Wednesday, July 31, 2019
Sqc – Statistical Quality Control
Statistical quality control (SQC) The application of statistical techniques to measure and evaluate the quality of a product, service, or process. Two basic categories: I. Statistical process control (SPC): ââ¬â the application of statistical techniques to determine whether a process is functioning as desired II. Acceptance Sampling: ââ¬â the application of statistical techniques to determine whether a population of items should be accepted or rejected based on inspection of a sample of those items. Quality Measurement: Attributes vs Variables Attributes:Characteristics that are measured as either ââ¬Å"acceptableâ⬠or ââ¬Å"not acceptableâ⬠, thus have only discrete, binary, or integer values. Variables: Characteristics that are measured on a continuous scale. Statistical Process Control (SPC) Methods Statistical process control (SPC) monitors specified quality characteristics of a product or service so as: To detect whether the process has changed in a way that w ill affect product quality and To measure the current quality of products or services. Control is maintained through the use of control charts. The charts have upper and lower ontrol limits and the process is in control if sample measurements are between the limits. Control Charts for Attributes P Charts ââ¬â measures proportion defective. C Charts ââ¬â measures the number of defects/unit. Control Charts for Variables X bar and R charts are used together ââ¬â control a process by ensuring that the sample average and range remain within limits for both. Basic Procedure 1. An upper control limit (UCL) and a lower control limit (LCL) are set for the process. 2. A random sample of the product or service is taken, and the specified quality characteristic is measured. . If the average of the sample of the quality characteristic is higher than the upper control limit or lower than the lower control limit, the process is considered to be ââ¬Å"out of controlâ⬠. CONTROL CHA RTS FOR ATTRIBUTES p-Charts for Proportion Defective p-chart: a statistical control chart that plots movement in the sample proportion defective (p) over time Procedure: 1. take a random sample and inspect each item 2. determine the sample proportion defective by dividing the number of defective items by the sample size 3. lot the sample proportion defective on the control chart and compare with UCL and LCL to determine if process is out of control The underlying statistical sampling distribution is the binomial distribution, but can be approximated by the normal distribution with: mean = u = np (Note ââ¬â add the bars above the means used in all the equations in this section) standard deviation of p: sigmap = square root of (p(1 -p ) / n) where p = historical population proportion defective and n = sample size Control Limits: UCL = u + z sigmap LCL = u ââ¬â z sigma p is the number of standard deviations from the mean. It is set based how certain you wish to be that when a l imit is exceeded it is due to a change in the process proportion defective rather than due to sample variability. For example: If z = 1 if p has not changed you will still exceed the limits in 32% of the samples (68% confident that mean has changed if the limits are exceeded. z = 2 ââ¬â limits will be exceeded in 4. 5 (95. 5 % confidence that mean has changed) z = 3 ââ¬â limits will be exceeded in . 03 (99. % confidence) c-Charts for Number of Defects Per Unit c-chart: a statistical control chart that plots movement in the number of defects per unit. Procedure: 1. randomly select one item and count the number of defects in that item 2. plot the number of defects on a control chart 3. compare with UCL and LCL to determine if process is out of control The underlying sampling distribution is the Poisson distribution, but can be approximated by the normal distribution with: mean = c standard deviation = square root of c here c is the historical average number of defects/unit Con trol Limits: UCL = c + z c LCL = c ââ¬â z c Control Charts for Variables Two charts are used together: R-chart (ââ¬Å"range chartâ⬠) and X barchart (ââ¬Å"average chartâ⬠) Both the process variability (measured by the R-chart) and the process average (measured by the X bar chart) must be in control before the process can be said to be in control. Process variability must be in control before the X bar chart can be developed because a measure of process variability is required to determine the -chart control limits.R-Chart for Process Variability: UCLR = D4(R) LCLR = D3(R) where is the average of past R values, and D3 and D4 are constants based on the sample size -Chart for Process Average: UCLR = X bar + A2(R) LCL = X bar ââ¬â A2(R) where X bar is the average of several past values, and A2 is a constant based on the sample size Other Types of Attribute-Sampling Plans Double-Sampling Plan: Specifies two sample sizes (n1 and n2) and two acceptance levels (c1 and c2 ) 1. f the first sample passes (actual defects c1), the lot is accepted 2. if the first sample fails and actual defects > c2, the lot is rejected 3. if first sample fails but c1 < actual defects c2, the second sample is taken and judged on the combined number of defectives found. Sequential-Sampling Plan: Each time an item is inspected, a decision is made whether to accept the lot, reject it, or continue sampling. Acceptance Sampling Goal: To accept or reject a batch of items.Frequently used to test incoming materials from suppliers or other parts of the organization prior to entry into the production process. Used to determine whether to accept or reject a batch of products. Measures number of defects in a sample. Based on the number of defects in the sample the batch is either accepted or rejected. An acceptance level c is specified. If the number of defects in the sample is c the atch is accepted, otherwise it is rejected and subjected to 100% inspection. Sqc ââ¬â Statistical Quality Control Statistical quality control (SQC) The application of statistical techniques to measure and evaluate the quality of a product, service, or process. Two basic categories: I. Statistical process control (SPC): ââ¬â the application of statistical techniques to determine whether a process is functioning as desired II. Acceptance Sampling: ââ¬â the application of statistical techniques to determine whether a population of items should be accepted or rejected based on inspection of a sample of those items. Quality Measurement: Attributes vs Variables Attributes:Characteristics that are measured as either ââ¬Å"acceptableâ⬠or ââ¬Å"not acceptableâ⬠, thus have only discrete, binary, or integer values. Variables: Characteristics that are measured on a continuous scale. Statistical Process Control (SPC) Methods Statistical process control (SPC) monitors specified quality characteristics of a product or service so as: To detect whether the process has changed in a way that w ill affect product quality and To measure the current quality of products or services. Control is maintained through the use of control charts. The charts have upper and lower ontrol limits and the process is in control if sample measurements are between the limits. Control Charts for Attributes P Charts ââ¬â measures proportion defective. C Charts ââ¬â measures the number of defects/unit. Control Charts for Variables X bar and R charts are used together ââ¬â control a process by ensuring that the sample average and range remain within limits for both. Basic Procedure 1. An upper control limit (UCL) and a lower control limit (LCL) are set for the process. 2. A random sample of the product or service is taken, and the specified quality characteristic is measured. . If the average of the sample of the quality characteristic is higher than the upper control limit or lower than the lower control limit, the process is considered to be ââ¬Å"out of controlâ⬠. CONTROL CHA RTS FOR ATTRIBUTES p-Charts for Proportion Defective p-chart: a statistical control chart that plots movement in the sample proportion defective (p) over time Procedure: 1. take a random sample and inspect each item 2. determine the sample proportion defective by dividing the number of defective items by the sample size 3. lot the sample proportion defective on the control chart and compare with UCL and LCL to determine if process is out of control The underlying statistical sampling distribution is the binomial distribution, but can be approximated by the normal distribution with: mean = u = np (Note ââ¬â add the bars above the means used in all the equations in this section) standard deviation of p: sigmap = square root of (p(1 -p ) / n) where p = historical population proportion defective and n = sample size Control Limits: UCL = u + z sigmap LCL = u ââ¬â z sigma p is the number of standard deviations from the mean. It is set based how certain you wish to be that when a l imit is exceeded it is due to a change in the process proportion defective rather than due to sample variability. For example: If z = 1 if p has not changed you will still exceed the limits in 32% of the samples (68% confident that mean has changed if the limits are exceeded. z = 2 ââ¬â limits will be exceeded in 4. 5 (95. 5 % confidence that mean has changed) z = 3 ââ¬â limits will be exceeded in . 03 (99. % confidence) c-Charts for Number of Defects Per Unit c-chart: a statistical control chart that plots movement in the number of defects per unit. Procedure: 1. randomly select one item and count the number of defects in that item 2. plot the number of defects on a control chart 3. compare with UCL and LCL to determine if process is out of control The underlying sampling distribution is the Poisson distribution, but can be approximated by the normal distribution with: mean = c standard deviation = square root of c here c is the historical average number of defects/unit Con trol Limits: UCL = c + z c LCL = c ââ¬â z c Control Charts for Variables Two charts are used together: R-chart (ââ¬Å"range chartâ⬠) and X barchart (ââ¬Å"average chartâ⬠) Both the process variability (measured by the R-chart) and the process average (measured by the X bar chart) must be in control before the process can be said to be in control. Process variability must be in control before the X bar chart can be developed because a measure of process variability is required to determine the -chart control limits.R-Chart for Process Variability: UCLR = D4(R) LCLR = D3(R) where is the average of past R values, and D3 and D4 are constants based on the sample size -Chart for Process Average: UCLR = X bar + A2(R) LCL = X bar ââ¬â A2(R) where X bar is the average of several past values, and A2 is a constant based on the sample size Other Types of Attribute-Sampling Plans Double-Sampling Plan: Specifies two sample sizes (n1 and n2) and two acceptance levels (c1 and c2 ) 1. f the first sample passes (actual defects c1), the lot is accepted 2. if the first sample fails and actual defects > c2, the lot is rejected 3. if first sample fails but c1 < actual defects c2, the second sample is taken and judged on the combined number of defectives found. Sequential-Sampling Plan: Each time an item is inspected, a decision is made whether to accept the lot, reject it, or continue sampling. Acceptance Sampling Goal: To accept or reject a batch of items.Frequently used to test incoming materials from suppliers or other parts of the organization prior to entry into the production process. Used to determine whether to accept or reject a batch of products. Measures number of defects in a sample. Based on the number of defects in the sample the batch is either accepted or rejected. An acceptance level c is specified. If the number of defects in the sample is c the atch is accepted, otherwise it is rejected and subjected to 100% inspection.
Tuesday, July 30, 2019
Cloud Computing â⬠Risk or Opportunity Essay
Abstract Cloud computing is a term that refers to sources and computer systems available on demand through the network, which can provide a number of computer services integrated without being restricted local resources in order to make it easier for the user and include those resources space for data backup and synchronization self also includes processing capabilities software and scheduling of tasks and push e-mail and remote printing, and the user can control when it is connected to the network in these resources through a simple software interface simplifies and ignores a lot of detail and internal processes. Cloud computing has become increasingly popular because it offers users the illusion of having infinite computing resources, of which they can use as much as they need, without having to worry about how those resources are provided. It also provides greater scalability, availability, and reliability than users could achieve with their own resource The core property in cloud computing that held computing ââ¬Å"in the cloudâ⬠; for clarity, the treatment process (and related data) is not confined to the place (places) private and unknown. Thus, this model is the antithesis of the treatment process is located in one or more of the servers are well known. Exposure model cloud of criticism and attack because of privacy advocates, for the ease of large governing the hosting companies for services cloud, and then, can impose censorship and domination, whether legal or illegal, the communication process as well as the data stored in between the user and the host company Introduction Cloud computing has become a ubiquitous term and largely discussed topic in the global information technology (IT) world. Cloud computing has changed dramatically the ways in which organizations and individuals communicate, collaborate and compute. The concept of cloud computing ensures a costââ¬âeffective transformation of utility computing principle that allows users and providers a convenient access to resources in a self-service and ââ¬Ëpay as you go fashionââ¬â¢. Consequently, cloud computing has reduced the cost associated with system administration as well as aided in improving resource utilization and accounting. Since last few years, cloud computing has resulted in a number of positive impacts on the IT ecosystem, thereby giving rise to new markets and widely scattered new user communities (European Commission, 2012). Contextually, the concept of cloud computing is the outcome of the direct industrial needs to enhance resource utilization without intervening consumer requirements. In other words, the concept ensures the use of the available resources in more efficient manner (European Commission, 2012). The paper intends to critically examine the opportunities and the risks associated with cloud computing and draws a valid conclusion on its adoption by organizations. Cloud Computing: Definition, Models and Services Cloud computing was initially used in an academic perspective by Prof. Kenneth K Chellapa who illustrated it in 1997 at the Informs Conference in Dallas as ââ¬Å"a computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limitsâ⬠(Petri, 2010). There are various definitions of cloud computing however the most appropriate and broadly accepted definition is being provided by North America National Institute for Standards and Technology (NIST). According to NIST, ââ¬Å"Cloud Computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort to service provider interactionâ⬠(Petri, 2010). There are many cloud computing models for business purposes including: Public Cloud: Public cloud model is provided by vendors and can be accessed over the internet or private network. One or more data centers are used by this model which is shared by multiple customers (Weitz, 2010). Private Cloud: Private cloud model is managed and used internally by the organizations which utilizes ââ¬Ëshared services modelââ¬â¢ and makes variable usage of virtualized computing resources. The data stored in the model are managed within the organization (Weitz, 2010). Hybrid Cloud: As the name suggests, the hybrid model is the mixture of public cloud services and private cloud architecture. The model is designed to meet certain specific needs of customers (Weitz, 2010). Community Cloud: Community cloud model is used across the organizations having similar requirements and objectives. Community cloud model is established using public cloud services in order to ensure collaboration among the companies (Weitz, 2010). Cloud Computing Services Cloud computing services are provided mostly in the following ways: Software-as-a-Service (SaaS): Software-as-a-Service (SaaS) has been operational in the market since many years. Currently, businesses are more interested in shifting licensing software to subscribe services particularly on the basis of per user and per month among others (Weitz, 2010). Platform-as-a-Service (PaaS): Platform-as-a-Service (PaaS) includes development of such environment that allows developers to build software applications that can be offered as services to customers or to general users (Weitz, 2010). Infrastructure-as-a-Service (IaaS): Infrastructure-as-a-Service (IaaS) provides customers or users with storage, network and other various fundamental resource requirements in order to run arbitrary applications (Weitz, 2010). Literature Review According to Etro (2009), cloud computing is a recently evolved internet based technology that stores large information in servers and provides that information as services on demand to clients. Accordingly, its impact is spectacular on both consumers and companies. Furthermore, he stated that consumers can access all their documents and data from any devices such as laptops, mobile phones and tablets while the companies can rent hardware and software from the service providers and pay as they use the services like other services availed by the companies such as electricity (Etro, 2009). Petri (2010) postulates that, cloud computing is one of the most discussed IT innovations in the last few years. Hence, risk management is the most critical area which draws a serious attention. He emphasized that future is relatively uncertain when associating cloud computing with security factor. He critically points out that cloud vendors should quickly address the security and other related concerns for ensuring better customer satisfaction (Petri, 2010). According to Bein, Bein & Madiraju (2010), cloud computing is a new paradigm of computing that has evolved in the recent times as an expensive way for providing storage and software. They further stressed that many companies are moving ahead with an intention to make cloud computing easy to use. They advocated that there are huge potential for consumers to exploit the cloud computing technology (Bein, Bein & Madiraju, 2010). According to Gartner Inc (2012), continuous monitoring of cloud computing technologies and usual updates to the enterprisesââ¬â¢ cloud strategies are necessary to prevent any cost related errors for the subsequent few years. It also stated that cloud computing technology will have significant impact on the level of its adoption over a period of time (Gartner Inc, 2012) According to Pokhriyal (2012), cloud computing would contribute towards increasing complexities relating to data storage and users access to applications as well as other frequently conducted processes. She also stated that risk of exposure of critical data is more with the use of cloud computing technology. She advocated that business firms may also witness security breaches and hacking that shall make the cloud storage relatively ineffective and inefficient (Pokhriyal, 2012). According to Willcocks, Venters, & Whitey (2011), cloud computing technology is changing the ways of IT business services in terms of data delivering and managing. Accordingly, cloud computing has escalated the importance of delivering effective services and for this reason the IT and business services urgently need to raise the level of service competency and should focus on the availability of quality services to meet the customer expectations (Willocks, Venters, & Whitley, 2011). In the words of Horwath, Chan, Leung, & Pili (2012), cloud computing has the potential to bring certain drastic changes in the organizations as witnessed in case of the internet during the last decade of the 20th century. They emphasized that by applying cloud computing technology without proper care and due-diligence may result in unforeseen problems. Consequently, executives must be aware of risks and other issues of cloud computing in order to derive significant benefits out of the provided services (Horwath, Chan, Leung, & Pili, 2012). According to Santos, Gummadi, & Rodrigues (2012), cloud computing enables organizations to cut costs associated with resource storage, network bandwidth and other relevant data. However, they argued that concerns about the privacy, confidentiality and integrity of the data and computation can be considered to be the major deterrents for those organizations which are looking forward to embrace cloud computing (Santos, Gummadi, & Rodrigues, 2012). According to Hinchcliffe (2009), cloud computing will transform IT business scenario by a large extent and it will have to balance between the risks and the benefits associated with cloud computing models. Therefore, he points out certain major risks associated with such transformations including security of organizational data that is stored in the cloud, loss of control over cloud resources and reliability factor. He also stated that the efficient use of cloud computing will enable market validation and prototyping of new approaches at much faster and relatively less expensive rate than ever before (Hinchcliffe, 2009). According to Weitz (2010), cloud computing will be playing a major role in the future of IT and shall bring in enormous opportunities for the organizations. Consequently, he stated that larger organizations will also have an opportunity for cutting the existing costs of IT infrastructure with the use of cloud computing models. However, he also highlighted the risks related with cloud computing and expressed his deep concerns relating to the security and confidentiality of certain relevant data (Weitz, 2010). Hyek (2011) in his report, ââ¬ËCloud Computing Issues and Impactsââ¬â¢, postulated that, cloud computing models should comply with laws and regulations in each of its operations. The processing of data by the cloud service providers must be in conformity with governmentsââ¬â¢ requirements (Hyek, 2011). According to Curtis, Heckman, & Thorp (2010), the most important factor related with the cloud computing model is the concern about the security and privacy of data while adopting cloud computing models (Curtis, Heckman, & Thorp, 2010). According to the Australian Academy of Technological Sciences and Engineering (2010), in its report, ââ¬ËCloud Computing: Opportunities and Challenges for Australiaââ¬â¢ considers the importance of government and its roles in encouraging researchers and business sectors to adopt cloud computing models. The report emphasized that government should formulate strategies that initiate business sectors to adopt cloud models for their resource and application requirements. The report precisely described the responsibility of the cloud service providers in terms of proper management of data in order to prevent any situation that may result in loss of vital data (Australian Academy of Technological Sciences and Engineering, 2010). According to Catteddu & Hogben, (2009) cloud services provide expedient storage accessible by various devices along with other benefits including useful communication and instant multi-point collaboration. They also emphasized that level of risk may tend to vary significantly based on the type of cloud model. It is for this reason that customers should be aware of the probable risks associated with cloud computing models and they should strive to transfer the risks to the providers (Catteddu & Hogben, 2009). Characteristics of Cloud Computing A few of the relevant characteristics of cloud computing are elaborated below: On-Demand Self Service: Cloud computing providers offer various computer services such as applications, e-mail and network without involving human interaction with various service providers engaged in certain specific services only. Currently, there are multiple organizations that provide cloud computing services based on on-demand self services such as Google, Amazon Web, Microsoft and IBM among others (Information System Audit and Control Association, Inc, 2012). Broad Network Access: Cloud services are available over the network, specifically over the internet and are accessed through certain standard mechanisms such as personal laptops, mobile phones, tablets and iPads among others (Information System Audit and Control Association, Inc, 2012). Resource Pooling: The cloud computing models of the providers are shared with various resources in order to serve multiple clients. The resources united together may consist of processing, network bandwidth, storage of data, memory, virtual machines and email service (Information System Audit and Control Association, Inc, 2012). Rapid Elasticity:The capacities of cloud services can be swiftly and elastically provisioned, in a few instances robotically as well to quickly balance out and release to scale in quickly. Furthermore, the capacities accessible for provisioning frequently emerge to be infinite and can be procured in any amount at any time (Information System Audit and Control Association, Inc, 2012). Measured Services: The resource usage of cloud computing can be measured and reported to both providers and customers related to the amount of services utilized. Hence, cloud computing service providers charge the customers for the resources that they have actually used i.e. ââ¬Ëpay as you useââ¬â¢. Considering the fact, more the customers utilize the cloud computing services, more they have to pay and vice-versa (Information System Audit and Control Association, Inc, 2012). Multi-tenacity: Multi-tenacity is one key characteristics related to cloud computing which is being advocated by Security All iance. Multi-tenacity is related with the requirement for segmentation, ââ¬Ëpolicy-driven enforcementââ¬â¢, control, service levels, billing models and isolation for the different consumer requirements (Information System Audit and Control Association, Inc, 2012). Cloud Computing: Opportunities and Risk Assessment Cloud Computing Opportunities Opportunities derived from cloud computing are related with cost reduction to increase flexibility and decrease complexity which benefits the customers in terms of higher returns on their investments. Certain vital opportunities and benefits provided by cloud computing comprise: Cost Saving: Cloud computing customers are liable to pay merely for computing services and resources that they use rather than making permanent investments on resources or leasing equipments that may or may not be utilized fully at all times. Cloud computing enables to share IT resources with multiple organizations and facilitates them to access as per their requirements which can be related as operating expenses (OPEX) and not as capital expenses (CAPEX) (Petri, 2010). Speed of Deployment: Cloud service providers can meet the needs of the organizations for computing resources quickly and efficiently than other internal informati on technology functions. The customers do not have to wait for months for crunching large data. They can simply rent resources for limited period and can avail huge benefits at considerably reduced time (Petri, 2010). Scalability and Better Alignment of Technology Resources: An organization is able to scale up as well as down its capability from a single server to multiple numbers of servers with no capital expenses through the use of cloud service models. An organization is also able to deploy additional storage capacity over the web (Petri, 2010). Decreased Efforts in Managing Technology: Owning and operating of IT functions are often costly and time consuming. However, cloud computing enables an organization to concentrate more time on its purposes and goals (Petri, 2010). Environmental Benefits: Cloud computing also results in environmental benefits. If all the organizations replace their private data centers with cloud computing, it will significantly reduce the overall power consumption and carbon emissions (Petri, 2010). Higher Value Added: Cloud computing does not only provide software functionality but it also provides the customers with relevant information and data which was traditionally supposed to be created by the customers themselves (Petri, 2010). Cloud Computing Risks Risk is an event that prevents the organizations from achieving their determined purposes and objectives. Certain risks associated with cloud computing are stated below: Disruptive Force: Facilitating innovation and cost saving aspects can itself be viewed as risk to the existing cloud computing organizations. By lowering the barriers to entry, new competitors may pose a serious threat to certain cloud computing business models (Horwath, Chan, Leung, & Pili, 2012). Residing In the Same Risk Ecosystem as the Cloud Service Provider (CSP) and Other Tenants of the Cloud: Organizational reliance on third party involved in managing cloud solutions will increase legal responsibility and incident escalation among other core areas. By following the actions of CSP may impact the organizations in certain direct and indirect ways (Horwath, Chan, Leung, & Pili, 2012). Lack of Transparency: A cloud computing service provider does not facilitate complete information regarding its processes and oper ations. Consequently, cloud customers have only little knowledge about the storage locations and algorithms that are implemented or used by the cloud service providers in relation to computing and controlling resources of customersââ¬â¢ data (Horwath, Chan, Leung, & Pili, 2012). Reliability and Performance Issues: Even though efficiency of cloud computing may get disrupted due to risk events such as system failure that may occur without any early alerts to the end users. Hence, system failure may be viewed as a distinctive challenge posed to cloud computing (Horwath, Chan, Leung, & Pili, 2012). Security And Compliance Concerns: Cloud computing supports various processes that may tend to evolve security and retention concerns in relation to its compliance with certain specific laws such as Health Insurance Portability and Accountability Act of 1996 (HIPAA). The cloud service providers may have no obligation to reveal such information associated with privacy of certain laws such as US Patriot Act and EU Data Protection Directives among others (Horwath, Chan, Leung, & Pili, 2012). High Value Cyber Attack Targets: The over-dependence of multiple organizations on single cloud service providers may tend to create vulnerability of cyber attacks then those used by a single organization (Horwath, Chan, Leung, & Pili, 2012). Risk of Data Leakage: The risk of data leakage is also more where multiple organizations share their resources through cloud environment. Consequently, cloud service providers do not provide adequate data privacy and confidentiality of resources which the organizations intend to secure from intruders (Horwath, Chan, Leung, & Pili, 2012). Conclusion Cloud computing has changed dramatically the ways in which the organizations communicate, collaborate and compute. In general, cloud computing refers to delivery of scalable IT resources over the web particularly internet. An organization can purchase or rent software on need basis or according to usage which results in less investment and consumption on the part of the organization. Cloud computing facilitates the organizations to manage their IT requirements remotely, at much lowered costs. It further enables organizations to share resources in a single place or through a single cloud service provider. The organizations do not have to make heavy investments on establishment of their own IT infrastructure as cloud computing models provide organizations with established database for fulfillment of their IT demand. Moreover, organizations and users are charged or billed on the basis of their resource consumption. Despite having numerous benefits of adopting cloud computing models, there also exist certain risk factors which restrict the scope of cloud computing. Security and privacy are the prime issues restricting the adoption of cloud computing. Since multiple organizations will be consolidated on single cloud computing, there exists more vulnerability of data hacking. Consequently, cloud computing service providers do not guarantee the adequate safety for data losses and leakages which at times deters organizations from adopting cloud computing solutions. Nonetheless, if organizations cautiously consider the risk factors associated with cloud computing related solutions then these risk events can be overcome efficiently. Considering this aspect, it can be stated that organizations should adopt cloud computing solutions. By adopting cloud computing solutions, they can avail numerous opportunities that shall help them to grow and sustain their business profitably. References Australian Academy of Technological Sciences and Engineering. (2010). The roles of government in cloud computing. Cloud computing: opportunities and challenges for Australia, pp. 13-19. Bein, D., Bein, W. & Madiraju, P. (2010). Web applications and cloud computing. The impact of cloud computing on web 2.0, pp. 1-6. Curtis, W. B., Heckman, C. & Thorp, A. (2010). Security and Privacy Considerations. Cloud computing: e-discovery issues and other risk, pp. 1-5. Catteddu, D. & Hogben, G. (2009). Top security risks. Cloud Computing: Benefits, Risks And Recommendations For Information Security Cloud Computing, pp. 2-125. Etro, F. (2009). Features and implications of cloud computing. The economic impact of cloud computing on business creation, employment and output in Europe, pp. 2-33. European Commission. (2012). Introduction & background. Advances in clouds, pp. 1-7. Gartner Inc. (2012). Gartner outlines five cloud computing trends that will affect cloud strategy through 2015. Retrieved from http://www.gartner.com/it/page.jsp?id=1971515 Horwath, C., Chan, W., Leung, E. & Pili, H. (2012). COSO enterprise risk management for cloud computing. Enterprise Risk Management For Cloud Computing, pp. 1-20. Hyek, P. (2011). Security and privacy. Cloud computing issues and impacts, pp. 12-46. Hinchcliffe, D. (2009). Eight ways that cloud computing will change business. Retrieved from http://www.majorcities.org/generaldocuments/pdf/zdnet_eight_ways_that_cloud_computing_will_change_business.pdf Information System Audit and Control Association, Inc, (2012). Essential characteristics of Cloud Computing. Retrieved from http://www.isaca.org/Groups/Professional-English/cloud-computing/GroupDocuments/Essential%20characteristics%20of%20Cloud%20Computing.pdf Pokhriyal, R. (2012). Cloud computing myths explained: part 1. Retrieved from http://www.cloudtweaks.com/2012/10/cloud-computing-myths-explained-part-1/ Petri, G. (2010). Risks of cloud computing. Shedding light on cloud computing, pp. 25-30. Santos, N., Gummadi, K. P. & Rodrigues, R. (2012). Towards trusted cloud computing. Retrieved from http://www.mpi-sws.org/~gummadi/papers/trusted_cloud.pdf Willcocks, L., Venters, W. & Whitley, E. A. (2011). Clear view of the cloud: The business impact of cloud computing. Cloud computing, (1). Weitz, C. (2010). Barriers of cloud computing. A Balancing Act What Cloud Computing Means For Business, And How To Capitalize On It, pp. 1-9.
Google in China Case Study Essay
In the case study presentation regarding the Google Company there have been many challenges that have arisen during the growth of the global leader. One of those challenges is in regards to the penetration of the largely available market in China. Google has a mission ââ¬Å"to organize the worldââ¬â¢s information and make it universally accessible and useful.â⬠(Closing Case: Google in China) Google has constructed a largely profitable advertising business that piggy backs its search engine; which by far is the largest in the world. Using a business model called pay-per-click; advertisers pay Google each time a user of the search engine clicks on one of the paid links that are usually listed on the right hand side of engines results page. These are the paid links and are not included in the main search results generated by Google. The Move In order to penetrate a larger market and further increase popularity Google began running a Chinese language service in 2000 for the largest country on the planet; even though the service was operated from the United States. In 2002, Chinese authorities blocked the site. The people that would have been using Googleââ¬â¢s search engine were directed to a Chinese rival search engine company. This came as a huge surprise to Googleââ¬â¢s managers. When this occurred the co-founder of Google quickly ordered several books on China and began studying in order to understand its vast country and its culture. In just two weeksââ¬â¢ time the services were restored in China. It appeared that this had just come out of nowhere. It was reported by Chinese users that politically sensitive material sites were no longer accessible. This gave way to the suggestion that the Chinese government had begun monitoring search activities more aggressively. This also generated the suggestion that the Chinese government had constructed a giant firewall between Chinese internet and the internet in the rest of the world allowing the Chinese government to block any sites that were deemed insurrectionary. Due to the fact that serving the Chinese from the United States was incredibly slow and the new censorship imposition was ruing search results Google decided it was time for some change. In a new mindset of operations Google decided to open up a site in China using Chinese management and employees and even a Chinese home page. The Culture and Conclusion It appeared that the cultural divide between Google and China caused some misunderstandings to take place; this in-turn caused some serious offenses to be made. Chinese government did what it felt needed to be done in order to keep the divide between government and citizenship as strong as it has always been. Realizing that it had crossed the line, the search giant Google decided to move its Chinese operations overseas. Google was faced with two choices, they could give up China or and lose over 100 million users, a number that rapidly increases every year, or operate out of China and respect the culture. Now that Google is up and operating in China, even though they have to provide a slightly more less lucrative service, they have provided a small notation for every site that has been blocked once the search results show up; a service no other provider gives. References Closing Case: Google in China; by International Business. Competing in the Global Marketplace, Seventh Edition Chapter 4: Ethics in International Business: by Charles W. L. Hill copyright à © 2009 McGraw-Hill, a business unit of the McGraw-Hill Companies, Inc. https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx
Monday, July 29, 2019
Central Bank for GCC Research Paper Example | Topics and Well Written Essays - 1250 words
Central Bank for GCC - Research Paper Example International financial crisis in the recent years calls for monetary integration and regional cooperation of the countries for efficiently dealing with the crises and protecting the interests of the member countries. The monetary policies of a central bank plays pivotal role in regulating interest rates and inflation in the countries with a view to ensure economic growth. The monetary policies of a central bank have impact on various economic factors such as employment, liquidity in the system and stability of the currencies. Central bank proposed for the GCC countries aims at financial stability in the GCC countries with a view to reorient the strategies of the group countries in response to the dynamic international economic situation and to promote economic cooperation among the group countries. Therefore, the structure of the central bank should be designed to achieve these objectives in relation to the group countries. ... Under the monetary policies of GCC central bank, stability in exchange rate could be achieved. The member countries of GCC peg their currencies to USD and their interest rates are fixed based on the changes interest rates in US. Adjustments in interest rates in sync with US policy might have negative impacts on domestic economies of the GCC countries. Currency unification is expected to delink pegging of GCC currencies to USD. The member countries are not yet prepared for monetary union. There are differences in economic fundamentals among the countries. Trading and transactions within the region is very limited, and the countries are mostly dependent on oil exports. Lack of efforts towards economic integration and institutional development are the important drawbacks. The differences in the economic policies followed by the GCC countries would make the unification process difficult. Three different methods used to test the GCC economies by Abu-Bader and Abu-Qarn (2006), the Structur al VAR, co-integration tests and common business cycles provide no support for establishing a monetary union (AlKholifey & Alreshan, p. 19). They also observed ââ¬Ëthat neither AD nor AS shocks are symmetrical between the GCC countries and the selected European countriesââ¬â¢ (p. 20) while AD refers to Aggregate Demand and AS, Aggregate Supply. Structure of the suggested Central Bank for GCC Monetary union in GCC can stimulate uniformity in macroeconomic policies within the union and inter alia improve investment options and allocation of resources within the region. Fundamental factor involved in establishing central bank or monetary union is convergence of monetary, fiscal and structural policies of the member countries. According to Sturm and Siegfried (2005, p. 63), ââ¬Ëmonetary union
Sunday, July 28, 2019
What effect did the Enlightenment and the Great Awakening have on life Essay
What effect did the Enlightenment and the Great Awakening have on life in British North America - Essay Example The natives were also very much concerned with their beliefs, authority of their tribal chiefs, the traditional responsibilities for an individualââ¬â¢s clan and their close relationship with the nature (Demos, 4). The English were trying to bring these natives from ââ¬Å"darkness of heathenismâ⬠to Protestant Christianity, which could fill the savagery lives of these natives with bright light of English ââ¬Å"civilityâ⬠. However the transformation in the form of an awakening did not happen overnight. The English started to build villages, started plantation, trees were cut down and sawed to build houses, barns, furnishings, etc. They also built special places called ââ¬Å"praying townsâ⬠for the inhabitants who converted to Protestants. But the British faced many natural hindrances like winter cold, crop blights, droughts and storms. Then there were epidemic diseases like small pox, measles, respiratory illnesses and typhus, which were brought by the European colonizers themselves also acted as crippling influence to their plans for creating a new civilization. It also created demographic losses and complications brewed up with ethnic, linguistic and religious differences. (Demos, 3) After much struggle when they finally built the colony, during the late 17th and 18th centuries, different cities of colonial America played a pivotal role as many of them were seaports and it enabled the Enlightenment movement of Europe to reach American soil.... The theory of Rational Christianity also emerged during this period. This Enlightenment process reached the American colonists a century later and during the late 1700 and early 1800 century the American colonists saw a key change. The British colonies were liberal in their outlook in dealing with different intellectual and religious challenges. During this period America saw many spiritual and religious revitalizations. It also challenged the divine right and role of religion. It enabled the American colonists to challenge the King as well as the divine right. This helped to raise common views between the North and South and this belief was preached across the races through North and South of the colonial America. It also stated that slavery is similar to sin. The people began to develop belief in themselves and the importance of the church and the clergymen diminished. Changes were observed with respect to the reducing significance of the sects. (The Great Awakening And Enlightenme nt In Colonial America). The period saw a growth in literacy and witnessed an increase in number of colleges. The impact of the Great Awakening in colonial America led to creation of many new colleges in order to educate ââ¬Å"new lightâ⬠ministers like ââ¬â Princeton, Rutgers, Brown, etc. This enabled to create a rift between believes of the thinkers and it resulted in formation of two cults namely, ââ¬Å"old lightsâ⬠who believed in rational process and ââ¬Å"new lightsâ⬠who focused on the experience gathered from life. These religious challenges also strengthened political challenges to the authorities (CHAPTER FIVE: THE CULTURES OF COLONIAL NORTH AMERICA, 1700ââ¬â1780). Many soldiers those who took part in the revolutionary war were ââ¬Å"new lightââ¬
Saturday, July 27, 2019
Toyota recall is not safe Essay Example | Topics and Well Written Essays - 1250 words
Toyota recall is not safe - Essay Example One of these companies is Toyota Motor Corporation, commonly known as Toyota. This is a multinational corporation with its headquarters in Japan. Toyota has factories in most parts of the world which makes it one of the worldââ¬â¢s largest automaker (Toyota, 2010). The cars manufactured by Toyota were considered the best until the series of accidents that were caused by the carsââ¬â¢ design. Some say that the issue was not very serious and it was unnecessarily amplified by its competitors over the media. Very recently, several vehicles faced the problem of the accelerator pedal getting stuck which caused unintended acceleration and hence many accidents. As a corrective measure, Toyota has decided to recall its sold cars and fix them (Reed, P., 2010). According to a source, by January 28, 2010, Toyota had announced recalls of about 5.2 million cars for the pedal entrapment/floor mat problem, and an additional 2.3 million cars for the accelerator pedal problem. Out of these, almost 1.7 million cars have both these problems (Toyota Press Release, 2010). In addition to this, it cut down on its production to a great extent as well. Other companies that have faced the same problems include Honda, Ford, etc. However, the problem faced by these org anizations did not affect their image and financial condition at the same scale as Toyota. Now when we talk about this incident and Toyotaââ¬â¢s reaction of recalling the cars that were potentially damaged, people often take two different sides. Some say that the Toyota recall was a good idea while some disagree. It is very important that all aspects of this issue are discussed so that we can understand the strategy better from all angles. Therefore, in this paper, we will discuss both sides of the argument in the coming paragraphs, firstly discussing the arguments for the Toyota recall. The Toyota recall is believed to be the best thing for everyone. We noted in the
Friday, July 26, 2019
Is the Arab world changing for the better Essay
Is the Arab world changing for the better - Essay Example As a result of these conflicts, some of these countries have made conclusions in transforming the governments and pave the way toward democracy and social justice. Hence, education, frequent communication, and high rate of population increase in the Arab world, no government could be able to be stopped from the winds of democratic change. Primarily, the Arab Spring may attest to be as transitional stepping stone towards change just like the European rebellions of 1848 that did not at once produce operational democracies. This is whereby the Arab Spring has created a new perception of the Arabs especially the young peopleââ¬â¢s capabilities and ambitions whereby they desire more liberty, employment, parity, and justice in their countries. They demand to be listened to, appreciated, and take active participation in decision making regarding their current, future plus the future of their communities and states. Tunisia, for example, has confirmed to the entire world that Arab World is not resistant from democratic change, and following several years of experimentation with the replica of armed revolution that merely led to violence, demolitions, and disillusionment, Tunisia gives a new form of transformation through tranquil demonstration and popular revolution. According to Serag El-Din during the conference held in Egypt on Arab Reform Initiative, the Arab countries has witnessed transformation, indicating that Arab constitutions ought to fight the logical inflexibility that subjugated the constitutional thought in the previous decades. Additionally, they demand to be heard in matters regarding the transformation towards authentic democracy because it is a novel atmosphere for them to that takes into consideration their stronger civic engagement. Hence, the new constitutions will take the Arab world to a new and bright future, therefore, the measures that would be undertaken regarding democracy through the electing of new
Thursday, July 25, 2019
The movie style of David Fincher Essay Example | Topics and Well Written Essays - 1500 words
The movie style of David Fincher - Essay Example Quotations from the film have been cited independently in the bibliography. Fincherââ¬â¢s choice and portrayal of protagonists merit some attention. Frequently, his lead characters are men in a stressful or otherwise unfulfilling job, at odds with the world they inhabit, and with complex and unstable psychologies. Detective William Somerset in Seven is on the verge of retiring from a long career in the police. He repeatedly speaks about the oppressive nature of the city he lives in and how he would like to travel ââ¬Ëfar [a]way from hereââ¬â¢. In Fight Club, the unnamed protagonist suffers from insomnia and has to join a slew of support groups to feel like a victim and find his emotional release. He is later revealed to be suffering from Split Personality Disorder as well. In Zodiac, the cartoonist-detective becomes obsessed with trying to solve the Zodiacââ¬â¢s codes and can think of nothing else, leading his second wife to leave him. The Game features millionaire Nicholas Van Orton, who, in his brotherââ¬â¢s words, was ââ¬Ëbecoming such an assholeââ¬â¢ that he needed an extraordinarily complex and dangerous prank played on him for him to be able to feel again. The Social Network also fictionalises its real-life lead Mark Zuckerberg as someone not really ââ¬Ëlikeableââ¬â¢. Film critic James Lewis Hoberman, in his review of The Social Network, describes the character as ââ¬Ëa sort of mildly autistic Sammy Glick with a grim 1,000-yard glareââ¬â¢. In the movie itself, the final lines are also directed at Zuckerbergââ¬â¢s character: ââ¬ËYoure not an asshole, Mark. Youre just trying so hard to be oneââ¬â¢. The social and psychological alienation of his protagonists then, are a recurrent feature in Fincherââ¬â¢s films. Another thematic concern that pervades Fincherââ¬â¢s oeuvre is contemporary society as a locus of apathy and emotional numbness. In Seven, Somerset repeatedly expresses his dissatisfaction with the society he inhabits
Wednesday, July 24, 2019
Employment Law Assignment Example | Topics and Well Written Essays - 3000 words - 1
Employment Law - Assignment Example She has all the rights to take legal action against the operation manager. These are the issues that are hurting the operation manager as well as the organization. In the first issue, UK Disability Discrimination Act 1995 can be implemented. Enid came to know that some organizational members and staffs are making fun of her problem. It can also be considered as a disability discrimination case in which she has not done any kind of mistake. According to this act, an individual within an organization cannot discriminate others based on disability issues. Therefore, in this case Enid has all the rights to take legal actions against the staffs, who are involved in wrongdoings. The legal case of Rolls Royce Ltd v Walpole 1980 can be referred as related to this case. In this particular employee was dismissed from work due to short-term absences in workplace due to disability issues and the employee was terminated (Walpole v Rolls Royce Ltd 1980). Then, the employee filed a legal complaint under the act against the organization. This issue is very much similar to the issue of Enid. She was discriminated in workplace due to her disability issues. In this case, the staffs and other engaged employees should be warned or should take apology to Enid. In the Second Issue, Sexual Discrimination Act 1975 can be considered as Barbara was sexually harassed by some male employees at the workplace. It is highly important Barbara to take legal actions against them as it is a serious concern for the organizational workplace environment. The legal case of Noeleen McAleenon v Autism Initiatives can be referred to the case in which the female employee was sexually harassed by a male co-worker and she went on to make a legal case against the organization (Noeleen McAleenon v Autism Initiatives 2013). Finally she was legally awarded with a compensation for this workplace harassment. The issue of Barbara is quite similar to the
Israeli Intelligence Agencies Essay Example | Topics and Well Written Essays - 500 words
Israeli Intelligence Agencies - Essay Example There are a number of theories provided regarding Pollardââ¬â¢s decision to betray his country of birth unto the Jewish state; nonetheless, the fact that Pollard betrayed his country of birth to Israel is away from all doubt. His defense was that he never spied so much against the United States; rather, he spied for Israel by sending those documents, which according to him, the US should have eventually shared with Israel. Pollard lacked the authority of making a decision regarding what documents Israel must have; however, based on his position of trust in the US Navy Pollard succeeded in delivering over 1000 classified documents unto Israel whereby his payment was super. Those documents contained the names of over 150 US agents found in the Mideast, converted into agents for Israel. Nevertheless, the most egregious harm brought about by Pollard was stealing classified documents concerning the US Nuclear Deterrent comparative to the USSR and sending them to Israel. Sources in the US State Department reveal that Israel then went ahead to trade those stolen nuclear secrets unto the USSR, in return for enhanced emigration rations from the USSR to Israel. Apart from that, there was other information, which slipped from the US to Israel and eventually to the USSR resulting in the loss of American agents, who were operating within the USSR. This damage done to the United States was enormous; therefore, it was extremely difficult to envisage of a greater harm to national security compare to that caused by the treasonous behavior of Pollard. 2 This is a clear indication that Israelââ¬â¢s spies are far from being harmless. The cost of building and maintaining United Statesââ¬â¢ nuclear deterrent estimated at five trillion taxpayer dollars in the 50s and 60s, and below $100,000 to be undermined by Pollard. Although Israel waited 13 years to confess that Pollard had been their spy, they eventually granted him Israeli
Tuesday, July 23, 2019
Legislation on Stem Cell Research & Related Issues Essay
Legislation on Stem Cell Research & Related Issues - Essay Example The actual research on stem cells began after the 1950ââ¬â¢s when a cure for leukemia and several immune-deficiency disorders were sought that were life-taking (UK Stem Cell Foundation 2011). Stem cell research produced a cure for leukemia through bone marrow transport from a sibling and within no time, people began to look forward at the same to develop a cure for several other disorders. People still consider stem cell research potentially providing a cure for several disorders including renal conditions (requiring renal transplantation, neuro-dengerative disorders, cardiac disorders, cancers, etc, wherein no cure for the same has been found till today using other forms of technology. In order to generate opportunities and cure for the disorder there needs to be greater funding from the Federal government in order to pioneer and support the development of such technology. In the past, stem cell research has also worked real-time cures for several disorders. For example, a person who had a gene resistant to the HIV virus, stem cell research helped the person to stop taking antiviral drugs. ... logy and that in sporadic cases, cures for several diseases have been obtained, there is no evidence to point out that stem cells can in fact proved a cure for diseases. These two points into consideration, the Bush Administration in 2001 decided to partially fund such research and slowly phase out the use of such technology. Stem cell research also involves harvesting body parts and for this reason the Congress sought a ban (Wertz, 2002). However, it should be noted that the Congress sought a ban only on that research that involved destruction of embryonic stem cells that had the potential to transform into living beings. Slowly with greater mileage and greater studies that proved that stem cells provided a cure for various disorders that were otherwise incurable, slowly stem cells research was sought as a necessity. In order to regulate the funding and projects under the stem cell banner, the California Institute for Regenerative Medicine was created in 2004; any organization that wanted sponsorship for stem cell research had to approach to the CIRM. With greater pressure on the Bush Administration on the policy of banning stem cell research, a partial reversal of the policy was taken by the Bush government. The Barack Obama Government which came to power in 2008 immediately signed an Executive Order that permitted stem cell on human embryos. A clarification was issued by the US Federal Government in 2011, which said that the funds could only be used for stem cell research and not on destruction of human embryos. Hence, research projects that wanted to use federal funds had to have a clear and constructive purpose for stem cell research and not mere destruction of human embryos that would otherwise be obtained from the leftover embryos from couples who undergo IVF
Monday, July 22, 2019
Hard Times Essay Example for Free
Hard Times Essay Mr Gradgrind says is it satisfactory to me to know that you do not come to the consideration of that question with the previous habits of mind, and habits of life, that belongs to many young women in reference to fancy and emotion when deciding whether to marry Mr Bounderby or not. Later on in the page we are told that Louisa was compelled to throw herself upon his breast and give him the pent-up confidences of her heart. However this doesnt happen because Mr Gradgrind fails to see it. This is because of the artificial barriers that have been set up between him and his daughter and these barriers are primarily fact and his utilitarian views. It is a utilitarian view because he believes the decision should not be made based on the individual happiness of Louisa but on what will be best for everyone and therefore looking past her. It also is criticising Utilitarians and Mr Gradgrind through the use of dramatic irony in the sense that we see that Loo yearns to talk to her father but he doesnt and we are criticising his inability to see it. The barriers being set up are metaphorical barriers he has put between himself and his daughter emotionally to achieve the greatest good for the greatest number of people. The barriers are themselves blocking out subtle essences of humanity with reference to fancy. By saying that fancy is an essence of humanity in accompaniment with Gradgrinds will to get rid of fact we see that Dickens is showing us that utilitarian principles strip us of these essences of humanity and therefore de-humanises us. Furthermore it is a very human ideal for a daughter to confide with her father or parent in general but here Louisa has been stripped of that showing us even more then de-humanising qualities of fact. Dickens then goes on to say that these subtle essences of humanity will elude the utmost cunning of algebra until the last trumpet blow even algebra to wreck saying to us that fancy and emotion will always beat fact. The last trumpet is judgement day so Dickens is saying that fancy will win until the end of eternity. This passage clearly shows Dickens preferences to emotion and how he feels it is superior although he does give fact some credit when he says blow even algebra as if algebra is a tough subject to blow. Then dickens talks about how with his utilitarian face he hardened her again telling us that utilitarianism is hardening Loo. First of all this builds sympathy for Loo because we were told earlier that Loo wanted to throw herself upon her father but she cant because of the barriers and is hardened again and secondly builds up our dislike for Gradgrind and utilitarianism more because of its hardening qualities.
Sunday, July 21, 2019
How music influences the fashion industry
How music influences the fashion industry This study is purposely carried out in order to find out whether music has any influence on fashion. The research question that will be a guide to the establishment of the intended explanation will be: Does music influence fashion? The hypothesis therefore for this study will be; music has had a great influence on fashion both now and in the recent historical times. This is greatly supported by the fact that music is an independent variable and has everlasting effects of various aspects of the society including fashion (Powell, 2001, pp 134). Fashion in this case will serve as a dependent variable since it is affected differently by the different types of music that exist within the society. Additionally, it has been seen that fashion changes with the entry of a certain song to the music industry (Lounger In Society, 2009, pp 4). This study as it tries to establish the effect of music on fashion will provide helpful information to the fashion designers because they will be able to id entify the best marketing strategies for their products by relating it to a particular genre of music that is considered fashionable (Huntley, 1972, pp 66). Introduction There are various entities in every society that influences its behavior and interaction among its members. The way people work, relate, play, eat or even dance is influenced by music in one way or the other. Within the society, it is also important to note that its members have different tastes and preferences to various kinds of music (Powell, 2001, pp 137). Such kind of music includes reggae, rhythm and blues, pop, rock, classical, hip-hop, jazz among others. Music in essence is a form of an art that organizes sound in a melodious manner with the aim of expressing feelings and emotions. It is rare on earth to find a human being who does not have a taste to any kind of music (Shmoop University, 2000, pp 13). The music could either be international like reggae, pop and rock, or local as used by various native languages within a certain locality. Music has tremendously grown and may prove hectic for one to be able to categorize it into various types because its origin may not be easi ly decoded by history (Huntley, 1972, pp 69). The study of behavior and music shows that music has an eccentric influence on fashion as manifested by the trends emulated by youths and other members of the society. Fashion can be defined as the mirror of what the society thinks and does within a certain period of time (Randel, 2003, pp 253). This is widely noticeable when music of a particular genre is released and attracts the attention of many listeners. This is also expressed through the radio stations that people listen to and the videos for the songs they watch. Music is an integral part of the social environment and cannot be avoided. It also influences how young people grow up and ultimately contributes in the setting of various societal norms (Campbell, 1994, pp 27). This is seen as a way that creates excitement and alters how an individual especially teenagers dress and decide to emulate the dressing code of a particular singer. This research will greatly dwell in providing evidence that the various trends in the music i ndustry have had a big influence on fashion (Warner, 2003, pp 123). Aims and objectives It has always been and will remain to be a belief that music is the food of the soul and a panacea of the mind as greatly depicted by the ability of children and other individuals to grasp a verse of a particular song within a short time (Randel, 2003, pp 253). This becomes a relevant topic because it influences different dressing styles of the society being examined. The purpose of this research therefore is to revisit the evolution and history of music and cultural backgrounds, outline various types of music, examine the prominent debates relating to music and fashion, and enumerate various fashion trends in each type of music. The research will further introduce and examine various fashion designers, musicians, and photographers who have influenced fashion through their careers particularly music (Cargan, 2007, pp 116). Literature review The success of this research and the definite provision of solutions to the identified objectives will dwell on the facts provided by various writings that relate to this topic. Various authors have shared their arguments and made immense contributions to indicate that indeed, music has an influence on fashion. This is clearly pointed out and illustrated by the dressing styles that people copy when they listen to a particular type of music. Tortora and Eubank in their book Survey of historic costume: a history of Western dress argued that the industry related to fashion has always been a risky venture due to unpredictable dressing trends emulated by the society caused by the dynamics in music industry. They pointed out that people changed the ways they dressed to imitate that of the singers in any famous song within a particular period of time (Tortora Eubank, 2005, pp 171, 519). An article by Hunter in the Cincinnati Magazine points out clearly that music and fashion are one entity and they go hand in hand. He used an example of the seventies where there was spontaneous freedom in the choice of music that was attractive to the youthful population of the time. During that time, people went for the outfits that would make one look disco-like and contrasts the ones of the nineties. He however showed that the fashion tastes for a particular age-group may be different and this is enhanced by music that they listen to (Hunter, 1997, pp 50). Duran Alan on the other hand gives diverse interpretations that have been given as it relates to fashion. He uses an example of David Bowies song, Fashion that clearly points out how rock music is intertwined with fashion concerning the dancing styles and mode of dress. According to him, the interpretation of fashion and how it has been affected by music does not involve the taking of rigid stands and should not be assumed (Dur an, 1984, pp 189). Wilbekin on his part while interviewing Armani (a designer) was able to find out that most of the fashion outfits he makes are determined by the type of music people listen to. An example of hip hop music is given where he says that it embraces the fact that one becomes more real and individualistic. This is because according to Armani, all rules of fashion have been broken by hip hop by technically fusing sportswear and high fashion. In addition, he says that the street wear has formed a fundamental idea of modern and casual lifestyles. We can be able to identify that this magazine critically answers our research question. He also uses the examples of DAngelo, Mariah Carey, and Lauryn Hill to explain the influence that the musicians have made in his fashion boutique. He also points out that most hip hop artists are attracted to the legendary Italian wear like suits, fedoras, and jewelry and this will automatically be copied by their listeners (Wilbekin, 2000, pp 172). In her book, Fundamentals of sociology, Sharma points out that music refines human tendencies in day to day life which enhances the societal feelings depicted through singing and dancing. He also adds that since there have been improved modes of communication, the influence of a particular genre of music spans over a wide area thus proving a universal effect (Sharma, 1996, pp 345). The effects are clearly brought out when Steele analyses the effects music has had to the society for the last fifty years (Steele, 2000, pp 155). It critically examines the effect it has brought culturally, socially and even economically. It is important to point out that during the same period, there was a great evolution of music and thus the effects were diverse. She enhances her analysis by using fashion pictures thus providing the required evidence of the changing fashion trends of the time (Steele, 2000, pp 163). Blackwell and Stephan in the book Brands that Rock have used Madonna as a perfect example to bring in the fact that music influences everything and fashion cannot be left out. They explain that music hypnotizes everybody and this relates to Madonnas fashion of KISS. They have indicated that the success of this fashion trend was achieved due to various performances and shows in clubs (Blackwell et al, 2004, pp 157). What would follow were unprecedented sales of the clothing inclined to the KISS fashions. In this case, it has been illustrated that people were able to elevate themselves to megastar status by choosing music as the best choice to do so. This involved the choosing of the best music style that was acceptable and quality and this would influence people of all categories (Blackwell et al, 2004, pp 153). Bunt on the other hand categorically states that because music influences the society, the effect will automatically shift to fashion. This serves to answer our research quest ion because Bunt has shown that music has some influence on fashion (Bunt, 19994, pp 98). The effort of Radano and Bohlman cannot be left out in this research due to their contribution in the provision of facts of the effects of Gypsy music in rural Hungary. According to them, the effect of this kind of music swept the rural Hungary irrespective of the age bracket. This was followed by the imitation of the dressing culture of the musicians and this had immense effect on the fashion and the traditional musical traditions (Radano and Bohlman, 2000, pp 409). In his comparative studies, Kerman in his part took much consideration on the assimilative culture of Elizabethan madrigal. According to him, the impetus of copying foreign musical styles led to the local flourishing of musicians and within a short span of twenty five years, the whole fashion industry had drastically changed. He credits the cause of the changes to the native inspiration of musicians and their fans (Kerman, 1962, pp 130). Hockx and Strauss on their part made a significant impact in this field by taking a study on the Chinese culture. According to them, the dressing culture of the cities of Beijing, Shanghai and Guangzhou have been influence by a particular musical genre. Beijing for instance has faced a lot influence from rock music while the city of Xinjiang has been influenced by pop music. They also point out that this has contributed immensely in dynamic change of fashion where music is the driving force. The local music industry has seen itself adapting to innovative ways which are instantly copied by the fashion industry and ultimately their fans (Hockx Straus, 2005, pp 3). Hendrickson in his book Musica Christi gives us some information about the effect that music has had on fashion. He takes into consideration a discussion by various theologians that shows that the dynamic nature of music has influenced the defining of analogia entis and fashion. The effect of musical styles on fashion during the renaissance period has also been wholly discussed and this goes in line with our research question and our objectives (Hendrickson, 2005, pp 83). Sims in his book Rock Fashion illustrates and explains the fashion trends that have accompanied the changing times of rock music. One example is the fetish wear items and biker clothes that were won by singers and this was immediately imitated by the listeners. Chain jackets and sideburns that the rock musicians like are most of the time seen among their listeners and fans. Sims goes ahead and uses the example of Cliff Richards white tie and Johnny Kidds eye patching that made most of their fans to change their wardrobe. His contribution in this research extends further when he points out that in the past forty years, the rock stars have influenced fashion in various cultural groups of the world (Sims, 2001, pp 14). Jones in his book Fashion Design expresses music as an inspiration to the world of fashion since designers are forced in one way or the other to be creative and follow the fashion details and fabrics that would fit the listener market for a particular genre of music. He p oints out that a good fashion designer goes with the music of the time if he/she has to make good sales. This clearly points out how music influences fashion (Jones, 2005, pp 17). An article by Tony Ware in the CMJ Music Magazine titled Brand New Wave describes the dressing trends of the eighties where musicians wore asymmetrical outfits to battle for their commercial space in the discos. This extended to the various geometric haircuts by musicians like Britney and Kid Rock. From this analysis, we can point out clearly that the fans would go ahead and ape their model stars especially in the field of hip hop and pop (Tony, 2001, 45). Vernallis in her book Experiencing music video: aesthetics and cultural context, takes into consideration enormous effect that music video has influenced music and fashion. The visual imagery that pop songs of the sixties had on the society according to her, affected fashions to a very large extend. She points out clearly that the introductions of music videos enabled the fans to watch for themselves and thus were able to identify the particular dressing styles of their stars. They would in turn copy it and thus making the fashion of the society to be affected in a way that follows the trends of the time (Vernallis, 2004, pp 287). Shepherd John in his book titled Continuum Encyclopedia of Popular Music of the World: Media, industry and society made a significant contribution to this research by identifying the various musical types and how they have influence fashion. His book contains contributions from more than a hundred individuals relating to how popular music has influenced the society. His works contain all the influences music has had on the societal culture which of course has a direct influence on fashion trends that accompanies the songs. The book clearly indicates that, regardless of any part of the world, music has a significant influence on the trending trends of the listeners (Shepherd, 2003, pp 56). Morrell Ernest in his book Becoming Critical Researchers uses the evidence from the urban culture teenagers to conclude his finding that music has a direct influence on fashion. He says that hip hop for instance influences fashion as indicated by a college student wearing a T-shirt and a hat which i s mostly a characteristic of hip hop musicians (Morrell, 2004, pp 72). The contributions made by Kendall Diana to this research cannot be left out because she has brought clearly the aspect of fashion as a valued style of behavior found in many areas of our lives including music (Martin Lehu, 2009, pp 34). She further asserts that contemporary music and clothing in the United States to some extent reflect some aspect of African, Caribbean, and Asian culture. It is also in this book that we can be able to know that music has facilitated cross-cultural influence in fashion indicated by the dressing styles that accompany the song in question (Kendall,2009, pp 66). Bennet, Temperley and Yang in their book Lectures on musical life, endeavored to show the influence that music as an art has had on fashion. According to them, music is rooted in the acceptable manners of the society and these results in dynamism associated with every kind of new music that comes across. They went ahead and pointed out that the performance of a particular fashion as rooted on mu sic has a traceable and more gradual effect on the composition of the song itself (Bennet et al, 2006, pp 146). Research Methodology The primary method that was used to obtain the answers to the objectives of this research involved the use of questionnaire. A well structured questionnaire was formulated and contained probing questions that would ensure that the correct answers are obtained from those whom they were administered to. The use of this method of obtaining the required data is reliable and facts are recorded instantly thus merited (Miller Salkind, 2000, 27). The method is also advantageous because information is obtained from the correct person and not second hand which would otherwise lead to distortion of results (Lippman, 1999, pp 34). The presence of the person who is administering the questionnaire is also an advantage for this method because the questions that have not been understood may further be explained in more understandable manner. The method however, is too involving and cumbersome. In addition, it was realized that open-ended questions took longer time to be answered and took long time to be analyzed while some respondents made a lot of exaggeration in some other questions (Cargan, 2007, pp 116). The questionnaire that was used in this research consisted of twenty five questions all which were geared towards achieving the objectives of the research. Some of the questions included among the following: What is music? What is fashion? Is fashion influenced by music? Give the instances that you think fashion has been influenced by music? What types of music do you know? Briefly describe the history of music according to your own understanding. Name any musician who has influenced your wardrobe or that of someone you know (Titon et al, 2009 25). These are some of the sample questions that were in the questionnaire among others. In order to minimize errors and enhance accuracy, two hundred and fifty questionnaires were prepared and administered over randomly selected individuals. Results were then collected and analyzed before arriving at the final conclusion (Metz Benson, 1999, pp 166). The other primary method that was used was direct interview with identified clients. Interview however had fewer questions than the questionnaire but answers were more detailed because the interviewer could use various skills to identify if the person they are interviewing has answered the question correctly (Seale, 2004, pp 165). Wherever a mistake was realized, the interviewer would immediately devise ways that would ensure the question is correctly answered. The method however has some limitations, these includes; the exercise itself being too involving and sometimes affected by language barrier or handling illiterate clients. The interviewer was also expected to avail himself to the client unlike the use of questionnaire where it would just be sent to trusted clients. Few interviews were however carried out because they were just meant to supplement the questionnaire. Data collected was then analyzed and relevant results recorded (Seale, 2004, pp 170). In the course of the research however, there were instances that required the use of secondary sources with the aim of primarily giving weight to the data that were already collected (Kumar, 2001, pp 58). Our research used library search as and indexing and involved the research panel going through written texts that had similar topic on the effects of music on fashion. This method was the best alternative of secondary sources because it provides trusted results and data thus enhancing the accuracy of the data being collected (Kumar, 2001, pp 63). Futhermore, its analysis required minimal time and limited skills from the research panel. This method however had a limitation because it was difficult to obtain the exact required data and thus several texts were to be analyzed. This consumed some good quality time in the research (Campbell, 1994, pp 27). Results and Findings After the completion of the research and findings analyzed, it was found out that most people agreed with the fact that music affects their fashion in one way or the other. Some would find themselves aping the dressing styles of the musical stars or the hair styles (Hook, 2010, pp 3). Others however were not directly affected by music but out at their friends who find themselves changing their wardrobe to resemble that of renowned stars like Rihanna, Jay-Z, Madonna among others (Tera, 2009). Due to the agreeable fact that music affects our lives, its found out that the rate at which the listeners respond to a particular fashion was unpredictable since music solely depends on mass media for it to be heard or known (Manlow, 2009, pp 45). The introduction of musical videos is seen as milestone that enhanced how music affected their fashion because they can be able to perceive the current trend of dressing (Perpetual-vogue, 2008). The history of music according to this research can be factually traced until the First World War where jazz music was sang in the 1920s (Miller Salkind, 2002, pp 16). Famous jazz players like Louis Armstrong began his career as a jazz player and his music attracted many people of the time (Tera, 2009). The euphoria of jazz was later replaced by Swing type of music which was later replaced by Rock and Roll of the 1950s. In 1960s, The Beatles was the fashionable musical style of the time. The rockers of the 50s were primarily characterized by leather jackets and the keeping of long unkempt hair. On top of these, drainpipe trousers and rubber-soled shoes were a characteristic of Rock and Roll artists (Tonneau Thompson, 2000, pp 269). Music of the 1960s made so many people to be cloth-conscious and teenage fashion of the time entailed the wearing of short hair, shoes and green parkas were relatively long. It was during this time that musicians started wearing necklaces and were quickl y aped by their fans (Jones Brown, 2005 pp 128). Disco hits came in the 70s which became a driving tool of fashion in the urban areas and it may seem as though the style is dead but the current fashion is deeply rooted in it. People in the 80s and 90s desired the Grunge look popularized by hip-hop and involves attires not limited jumpsuits, sneakers, and Kangol hats (Katz Dahlhaus, 1987, pp 93). Fashion of this generation is considered modest and the music industry of this genre was popularized by artists like Notorious B.I.G, Tupac Shakur, and Jay-Z among others (Hess, 2007, pp 406). Wearing of t-shirts and jeans is an example of the millennium music closely related to Hip-hop fashion and pop (Welters Cunningham 2005 pp 19). The supremacy of baggy jeans and large black rimmed glasses are characteristic of fashion in this musical era. It was also found out that it is during this time that the use of pink color by the lady world found its way to the fashion shelves (Rosengren, 1994, pp 73). In the course of this research, various kinds of music were identified and it was clearly pointed out that each musical genre was related to a particular fashion trend. Among the genres include; classical music, rock music, metal music, hip-hop music, trance music, jazz music, and techno among others (Katz Dahlhaus, 1987, pp 93). It is important to note that irrespective of the type, music has an impact on its listeners. The roots of Rock type of music can be traced to the rock and roll era which began a dance but later became dominant to the teenage audience of the time. Metal music on the other hand is a rather rapidly played music that dates back to World War II (Henwood, 2010, pp 16). Most people consider it to be associated with members of the society who are not satisfied and this has greatly impacted on the other types of music. The minorities in America are believed to be the inventors of rap music characterized by break dancing and a lot of graffiti. This kind of music has also influenced the Jamaican music which is deeply rooted in reggae music (Benstock Ferriss, 1994, pp 197). Wedding music was also identified in the research but one can realize that it can be fused with other types like classical or traditional. This is because wedding is an occasion characterized by the changing moods of the people (Campbell, 1994, pp 27). It also diverse among the different cultures of the world and dancing in this occasion can range from the Brazilian salsa and even to pop music. Hip-hop on the other hand is the one characterized almost all instruments with bass taking the prominence (BensmaÃÆ'Ã ¯a, 1987, pp 88). It is generally used by artists to show different feelings and this has resulted in hip-hop culture and thus hip-hop fashion. The roots of this musical genre can be traced to West African music. Trance music is mostly played in clubs and discotheques and is easily traced to the 20th century music. It is basically characterized by fast tempo and quick repetition of beats that creates a hypnotic effect on its listeners (Longhurst, 2007, pp235). The research would not have been successful if country music would not have been identified. This kind of music and a couple of other folk music gained popularity in the 40s to mid 70s by musicians like Bob Wills and Bill Mornoe (Greaves, 2009). There is also Techno music which was identified and this has been seen to have a direct relationship and following among high school students. Western music has a variety of musical genres among them are music which incorporates classical and experimental music (Wallin et al, 2001, pp 49). There is also the pop music and fabulous music that ranges from reggae, rock, and metallic. Latin music has also been gaining popularity in the recent past and with its unique dressing style, people are also aping the fashion associated with all the kinds of music (Krummel, 1987, pp 93). Music as identified from the research carried out affects fashion and fashion trends in any society. It has been indicated that fashion is the styles especially dressing which are constantly dynamic in a given culture within a given time (Malone Stricklin, 2003, pp 124). Someone may be considered fashionable when they fit to the current dressing trends that are mostly popularized by music (Llanas, 2010 pp 11). When they do not fit to such kinds of dressing modes then they are considered unfashionable. Fashion can sometimes be used together with beauty or style. Fashion trends have solely been influenced by musicians and songwriters to the extent that the fashion industry has been intertwined with musicians (Bierut et al, 2002, pp 259). Such artists use their fame popularity to sell a particular line of clothing. Jennifer Lopez and Gwen Stefani for instance are making a kill by incorporating fashion and music (Gehlhar 2008, pp 230). Adidas as a fashion phenomenon was popularized by rap song and this resulted in massive sales. This also happens to other wears like hats, tracks and T-shirts. The trend is seen to have change to sleeveless rock T-shirts in the 90s and was particularly popularized by musicians like Poison, Ratt, and Ozzy among others (Seale 2004, pp 165). The Grunge look is also a fashion trend that was popularized by Nirvana in the 90s while Kangol became fashionable when LLcool J placed it as a trademark of his hat. It is also in the 1980s that Madonna drastically changed the way girls dressed to look bold and beautiful (Perkins, 1996, pp 266). She became the queen of fashion during this time and most girls imitated her dressing style to the fullest (Tonneau Thompson, 2000, pp 267). On characteristic of this era was the black leggings, bangles, bracelets, ballerina skirts, large earrings among others. This resulted in the formation of the MTV television network that brought out stars and their out standing fashions (Solomon Rabolt , 2004, pp 72). The launch of MTV popularized the fashion trends of musicians like Michael Jackson, Madonna, Whitney Houston, among others in the year beginning 1981. Their names were extensively used in various households and this promoted imitation of their fashion by teens and even young adults (Malone Stricklin, 2003, pp 127). This includes his legendary jackets which he wore mostly in his videos and later the white gloves of the millennium times that are still worn by his fans even after his death. A song sung by Madonna titled vogue mentions some of the renowned actors and actresses who have influenced the wardrobe of the populace (BensmaÃÆ'Ã ¯a, 1987, pp 89). Among the people she mentions includes Grace Kelly, Jimmy Dean Jean Harlow among others this was seen as a tool that generated more sales for fashion designers (Schneck et al, 2008, pp 186). It is vividly noticeable that whenever a new song comes out, fashion changes and it appears rather funny to see how people change rapidly with the entry of a particular song. One example is during Avril Lavigne time when she released her song Girlfriend. Just because the video of the song featured her wearing a tight miniskirt was enough to make other girls ape (Lysloff Gay, 2003, pp 334). It is important to mention the contributions of three hip hop artists who have been the latest movers and shakers in the fashion industry. Kelis Daringa in the video of her song I bossy is credited for the introduction of the sleek and A-symmetrical haircut that was immediately imitated by her fans (Malone Stricklin, 2003, pp 124). Rihanna on her part as a pop star changed her look from the traditional brown hair to the edgy black style. The influence that she elicited can best be seen by looking at teenage girls around. Kanye West on his part has impacted the fashion industry wherever he goes. T alk of sweater vests and unique sunglasses and all directly linked to him (Tonneau Thompson, 2000, pp 260). Conclusion Both music and fashion are forms of art and are inseparable since they depict our expressions and viewpoints within our scope (Hawkins, 2006, pp 12). It was found in this research that people dress in relation to the music they listen to and thus providing an answer to our research question, does music affect fashion? Our cross-examination of the last six decades has given us tangible evidence on the growth of music and how it has influenced and how it has impacted on the wardrobe of their listeners (Lysloff Gay, 2003, pp 330). Fashion designers and marketers are fully aware of the effect of music on their products and they can only be able to maximize their sales by coordinating it with music. It is also important to mention the fact that people are placed in a particular stereotypical image due to the music that they listen to and the clothes they put on (BensmaÃÆ'Ã ¯a, 1987, pp 88).
The Truth About Journalism Media Essay
The Truth About Journalism Media Essay Journalism, a profession of unveiling truth, bringing facts in front of people has been under discussion for quite a while. The main reason why media and journalism has attracted so many spotlights in recent years is the freedom of speech and independence of media from any governmental influence. It was a profession of honor, now has become a taboo in some of the societies. Should journalism be verdicts or just another literature in a hurry? Journalism has been a respectful profession not just a game of mud splashing and money making in no time, it was a source of information for the people belonging to that nation. It should be so today as well as tomorrow. What is journalism in real? Is it just the challenge of satisfying the space or it is a discipline of assembling, authenticating, covering and analyzing information drawn together regarding current events, including development, problems and people? Journalism informs society about itself and makes public that which would otherwise be private (Tony Harcup, 2004). Those who practice journalism are known as journalists. Journalism plays a vital role in society. Different journalists have different viewpoints, some say that it is important to go in depth of the issue and trace back its history, while others say that it is not important to know the history of power and authority however only to put the fact as it is in real is foremost important (Tony Harcup, 2004). Supportive arguments with documented evidence Journalists who think that it is vital to find out about the history of politics and power related to any issue in a certain place hold this perception because of many reasons. Firstly knowing the societies through their own perceptions is very necessary. Until a person understands the historical context of that area or society, it will be very difficult to judge their behavior and give a verdict about what is being done wrong here. Learn from the article Different societies have different norms and values. They think differently and act differently, for them there might be something wrong which is right in our society. So to decide whether this should make the newspaper as someones gossip, it is necessary to find out about the right and wrong from the eye of the commoner (Bird, E. 1990). Supportive arguments with documented evidence If journalists are to live up to the principles of their occupation, they need to glance further than the expected confines of politics and journalism as they now survive-limits which, in large gauge, they themselves have set since they take pleasure in a relatively elevated extent of autonomy in democratic societies. Too often, the master narratives are about disagreement, and winners and losers, which in turn produce the shallow story that not passes to effect necessary social change and development (Ron Smith, 2008). Learn from the article News, issues facts and information about a society does not hang outside in just some ethereal way that journalists pass it on. News is not a commodity to be sold or that can be apportioned for readers and viewers. This is the point where a journalist comes in and extracts the important matter and makes it into news. For that understanding the cultural, historical context of the society is most important. There are journalists who do not think that it is important to understand the context and background of the news before making it public. They believe that truth and honest facts should reach the nation as they are in real. No manipulation should be done to the facts to show the concerned people in a positive spotlight. Facts should be made public no matter how gross they might be. Supportive arguments with documented evidence These types of journalists think that in journalism, assertions should be reported as if they were true, whether or not they have been stranded in a thorough process of confirmation. In fact, the assumption is such a fundamental constituent of all journalism that it extends to both so-called excellence and tabloid reporting. Learn from the article A tabloid story is accurate if it realistically reports what was said or printed by sources. By this standard much of what is written in tabloids can be claimed to be extremely accurate including, one might add, the declaration of experts on alien abductions (Bird, 1990: 378). Wilkinss argument, then, is a call for a much more sophisticated understanding of what comprises truth and fact than journalists are typically armed with. I as a person interested in journalism would rather prefer the truth based journalism. No doubt that the historical contexts are very important but now the political conditions all around the world has worsened so much that giving the right facts and timely information to the public is more important. Learn from the article Honesty is integral part of journalism which is for what the public and nation keep their eyes in search for. Whether the news is related to local and common people or any breaking news about the well known figures of the state, the news should be authenticated and should be without any manipulation. Learn from the article Recently in Jamaica there was uproar about the government that it sold the Sandals Whitehouse hotel to Gordon Butch Stewart. One week after this announcement that Cabinet has approved the proposed sale of the five-star Sandals Whitehouse hotel to Gordon Butch Stewarts company, Gorstew Limited, the office of Contractor General has asked to halt the sale. It must be made unmistakably obvious here, that the contractor general is entirely correct when he says his office, the Office of the Contractor General, is an autonomous anti-corruption commission of Parliament which is authorized by law to perform enquiry into the award of government awards and to make sure that everything is above board (John Maxwell, 2010). Learn from the article He is right again when he says that it is against the law for a contractor general in the effect of his authority, to be subject to the dictates, direction or control of any person or authority. He must be totally satisfied that the Gorstew deal is in the best interest of the country and complies with all the necessary protocols and rules. Supportive arguments with documented evidence The transaction of the embattled Whitehouse hotel in Westmoreland to Gorstew has obtained many remarks with some quarters laboring under the misinterpretation that it is a sweetheart deal that is injurious to taxpayers. Learn from the article The news channels and news papers are making this issue their front page headlines, no matter that the government is involved in the deal of this sale of the hotel, the facts and figures related to this matter has been made public with entire openness, may be with not so much honesty, only to get the high rating on news channels and papers, yet these facts reach the public knowledge. Learn from the article Journalism is a tool to effect the needed change in society. à But unluckily, with the course of time, its real meaning has gone astray. Today, for the so-called journalists, robust salaries and of course, quick promotions alone, matter. And the insincerity is that while publishing any news what concerns them most is that they should beat their counterpart. The purpose should be to take on the troubling rudiments and explain to people who bank on the media to keep themselves knowledgeable and updated. Its not at all a felony to provide amusement but if it starts corrupting the roots/base obviously it will raise many eyebrows. à Journalism is sometimes said as the mirror of any society, but this was the ideology long time back, now it has changed. According to Thomas Jefferson I do not take a single newspaper, nor read one a month, and I feel myself infinitely the happier for ità People think that newspapers and media has gained too much freedom that it has forgotten the ethical values. Supportive arguments with documented evidence Journalism in the 20th century was explicitly an instrument of state control; this gave way to its becoming comparatively independent however it still remained liable to manipulation by those in power. This means that the conventional role of the journalist may actually become evanescent within a decade (E Quinn 1980) If the role of the journalism is to help us make decisions in national affairs, then we could ask for fewer retrospective stories and more challenging questions about governmental activities plans for the future and instead of only raising our eyebrows to communicate our anguish, we should get up against it so the line of work regains its lost grandeur. Though it sounds studious, I dont see any other solution. If we have an unflinching desire, I think we can do it (DB Bobrow 1973) Conclusion Journalism is a revolutionary aspect where individuals can decide to spread the truth, or make their own. Governments dont need liberated press, but liberated journalism needs egalitarianism or democracy. Free journalism is simply unattainable without one. A democratic system would be unachievable without trying to incorporate the community into governmental dealings. A French novelist once said, Free press can, of course, be good or bad, but, most certainly without freedom, the press will never be anything but bad. Journalism, for healthier or for poorer, is the best paradigm of the freedom of individuals and the significance of free deliberation in a dictatorship. If we can come to a conclusion why society needs to be well educated about the issues, matters and troubles going on in the world, then we can ask what kind of journalism they need and how they should use the existing media. It is our by and large conclusion that raising questions would be the superlative way to encourage debate among journalists and political theorists.
Subscribe to:
Posts (Atom)