases are automatically sent to the Court of Appeals while criminal cases like the violation of the AntiGraft and Corruption Practices Act go directly to the Supreme Court. The issues of ethics and accountability pose a continuing challenge to the Philippine government. The mechanisms and infrastructure that have been put in place, as outlined in this paper, may not yet be the best or ideal in the sense that ethical and accountable behavior in the public sector is still much to be desired in the Philippines.

Monday, December 2, 2019

Information security management

Introduction As Ullman (1983) explains, â€Å"security management is a broad field of management related to asset management, physical security and human resource safety functions†. The author further explains that security management plays a significant role in identifying a business’ assets and developments, as well as how they can be protected to ensure long-term development of a business is protected.Advertising We will write a custom essay sample on Information security management specifically for you for only $16.05 $11/page Learn More As Hong et al. (2003) cautions, â€Å"security management is core to ensuring very long-phrase sustainability of any company, and the need for people educated in this field is developing each and every day†. As far as human security is concerned, â€Å"employers have an obligation to shield the people within the workplace, and the measures delivered must offer workers in all sectors of the econo mic climate with the information and knowledge to tackle and control possibly hazardous occasions† (Hong et al., 2003). When it comes to information, every business today is faced with a test of coping with constantly changing information systems, threats and needs. â€Å"Businesses that have been around for a long time have had to adjust from ledger cards to keeping up with large volumes of information generated in the digital â€Å" (Awad Hassan, 2004). The speeds at which information flows in and out of a business today is makes information systems more complex and hard to keep up with. Awad Hassan (2004) further explain that â€Å"as we move rapidly into the future, leaders face the challenge of being effective in a global knowledge environment†. One way through which their effectiveness is tested is through investing in research, acquiring information from the markets when it is still relevant, and ensuring that information security is prioritized in a business . Today, the information entrusted to organizations by their clients is too detailed and sensitive. For example, banks and insurance companies require a customer to provide sensitive information such as birth dates, physical location, and other family members’ information, just to mention a few.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The situation leaves customers extremely vulnerable and at the mercy of the business’ ability to protect the information. It is therefore paramount that these business exercise sufficient care in managing and using their clients’ information. It is also notable that â€Å"leaders have to undertake the responsibility of helping their organizations cope with the challenges they face from expanding knowledge and information systems† (Cronin, 2009). Information security management enables a business to collect, represent, disbur se and use information in a safe and trustworthy manner. Information security further covers the process by which data is collected, converted to information and finally utilized in a business. â€Å"In a world overloaded with information, there is a need for emphasis on not just more information security, but actionable intelligence that is capable of guiding decisions in its security† (Beccerra-Fernandez, Avelino Rajiv, 2004). Developing an information security management strategy in any business requires a comprehensive understanding of what objectives the business intends to achieve from the process. It is also through a clear understanding of how the business intends to meet these objectives (Cronin, 2009). Information security in any business should be developed through formulating actions designed to meet its objectives. It should further be through implementing suitable timescales and progress assessment techniques. This ensures that a business is able to monitor and measure progress, as well as identify those systems that are working and those that are simply wasting its resources. When implementing information security strategies, it is crucial for a business to understand that over-reliance on one information security model can pose significant risks for a business.Advertising We will write a custom essay sample on Information security management specifically for you for only $16.05 $11/page Learn More For the big businesses such as multinationals, conventional security strategies may lead to stagnation and neglect in dynamics of change. Issues must be addresses as they come and a business must be willing to be flexible enough when new threats arise. â€Å"Strategy formulation may involve identifying how the business can leverage its information security strategies, the best approaches, and how to prioritize† (Cunningham Fried, 2002). For businesses that deal with huge amounts of information, the entire process must be guided by the company’s current information security needs. However, this does not mean that long term information security needs should be ignored. A business’ mission, vision and strategic objectives must serve as constant guidelines to strategy formulation. There are several areas that must be considered fundamental for the success of information security. As identified by Solms (2005), â€Å"they include top management support, unfiltered access to information, information security management teams and resources, and professional knowledge on how to implement safety strategies†. Management tools Managing information security requires adequate research and preparation. Several steps are followed to ensure the two are addressed comprehensively. Information classification It is important for a business to classify its information to avoid overwhelming amounts of data and information. Information can be classified according to how often it is use d, its influence on business operations, level of sensitivity and its ease of access. By doing this, complexity of systems put in place to ensure its protection can be increased or reduced depending with what class information is in. Furthermore, planning and design of strategies is made easier. Classifying information also ensures that information is only accessed when it is needed. Putting all information in the same database means that the database is visited more frequently and by more people. This is one way to protect data and information by ensuring it is only accessed by a few people, and when it is needed.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Risk assessment Risk assessment involves analyzing possible attacks into a business database and their effects on a business. It is not possible for a business to protect its information if there is no clear information on what or who it is protecting the information against. For example, a business must identify information that may sabotage the uniqueness of its products and services in a market, and ensure that it is out of reach to anyone considered as competition. Its clients’ personal information must be out of reach to anyone who is not authorized to access it. Risk assessment further allows a business put in place stand-by and control measures that it can use to address an attack if it occurs. This in many ways could reduce the damage caused by a damage. Risk analysis The first step towards effective safety management is identification of risks and threats. Analyzing risks facing a business allows it to adequately prepare for attacks and challenges. It provokes prepar edness for any possible attacks. Risk analysis involves calculating the implications of a perceived threat. Implications could include financial loses, reputation damage and strained relationships between employees and employers, just to mention a few. Risk analysis should be a continuous process carried out consistently to allow a business prepare for new threats. Information Security management options Accepting The first step towards managing information security is accepting that a security problem exists. Acceptance provokes an analysis of just how big a security threat is in a situation. Acceptance puts the management on alert that something needs to be done. This way, it is possible for information security to be prioritized as the company does its planning and programming of activities. Information security management requires early preparation and planning, as well as effective budgeting. When a business identifies and accepts potential threats to its information security, these elements are easily incorporated in the company’s system and schedule. Transfer Information security threats can be easily transferred from one location or area of business to another. Examples of such threats include those arising from equipments and portable materials such as data cables. Another way of transferring security threats is through insurance. This way, any financial liabilities arising from information security matters are transferred from the business to the insurer. Businesses prone to information security challenges employ this method to protect themselves from heavy financial burdens. Reduce Another significant information security management options is reducing the threats. This happens through consistent inspection and investigation of areas where threats are likely to occur. Reducing information security threats further occur when businesses invest in detection systems. In businesses where threats are mostly from external attacks, reduction can be a chieved through restricted entry to the facilities. It can also be done by ensuring that people getting into and out of the facility are screened and checked. Eliminate Elimination has been identified as the best information security management option. Its saves a business troubles that arise from disasters and crises common in information security related disasters. It is paramount for a business to ensure that it prioritizes elimination in its information security management strategies. Elimination is many times not easy as there are new information security challenges facing any business each day. Businesses can achieve elimination using several procedures: Detect Installing detection systems helps a business deal with a threat before it materializes into a full-blown security disaster. Latest technological innovations have made it easy for businesses to achieve this. Inside a business, using controls is a common method of arresting security and safety problems before they occur. In the external areas of the business, using surveillance cameras and other technologies allow a business to detect threats such as cable interference easily. Detection also occurs by enrolling investigative services where suspicion occurs. Many governments have put in place measures that allow businesses access to professional security advice and services. Deny Denying attackers a way to get through to a business’ system is the most cost effective elimination strategy. All information security strategies should be aimed at minimizing access to a business information, especially to anyone who cannot be trusted with it. Business do this using different tools such as administrator passwords and having employees seek authorization before accessing sensitive information, among others. Delay Having systems that delay damage in case of an attack allows a business time to react. Depending with the nature of the situation, the amount of threat facing a business may be considerably r educed in such a situation. Delaying damage can be done using control systems that send signals to operates in case of threats or automatically shuts down a company’s operations systems before the damage spreads to the key areas of a database. In today’s world, creative innovations allow business to purchase and implement custom made solutions that may detect specific threats common to some areas of the business. For example, the IT department can install systems that send notification messages to every user in the company in the face of a probable virus threat. The department can also have warning messages sent to them anytime unauthorized users try to access certain information. Users of certain systems can have limited attempts to enter the correct password, after which the system shuts itself down or locks itself. Managing security at a data warehouse Some business have information warehouses such as specific rooms where sensitive information is stored. It is possi ble to have some information being only accessible in one specific room or location in a company. Depending with the nature of business, a company can have control rooms where operations are managed from. The security of such locations is critical. It can be managed using regular security measures used to protect physical locations. These measures include; Using simple and sophisticated locks Having local and monitored alarms Installing appropriate barriers for unauthorized personnel Use of security lighting Having authorized personnel use access control cards to monitor traffic in and out of the facility Improve communication capability between users and security teams Having armed security on stand-by in case of breakages Role of management Cunningham Fried (2002) argue that â€Å"while protecting the human element of information security may seem obvious, it clearly is not†. Many organizations are still below the level expected of them as far as information security is concerned. â€Å"In fact, most businesses do little than pay lip-service to it-spending more time and money on free coffee for employees than on educating those employees on information security practices that help mitigate the insider threat† (Brockman Turtle, 2003). The author further explains that any businesses trying to save money by cutting the cost of training on information security are taking a big and foolish risk. As information security threats grow in complexity, it is every business’ responsibility to ensure that their employees’ level of knowledge on the same is developed. Since there is always a human element in every information security threat, businesses need to realize that no single safety system is foolproof. Therefore, there should always be a clear road-map initiating different information security programs to suit different threats. Role of employees As Solms (2005) explains, â€Å"many employees in today’s workforce are not awa re that they play an important role in their organization’s information security†. Lack of awareness on their role in the matter may lead to actions which put a business under high risk of insecurity attacks. Cronin (2009) further explains that â€Å"employees engage in risky behavior on the internet, open unsolicited e-mail attachments, carelessly divulge proprietary information, introduce wireless risks to corporate networks, and neglect to consider security in their daily routines†. All these activities could put expose a business to security threats, and expose sensitive information. While much of the attention is given to high profile information security challenges such as viruses and hacking, the greatest risks arise from employees and other insiders. Major information security challenges occur not because systems have failed, but because people entrusted with the information failed. It is evident in many cases that the success of an organization and the s afety of its information, is dependent on how ordinary people with access to the information comply with the set safety measures. Unfortunately in many businesses, information managers are answerable for breaches committed by employees on their watch. This does not protect a business from information insecurity, since many times the damage is already done before the managers can realize it. â€Å"It is important to note that the human factor is typically the most critical variable in information security systems and even the best policies can be rendered completely ineffective if the people involved do not take responsibility for safeguarding the information they control† (Hong Et al., 2003). Experts in this area reveal that only 25% of information security breaches are planned and executed by outsiders. The remaining 75% of the cases are inside jobs and many times they are not intentional or planned. Insecure habits such writing password on sticker pads or forwarding informa tion to a home computer can expose an organization into major risks. Some employees are too polite to challenge visitors who invade their workspace, or fellow employees who have no authority to access information on their computers. An ignorant employee who opens spam emails and attached documents without verifying their sources may paralyze an organization’s information systems for days, and even cost it a lot of money. Today, threats grow exponentially as information systems become more and more complex. Therefore, ignoring the employee element of information security may be the most dangerous and costly mistake a business can make. Having employees that do not recognize their role information security may also be the biggest inhibition to achieving maximum information security. It is paramount that an organization trains its employees on all parameters of information security, and ensures that their level of information is constantly updated. Awareness training Awareness t raining must be equally balanced between corporate security and information technology (IT). Most organizations still regard information security as an issue that should be entirely left to the information technology department. â€Å"Unfortunately, businesses are leaving themselves open to security breaches because their information security awareness training is woefully inadequate† (Cronin, 2009). Since training employees and equipping them for proper information management it is not an easy task, it should not be left to one department. Instead, organizations need to ensure that the IT department is fully supported by the corporate security department. Experts in this field argue that the best way to ensure maximum information safety is having responsible and accountable end-users. This is only achievable through a complete change of corporate culture. Furthermore, a business must have the capacity and ability to manage the behavior of the end-users, especially those with access to key information. Unfortunately, the IT department is not good at these functions. The department primarily focuses on ensuring critical information systems are in place and running effectively. The IT department in many businesses lacks the appropriate communication skills to influence an organizational culture. Instead, they are more focused in ensuring that technical aspects of information management are working. For this reason, the corporate security managers should be more involved in influencing an organization’s culture. As Awad Hassan (2004) explain, â€Å"one of the chief strengths of corporate security managers is that they’re inter-personally involved with the employees†. Therefore, they are more equipped and experienced to manage personnel security as far as information is concerned. This includes making sure that every employee is well aware of their role in protecting a business from avoidable risks. It makes more sense for them to init iate a culture that fosters awareness and responsibility as information security is concerned. Programs initiated must create awareness of risks and reinforce well formulated policies. Furthermore, the corporate security is department is able to communicate important information security details in less technical language that would be easily be understood by employees at all levels. To ensure responsibility, both the corporate and IT departments must be able to explain why security breaches occur when they do. Therefore, it is both the departments’ responsibility to ensure that every employee is aware of possible threats before they happen. Educating employees ahead of time makes them more sensitive and will easily notice and report threats before they become harmful. Such a measure will save a business a lot of time and money spent on fixing the problem. Information security policies and procedures Businesses all over the globe spend billions of dollars each year to ensure that their information systems are well protected. But while the measures taken are important, security issues most arise from the most neglected aspect of information security-employees. More than 75% of security breaches occur as a result of employees who are either not conversant with a company’s security policies and procedures, or are ignorant of them. In an era where huge amounts of information can be sent with the click of a mouse, it is imperative that those with access to any sort of information know how to handle it well. As technological innovations get more and more complex, it imperative for businesses to secure their information starting from inside. Information portability has further made it easier for data thieves. Vital information can be smuggled out of a company’s data warehouse through extremely small devices such as flash disks or through emails. Wireless systems have further made it easier for one to transfer information from one point to another without hassle. This leaves organizations in extremely vulnerable situations, with the only hope being a corporate culture that encourages discipline and loyalty. It is important for a business to set up strict penalties for employees who breach security measures in a company. This is done through policies and procedures that define an employee’s roles and responsibilities. They should further outline tough measures and penalties for offenders. It is important for employees to understand the consequences of engaging in unacceptable behavior when dealing with information. However, security policies and procedures will not be very helpful if employees are not willing to abide by them. Developing a culture of discipline ensures that employees are cautious not to jeopardize vital information in a business. Awareness programs should focus on educating employees on how costly small mistakes can be and how it affects them as stakeholders. It is only through continuous transformatio n of attitude and exposure to training will policies and procedures help a company develop information security. Employees have the ability to transform the state of a company’s security by maintaining caution when handling information. As Solms (2005) argues â€Å" without implementing an effective awareness program an information security policy is more or less useless. The best policy in the world will fail if the people who are affected by it most don’t know the rationale behind it†. An organization’s biggest asset is a culture that promotes positive behavior in all aspects of its operation. Other measures that can be used to encourage positive behavior include rewarding diligent employees and encouraging communication between employees and the management. Management buy-in Cronin (2009) explains that â€Å"the first and most crucial step in developing an effective security awareness program is getting top management buy-in†. It is very crucial to get management on board for any important strategy to work. However, it is notable in many organizations that getting the management to understand the weight and significance of information security is not easy. This is because it may appear too technical and even abstract for people in other area of profession other than IT. Information security in many organizations is viewed as a matter of fixing computer infrastructure and ensuring latest technology systems. Managers who do not understand that it is much more than this may end up spending a lot of money on expensive infrastructure and yet still remain extremely vulnerable to information security threats. It is also notable that many managers do not view information security as a worth investment since on its own, it may not appear to have financial returns to a business. It is viewed as an investment with little chance for financial returns. However, what many managers don’t realize is that neglecting information secu rity may cost a business all other returns it is making. The long-term success of a business is highly dependent on how well its reputation, trademarks, copyrights and innovations are protected. As explained earlier, trying to cost cut by investing too little in information security may end up being the riskiest and most foolish decision any business can arrive at. It is also important to know where investments are required. By simply investing in the tangible elements of information security such as computers and software may not be very fruitful without working on other relevant areas. To ensure management understands the relevance of information security, they should be constantly reminded of certain issues; Downtime It is important for managers to be talked to about the millions of dollars it could take to recover if suffers from an information attack. Depending with the information lost, the whole business may be paralyzed for a while as it tries to get a database up. It may co st the the business a lot of money to instal new information systems, since the existing once might be too risky after they have been broken into. Reputation management Building a reputation for a business is an expensive and long-term affair. However, all the efforts put into ensuring a positive reputation may go down the drain if as a result of leaked information. Information security breaches many times leave a negative impression and competitive losses at the market. Managing the damage may end up being an extremely expensive affair for a business. A good example is a big corporation which requires to send over 200,000 letters to their clients explaining why their credit information has been exposed. For example, a bank may need to recall credit cards from customers after their numbers have been stolen. Managers need to be constantly reminded of such outcomes to take information security programs and initiatives seriously. Competitive disadvantage Information security breach lea ves a business exposed to its competitors. The trade secrets that give it a competitive advantage become easily accessible. Information such as a business’ marketing plans or future products will lead to loss of revenues and a widespread damage to profits. Since more than half the breaches arise from inside a business, it is important for the management to invest in ensuring that information security is managed from inside out. Legal liability Each day we hear of cases where businesses are facing legal challenges arising from wrongly leaked or exposed information. Clients in a business expect that management should be able to keep their information safe and confidential. Most business contracts obligate a business to keep a client’s information safe and take responsibility when it fails to do so. As a result, many businesses have found themselves in trouble when those terms are not adhered to. The situation is especially worse when stolen information is used against a client or used against their will and wish to for other purposes other than why they gave the information in the first place. When information is stolen from a company, it is almost impossible to prove in a court of law that the company took all the necessary measures to protect the information because if that was the case, then it wouldn’t be stolen in the first place. This leaves the business entirely responsible for any damages arising from information theft or leakage. It is important for managers to realize the magnitude of challenges that may arise from having to battle legal challenges every often due to under-investment in a company’s information security system. Behavior based information security models It is important to realize that an employee’s behavior does not have to be malicious to expose a company into information security threats. Innocent behaviors such as leaving computers on in the presence of a visitor, sharing a password with a colleague , willingness to answer innocent questions by social engineers, and laptop loss can result in very dire consequences. All these gateways to information insecurity have people as a common aspect. Therefore, bringing information safety message as home as possible is mandatory. Behavioral based security management are designed towards ensuring that every stakeholder is doing their best and playing their role in protecting the company’s assets. Every stakeholder must accept responsibility as a part of the enterprise, and as a beneficiary of the success of a business. As Brockman Turtle (2003) argue, â€Å"behavior-based awareness capitalizes on these elemental human dynamics, bridging the chasm of risk by instilling in every employee the empowerment to affect change and create value through awareness action†. From these realities, it evident that if a business can change its stakeholders behavior to suit that of a responsible culture, information security can be achieved more easily and cheaply. Behavior based information security models require a lot of investment in awareness an knowledge development. All stakeholders must be well equipped with proper knowledge on how to minimize chances of exposing a company to risks and threats. For example, if suppliers have gate access cards, they should avoid attempts to use them somewhere else, and report to the company as soon as it is lost or stolen. Employees’ attitude towards security measures should not be cavalier. Working spaces should be fully protected and sources of information such as computers and files guarded at all times. This will only happen if naivete towards information risks is eliminated in a business. The effectiveness of behavior based information security models can be maximized through these practices; Convincing employees and other stakeholders that security breaches harm not only the business, but also individual stakeholders. Employees could reduce their jobs and extreme i nformation security attacks could even lead to business shutdown. Constantly reinforcing strong security programs and integrating creativity to avoid monotonous routine that could see employee easily get casual with them. Ensuring programs put in place appeal to the issues considered important by employees and other stakeholders Continuous awareness programs through research, training and education Reinforcing positive attitude towards measures taken by a business through articulated programs that are easily applicable in employees’ day-to-day activities. Use of technical languages and approaches leaves a large number of people who may not understand the language out. It further discourages interest in subjects related to information security. Motivating employees, management and other stakeholders to put into use the information and knowledge they acquire through training and awareness programs Ensuring that everyone’s job description addresses the need to protect a c ompany’s assets which include information Helping create constant awareness Cunningham Fried (2002) explain that â€Å"only through constant exposure to appropriate awareness training can employees transition from the greatest risk to the greatest asset†. Continuous exposure can be achieved through the following methods; Use attractive posters Employees should be reached and reminded about information security at all times. Placing attractive posters around their work place, at the company’s entrance, around water coolers and other strategic positions ensures that they are constantly reminded of the importance of information security. A constant reminder further reiterates the significance and importance of the issue to the company. Create pop-up windows that feature information security Using such tools enables a business keep its employees aware of the constant threats facing the business as far as protecting information is concerned. Such pop-ups can also b e used to remind employees of important points covered during a past training event. It can further be used to remind them what to do in case they are faced with a risk to lose information from their machines. The pop-ups should lead the employees to the company’s security department of web page to allow them communicate a problem when it occurs or seek clarification on issues that may not be very clear. Publish information security articles in the company’s newsletters These is way for businesses to reach more than its employees. By having as many people read about information security as possible, companies will help each other fight the problem. A company that does not do regular trainings on the subject can benefit from having its employees read about such issues from other sources such as other companies’ newsletters. Newsletters provide a big space to explain details that may not be covered in small posters in a more comprehensive manner. A company can use real-life stories in its newsletters to catch the attention of its stakeholders and explain the relevance of information security. Using audio and visual aids These include using videos to pass messages that leave a long-lasting impression in the head of the viewer. â€Å"Such aids are effective in emphasizing various aspects of security such as how to defend against â€Å"social engineers† attacks† (Solms, 2005). These can be placed in social places such as the cafeteria. Conclusion Security management in an organization plays a significant role in its level of success. Perhaps nobody could put it better than Solms (2005) who explains that â€Å"the safest organizations are those that have figured out how to change the culture of the company so that everybody’s job is part of security†. As explained earlier, today businesses are faced with a hard task of managing overwhelming amounts of information coming in everyday. Information security management ena bles a business to collect, represent, disburse and use information in a safe and trustworthy manner. The benefits of information security management for any business are enormous. It provides businesses with a capacity to protect itself from constant threats larking in the markets. Big organizations such as multinationals need effective and modern strategies in their information management systems to ensure security, reliability and reputation management. In this case, information management is crucial in ensuring protection and minimized costs of recovering and managing damages. The most effective approach when managing information security is having a corporate culture that encourages responsibility. While much of the attention is given to high profile information security challenges such as viruses and hacking, the greatest risks arise from employees and other insiders. Major information security challenges occur not because systems have failed, but because people entrusted with the information failed. It is evident in many cases that the success of an organization and the safety of its information, is dependent on how ordinary people with access to the information comply with the set safety measures. Another approach in managing information security include identifying and understanding a business’ capabilities and resources. These are not restricted to but include corporate resources such as basic inputs and organizational capabilities. Expertise in the area is key for a business to stay ahead of possible threats. This calls for hiring and retaining the best talent in the IT field. Due to increased complexity in information management, it is important for a business to have a team that has capacity to keep up with new updates and solutions to information security. A business also has to identify its financial capacity its capacity to acquire and utilize resources. The strategies formulated for any organization must connect with the bottom line and nurture it with relevant knowledge on how improvements can be made. Steps for designing information security strategies for any business must include clarifying its business strategy, identifying its unique information activities, identifying available resources required to implement their strategies, and putting in place measures that allow it to detect threats before they become real dangers to it. It is also important for a business to â€Å"prioritize information security components that align with available needs and resources, and decide on how the business will access the lacking resources† (Beccerra-Fernandez, Avelino Rajiv, 2004) In order for any corporation to develop an efficient information security strategy, these recommendations, among others will be applicable: Design strategic and tactical information management initiatives Conduct a comprehensive company needs analysis to identify key issues in Information security Identify key staff needs that require urg ent attention to support information security Based on the above recommendations, develop a strategy to address the needs Identified Reference list Awad, E.M. Hassan, G.(2004). Knowledge management. Pearson Prentice Hall. Beccerra-Fernandez, I., Avelino, G. Rajiv, S. (2004). Knowledge management: Challenges, solutions and technologies. Pearson: Prentice Hall. Brockman, P. Turtle, H.J. (2003). â€Å"A barrier option framework for corporate security valuation†. Journal of Financial Economics, 67(3), 511-529. Cronin, O. (2009). â€Å"Information assurance: A survey of current practice†. International Journal of Information Management, 14(3), 204-222. Cunningham, R. Fried, D. (2002). Adaptable Real-Time Information Assurance. Aerospace, 6 (4), 2678-2682. Hong, K.S. Et al. (2003). â€Å"An integrated system theory of information security management†. Information Management Computer Security, 11(5), 243-248. Solms, S.H. (2005). Information security governance-Co mpliance management vs. operational management. Computers Security. 24(6), 443-447. Ullman, R.H. (1983). â€Å"Redefining security†. International Security, 8(1), 129-153. This essay on Information security management was written and submitted by user Myah R. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here. Information Security Management Introduction Information is critical to the functioning of every organization. It defines its operations and activities. The concept of security management is thus elusive and focuses on organizational security. Organizations have remained active in terms of acquisition of information management systems.Advertising We will write a custom essay sample on Information Security Management specifically for you for only $16.05 $11/page Learn More These systems are meant to aid organizations in securing their information. This paper discusses the concept of information security basing on the case. The paper looks into the practice of information management and security taking into account the ethical and legal matters which surround information security and management. At the initial stages of operation, most information is saved within an organization. This is backed by the argument that there are fewer transactions at this period. As firms expand their operat ions to include many external players, the concept of preserving and securing information becomes elusive. The issue of information security management in Stratified Custom Manufacturing began to be addressed when the company entered and successfully implemented an initial public offer. This denoted that the firm was officially entering the public trading environment, hence exposing itself to competitors. Most current organizations have information management departments which help in preserving and controlling the flow of information within and without the organization. Companies embracing the use of information and communication technology in discharging organizational functions are often prone to security risks. Information security is thus a great concern for these companies.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Information security is critical in safeguarding company data. I nformation security entails the safeguarding of company information from the external environment as well as technological faults or threats. A substantial number of legal and ethical issues touch the implementation of information security by companies (Whitman Mattord, 2011). According to Information Systems Audit and Control Association (2010), information security is a detailed management issue that calls for managerial attention. Stratified Custom Manufacturing established a broader information management security department. The security team of the company is focused on several aspects of information security. This is reflected in the top security management team positions. The company has other security managers under control of the senior. There are a manager in charge of administrative security, a technical security manager and a security and compliance manager, among the others. In addition to this, the company has a broad policy framework for information management. This forms the ground on which department draws the guidance on information security management. Policies in security management in organizations seek to guide and set limitation to the level of information sharing in an organization. Information belonging to organizations is secured and limited to viewing only by accredited entities.Advertising We will write a custom essay sample on Information Security Management specifically for you for only $16.05 $11/page Learn More Policies on information security stipulate on the way information is shared within and without the organization. A violation regarding the access and the use of company information is easily identified, so the necessary steps will be taken to deal with it. Those identified breachings of the information security rules are punished in different ways. One of the means used to punish information security offenders is by denying them privileges to access and use the information belonging to the o rganization. This takes place in different ways, for example, by barring such people from accessing information devices. The other way of punishment is deactivation of access details of the individual to retrieve or view the company information. In some cases, information security offenders are prosecuted and forced to pay fines or compensation for the damage caused to the company (Whitman Mattord, 2011). In most cases, assessment of the risk caused is done before the users are punished. Information security management is complicated by the growing patterns and trends of management that encourage the sharing of information between different organizations. With the prevailing trends and use of information technology, it is difficult to secure organizational information. Piece of legislation on information security management also varies making it difficult for organizations to formulate policies on information security (Straub, 2008).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Ethical issues also touch the managerial practice of security management. The main issue in information security management is the level to which organizations conceal their information. Companies are encouraged to share information and access more external sources (Whitman Mattord, 2011). The information helps organizations in improving strategic management practices. They get to know the tactics of management that are used by other organizations performing well in the market. Competition between organizations is open. They are encouraged to practice positive competition as they work on improving the service delivery to their customers. Therefore, the open release and sharing of information is one of the methods of open competition. The other point on ethics and information security is that firms are required to improve their relations with employees. Building healthy relationships and motivating work environment enhance information security in organizations. This step has proved t o be more effective than other methods (Whitman Mattord, 2012). Conclusion The responsibility for information security has become an organizational matter more than a concern of legislative bodies. Organizations need to actively participate in and work on improving their systems by making them less prone to information leakage. The model of information security management taken by Stratified Custom Manufacturing is a desired step in ensuring that the company information is secure. References Information Systems Audit and Control Association.(2010). Certified Information Security Manager review manual 2011. Rolling Meadows, IL: ISACA. Straub, D. W. (2008). Information security: Policy, processes and practices. Armonk, NY [u.a.: Sharpe. Whitman, M. E., Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology, Cengage Learning. Whitman, M. E., Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technolo gy. This essay on Information Security Management was written and submitted by user Elise Walker to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

Abiotic and Biotic Stresses

Abiotic and Biotic Stresses What causes a plant to be stressed? As with humans, stresses can originate from the surrounding environment or, they can come from living organisms that can cause disease or damage. Water Stress One of the most important abiotic stresses affecting plants is water stress. A plant requires a certain amount of water for its optimal survival; too much water (flooding stress) can cause plant cells to swell and burst; whereas drought stress (too little water) can cause the plant to dry up, a condition called desiccation. Either condition can be deadly to the plant. Temperature Stress Temperature stresses can also wreak havoc on a plant. As with any living organism, a plant has an optimal temperature range at which it grows and performs best. If the temperature is too cold for the plant, it can lead to cold stress, also called chilling stress. Extreme forms of cold stress can lead to freezing stress. Cold temperatures can affect the amount and rate of uptake of water and nutrients, leading to cell desiccation and starvation. Under extremely cold conditions, the cell liquids can freeze outright, causing plant death. Hot weather can affect plants adversely, too. Intense heat can cause plant cell proteins to break down, a process called denaturation. Cell walls and membranes can also melt under extremely high temperatures, and the permeability of the membranes is affected. Other Abiotic Stresses Other abiotic stresses are less obvious but can be equally as lethal. In the end, most abiotic stresses affect the plant cells in the same manner as do water stress and temperature stress. Wind stress can either directly damage the plant through sheer force; or, the wind can affect the transpiration of water through the leaf stomata and cause desiccation. Direct burning of plants through wildfires will cause the cell structure to break down through melting or denaturation. In farming systems, the addition of agrochemicals such as fertilizers and pesticides, either in excess or in deficit, can also cause abiotic stress to the plant. The plant is affected by an imbalance of nutrition or via toxicity. High amounts of salt taken up by a plant can lead to cell desiccation, as elevated levels of salt outside a plant cell will cause water to leave the cell, a process called osmosis. Plant uptake of heavy metals can occur when plants grow in soils fertilized with improperly composted sewage sludge. High heavy metal content in plants can lead to complications with basic physiological and biochemical activities such as photosynthesis. Biotic Stresses Biotic stresses cause damage to plants via living organisms, including fungi, bacteria, insects, and weeds. Viruses, although they are not considered to be living organisms, also cause biotic stress to plants. Fungi cause more diseases in plants than any other biotic stress factor. Over 8,000 fungal species are known to cause plant disease. On the other hand, only about 14 bacterial genera cause economically important diseases in plants, according to an Ohio State University Extension publication. Not many plant pathogenic viruses exist, but they are serious enough to cause nearly as much crop damage worldwide as fungi, according to published estimates. Microorganisms can cause plant wilt, leaf spots, root rot, or seed damage. Insects can cause severe physical damage to plants, including the leaves, stem, bark, and flowers. Insects can also act as a vector of viruses and bacteria from infected plants to healthy plants. The method by which weeds, considered as unwanted and unprofitable plants, inhibit the growth of desirable plants such as crops or flowers is not by direct damage, but by competing with the desirable plants for space and nutrients. Because weeds grow quickly and produce an abundance of viable seed, they are often able to dominate environments more quickly than some desirable plants.

Saturday, November 23, 2019

How to Grow a Big Alum Crystal

How to Grow a Big Alum Crystal Alum is found in the spices section of the grocery store. That little jar contains small white crystals that, with a bit of time and effort, you can grow a big alum crystal  that looks a bit like a diamond. This takes days to weeks. What You Need for Alum Crystals 1/2 cups hot tap water2-1/2 tablespoons alumnylon fishing linepencil, ruler, or knife2 clean jarsspooncoffee filter/paper towel Grow the Crystals Pour 1/2 cup of hot tap water into a clean jar.Slowly stir in alum, a little at a time, until it stops dissolving. Dont add the whole amount; just enough to saturate the water.Loosely cover the jar with a coffee filter or paper towel (to keep dust out) and allow the jar to sit undisturbed overnight.The next day, pour the alum solution from the first jar into the clean jar. You will see small alum crystals at the bottom of the jar. These are seed crystals that you will use to grow a big crystal.Tie nylon fishing line around the largest, best-shaped crystal. Tie the other end to a flat object (e.g., popsicle stick, ruler, pencil, butter knife). You will hang the seed crystal by this flat object into the jar far enough so that it will be covered in liquid, but wont touch the bottom or sides of the jar. It may take a few tries to get the length just right.When you have the right string length, hang the seed crystal in the jar with the alum solution. Cover it with the coffee filter and gr ow a crystal! Grow your crystal until you are satisfied with its size. If you see crystals starting to grow on the sides or bottom of your jar, carefully remove your crystal, pour the liquid into the clean jar, and put the crystal in the new jar. Other crystals in the jar will compete with your crystal for alum, so it wont be able to get as big if you let these crystals grow. Crystal Growing Tips You can use sewing thread or other string instead of nylon fishing line, but crystals will grow on the entire length of the submerged string. Crystals dont adhere to nylon, so if you use it, you can get bigger and better crystals.Alum is an ingredient used to make pickles. It makes them crispy.