Friday, November 29, 2019

Managerial Prerogative Essay Example

Managerial Prerogative Essay There are still ongoing arguments on whether managerial prerogative should be practise by manager without any external interference from states, trade unions and employees. Human Resource Management (HRM), described by Boselie (2009) is using the human resources through high performance work practises which increase an organisation’s competitive advantage (p. 93). Boselie’s reference to high performance work practices indicated strong highly control through managerial prerogative. This paper stressed the importance of interventions from trade unions and state tribunals as supported by Nissan (as cited in Godfrey, Dale, Marchington Wilkinson, 1997, p. 3) that the consequences of allowing managerial prerogative on issues such as recruiting, selecting, training and development reduced teamwork commitment, loyalty to organisation, skilled employees The unitary theory (HRM) enforce managerial prerogative, one source of authority where decision makings should be done by management solely which employees have to obey the decisions management made. Trade union’s intervention (Bray Warring, 2006, p. 46) is considered as the inhibitor force due to the effect of collective bargaining on an organisation. On the contrary, Oakland (as cited in Godfrey, Dale, Marchington Wilkinson, 1997, p. 559) argued controlling others is not an effective approach. Pluralistic approach pointed out the need for interventions as conflicts are inevitable. There are always issues to be address and solve. This is where trade union’s step in when managerial control undermines employee rights. We will write a custom essay sample on Managerial Prerogative specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Managerial Prerogative specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Managerial Prerogative specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Trade union negotiates with management regarding the concerns voiced by employees. At times which management tend to neglect as they emphasised on efficiency and standardisation as well as profitability. There are several examples incorporated to illustrate the downside of practising the HRM approach. First off is Australia. The Howard Government â€Å"Workplace Relations Act 1996† has replaced Keating (Australian Labour Party) Government awards with enterprise agreements. The enterprise agreements encouraged individual bargaining contract agreements whereby increasing managerial prerogative. Bray Warring (2006) argued the righteousness of the individual contracts because different employees will then have different pay systems in regards to overtime or weekends or public holiday’s rates (p. 55). The question is whether employees have a choice to accept or reject the offer? Management has made unilaterally decision making when making that offer to employees. In result, teamwork is damaged consequentially of individual pay system Collective bargaining was reduced during that era. Beaumont Harris (1996, p. 392) agreed that HRM removes collective bargaining. Collective bargaining (Gardner Palmer, 1997) is the mutual agreement after trade union and management discussed and negotiated after issues such as remuneration and workplace environment. Barneveld and Nassir (2003, p. 29) pointed out that the individual contracts reduced labour costs as the centralised awards system were ignored. The inequality pay system caused an employee to have lower wage reduced more as compared to fellow colleagues with position and skills. A trade union as described by Perline and Poynter (1988, p. 28) is the solace to fight this inequality as the power of collectivism made their voices stronger in attempting to solve their issues. Therefore, bargaining experiences as Walton and McKersie (as cited in Beaumont Harris, 1996, p. 400) emphasised should be share for the benefits of employees. The shared bargaining experiences are the key towards creating effective teamwork beneficial for problem solving of all parties involved. Understandably, the current econom ic environment, all organisations have to manage effectively and efficiently at the same time using low cost inputs. In order to do this, an organisation has the choice to either hire skilled labour or machineries. Using hire skilled labours for example, in order to attract these people to work in that organisation, a manager (Tsui Wu, 2005) offers lucrative pay to attract the individuals to come and work with the selected organisation (p. 119). When these happen, manager will do further cost cutting through redundancies or wage cuts to accommodate the new recruitments. This short term requirements, Mabey (as cited in Baker, 1999, p. 54) do not strategically fit to HRM’s objective as the approach that oversees long term benefits. The key to attract and retain candidates are to avoid arbitrary treatment by management. The pluralistic approach helps employees to fight this arbitrary treatment. Rhetorically, if training is carried out, on the long term run, current employees will be more multi-skilled. Therefore, the redundancies and wage cuts can be avoided. Organisation does not need to increase labour wages as Goux Maurin (as cited in Grip Sieben, 1997) discovered that training has no real effect on workers’ wages (p. 2). A worker’s wage does not oversee any increment from the training when firm’s paid for it. Either the firm delivered on the job training or off the job training. In addition, the skills of the workers are not rewarded according to their relevance for the productivity of the firm. A worker’s computer skill may be advantageous towards firm’s productivity but nonetheless, a worker’s wage would not be given extra incentive just because he/she possess this particular skill. In other words, the unitarist approach in the organisation increased workers workloads. The downside of adopting this approach is that performance in workplace drop expressing weak psychologically commitment to the organisation. Secondly, loyalty to organisation is now replaced with a contract like economic exchange. In the end, management lose high performance and committed employees. In terms of health and safety issue, what happens when an employee refuse to work in hazardous work environment in fear of his/her personal safety? McDonald as all know is the biggest fast food employer with high labour turnover. Significantly, they are also overtly anti-union. There was a case where two youngsters, Tessa Lowinger and Jennifer Wiebe were exasperated with the unsafe working environment. Their repetitive consulting management on these problems fell on deaf ears. They joined a union because they believed on collectivism power is stronger compared to their individual consultation to management. However, when they were discovered joining a union, their wage was deduce to 25 cents an hour. HRM enforcement subjectively allows McDonald to ignore in ensuring employees safety and punished these two teenagers for joining a union and speaking up for better working environment (Featherstone, 2008, p. 4 5). The other disadvantage of HRM in terms of unfair dismissal can be shown through the case of Drapp and Nickens, former employees of McDonald (Featherstone, 2008, p. 5) who were dismissed because they organised strike. Ronnnmar (2006, p. 61) argued it is the breach of duty of obedience that allowed management to dismiss them based on â€Å"the employer’s right to direct and allocate work. † Yet, management was the one who failed to regulate the content of the obligation of work. Regulating the contract for management was proven to be difficult and economically inefficient to properly define the contract. Plus, it’s an â€Å"employer’s right to direct and allocate work and right of transfer,† disregarding employees sayings (Malmberg as cited in Ronnnmar, 2006, p. 64). Another party that intervene when dispute between management and trade union cannot be solve, by which both parties bring forth their case to state tribunals. It plays the regulatory tool (Peetz, 2005, p. 90) as it introduced legislation that all industries have to follow; keeping managerial prerogative under control. Gardner Palmers (1997) described the process of intervention where the first step is to coerce the defendant and plaintiff to try to come to terms into agreement. If failure to come to terms, arbitrator will make decision to settle the dispute. The decision of arbitrator will usually pass lawful code where it is mutually accepted by both parties (p. 189). Managerial prerogative can be exercise if there are cooperative communication between trade unions and management. Sirota et al. (as cited in Karnes, p. 196) corresponded â€Å"there is a strong positive relationship between employee morale and business success, as gauged by productivity, quality, sales, long-term stock market performance and many measures. Trust is the key to good employer – employee relationship (Tsui Wu, 2005; Hills, Madigan Scott as cited in Beaumont Harris, 1996). A business success is build up by the members (employees) in the organisation! Even machines require human labour to be operative. Another issue caused by managerial prerogative are inefficiency and decentralise decision making in an organisation (Kleiner and Bouillon, as cited in Schwoerer, May Ros en, 1995, p. 535). Nissan plant in Sunderland (Garrahan Stewart as cited in Graham, Dale, Marchington Wilkinson, 1997, p. 5) was supposedly practised empowerment yet employees pace were controlled by increas6ed workload with only short breaks to meet productivity targets. Productivity targets were met as management achieved cost effectiveness. Is this acceptable for employees where they were mislead on the truth? Implementing HRM is beneficial in the long run but only with employer and employees involvement in structuring those organisation’s plans/objectives. However, HRM requires a necessity of intervention from external parties to keep the managerial prerogative’s power exercise in an objective manner. Employees are motivated and be more innovative when they felt that manager or the organisation treat them decently and with respect. It is a matter of providing common framework, strategies that accommodate the knowledge of industrial relations and human resource management. To conclude this essay, it is simply a matter of trying to find the balance that satisfies all parties.

Monday, November 25, 2019

The Barbican Complex essays

The Barbican Complex essays In 1951 the City of London Corporation held a design competition for the building of a new community in the boundary area of central London. Geoffry Powell won this competition along with two other teachers from Kingston Peter Chamberlin and Christof Bon, who formed a partnership to execute the design. The competition received a lot of notoriety partly because of the emphasis on designing a big new residential project, mainly because this event marked the arrival of the planning ideas of Le Corbusier in England. This new project was called Barbican and sited on 42 acres of land. By that time the brutalist architecture HAD flourished in England, which originated from the modernist architectural movement. A typical example of this movement could be the Barbican complex, because it was a part of those buildings which were linear, fortress-like and blockish, often with a predominance of concrete construction. The Estate was a concrete mega structure, which did not appel to many people, as well as the style in which it had been built. That is why the complex gained its notoriety from. Barbican was built on a post-Second War blitzed wasteland by the architects Chamberlin, Powell and Bon, as I already mentioned. It is a masterpiece of asymmetrical, formal planning, built in reinforced concrete and hammered granite. Many may not see the beauty of its construction and open spaces, but it should receive acknowledgement, as it was constructed in difficult times with the purpose to re-populate the central part of London. The history of the complex is very interesting still. Planning began in 1956, but the actual work on it did not start until 1963 and it was finally finished in 1981. The building of the complex may have not been fast but the results are quite fascinating, from my point of view. As overall it is not the most interesting and good looking place, but it has got quite interesting interiors which I will mention in short. The Barb...

Thursday, November 21, 2019

Informative Explanatory Synthesis Green Power Assignment

Informative Explanatory Synthesis Green Power - Assignment Example The threat of environmental degradation can be significantly eradicated because nature has provided mankind with alternative sources of sustainable or renewable energy and the power to exercise discretion in policy making. There are several features of the environmental crisis, as a result of the burning of fuels. One of the features of burning fossil fuels is the release of an array of pollutants such as carbon dioxide and sulphur dioxide into the atmosphere. The crux of the matter is that carbon dioxide and sulphur dioxide are greenhouse gases which directly generate the Greenhouse Effect. While the Greenhouse Effect may be important in supporting life, the significant increase in the quantity of greenhouse gases causes global warming (an increase of temperature on the earth’s surface) (Gartland, 42). Again, since burning fossil fuels releases sulphur dioxide and carbon dioxide, it is clear that pulmonary and non-pulmonary diseases and health conditions are bound to ensue. Asthma is the commonest pulmonary disease which may emanate from the burning of fossil fuels. Conversely, burning petrol and diesel releases lead in the atmosphere, yet lead deters mental development. It is also important to note that burning fossil fuels in the environment brings about the cocktail effect. The cocktail effect refers to a situation whereby harmless gases combine with other gases in the atmosphere and become harmful. It is a fact that there are alternative sources of energy as has been envisioned by Lemonick, Friedman and Gore. Nuclear power, compressed natural gas, biomass, geothermal power, radiant energy, hydroelectricity, wind energy, solar power, wave and tidal power are some of these alternative sources and forms of energy. Compressed natural gas CNG) as a fossil fuel, is also considered as a viable alternative to diesel, gasoline and propane fuel. CNG is environmentally cleaner, safer (since it does not spill

Wednesday, November 20, 2019

Reading Summary Essay Example | Topics and Well Written Essays - 1500 words

Reading Summary - Essay Example It was thereby specifically identified that Thomas Cook had envisioned to take this remarkable opportunity to market visiting these battlefields in 1919, as advertised in the Traveller’s Gazette. As reported, two forms of travel were initially offered: (1) the first class luxury travel and (2) a more popular travel by motor car from Paris. Excerpts of descriptions of these battlefields were cited to provide the readers with the overview on how these were promoted through the Traveller’s Gazette. Facts were likewise provided in the rates for luxury travel, as well as scheduled departures for the battlefield tours during those times. Likewise, rates and schedules were also revealed for the popular travel tours which initially lasted for about one-week. Overall, the article was successful in indicating that even events related to deaths of loved ones through their bravery and courage in battlefields have been strategically capitalized to spur growth in tourism. Summary: â €Å"A New Way of Thinking About Tourism† The article entitled â€Å"A New Way of Thinking About Tourism† discussed the innovative point of view that classifies tourism as mobile and highly connected to people’s daily activities. ... The author rationalized that the focus on mobility naturally emerged with the onset of the telecommunications developments in recent times. The effect of the cited space-time compressions enabled immediate access to places and locations with speed that spans across distance in shorter time frames. As emphasized, readers were illumined on the possibility of thinking about tourism through a leisure mobility spectrum which was apparently described as a day’s activity could include visiting tourist spots, hotels, and other tourist events and be able to access or return to one’s domicile within a day’s frame. The thrust of tourism and mobility is to integrate and connect events usually associated with tourism to other social activities, which are seen as connected, rather than distinct, separate or distant. The recent developments in transport, technology, communications, and opportunities to span across borders of time and space were noted to be instrumental for the emergence of mobility in tourism. Summary: â€Å"Get Ahead: why travel and tourism is the sector to be in† Recent trends on the global market see the travel and tourism industry as one among those with vast growth potentials. In the article entitled â€Å"Get Ahead: why travel and tourism is the sector to be in† written by Jesse Whittock and published online in the Travel Trade Gazette on November 28, 2012. Sourcing the information from the chief executive of People 1st’s travel and tourism, hospitality and passenger travel sector skills council, Brian Wisdom, it was revealed that despite the economic gloom, this particular sector remains robust with statistics that back up the optimistic trend.

Monday, November 18, 2019

Organizational Innovation and Change - Critical Thinking Mod 4 Essay - 1

Organizational Innovation and Change - Critical Thinking Mod 4 - Essay Example Such concerns and reservations on the part of the employees must be resolved at the earliest as this is a grave issue which has cropped up at Perrier. One should believe that the key elements behind this resistance to change include the unionization of the employees. It does not sit well with Perrier and needs to be done away with at the earliest. It creates hurdle of sorts for Perrier which is simply an unacceptable proposition. Whether or not Nestle aims to join hands with Perrier, it should not be a concern of the employees who are working under the realms of the union (Trott, 2008). They are after all the loyal employees of Perrier and any lingering thoughts to be more dedicated towards the union itself are a step in the dark for them. Hence all-out consideration needs to be paid towards the unionized philosophy which is creating hurdles for Perrier. In fact, Perrier is self-reliant in its understanding as to how it must go ahead and form significant touch points with Nestle, which is essentially the world’s largest food company. Another key element why the employees are resisting changing is due to the fact that they w ould have to face more stringent policies that Nestle shall bring with it. It would mean that the employees would find it hard to live up to the expectations of Nestle, which is indeed a much sought after name (Saunders, Lewis and Thornhill, 2007). Perrier, on the other hand would not impose similar issues for the employees and the joyride would sustain even in the future as it is being carried out at the present. A change management strategy for Perrier would be devised keeping in mind the adherence of employees towards the unions and how they are actually resisting to the philosophy of change in essence. This is a grave aspect that needs much consideration on the part of the employees, without which there would be

Saturday, November 16, 2019

The More Effective Leader: Hitler Or Stalin?

The More Effective Leader: Hitler Or Stalin? Introduction In a sense, a certain analogy appears to be between Adolf Hitler and Joseph Stalin. It is vital to recognize that these two dictators of the twentieth century represented embodiments of modern evil. Both leaders possessed almost absolute power due to their unprecedented level of repression and attempted manipulation and indoctrination. Each of these dictators was drifted by revolutionary and controversial monopolistic set of dogmatic principles about the internal systemization of society and the leading power of history. Although Hitler and Stalin shared some clear parallelisms, their personalities, the effectiveness of leadership and specific regimes were fairly distinct rather than similar. The first part of this essay will concentrate on the analysis of various historiographical interpretations, focusing on the intentionalist view, to critically assess the effectiveness of Hitlers leadership qualities in particular. Secondly, the essay will focus on the comparison of some distinct aspects of Hitler and Stalins dictatorships in order to examine the importance of power hierarchy in both their regimes. It will be argued that both leaders had different styles of leadership that played very important part in moulding of their authorities and leading power. Furthermore, the essay will evaluate some principal tools of power such as the cult of personality, the powerful machine of propaganda, the use of terror and the development of pivotal economic policies, in order to provide a compact framework of Hitlers leadership potential capabilities. It will be highlighted that Stalin counted far too much upon mass terror therefore he was unable to maintain an efficient mechanism of leadership. Lastly, the essay will conclude by connecting the analysis of Hitlers dictatorship to the current debate between historical scholars, therefore the central argument will be proved that Hitler personified more competent and constructive leader compared to Stalin.* *The purpose of this essay is not to establish the fact that Hitler was, to a certain extent, a leading giant or a failure. It is meant to assess a man and the various facets of successful leadership he applied during his domination in the Third Reich that makes him more effective leader in comparison with Stalins abilities and intentions. The Analysis of Historiographical Interpretations of Hitlers Leadership It is indispensable to realize that several historical schools of thought (the Functionalist/ Structuralist and the Intentionalist school) have tried to account for their own arguments and interpretations of Hitlers dictatorship abilities. Lets look at the major points of each historiographical perspective in order to analyze Hitler as more effective leader in comparison with Stalin; and evaluate the relevance of Kershaws theory of Working Towards the Fuhrer in terms of Hitlers role in the Third Reich. Advocates of the Functionalist view, such as Martin Broszat and Hans Mommsen, largely concentrate on the interpretation of systematization of Hitlers Nazi Germany and on his leadership qualities and charisma which played an essential role in strengthening Hitlers leading effectiveness. According to Broszat, Nazi Germany represented a chaotic tangle of conflicting institutions and bureaucracies therefore the figure of Adolf Hitler was not a key driving force behind the dynamics and organization of Hitlers Germany (Broszat, 1981: p. 262). It can be argued that Hitler as a leader did not solely dominate to the Third Reich because there were constant power struggles initiated by several institutions. Furthermore, in Broszats perspective, Hitler epitomized a weak dictator because the Third Reich signified a dualistic state where Nazi Party operated simultaneously with the normal institutions of Nazi state (Broszat, 1981: p. 244). Broszat advocated that behind a faà §ade of Nazi integrity , there were perpetual struggles for power between the revolutionary Nazi institutions, such as SA and SS, and the traditional authority of German state. According to Broszats opinion, Hitlers leadership style enabled Nazi state to emerge as a collection of competing power units which triggered the radical forces to penetrate into German society (Kershaw, 2000: p. 75). Certainly Hitler undermined orderly government in Germany by his habit of appointing several people to practically the same job, resulting in official competing for Hitlers favour. The Intentionalist historiography is embedded in the concept of Social Darwinism, therefore according to this view Hitler was depicted as a fanatical and extreme ideologist who was incessantly avid for nationalism, militarism, the importance of lebensraum and anti-Semitism. It is worth noting that there is a certain parallel between the Nazi bureaucratic machinery and Darwinian Theory of competition in terms of power struggle. In a certain way, Hitler as a leader represented the fittest element of the Nazi Party, relying on his personal appeal. Hitler was essentially responsible for the increasing momentum of radicalization. In Allan Bullocks view, he was very strong and artful leader, creating uncertainty, confusion and tension among his adherents in order to secure his leading post. Therefore, it is evident that Hitlers intention was to provoke unchecked struggle and competition until the natural selection and the survival of the fittest would have occurred (Kershaw Lewin, 1997: p. 96). To a certain extent, a highly regarded scholar Ian Kershaw inclined to endorse the interpretation of Functionalist/Structuralist school regarding Hitlers leadership qualities. On one hand, Kershaw does not associate himself with the thesis that Hitler was a weak dictator and therefore played an unimportant role in the Third Reich. On the other hand, Kershaw had advocated the idea that Hitler was completely uninvolved in the daily administrative work (Kershaw, 1998: p. 529). It is necessary to point out that Kershaw considered Hitler to be a lazy dictator who was highly inconsistent, indecisive and did not engage in the everyday direction of Germany (Kershaw, 1998: p. 533). However, other structuralist champions, such Mason, maintained that Hitler was predominantly involved in the leading of his interests: military decision-making and planning of foreign policy (Kershaw, 1998: p. 532). It might be argued that Hitlers clear focus enhanced his untouchable leading status and veiled him i n the mystery. Moreover, Kershaw argued that the actual importance of Hitler was mainly based on the perception of Germans people of Hitlers personality and not just on the character of his dictatorship.1 _______________________________________________________ 1 It is vital to recognize that some historians agreed that Hitlers effective leadership aimed to arrange his power that would enable him continuously to educate the people in the spirit of his mission by means (in his words) the total domination of every individual (Cassinelli, 1976: p 63). Nazism and Stalinism: The Comparison of Leadership Styles Æ’Â   Ideology The main contrast between the Stalinism and Nazism was that both regimes arose from completely different types of societies traditions. Russias lack of culture, traditions and illiteracy meant that Stalin had very limited possibilities to accomplish his large tasks, such as transform the whole society from bourgeois system to socialist community. The Nazi ideology was shaped Given that Hitler was allergic to any restriction to his power, he had no clear-cut effort to form the administrative anarchy of the Third Reich. It is essential to emphasize that Hitler is characterized by the unbureaucratic style of leadership mainly because he remained quite aloof from the daily business and government and distanced himself from the intricate situations. Although his style of leadership appears to be, to some extent, limited, Hitler predominantly focused on the realm of his personal interests, such as foreign policy and military affairs. It can be argued, that this unbureaucratic style emphasized Hitlers personality, an inescapable product of the deification of the leadership position itself (Kershaw, Ian, 1997: p. 99). It can be purported that Hitler did not want to concern himself with the administration to sustain prestige to match the created image (Kershaw, 1997: p. 100). According to Marx Webers classic study of the authority of power, the quality of Hitlers charisma consists in his apparent possession of supernatural or superhuman or at all events specifically out of the ordinary qualities, which make him appear an emissary of God, or a destined Leader (Schapiro, 1972: p. 21). By contrast, Stalin personified very interventionist dictator whose main objective was to established the centralization of state power in order to eliminate the party-state dualism (Kershaw Lewin, 1997: p. 91) but also to create a monopolization of all decision-making, in relation to economic reconstruction, to open up a giant bureaucratization of all aspects of life. He intended to intentionally provoke instability in the governmental apparatus and society to implement his unpopular policies by the full command of modern means of control and administration [EVIDENCE]. Stalins power was, therefore, described as bureaucratic authority (Kershaw Lewin, 1997: p. 98) hence his influence in daily administration was far-reaching and cross-sectional. This fact suggests that Hitler largely relied on his charismatic impression to coordinate the states apparatus and gain a public support for his policies and actions, therefore it might be argued that Hitler was more effective leader in strengt hening his support and forming a new and higher kind of man by a process that involved the remolding of mens psychologies than Stalin (Cassinelli, 1976: p. 63). However, Stalin was able to transform illiterate and backward masses of Russians into obedient and simple-minded people. He relied on the masses that have a certain purity and naivetà © enabling them to understand the essence of significant situations. [2] _______________________________________________________ [2] As Stalin said, Simple people sometimes prove to be far nearer to the truth than some highly placed institutions. (Cassinelli, 1976: p. 89) ***Joseph Stalin declared: Can such a radical transformation of the old bourgeois system of society be achieved without a violent revolution, without the dictatorship of the proletariat? (Cassinelli, 1976: p. 77) The Effectiveness of Hitlers Leadership There is no doubt that Hitler and Stalins regimes shared some similar characteristics, nevertheless the main argument of this essay is based on fact that Hitler represented more effective and visionary leader compared to Stalin in terms of the cult of personality, propaganda, the use of terror and economic strategies several significant ways compared to Stalin. Therefore it is quite substantial to take into account the extent to which these major factors contributed to the effectiveness of Hitlers leadership. In essence, both Stalin and Hitler applied their power in different manner, however they shared a common ground regarding to implementation of their power. Evidence I: The Cult of Personality One of the principal factor, that significantly contributed to Hitlers effective leadership, was his sophisticated cult of personality. [3] Hitler was regarded as the personification of the nation and the unity of the national community therefore he primarily established his mastery on a cultivated principle of personal loyalty to which he could always successfully appeal at moments of crisis (Kershaw, 1997: p. 93). It must be noted that the principal reason for Hitlers domination of all who assisted him was an extraordinary power of his individuality. Hitler radiated confidence, high self-esteem and strong belief in his ability; it made him extremely powerful and everyone was frightened by his aura of total assuredness (Cassinelli, 1976: p. 73) thus he could stir up emotions and hypnotize the broad spectrum of German society. Hitlers main characteristic features were his skills to achieve an extraordinary power over the German people and ability to accomplish his political objective s. In large measure, his power to grip an attention and public admiration was especially due to his exceptional oratorical talent. [4] Hitler used his speeches as a powerful tool of political intoxication that inspired a degree of fervor in his listeners that seems to defy definition and explanation (De Luca, 1983: p. 96-7). Therefore it can be argued that Hitlers leadership uniqueness stemmed from his geniality to effectively use spoken word in order to manipulate mass propaganda for his own benefit. In Hitlers view, words build bridges into unexplored regions (Bullock, 1962: p. 372). The key aspect of this argument is that his uncanny ability to appeal to the subconscious and irrational needs of his audience and to solicit the desired response made him a formidable political figure (De Luca, 1983: p. 96-7). Furthermore, Hitler, in contrast to Stalin, was able to add the authority of spiritual founder of national socialism to that of party leader. _______________________________________________________ [3] Charismatic rule has long been neglected and ridiculed, but apparently it has deep roots and becomes a powerful stimulus once the proper psychological and social doubt that millions believe in it (Neumann, 1942: p. 75). Both the Stalinist and the Nazi regimes signified a new genre of political system that concentrated the artificial concept of a leadership cult the heroic myth of the great leader, who represented a man of the people and no more super-ordinate monarch who was distant to the masses. However, in Moshe Lewins view, the rapid pace of centralization in Stalins leadership resulted in rapid growth of officialdom; hence, it might be said that the cult of Stalin was replaced by the cult of the state (Kershaw Lewin, 1997: p. 11) hence Stalin predominantly concentrated on reinforcing his authority in order to be seen as autocratic and retain. [5] It is necessary to emphasize that Stalins rise to power was from within the Soviet Union consequently he shared public glorification with former icons such as Vladimir Lenin and Karl Marx. The crucial aspect of this argument is that Stalin and his communist ideology could be detached therefore when Stalin died the similar cult of personality never evo lved around his successor but the Soviet communism preserved. It is worth noting that unlike Stalin, Hitler became a permanent image of Nazism. The Fuhrer principle, in essence, rooted in Hitler formulated the Nazis system of governance. [6] megalomaniac ambitions _______________________________________________________ [4] Walter Langer depicts Hitler as a showman with a great sense for the dramatic. However he provides very clear characterization of Hitlers captivating rallies: Not only did [Hitler] he schedule his speeches late in the evening when his audience would be tired and their resistance lowered through natural causes, but would always send an assistant ahead of time to make a short speech warm up the audience. Strom troops always played an important role at these meetings and would line the aisle through which he would pass. At the psychological moment, Hitler would appear in the door at the back of the hall. Then with a small group behind him, he would march through the rows of S.A. men to reach the speakers table. He never glanced to the right or to the left as he came down the aisle and became greatly annoyed if anyone tried to accost him or hampered his progress. Whenever possible he would have a band present, and would strike up a lively military march as he came down the aisle (Lan ger, 1972: p. 46). [5] To a certain extent, a Cult of Stalin Worship developed from a sense of paranoia because he wanted people to deify him and if he had to accomplish it though brutal means then he was prepared to do so. [6] Moreover, it might be said that the loyal adulation of Hitler signified the most effective political instrument of power in Nazi Germany, therefore there was no reliance and dependence on massive domestic constrain that was typical feature for Stalins rule. Evidence II: Propaganda Æ’Â   controlling every single aspect of daily-life Æ’Â   parades and marches provided a sense of order and gave a feeling of belonging. So that the unity between the people was very firm. Æ’Â  youth indoctrination The second key factor strengthening the effectiveness of Hitlers power was the Nazi propaganda that played very substantial role in the setting of totalitarian society. In essence, the primary objective of Hitlers propaganda was not the ideological enlightenment of the masses, but their mobilization for action through extensive spreading of ideas and symbols aimed at influencing opinion and attitude of wide range of people. For Hitler, propaganda was the sharpest weapon in conquering the state, and remains the sharpest weapon in maintaining and building up the state (Hinton Hite, 2000: p. 244). It can be affirmed that every propaganda was the preparation of political activities (Unger, 1974:p. 35). Hitlers effectiveness to indoctrinate society might be seen in fact that the high cultural level of the Germans allowed the Nazis to extensively apply the technical potentialities of modern propaganda as far as possible; therefore Nazis propagandist intended to develop the manipulation of words and symbols into the highest creative art (Unger, 1974: p. 47). [EVIDENCE Æ’Â   Unger p. 43] [7] In some way, this propaganda had also considerable success in strengthening overall support for Hitler and the regime, by reinforcing enthusiasm for a strong leader who was capable of making Germany economically and military powerful. For instance, the Nuremberg rallies brought some excitement into peoples lives and gave them a sense of belonging to a great movement. [EVIDENCE Æ’Â   DATA, STATISTICS World History] In contrast, Stalins propaganda contended with the lack of technical skills and the virtues of labour disciple therefore the effectiveness of propaganda was very limited. Due to the lack of modern mass media in the Soviet Union, a large illiterate masses (especially peasantries), were only indoctrinated by oral agitation which was hardly disseminate across large distances. There were no cultural and informational media which cemented the framework of modern society, therefore the Soviet propaganda was full of stereotyped monotony of Stalins declarative and simplistic slogans convincing the Russians about Stalins greatness and invincibility. In other words, Soviet propaganda had to be adapted to the capacity of the least intelligent and constant repetition was one of its main weapons (Unger, 1974: p. 46). Æ’Â   forcible collectivization of agriculture led to a direct clash between Stalins regime and the majority of the population therefore the rapid mobilization /////In Conquests view, the alienation distinctly increased before the wartime since many Russians started to hate Stalin for the misery he triggered; therefore it led to gradual decline in morale and discipline (Conquest, 1991: p. ). In case of Stalin, the propaganda tool was used to a limited extent and often in a wrong way. It is essential to mention that the widespread fear between the Russian population resulted in limited ability to believe Stalins promises and slogans. EVIDENCE !!!!!! ////Æ’Â  Additionally, it is vital to perceive that Hitlers leading effectiveness was mainly achieved by remarkable Nazi propaganda that enhance the popularity of policies that were genuinely popular, for instance, public works projects (autobahn) or the 1933 Farm Law assuring subsidies for farms. Whereas Stalins propaganda was directed at forming a measure of acceptance for politics that were quite undesirable, such as compulsory collectivization and rapid industrialization. [FOOTNOTES Æ’Â   EVIDENCE!!!!!] Unger Citation!!! _______________________________________________________ [7] According to historian Dick Geary, the Nazi propaganda was most successful: where it could play upon the traditional German prejudices and values of German middle-class society upon issues such as nationalism, anti-socialism, family issuesà ¢Ã¢â€š ¬Ã‚ ¦ (Geary, 1993: p. 59). [8] Evidence III: The Use of Terror and Violence The third crucial element related to Hitlers effective leadership is the use of terror and violence. Terroristic aspect of the two regimes appears to be very significant in order to compare the leadership qualities of Adolf Hitler and Joseph Stalin. Hitler seems to have had no deliberate policy of destabilization. In a sense, he tried to protect his deified leadership position by his non-bureaucratic and non-interventionist governance because he did not want to lose a popularity by deciding some unpopular policies. Furthermore, Hitler did not rule internally by terror even so his regime was deeply authoritarian and disciplinary. This means that his effectiveness based on the ability to maintain a supporting base of Nazi members in order to strengthen his own position but also to stabilize the party apparatus. However, with the exception of his purge of the Storm Trooper leadership on the Night of the Long Knives in 1934, Hitler never triggered a systematic attack on members of his ow n regime. However, It is important to note that Hitler never initiated an organized terror on members of his regime. It is significant to highlight that Hitler had his leadership position technically more secure than Stalin. On the other hand, Stalin personified the creature of bureaucracy therefore he appeared intentionally to destabilize government to turn this to his advantage; in the mid-1930s Stalin mainly instigated the liquidation of the kulaks as a class and great purges against his closest supporters in order to eliminate all challenges to his absolutistic rule but also he used the brutality of collectivization to infected the whole political system with the lust for blood and any criticism came to be identified with the sabotage of class enemies (Sakwa, 1998: p. 40). To a considerable extent, Stalins purges and the extensive use of terror and violence undermined the stability of his position and intensify his opposition within the Party sector (Kershaw, 1997: p. 93). However, it might be said that the use of purges represented a kind of weapon against the unstoppable power and expansion of Stalinist bureaucracy which seemed to malfunction. Also Stalins paranoid mentality resulted in unprecedent ed brutality used as an instrument for applying and implementing his policies and terrorizing his followers and Soviet citizens. Therefore he used purges and the Show Trials to remove Old Bolshevik rivals like Zinoniev and Kamenev, in order to destroy their reputation, so that he alone could take the credit for the Communist Partys achievements. Additionally, Steve Rosefielde argues that in the years 1929-38, the average Gulag forced labour population was about 8.8 million, and that the total adult losses attributable to forced labour, collectivization and the purges was over 20 million (Sakwa, 1998: p. 41). This, in fact, resulted in a greater alienation of masses and sustained the Soviet peoples sense of anxiety and feeling of helplessness thus they responded to Stalins force by self-control and dissimulation (Cassinelli, 1976: p. 129). Furthermore, the Purges disruptive effects were felt in the development of industry where the destruction of qualified engineers and managers seri ously undermined the Second Five Year Plan and accounts for Stalins reduction in the scale of the purges in 1939. Nonetheless the destructive policies penetrated through Stalins autocracy and the Soviet people felt perpetually insecure therefore this led to escalation of opposition between the Soviet citizens which had weakening effect on Stalins power. Evidence IV: The Major Economic Policies Another important factor that reflects Hitlers effective leadership is the series of economic policies implemented in 1930s. The main success of Hitlers economic recovery based on the total elimination of unemployment and on stabilization of German economy and progress towards an economy that would prepare Germany for war. For instance, Dr. Schacht organized Germanys finances to fund a huge programme of work creation; the increase in government spending (from RM 8.6 billion in 1932 to RM 29.3 billion by 1938) resulted in schemes to build a network of autobahns or conservation programmes. Moreover, Hitler concentrated on need to gear the economy for war It is important to highlight that Hitler was aware that he needed the support of the German people and could not risk to exacerbate their living standards at the cost of military supremacy. In 1930s, Hitler developed managed economy in Nazi Germany and in 1936 he focused on the Four Year Plan Æ’Â   autobahn completed, industry rebuilt, farmers: Blood and Soil, Workers: Strength Through Joy Æ’Â   Germany was a great economic power Stalin Æ’Â   unsuccessful FYPs collectivization and industrialization still backward- inability to catch up the West!! On the other hand, it might be argued that Stalins economic policies had only moderate short-term success. established the command economy [*9*] in the Soviet Union, clearly without this economic concept USSR would not survived. However, Stalins Five Year Plans were followed by forcible collectivization of the peasantry in order to erase all traces of capitalism and transform Soviet Union into fully industrialized, self-sufficient and completely socialist state without regard to cost. It is significant to point out that the effort to fulfill overambitious plans and resistance to collectivization led to acute shortage throughout the economy. It can be argued that despite the Stalin The top priority was investment in heavy industry which was view as the key to rapid economic growth and as an essential guarantee of national security. The acceleration continued through the Second Five Year Plan and extended into consumer goods. Against a background of a political purges and partial wartime mobilization, the pace of industrial growth slackened in the three years of the Third Five Year Plan, and such growth as took place may be attributed to territorial expansion. (p. 152-3) Falsification Æ’Â   It is vital to point out that Stalins leadership proved to be inefficient in terms of improving the Russian economy in the long run and great human expense. According to Isaac Deutscher, Stalins All-out Drive revolution from above appeared to be unsuccessful attempt to stimulate the production and increase the output because it lacked all rules of logic and principles of economies which were turned upside down (Cassinelli, 1976: p. 117). It is important to realize that Stalins economic policies were aimed at satisfying his own ideology rather than for benefit of people. This clearly supports the initial claim that Stalin was less effective leader than Hitler. _______________________________________________________ [*9*] Soviet planned or command economy was a type of economy in which centralized, bureaucratic management of economy, GOSPLAN, made a wide range of decisions penetrating to production and wages. Basically, the key objectives of centrally planned economy were to build socialism as quickly as possible and centralize the decision making and control. [10] In 1932, the number of unemployed in Germany was 5.6 million, however in 1938 there were only 0.2 unemployed in Nazi Germany. [EVIDENCE] Debate: Intentionalist view and Hitlers Effective Leadership Qualities Intentionalist view Æ’Â   Hitlers leadership domination and effectiveness was apparent in connection with [***]Hitlers dictatorship presented very extreme and intensive totalitarian demands of modern state, such as unexpected degree of violence and oppression, unprecedented manipulation of mass media to gain control and mobilize the masses, an unaccustomed cynicism in the international relations, an extraordinary aggression of nationalism and pestilent power of ideological racial superiority. Additionally, this specific dictatorship demonstrated that the modern, advanced and cultural society could fall headlong into barbarism. Indeed, Hitlers form of dictatorship meant the collapse of the modern civilization. On the other hand, Stalin personified a type of leader who focused on the continuity of Leninist tradition. By contrast, Stalin used hostility and terror as a normal feature of government when the USSR was in peace. His dictatorship resulted in creation of a personality cult of monstrous proportions but he never achieved a popular acceptance for his policies as Hitler did. ******It is vital to highlight that Hitler was more effective leader in terms of his cult of personality, propaganda and social and economic policies to 1941. This year represented a key turning point in Hitlers power and effectivity. Hitlers clash with Stalin indicated that the existing distribution of powerfulness was no longer able to outlast. It is very interesting to see the rapid transformation of power from Hitler to Stalin. Therefore it may be argued that, from the chronological perspective, Hitler was able to keep his authority at the highest position so his leadership skills were clearly better than Stalins abilities. Conclusion In conclusion, although Hitler signified a leader of one of the purest autocracies, there were some limits to his power, but it is essential to point out that these limits did not result from imperfections in his machinery of power but mainly from the context within which Hitler has to operate. However, Hitlers success might be apparent in regard to popular acceptance of his policies but also most Germans appreciated the sense of national community which was constantly instilled into them by Hitler. Furthermore, Hitlers long-lasting interest for the material-well being and social standing gave his regime a popular legitimacy that was one of the greatest success to his power. Security Management: Instant Messaging Perspective Security Management: Instant Messaging Perspective Executive Summary Nowadays, Instant messaging (IM) is used in the corporate environment which is rising rapidly, as organizations welcome to accept IM as a business communications tool. IM promotes cooperation and real-time communication among employees, business partners, and customers. It also brings new threats to local area network security and makes organizations to have a potential risks when employees share illegal or inappropriate content over the internet. Organizations are also faced with reduced employee productivity when IM is used arbitrarily and for personal communications. When use of IM is unmonitored and uncontrolled, it can lead to a significant drain on IT resources, as the IT staff attempt to identify which IM applications are being used and by whom. Moreover, when instant messaging is used to send and receive files, not only can the resulting drain on bandwidth negatively impact network performance, but the files themselves can pose a serious security threat. This report provides information to better understand threats of IM and mitigate its impact to business. The threats of IM are investigated. The trend in growing targets and number of cases are related to IM threats are analyzed. The impacts to business are assessed to identify areas of security management require great concern. Finally, measures are introduced to improve security management such that IM threats become manageable and their impact is reduced. 1. Introduction Today, Instant Messaging (IM) applications have rapidly become accepted by businesses as viable employee communications tools. IM is more instant than email, obviously easy-to-use, and provides the real-time collaboration organizations need to ensure quick judgments and decisions. Using Instant Messaging, organizations and their business partners can make a conference, share files and information easily over the Internet. Furthermore, within the organization, IM conversations among project team members can resolve issues and questions in an instantsomething that might have taken a series of emails, telephone calls, or face-to-face meetings to carry out. IM can be used to provide immediate replies to requests. It can also help promote personal relationships with customers and remote employees, and assist customers in completing transactions with Web-based businesses. This report is shown the concern of security of IM and gives some countermeasure to deal with IM threats. 2. Findings and Analysis 2.1 What threats are related to Instant Messaging? l   Worms A worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do without any user participation. In case of instant messaging, antivirus software does not currently monitor traffic at OSI Model-network layer. If a worm starts to spread via instant messaging, it cannot be stopped before it reached the remotes computer. Dissimilar a virus, it does not need to attach itself to an existing application or program. Worm almost always causes damage to the network when it drains the network bandwidth. On the contrary, virus almost always corrupt or modify files on a targeted computer. The number of instant messaging worms is rising steadily. This is made clear when one considers the list of recent IM worms: n dubbed Pykse.A (16 April 2007) n W32/Rbot-GRS (26 June 2007) However, a few antivirus applications can plug in to instant messaging clients for scanning files when they are received. The lack of applications scanning instant messaging network traffic is partly due to the difficulty in monitoring instant messaging traffic so that the antivirus product running at the desktop level can catch the worms. l Backdoor Trojan Horses Instant messaging clients allow peer-to-peer file sharing, the instant messaging client to share all files on the system with full access to everyone can be configured by a Trojan Horse and in this way gain backdoor access to the computer. Moreover, the victim computer is on-line; a notification will be send to hacker automatically. So hacker can keeps track and accesses the infected computer easily. Besides, the hacker does not need to open new suspicious ports for communication in that hacker can instead use already open instant messaging ports. Classic backdoor trojans open an outgoing listening port on the computer, forming a connection with a remote machine. If the trojan operates via the instant messaging client, it does not open a new port as the user has usually already created an allow rule for instant messaging traffic to be outbound from their machine, therefore, allowing the backdoor trojan horse using the same channel to go unblocked. l Hijacking and Impersonation Users can be impersonated in many different ways by hacker. The most frequently used attack is solely stealing the account information of an unsuspecting user using the instant messaging or IRC application. Hacker can execute a password-stealing trojan horse to obtain the account information of a user. If the password for the instant messaging client is saved on the computer, the hacker could send a trojan to an unsuspecting user. When trojan executed, it would find the password for the instant messaging account used by the victim and send it back to the hacker. l Denial of Service Instant messaging may lead a computer vulnerable to denial of service (DoS) attacks. These attacks may have different outcomes: A lot of DoS attacks make the instant messaging client crash, hang, and in some cases consume a large amount of computer processing power and causing the entire computer to become unstable. There are many ways in which a hacker can cause a denial of service on an instant messenger client. Furthermore, they are used to combine with other attacks, such as the hijacking of a connection and form a bot network to attack other servers. l Unauthorized Disclosure of Information Information disclosure could occur without the use of a trojan horse. Once the data that is being transmitted via the instant messaging network is not encrypted, a network sniffer can sniff data on most types of networks and can be used to capture the instant messaging traffic. Also, a hacker could sniff the packets from an entire instant messaging session. It can be very dangerous as hacker may gain access to privileged information. It is especially dangerous in the corporate environment in that confidential information may be transmitted along the instant messaging network. 2.2 Recent Incidents Case 1: New IM worm targets Skype users (Published date: 17 Apr 2007) Affected: The IM worm affects Skype users running Windows. Threat Type: Worm Description: A new instant-messaging pest that spreads using the chat feature in Skype has surfaced, security firm F-Secure warned. The worm, dubbed Pykse.A, is similar to threats that affect instant-messaging applications. A targeted Skype user will receive a chat message with text and a Web link that looks like it goes to a JPEG file on a Web site, F-Secure said on its Web site. Clicking the link will redirect the user to a malicious file. The file, after executing, will send a malicious link to all online contacts in a Skype users list and will show a picture of a scantily clad woman, F-Secure said. In addition, it sets the users Skype status message to Do Not Disturb, the security firm said. Pykse also visits a number of Web sites that dont host any malicious code and a site that appears to count infected machines, F-Secure said. The Finnish security company doesnt list any particular malicious payload for Pykse other than it spreading and visiting Web sites. Status: Skype also recommends using antivirus software to check the files received from other people. Case 2: Next-generation Skype Trojan hits web (Published date: 26 Mar 2007) Affected: Warezov Trojan horse to target Skype users. Threat Type: Trojan Horse Description: Miscreants have again adapted the Warezov Trojan horse to target Skype users. The attack is similar to threats that target instant-messaging applications. A targeted Skype user will receive a chat message with the text Check up this and a link to a malicious executable called file_01.exe on a website. Once infected, a computer will be at the beck and call of the attacker and the Trojan horse will start sending messages to the victims Skype contacts to propagate. Status: Skype warned users against opening the malicious file, take caution in general when opening attachments, and also recommends using antivirus software to check incoming files. Case 3: AIM bot creates fight combos to spread (Published date: 18 Sep 2006) Affected: Online attackers have created an instant-messaging bot program for AOL instant messaging that chains together a number of executable files, similar to the combination moves in fight games. Threat type: Worm and Bot Description: The software, dubbed the AIM Pipeline worm, uses modular executable files to infect machines with different functionality but also to make the bot networks growth more robust: if a Web site hosting one of the components gets shutdown, the other pieces of the worm can still spread. Status: America Online has blocked the URLs used in the messages sent by the AIM Pipeline worm. 2.3 Trends l Increase in IM threats IM Security Center researchers tracked 33 malicious code attacks over IM networks during the month of September, bringing the 2007 total to 297. This is a 20% increase in IM threats compared with the same time period last year. (SAN DIEGO Akonix Systems, Inc 2007) Research also indicates that there are more targets affected by IM threats (SANS Institute 2006) l New type of IM worms New IM worms identified include Agent-GCG, Ataxbot, Exploit-VcardGadget, Focelto, MSNFunny, IMBot, MsnSend, MSN-WhoBlocked, Neeris, Pykse, Skipi, STRATION and Yalove. IRCBot was the most common with four variants, followed by Imaut and Neeris with two, respectively. Akonix tracked 16 attacks on P2P networks, such as Kazaa and eDonkey (SAN DIEGO Akonix Systems, Inc) l Evolution of IM threats The vulnerability of IM are used in botnet communication and spread the bot and worms to another computers. When the hacker send the command to botnet army, the consequence of attacks is very serious. Unlike other attacks, botnet can comprised of thousands of computer power to perform a variety of attacks against a wide range target. For example, the botmaster can command each zombie participant in a botnet to launch spamming e-mails to steal the credit card information and launch Distributed Denial-of-Service (DDoS) attacks simultaneously against the thousands of computer. 2.4 Factors for growth of IM threats The growth of instant messaging usage within the organization, vulnerabilities in public IM networks occur during the process of transferring files. When a user transfers files or uses other IM features like file sharing or voice chat, users IP address is revealed. Using this IP address, hackers can have ability to attack the system. Some organizations configure their firewalls to block ports used by IM applications or block the external addresses of IM network servers. But IM applications can be configured to change ports automatically and are capable of penetrating firewalls through ports used by other applications. (For example: port 80). So policy control management is required. 3. Impact to Business Once the IM threats occur in the organizations, they face a significant security risk from disclosure of intellectual property or business-critical information using IMs file attachment capability. As IM is a highly informal means of communication, employees can unintentionally send critical company-confidential information, such as product specifications, code, and blueprints, or private customer data, to friends, colleagues, and competitors. There are three main concerns of using the IM which are identified. l Legal Liability concerns The danger of allowing employees to use IM at work under lacking of security management, the viruses and worms is very easy to expose. On the other hand, organizations face legal and compliance risks when employees share copyrighted, illegal, or inappropriate content via instant messaging. Unmonitored IM applications allow employees to openly transfer files and information that could lead to significant corporate liability. For example, transferring copyrighted MP3 files, movies, and software using IM is common among friends and bypasses the file size restrictions of email. l Employee productivity loss Many employees have already adopted IM which they prefer that IM is regarded as the personal connection with friends of family, because it has not used the telephone to be obvious, talking cant be eavesdropped. Employees can seem it is work, in their keyboard is typed and left, been exchanging the personal connection with friends of family all the time. l IT resource abuse Most organizations dont know what kind of IM should be installed on computer, which employees should use the IM and how often to use IM for business communication such as send, receive files, video conferencing. In addition, it is not uncommon for intensive file sharing over the IM that can influence the performance of the network. 4. Dealing with Instant Messaging threats IM threats can be operated by insider (employees) and outsider (hacker). According to the Figure 4-1, Operational-level employees want to increase their ability to override controls mechanisms base on some factors such as fear of lose their job whereas the top level-manger want to have control mechanism to monitor all harmful activity in the organization. However, top level-mangers always neglect the risk of middle-level managers whose have part of administrative power to act as insider. So that good security management must be executed in the organization to avoid or mitigate the insider and outsider activities. Consequently, prevention, detection, incident response and controls are good measures for security management. 4.1 Prevention Ensure that vendor patches are promptly applied to instant messaging software, interrelated applications, and the underlying operating system. Firewalls to separate all DMZs, internal networks and external un-trusted networks Monitor using an Intrusion Detection/ Prevention system for users. Create secure communications channel when using instant messaging with trusted business partners Do not rely on external IM servers for internal use of instant messaging. Install and use anti-virus and anti-spyware applications. Consider disposing the clear products designed for instant messaging safely. Some product like as Trend Micro IM Security for Microsoft Office and Symantec IM Manager 2007 seamlessly manages can be used for mitigation of the potential risks associated in that they acts a filter and detector between internal and external. Using Multi-factors authentication or biometric authentication to prevent the hacker to login the target computers. 4.2 Detection Monitor and detect using an Intrusion Detection for users creating tunnels for instant messaging. An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. Enable the auto detect mode of updated antivirus and anti-spyware products for client computer. Filter all http traffic through an authenticating proxy server or firewall to provide additional capabilities of filtering or monitoring instant messaging traffic. Appropriately configure intrusion detection systems. Understand that many instant messaging applications are capable of enabling associated communications to masquerade as otherwise allowed traffic (e.g. http). 4.3 Incident Response Block popular instant messaging ports. Block access to known public instant messaging servers that have not been explicitly authorized. Virus-scanning software at all critical entry points such as firewalls, remote access server, e-mail servers etc. Ensure that vendor patches are promptly applied to instant messaging software, interrelated applications, and the underlying operating system. 4.4 Management Policy Controls Establish policies for acceptable use of instant messaging and ensure that all users are aware of those policies and clearly understand the potential risks. General users should not be allowed to install software. Limit Administrative and Power User level privileges to support personnel with their support ability. If a user must have Administrative or Power User privileges, create a separate account to be used for their daily office functions, internet surfing and on-line communication. 5. Conclusion Instant messaging has clearly taken off as a means of communication. The ability to communicate in real-time makes it an ideal medium for both business and personal communication. Unfortunately, threats that affect instant messaging already exist today, including worms and vulnerabilities that can give hackers remote access to vulnerable computers and can replicate in seconds can affect more than just instant messaging. Therefore, end users and corporations should employ basic security countermeasure. However, update the patch of product can mitigate the occurrence of threats, but these measures are not enough to prevent the network security. Corporations should have other measures for security such as prevention, detection and incident response. Furthermore, management controls are available to less the impact of IM threats. Once these measures get implement, IM threats must become manageable as a result of reducing the damage of business. References Michael E. Whitman and Herbert J. Mattord (2004) Management of Information Security, Boston, Mass.; London: Thomson/Course Technology Joris Evers (2007) New IM worm targets Skype users, Cnet, Available: http://www.zdnet.com.au/news/security/soa/New-IM-worm-targets-Skype-users/0,130061744,339274904,00.htm (17 Apr 2007) Joris Evers (2007) Next-generation Skype Trojan hits web, Silicon, Available: http://software.silicon.com/malware/0,3800003100,39166534,00.htm (26 Mar 2007) (2006) AIM bot creates fight combos to spread, Security Focus, Available: http://www.securityfocus.com/brief/305 (18 Sep 2006) San Diego (2007) Akonix Intros IM Security Appliance, Dark Reading, Available: http://www.darkreading.com/document.asp?doc_id=125041WT.svl=wire_2  (29 MAY, 2007) San Diego (2007) Akonixs Threat Center tracks 33 IM attacks , Dark Reading, Available: http://www.darkreading.com/document.asp?doc_id=135045  (28 Sep 2007) SANS Institute (2006) SANS Top-20 Internet Security Attack Targets, Available: http://www.sans.org/top20/ (15 Nov 2006) Symantec (2006) Protect Your Business from Instant Messaging Threats, Available: http://www.symantec.com/business/library/article.jsp?aid=instant_messaging_threats (11 Jul 2006) Symantec (2007) Internet Security Threat Report 2007,  Avalable: http://tc.imlogic.com/threatcenterportal/pubIframe.aspx (13 Jun 2007)

Wednesday, November 13, 2019

Purple Robe and Anemones :: Essays Papers

Purple Robe and Anemones Henri Matisse, the leader of the Fauvist movement and master of aesthetic order, was born in Le Cateau-Cambresis in northern France on December 31, 1869. The son of a middle-class family, he studied and began to practice law. In 1890, however, while recovering slowly from an attack of appendicitis, his mother bought him a paint set and he became intrigued by the practice of painting. In 1892, having given up his law career, he went to Paris to study art formally. His first teachers were academically trained and relatively conservative, Matisse’s own early style was a conventional form of naturalism, and he made many copies after the old masters. He also studied more contemporary art, especially that of the impressionists, and he began to experiment, earning a reputation as a rebellious member of his studio classes. Matisse’s true artistic liberation, in terms of the use of color to render forms and organize spatial planes, came about first through the influence of Gauguin, Cezanne and van Gogh, whose work he studied closely. Then, Matisse encountered the pointillist painting of Edmond Cross and Signac. By 1905 he had produced some of the boldest color images ever created. His images of dancers, and of human figures in general, convey expressive form first and the particular details of anatomy only secondarily. Although intellectually sophisticated, Matisse always emphasized the importance of instinct and intuition in the production of a work of art. He argued that an artist did not have complete control over color and form; instead, colors, shapes, and lines would come to dictate to the sensitive artist how they might be employed in relation to one another. He often emphasized his joy in abandoning himself to the play of the forces of color and design. He explained the rhythmic, but distorted, forms of many of his figures in terms of the working out of a total pictorial harmony. In 1937, Matisse asked his model Lydia Delectorskaya to pose in a purple robe, for a painting he later named â€Å"Purple Robe and Anemones.† When Matisse started the painting he had no intention of painting a portrait that looked like a photograph and readily admitted that his paintings were not faithful re-creations of reality. He believed that taking liberties with reality allowed him to convey the very essence of his subject. When accused of painting unrealistic images of women, he explained, "I do not create a woman, I make a picture.

Monday, November 11, 2019

John Lock’Es View on Innate Knowledge Essay

John Locke, a renowned English philosopher in the seventeenth century, argued against the pre-existing prevalent belief of innate knowledge, such as those led by Descartes. Many of Locke’s arguments begin with criticisms on philosophers’ opinion on innate knowledge, notably Descartes. Therefore, many of Locke’s arguments are direct rebuttals of Descartes and other philosophers’ beliefs about the existence of innate knowledge. To arrive at the conclusion that innate knowledge is impossible, Locke comes with various premises and rebuttals that add weight to his arguments. First, Locke emphasizes that knowledge and ideas are learned through experience, not innately. He argues that people’s minds at birth are ‘blank slate’ that is later filled through experience. Here, the ‘senses’ play an important role because ‘the knowledge of some truths, as Locke confesses, is very in the mind; but in a way that shows them not to be innate’. By this, Locke argues that some ideas are actually in the mind from an early age but these ideas are furnished by the senses starting in the womb. For example, the color blue and the  Ã¢â‚¬Ëœblueness’ of something is not that which is learned innately but is some is learned through exposures to a blue object or thing. So if we do have a universal understanding of ‘blueness’, it is because we are exposed to blue objects ever since we were young. The blue sky is what many would acquaint with blue easily and at a young age. Second, Locke argues that people have no innate principles. Locke contended that innate principles rely upon innate ideas within people but such innate ideas do not exist. He says this on the basis that there is no ‘universal consent’ that everyone agrees upon. Locke quotes that ‘There is nothing more commonly taken for granted that there are certain principles universally agreed upon by all mankind, but there are none to which all mankind give a universal assent’. This argues against the very foundation of the idea of innate knowledge because principles that garner universal assent are thought to be known innately, simply because it is the best explanation available. However, it cannot even be an explanation for such belief because no ‘universal consent’ exists. Rationalists argue that there are in fact some principles that are universally agreed upon, such as the principle of identity. But it is far-fetched to claim that everyone knows this principle of identity because for the least, children and idiots, the less-intelligent ones are not acquainted with it. There are several objections to these premises and arguments that are outlined above. The argument by Locke that there are some ideas that are in the mind at an early age gives credence to argument for the innate ideas. For ideas to be furnished by the senses later on there has to be ideas that are laid as foundations. If such ideas are innate, as acknowledged by Locke, no matter how trivial or less significant these ideas may be as one may argue, such claim could give weight to the idea of innate knowledge. Innate knowledge or ideas, after all, doesn’t imply that all ideas are innate because as one can see, there are things that we learn through our experiences and encounters in life as well. So as long as there is even the basic principle that is innate early in life, then innate knowledge can be known to exist. The validity behind the claim that there is no ‘universal consent’ is also questionable. Locke argues that no principle that all mankind agrees upon exists because there are those who are not acquainted with such principle, notably children and idiots. However, the terms children and idiots are somewhat misguided. How are children and especially the idiots categorized? Is there a specific criteria used for those who are classified as idiots? It is hard to generalize that idiots or those who are deemed less intelligent are not acquainted with certain principles because at times, intelligence is not the best indicator of someone’s knowledge or ideas. There are many intelligent people out there who take their status for granted and do not think, contemplate or make an effort to their best extent. The objections that are made against the initial arguments can be defended in certain ways. Regarding the objection that since there are innate ideas in the mind at an early age, innate knowledge exists, the term ‘innate’ should be thought of again in greater detail. Innate knowledge has to be significant enough for us to recount to be considered such. Thus, there comes a risk with considering the ideas within our minds early on as innate. For example, the knowledge of our hands and feet maybe imbedded to us at a very early stage. The knowledge of using our hands and feet are not so significant. The knowledge that we gain through our use of hands and feet could be vital knowledge that we may recount throughout. Throwing a baseball properly under a coach’s instructions is an example. Also, there is the claim that intelligence cannot be the sole indicator of one’s acquisition of ‘universal consent’ and that there isn’t a clear distinction of those who can understand universal principles to those who cannot. However, the important focus here should not be on defining ‘idiots’ and intelligence but on that universal consent is hard to be assembled by every single mankind. Therefore, more should be considered than just innate knowledge that could garner universal consent. Empirical principles that are derived from experience could garner universal assent too. For example, the fear of ‘dying’ or ‘getting seriously injured’ could mean that people would not jump out the roof from tall buildings. And this belief could be universal among all.

Saturday, November 9, 2019

Free Essays on Juvenile Justice Reform

Juvenile justice reform is a big issue in today’s juvenile justice department. The fact that more and more juveniles are getting into more serious crimes today has become a problem. The key factor is what is the government and society going to do about the problem that must be taken care of? In this paper the fact of the matter is what is the cause of this problem and what methods are being taking to end it. Certification is a method of trying to stop delinquency. But is it right to send children who are fourteen years old to prison? Where and when does violent behavior begin? It will be discussed in this paper on what signs to look for in a delinquent. Mary Craft, Judge of the 314th District Court in Houston says, â€Å"The juvenile justice system in Texas actually is progressive, compared to those in other states.†(Houston Chronicle Magazine 2) In Texas children as young as fourteen can be certified. In some states there is no age limits, and children of any age can be certified. Craft says that she would actually prefer other forms of punishment rather than certification in many cases. Craft states that, â€Å" No question; I see it every day,† Craft says. â€Å" The reality is this: There are more Anglo families that are middle class and have middle-class values and supervise their kids at home than there are in the minority community.† She says that judges are not penalizing people because they are minorities. Crafts says that she is very sensitive to the issue. High-crime neighborhoods are characterized by high rates of families abandoned by fathers. â€Å"The type of aggression and hostility demonstrated by a future criminal often is foreshadowed in unusual aggressiveness as early as age five or six.† (Congressional Digest p.201 1) Behavior that is demonstrated at an early age is beginning abusiveness to siblings and animals. Not getting alone with other children could be a good example of behavior that co... Free Essays on Juvenile Justice Reform Free Essays on Juvenile Justice Reform Juvenile justice reform is a big issue in today’s juvenile justice department. The fact that more and more juveniles are getting into more serious crimes today has become a problem. The key factor is what is the government and society going to do about the problem that must be taken care of? In this paper the fact of the matter is what is the cause of this problem and what methods are being taking to end it. Certification is a method of trying to stop delinquency. But is it right to send children who are fourteen years old to prison? Where and when does violent behavior begin? It will be discussed in this paper on what signs to look for in a delinquent. Mary Craft, Judge of the 314th District Court in Houston says, â€Å"The juvenile justice system in Texas actually is progressive, compared to those in other states.†(Houston Chronicle Magazine 2) In Texas children as young as fourteen can be certified. In some states there is no age limits, and children of any age can be certified. Craft says that she would actually prefer other forms of punishment rather than certification in many cases. Craft states that, â€Å" No question; I see it every day,† Craft says. â€Å" The reality is this: There are more Anglo families that are middle class and have middle-class values and supervise their kids at home than there are in the minority community.† She says that judges are not penalizing people because they are minorities. Crafts says that she is very sensitive to the issue. High-crime neighborhoods are characterized by high rates of families abandoned by fathers. â€Å"The type of aggression and hostility demonstrated by a future criminal often is foreshadowed in unusual aggressiveness as early as age five or six.† (Congressional Digest p.201 1) Behavior that is demonstrated at an early age is beginning abusiveness to siblings and animals. Not getting alone with other children could be a good example of behavior that co...

Wednesday, November 6, 2019

When DIY Bites You in the Butt

When DIY Bites You in the Butt We are an industrious lot. We want to know how someone did what he did successfully, so we can do it, too . . . or do it better. Or do it ourselves instead of buying the other guys product. Or do it ourselves to save money . . . or to maintain creativity as our own instead of splitting its ownership. Its called DIY, or do-it-yourself, and we cant stand not to try doing it ourselves if it means more benefits for us. I love to bake. I hate recipes that have boxed mixes or tell me to save time As writers, we fight that battle uphill to publish a book. How hard can it be to format that manuscript in Word? How difficult can a cover be? Surely I can learn how to upload books. We read directions, study what others have done, then grit our teeth, determined to do it ourselves. Then invariably, after weve erred, redone and cursed our mistakes, we reach a point where we ask ourselves and our friends: It doesnt look bad for me doing it myself, does it? And right there youve compromised your storys future. Youve cobbled together what others do for a living. Youve decided to settle for less than professional. You think others wont notice, because they havent learned what youve learned, and tried what youve tried. When youve poured your soul into writing, you need to equally pour your soul into its proper publication. You have two choices when doing anything in life: 1) Take the time to become an expert at it, or 2) Hire the expert. Just know that anything in between is settling. When it comes to baking a cake, Ill settle for my Milky Way Cake from scratch. Its meant to be rustic, gooey and not exactly straight around the edges. But when I need a cake for someones 50th anniversary, believe me, Im hiring someone wholl give me the presentation needed to respect the grand auspiciousness of the occasion.

Monday, November 4, 2019

Models of Evidence-Based Practice Essay Example | Topics and Well Written Essays - 500 words

Models of Evidence-Based Practice - Essay Example Through the bundles, the practitioners select the best practices then put them together in an attempt to offer the best services and deliver the expected outcomes. In the clinical setting, the practitioners select the most appropriate bundles for certain conditions to improve patient care (Kim, 2011). This model would help in creating a procedure that will see Total knee arthroplasty (TKA) be of less pain. Pantoja & Britton (2011) indicate that the multidisciplinary approach is one that focuses on speeding up the attainment of quality care. Through the model, it is easy to define mechanisms that will lead to collaborative learning among the healthcare providers. Pantoja & Britton (2011) argue that more focus is shed on patient through the Multidisciplinary model. Through this model, Total knee arthroplasty (TKA) would be conducted by a multidisciplinary team; thus, a successful procedure. According to Riva, et al (2012), PICOT focuses on â€Å"P† for the population or the disorder in question, â€Å"I† for the intervention, â€Å"C† for comparison with other infections, â€Å"O† for the outcome after a diagnosis and â€Å"T† for the time frame set for the outcome of the intervention administered to take place. These questions present a formula for developing researchable questions and evaluating the existing evidence. The PICOT Model would allow for a systematic practice of conducting Total knee arthroplasty (TKA). Doody & Doody (2011) indicate that the IOWA model highlights the importance of analyzing the whole healthcare system from its infrastructure, the patients as well as the providers. Through this, Doody & Doody (2011) say it is possible to identify solutions to problems that exist in the system. Through IOWA, the entire healthcare system will shift its focus on alleviating pain on patients after going through Total knee arthroplasty (TKA). I would recommend the PICOT Model for implementation to this research problem because it is inclusive and provides a

Saturday, November 2, 2019

Integrating Interactive Multimedia and Web Applications in Teaching Essay

Integrating Interactive Multimedia and Web Applications in Teaching - Essay Example The significance of investigating this integration remains, however, considering that listening now is the cornerstone of language acquisition (Krashen et al., 1994) and a fundamental activity in L2 acquisition process (Dunkel, 1991a; Krashen, 1982; Rost, 1993). Likewise, studies indicate that the social dynamics of listening have gained more significance in the study and use of LC for L2 (Lynch, 1988; Rost, 1990; Rubin, 1994). Increasingly, more emphasis is now being given to the processes of interaction and meaning-negotiation while focus shifts away from listening as a mental process internal to the listener (Doughty, 1991; Dunkel, 1991b; Pica, Young, & Doughty, 1987; Robinson, 1991). Researchers are also refining their understanding of the key differences and similarities between reading and listening (Canale, 1984; Hoven, 1991; Lund, 1991; Swaffar & Bacon, 1993). For all the above reasons and more, a model designed to facilitate such integration process is being proposed. In a nutshell, the model suggests an integration process based upon theoretical, pedagogical, and technical grounds accompanied by a user-centered approach for software design. It is argued that this model might lead to a successful integration of interactive Web applications for teaching listening comprehension. The model components will be discussed respectively. Toward a Constructivist Approach Two contradictory views of the most common theoretical frameworks of contemporary CALL exist. Felix (2002) claims that a quick look at the literature in language learning and technology will reveal that there is a move away from the static transmission models of knowledge and skill acquisition, which are instructivist vs. constructivist, tending towards more contextualized, authentic, and meaningful tasks in language learning. These three characteristics are underscored in three recent approaches in language learning and technology: the collaborative learning approach, the problem solving approach, and the constructivist approach. This study will adopt the definition of constructivism which believes that human knowledge is constructed and learners construct their own experience and understanding through assimilating current experience with previous internalized knowledge. Moreover, learning is seen as a collaborative, autonomous, socially negotiated process, which takes place when su pported by a rich environment (Ruschoff & Ritter, 2001). Pachler (2002), however, claims that traditional behaviorist modes, which I believe depends partly on transmission models (i.e., repetition in listening/speaking), are still very common in the world of CALL. The breaking of learning tasks into small manageable steps to drill and