Sunday, December 29, 2019

Shooting An Elephant By George Orwell - 1670 Words

During the last few weeks of my senior year of high school, I was hanging out with a few friends; it was late at night and we were on our way to a nearby park. Out of sheer boredom, we started playing pranks on one another. Some of the pranks were downright awful. In one instance, my friends decided to hide in a nearby bush and scare people who walked by. Initially, I was against pranking people, but reluctantly agreed because I did not want to be known as the â€Å"killjoy.† One of the people we scared, a five-year-old returning from the park, fell in a puddle and hurt his knee. We all ran away to avoid getting caught. Actually, I did not want to prank people; however, the social pressure of being with my friends in addition to my role in the group eventually caused me to comply. In â€Å"Shooting an Elephant,† by George Orwell, Orwell faced a similar dilemma. â€Å"Shooting an Elephant† is an essay that depicts Orwell’s conflictions about shooting a ramp aging elephant while he served as an Imperial policeman in Burma during British colonial rule. In his essay, Orwell describes the difficult decision of whether or not to shoot the elephant and why he made his decision. Although he did not initially want to shoot the elephant, the social pressure of being surrounded by a crowd of Burmese natives encouraging him and his role as an Imperial policeman ultimately forced his hand. The concepts of social pressure and roles are studied in many different experiments and studies. Two prominentShow MoreRelatedShooting An Elephant By George Orwell1246 Words   |  5 PagesSalma Kingu Professor: Michael English: 1301 Essay 2 Summer: 06/26/2017 â€Å"Shooting an Elephant† by George Orwell In the 1950, George Orwell was a police officer during the British Empire in lower Burma, India who was ill- educated and secretly hated his job due to the dirty works and evil of colonialism; George Orwell wrote the story about shooting an elephant. Shooting an Elephant is a story which describes how the British occupiers were badly treating the Burmese by killing and terrorizedRead MoreShooting An Elephant By George Orwell867 Words   |  4 PagesShooting an Elephant The short story â€Å"Shooting an Elephant† by George Orwell describes Orwell’s experience as a police officer of a town in the British colony of Burma. George Orwell, a military occupier in the Burmese land is much hated by the civilians. The hatred he receives from the locals makes him despise the British Empires mistreatment on the Burmese people. However, he also resents the locals in the village for revolting against him, for he is only a worker of the British Empire. â€Å"ShootingRead MoreShooting an Elephant by George Orwell 884 Words   |  4 Pagesappeared normal as usual. I was only in the kitchen for five minutes when I heard my brothers screaming my name. I rushed over to the screams which led to my room. My brother’s faces were pale with fright while they waited outside my room door. It was as Orwell once mentioned, â€Å"Evidently there was something that the children ought not to have seen† (pg. 231). They pointed towards the birdcage an d I immediately started thinking if I’d forgotten to feed the birds. While I gently removed the towel that I placedRead MoreAnalysis Of Shooting An Elephant By George Orwell988 Words   |  4 PagesEric Arthur Blair, or commonly known as George Orwell, is the author of many compositions. Blair, the author of two of the most famous novels of the 1920s; Animal Farm and Nineteen Eighty-Four, was born in Eastern Indian. He joined the Indian Imperial Police in Burma but resigned in 1927 to become a writer (BBC). Orwell’s style of writing can be described as bold and vivid. He puts the truth in his writing. Orwell’s novel, â€Å"Shooting an Elephant,† was published in 1936. In the novel, a colonial policemanRead MoreShooting an Elephant by George Orwell Essay585 Words   |  3 PagesShooting an Elephant by George Orwell In his essay Shooting an Elephant, George Orwell explains how the controlling authorities in a hostile country are not controlling the countrys population but are in fact a mere tool of the populous. Orwells experience with the elephant provided the insight for his essay, and gives a clear example of the control the natives have over the authorities. The authorities in Lower Burma were there to police the state that their government controlled, butRead MoreShooting an Elephant bye George Orwell1019 Words   |  4 Pagesmeans a loss of dignity. George Orwell’s short story, â€Å"Shooting an Elephant†, is an ideal example. In the story, Orwell, the main character, works as a policeman in Burma in the 1930s for the British Empire. One day, an elephant tramples loose, and although Orwell has no intent on shooting the elephant, a mob of native Burmese pressures Orwell to shoot the elephant. He reluctantly acquiesces to prevent being humiliated. After that experience, Orwell writes â€Å"Shooting an Elephant† to demonstrate nativeRead MoreAn Analysis Of Shooting An Elephant By George Orwell1147 Words   |  5 Pageswhere he is hated and pressured by a large number of people. George Orwell had made up his mind that imperialism was an evil thing and the sooner he chucked up his job and got out of it the better. As for his believe, â€Å"he was theoretically and secretly all for the Burmese and all against their oppressors, the British.† In the short story, â€Å"Shooting an Elephant†, George Orwell is face with an incident that leads him to shoot the elephant at the end of the story. Trough out the story he is faced withRead MoreGeorge Orwell s Shooting An Elephant 1114 Words   |  5 PagesShooting an Elephant : George Orwell Since the publication of George Orwell s, Shooting an Elephant in 1936 many philosophers have engaged in conversation about humanity, violence, politics, power, dominance, race, culture and principles. Orwell was in fact a genius plain and simple, though in a very complicated way(Firchow 94). He brings you into the essay with his lucid and vivid details the entire way through from the setting I remember that it was a cloudy, stuffy morning at the beginningRead MoreGeorge Orwell s Shooting An Elephant894 Words   |  4 Pagesdescribed by George Orwell, in his short story, â€Å"Shooting an Elephant†(Orwell). In this story, Orwell delicately explains to his readers how society is influenced by peer pressure. The story was set in Burma in 1936 and begins with a low self-esteemed police officer just trying to get through day- to- day life. His life takes a turn when he is suddenly faced with the decision to shoot an elephant to please a crowd of spectators. Believing that his act ions are wrong he shoots the elephant anyway andRead MoreAnalysis Of Shooting An Elephant By George Orwell727 Words   |  3 PagesGeorge Orwell is an internationally acclaimed author that has been praised for his awareness of social injustice and opposition to totalitarianism. Although in his later life he realized some of his previous misdeeds when Orwell was a young man he served as a police officer in a British controlled Burma. The Burmese people at the time were rightfully scornful towards the Europeans; this includes the young Orwell. The time that Orwell spent in Burma was not all wasted, as it inspired him to come up

Friday, December 20, 2019

Nike s Unethical Behavior Of The Workplace - 3836 Words

Look at all the clothing and apparel you have on. Chances are, those items were produced in sweatshops outside the United States. According to the US Department of Labor, a sweatshop is a factory that is in violation of at least two labor laws (Do Something, 2014). It is generally understood that sweatshops maintain terrible working conditions, and that the workers are compensated far below what many Americans would consider acceptable hourly wages. A startling fact that many do not know, however, is that many women employees are forced to take birth control pills in order to avoid maternity leave and other associated pregnancy benefits. Advocacy groups have raised awareness about these practices, and throughout this piece I will highlight four companies using sweatshops, a best practice organization that aims to help eliminate poor working conditions for employees, and how the four companies have responded to their unethical behaviors. Nike has been accused of using sweatshops since the 1970s (Global Labour Rights, 2000). The company originally outsourced manufacturing plants to Korea and Taiwan, yet had to move them due to increasing regulations and labor laws as those countries developed (Nisen, 2013). The new locations in China, Vietnam, and Indonesia offered the company cheaper labor, with fewer hurdles to overcome in order to drive costs down. In China, Nike has over 50 contractors, employing at least 100,000 workers (Global Labour Rights, 2000). There are numerousShow MoreRelatedInternational Business Ethics And Ethical Issues Within International Organizations1113 Words   |  5 Pagescountries †¢ There is a lack of governments’ initiative to create ethical cooperation framework and thus to enhance ethical behavior in international business; †¢ It is difficult to outline those ethical values, which would be understandable, acceptable and important for representatives of all the continents within different types of international cooperation projects. Ethical behavior within a business ensures awareness and concern for the future and for the right way of action in each particular situationRead MoreThe Pyramid Of Corporate Social Responsibility1262 Words   |  6 Pageslegal requirements (Carroll, 1991), ethical: organizations managements are to follow the generally held beliefs, about the behavior of the society. It is important to recognize that corporate integrity and ethical behavior go beyond mere compliance with laws and regulations (Carroll, 1991) and philanthropic: encompasses those corporate actions that are in response to society s expectation that businesses be good corporate citizens. It is important that managers and employees participate in voluntaryRead MoreTo What Extent Unethical Marketing Technique Could Damage the Sustainable Business Enivironment2676 Words   |  11 PagesTo what extent unethical marketing techniques could damage the sustainable business environment. Discuss. Marketing is like a double-edged sword, if it is adopted properly, it will give profits to a company; however, if it is used inadequately, it will give harm. It is undeniable that today’s business operations have more intense competition level against each other due to the advancement of technology that allows people to receive more information. Marketing plays the key role in making productsRead MoreTo What Extent Unethical Marketing Technique Could Damage the Sustainable Business Enivironment2661 Words   |  11 PagesTo what extent unethical marketing techniques could damage the sustainable business environment. Discuss. Marketing is like a double-edged sword, if it is adopted properly, it will give profits to a company; however, if it is used inadequately, it will give harm. It is undeniable that today’s business operations have more intense competition level against each other due to the advancement of technology that allows people to receive more information. Marketing plays the key role in making productsRead MoreBusiness Ethics of Nike Inc.5528 Words   |  23 Pageson the requirement given, I have chosen Nike Inc. as the topic of the discussion. Nike Inc. is the world leading company merchant of athletic shoes, sportswear and sports gear based on United States. Bill Bowerman and Phil Knight established the company in the 1964 and during that time Nike Inc. was known as Blue Ribbon Sports. Furthermore, the organization has been experiencing phenomenal growth and rapidly expanding since then. Krentzman (n.d.) claimed ‘Nike sold $3.2 million worth of shoes in 1972Read MoreStrategic Analysis of Nike Inc12147 Words   |  49 PagesTABLE OF CONTENTS Executive SummaryÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â….Â…Â…Â…Â…p.4 HistoryÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…..Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…..p.6 Profile of CEOÂ…Â…Â…Â…Â…Â…Â….Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…..p.7 Competitor s ProfileÂ…Â…Â…Â….Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â….p.7 Industry ProfileÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…..p.8 Company AnalysisÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…p.9 Industry AnalysisÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…......p.24 Top Competitor AnalysisÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â….p.25 Other External ForcesÂ…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Â…Read MoreNike Strategy Analysis12215 Words   |  49 Pagesp.30 Strategic Plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..p.33 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...p.38 LIST OF EXHIBITS 1. Sales Trends Graph†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦p.5 2. Net Income Trends Graph†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.p.5 3. Nike Board of Directors Table†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...p.11 4. Table of Key Financial Ratios†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...p.22 5. Net Income Trend Graph†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦..p.24 6. Primary Strategic Match Position Chart†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.Read MoreCorporate Social Responsibility Versus Profit Maximization2250 Words   |  9 PagesAs a large multinational corporation, Nike has built up its factories in many of the developing regions, such as Mexico, Bangladesh and Mainland China, to get access to cheaper resources and labors for their production, whilst the host country can only gain very little percentage of the profit from the product. As most of the revenue flows to the home country of Nike, the goal of profit maximization has been achieved by reducing the costs. The approach for Nike to realize their owners’ benefit is toRead MoreBusiness Ethics: Child Labor in Wal-Mart8552 Words   |  35 PagesPart A: Introduction There are several ways to define ethics. Ethic is a set of principles of right and wrong behavior guiding. Ethical person will behave in accordance with sound moral principles based on fairness, justice and trust (Wiley, 1995). The purpose of ethic is to provide an environment that allows people to live a more structured, happy life than would exist without ethics (Warnock, 1971). Business ethic is examination of variety of problems that can arise from business environmentRead MoreEssay on Under Armour strategic report9937 Words   |  40 Pagesthe Gen Y segment is the second largest segment next to the boomers (85 million strong), future growth looks optimistic, particularly because UA is also doing well with the Gen Z group, who will be even more likely to carry brand loyalty into their 20’s and beyond. UA has recently been active in reaching out to women and girl athletes in the same demographic age sets. Even though the Gen Y spending only makes up 4% of a typical household spending, this buying group tends to be more tech savvy, and

Thursday, December 12, 2019

Cyberphysical Security in Networked Control †MyAssignmenthelp.com

Question: Discuss about the Cyberphysical Security in Networked Control. Answer: Introduction Information is considered to be the most valued asset of any sector. Information is susceptible to various types of risks as well as threats. With the emergence of information technology, the cyber threats are increasing at a fast pace. Information security focuses on protecting the valuable and sensitive data of an organization. Information security is involved in protecting the integrity, confidentiality and availability of the information. Banking sectors deal with financial data that needs to be protected. Nabil Bank is known as the first commercial private bank of Nepal (Nabilbank.com 2017). Nabil Bank is involved in providing wide range of banking services via its 52 representation points. This report discusses and plans a security program for providing information security to Nabil Bank. It tries to improve the present security structure of Nabil Bank. This report gives a brief overview of information security. It gives suggestion about the kinds of security models that can be adopted by Nabil Bank for better and secure operations. Threat identification along with risk assessment is also carried out in this report. This report discusses about the ISO standards as well as modes that will be suitable for Nabil Bank with proper reasoning. The training requirements are also provided in this report for adopting security programs in an effective manner. This report recommends certain steps and procedures that can be taken by Nabil bank for improving its security infrastructure and for making the system of information security strong. Information security can be considered to be a practice of defending and protecting information from any kind of unauthorized access, misuse, disclosure, modification and disruption (Vacca 2012). The modern generation is completely dependent on the information and communication technology for confidential as well as commercial purposes. There are several risks as well as threats that are associated with information technology like safety risk, environmental risk, physical risk and financial risk. Security concerns that are related to ICT are gaining major importance with time. All the organizations in every sector face some kind of security issues (Webb et al. 2014). Strong information security structure as well as risks can be adopted in an organization to protect it from risks and threats. Risks can be mitigated and prevented by several methods and techniques. Information security has certain aspects like confidentiality, availability and integrity. When the information cannot be accessed by any unauthorized user then the confidential aspect of information is achieved (Von Solms and Van Niekerk 2013). When the information cannot be misused, destructed or modified by an attacker or user than the integrity of the information is maintained. When the right information is available to the right or authorized person at the correct time with no such interference or obstruction then the availability of information is achieved. Banking sectors have been a major target for the hackers, crackers as well as the cyber criminals. Information security aims at identifying the risks and mitigating it for protecting sensitive information. Current Security Situation and Titles of the Security Personnel Nabil Bank was founded in July, 1984. Their main objective is to extend the services of modern banking to different sectors of the society. Nabil Bank provides several banking and financial services via its 52 representation points. It has introduced several innovative and modern marketing concepts and products in banking sector. Their main objective is customer satisfaction. Highly qualified personnel are responsible for managing the daily operations. Sensitive financial information is handled by the bank. Risk management is carried out by highly experienced and qualifies management team. Nabil Bank is totally equipped with advanced technology that consists of banking software of international standard for supporting E-transactions and E-channels. Their aim is to provide a complete and secure financial solution to their customers. The risk management team is highly efficient in assessing the risk and providing information security to the organization (Sandberg, Amin and Johansson 20 15). There are many security personnel present in the risk management team. They are as follows: Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Head of Credit Risk Management: They are responsible for implementing procedures and policies for the purpose of reducing credit risk. They are also involved in building financial models that have the capability to predict any type of credit risk that can affect the organization. The credit risk management team reports to their head regarding daily operations and activities. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Compliance and Operational Risk Manager: They are responsible for handling the risk related to legal sanctions, financial loss or loss of banks reputation. They ensure that the bank complies with the government laws, standards and its own code of ethics and conducts. They also manage any type of risk arising because of failure of internal processes, systems, people as well as external events. Risk Assessment and Threat Identification Risk assessment deals with a number of steps and procedures for understanding the asset values, possible threats, system vulnerabilities, and predictable impacts of threats along with the likelihood of threats (Kit et al. 2014). Risk can be defined as vulnerability functions as well as the expected impacts of threats. Risk depends on the probability of the occurrence of threat. System characterization is the first step in risk assessment. Information about the software and hardware involved is initially found out (Aloini, Dulmin and Mininno 2012). NIST framework of risk management involves assessment of risk after all the risks have been framed. This framework integrates business processes, company goals, mission, SDLC processes and information security infrastructure for effective risk assessment. The methodology of risk assessment includes a process, risk model, an approach for assessment and analysis approach (Lo and Chen 2012). After risk identification is carried out, the risks are monitored. ENISA framework will be effective in the E-transaction processes of Nabil Bank for the purpose of assessing risks (Theoharidou, Mylonas and Gritzalis 2012). This model identifies the risk and analyses it for the purpose of evaluation. Information security can be enhanced in an organization only by identifying the possible threats and risks. Threat can be considered to be a potential for some kind of trouble or damage to IT infrastructure. After proper identification of threats a well planned security program can be carried out in order to protect the bank from any data and security breach. Nabil Bank provides several financial and banking services. It also provides online banking facilities to the customers. There are two broad categories of threats that are identified initially. These are the internal and external threats. Internal threats: Business practices and processes of a financial institute have a huge influence on internal threats. If more number of employees is able to access sensitive customer information then the probability of threats will be more. The intensity of internal threats is less as they are under the control of the bank. External threats: These threats have a greater intensity as they are not under the control of the bank. External threats can be reviewed by listing the reasons and ways in which personal data can be accessed, identifying the ways by which the banks system is connected to outside world via emails and networks, identifying service providers that have access to the data. Then the exposure of the threat is identified. Some of the threats that have been identified in the internet banking system of Nabil Bank are phishing, spyware, viruses, Trojan horses as well as key loggers. In phishing attack hoax mails are used for committing a fraud activity (Hong 2012). Online thieves can steal sensitive data of the customers to misuse it. Spyware is a type of malicious software that collects valuable information of the users in a secretive manner for misusing and modifying it (Giannetsos and Dimitriou 2013). Viruses can get attached to another program like spreadsheets for replicating itself. Trojan horses are another type of threat where an application acts like a secure application and harms the system in which it is downloaded or injected. Key logger software is considered to be the most harmful threat of Nabil Bank (Dadkhah and Jazi 2014). If key logger software is installed in the electronic device of the customer from where the customer accesses online banking services, then it tracks all the informati on that is used by the customers. This information can be used by the attackers in order to steal money from the bank. The financial database of the bank can be hacked to access sensitive financial data (Martins, C., Oliveira and Popovi? 2014). Deliberate and external threats are extremely harmful for the banking sector as it causes huge financial loss. After identifying the threats, their exposure must be determined to rank them based on their intensity. This will be extremely helpful for the bank to mitigate risk in an efficient manner. Security Models Security models are responsible for providing standards for the purpose of comparison and reference. Nabil Bank uses the NIST access control model for the purpose of identification of access mechanism that is used in different levels that exist in the bank. Management level is involved in dealing with information that will help in the strategic planning process. The level that deals with administration work will be responsible for controlling operational data. The technical layer of the bank deals with daily operational data that is needed for running the business. NIST framework is responsible for describing the present cyber security posture, their target state, find out ways to improve risk management and fosters the process of communication between the external and internal stakeholders of the bank. The present risk management procedure is not replaced when the bank uses NIST framework. Rather the NIST framework tries to complement the present security structure (Chang, Kuo and Ramachandran 2016). The bank can use its current structure and leverage NIST framework for the purpose of identifying opportunities for improving the current risk security management. The security models of NIST framework will be highly beneficial for Nabil Bank as their documents are available at free of cost. It can also be updated by government. Risk assessment guidelines, security plans and privacy control plans are provided NIST framework (Malik and Nazir 2012). Strong information security policies can be implemented for protecting the banks valuable information . Development of Security Program Nabil Bank is a large sized company having 52 points of representation across Nepal. The organization structure that is present in the bank is hierarchical in nature. The organization has code of ethics and conducts incorporated in its culture. The main objective of the bank is to provide a single and secure financial solution to its customers. Nabil Bank gives first priority to its customer. The employees follow a code of ethics in the organization (Peltier 2016). They act in an honest manner to protect the interest of their clients (Hu et al. 2012). The bank takes major action against any employee who commits any misconduct. Strong information security policies can be implemented for protecting the banks valuable information. A well planned security program can be effective for protecting the bank from any security risks and threats. Financial data breach will cause loss to the clients and also will affect the reputation of the bank. The following steps can be taken in order to dev elop an efficient security program: Risk assessment: The first step in this process is to identify what department deals with what information. The bank also needs to find out who has access to what sensitive information. The second step will be to identify external and internal threats and determine its probability of occurrence. The last step is to determine whether the existing policies are adequate for protecting the information. Current policy adjustments: A security policy must be designed to protect the customer information. This policy must be approved by the board of directors in order to carry enhance the information security of the bank. Security control design: The management should focus on developing security control plans for all the business units. There must be security guidelines present. Access controls need to be designed where authentication procedures like passwords, PINs, electronic tokens are used. Biometric identification and firewalls can be implemented for protecting the databases that store sensitive financial data. The networks can be protected by implementing firewalls. The customer details can be encrypted to protect it from any unauthorized access. Response plan: The management team must develop and design a response plan for overcoming a security breach situation. The person who is in charge of maintaining customer information must design this plan. It must be well written. The plan needs to include the contact details of law agencies for taking appropriate steps. Service provider: The contract between the bank and service provider must contain effective response plans. The bank must ensure that the contract contains appropriate standards for information security. Testing: The testing of the security controls and plans must be done to make sure that the bank is well protected from any type of security threat and risk (Shackelford et al. 2015). The parties involved in the contract must conduct control testing. They must conduct ethical hacking to find out the effectiveness of the security policies and plans. Roles and Responsibilities Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Security Manager: The role of the security manager is to collect and utilize information in an effective manner to achieve the goal of the organization. They are responsible for proper communication of information among various layers. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Information security of Nabil Bank can be improved by adding more designations and roles so that there is no overlap of responsibilities of the employees (Ahmad, Maynard and Park 2014). Some of the new titles that can play an effective role in improving information security are: Technical security manager: The technical aspects of security will be looked after by these managers. They will be involved in firewall implementation and encryption processes. Program security manager: The third pert or vendor risks can be evaluated by these managers. CISO: The whole security policies can be looked after by CISO. CISO can take the responsibility of design strong security policies for the organization. Source code manager: The source codes can be reviewed by these managers for detecting any type of vulnerability. There can be many specialized roles like virus technicians whose responsibility will be to detect new virus as well as develop a defense plan to fight the virus. Training Requirements The employees of Nabil Bank must be aware of the need of a strong information security program. Employee training can be considered to be a critical component for the information security of bank. Management must document the information regarding which employee has access to what valuable information of the customers (Hu et al. 2012). The employees must be made aware of the security policies of the bank. They must be trained to identify valuable customer information. Employees must be given training on how to implement the written policies that governs the disclosure of the information of the customers (Lebek et al. 2013). There need to be regular meetings to discuss new policies and modify existing policies for improving the present information security policy. ISO Standards and Models ISO model is used in most of the industries. ISO standards provide a common base to all the organizations in order to develop security standards and policies (Disterer 2013). Organizations are able to develop inter organizational deals by using ISO standards. ISO/IEC 27001: This standard helps in implementing ISO/IEC 27002 in order to set up ISMS (Susanto, Almunawar and Tuan 2012). ISO/IEC 27002: This standard addresses the security needs of an organization. It also helps in developing security policies (Ramanauskaite et al. 2013). ISO model is well suited for Nabil Bank because it will assist the bank in developing management system for managing information security. The ENISA model can also be suitable for Nabil Bank for the purpose of securing the E-transaction and E-channel. Conclusion This report concluded that Nabil Bank can improve its information security by adopting a well defined security program. This report discussed about the critical factors of information security like confidentiality, availability and integrity. It said that the breach of data and information security can lead to serious and potential losses. The main purpose of assessing risk is to identify organizational threats and vulnerabilities. Internal threats can be identified by finding out which staff has access to which information and overlapping information. It pointed out that the security system of the bank is accessed by an unauthorized outsider then this result in external threats. It gave a description about the security program that can be adopted by Nabil Bank. This report discussed about the current roles and suggested an improvement plan for making the information security of the organization strong. It suggested that the employees must be made aware of the security policies of th e bank. This report concluded that ISO model is suitable for the bank and ENISA model is suitable for its electronic transaction system. The advanced technologies as well the communication channels need to be protected from attackers. Recommendations Nabil Bank can secure its information and data from unauthorized access by following certain steps: Encryption: Financial data must be encrypted so that the hackers cannot get access to it. Employee training: Proper training must be imparted to the employees to enhance the information security. Updated software: Latest version of the software must be installed in the system. It must be updated regularly. Firewall: Firewall implementation will protect financial information from any external intrusion. References Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), pp.357-370. Aloini, D., Dulmin, R. and Mininno, V., 2012. Risk assessment in ERP projects.Information Systems,37(3), pp.183-199. Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, pp.24-41. Dadkhah, M. and Jazi, M.D., 2014. Secure payment in E-commerce: Deal with Keyloggers and Phishings.International Journal of Electronics Communication and Computer Engineering,5(3), pp.656-660. Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management.Journal of Information Security,4(02), p.92. Giannetsos, T. and Dimitriou, T., 2013, April. Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. InProceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy(pp. 7-12). ACM. Hong, J., 2012. The state of phishing attacks.Communications of the ACM,55(1), pp.74-81. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Kit, R.I.S., Allen, K., Mazzotti, F.J. and Briggs-Gonzalez, V., 2014. Risk Assessment Methodology. Lebek, B., Uffen, J., Breitner, M.H., Neumann, M. and Hohler, B., 2013, January. Employees' information security awareness and behavior: A literature review. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 2978-2987). IEEE. Lo, C.C. and Chen, W.J., 2012. A hybrid information security risk assessment procedure considering interdependences between controls.Expert Systems with Applications,39(1), pp.247-257. Malik, A. and Nazir, M.M., 2012. Security framework for cloud computing environment: A review.Journal of Emerging Trends in Computing and Information Sciences,3(3), pp.390-394. Martins, C., Oliveira, T. and Popovi?, A., 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application.International Journal of Information Management,34(1), pp.1-13. Nabilbank.com. 2017.About Nabil Bank - Nabil Bank Limited First Private Commercial Bank. [online] Available at: https://www.nabilbank.com/intro/about-nabil-bank/11-product-services/deposit-products [Accessed 5 Oct. 2017]. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Ramanauskait?, S., Olifer, D., Goranin, N. and ?enys, A., 2013. Security ontology for adaptive mapping of security standards.International Journal of Computers, Communications Control (IJCCC),8(6), pp.813-825. Sandberg, H., Amin, S. and Johansson, K.H., 2015. Cyberphysical security in networked control systems: An introduction to the issue.IEEE Control Systems,35(1), pp.20-23. Shackelford, S.J., Proia, A.A., Martell, B. and Craig, A.N., 2015. Toward a Global Cybersecurity Standard of Care: Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices.Tex. Int'l LJ,50, p.305. Susanto, H., Almunawar, M.N. and Tuan, Y.C., 2012. Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level.International Journal of Engineering and Technology. IJET Publications UK,2(1). Theoharidou, M., Mylonas, A. and Gritzalis, D., 2012. A risk assessment method for smartphones.Information security and privacy research, pp.443-456. Vacca, J.R., 2012.Computer and information security handbook. Newnes. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers security,44, pp.1-15.

Thursday, December 5, 2019

Should Tobacco Companies Be Held Responsible free essay sample

Should tobacco companies be held responsible for smoking-related illnesses and deaths? I. Introduction A. Should tobacco companies be held responsible for smoking related illnesses? In most cases I believe they should be held liable. Most Americans ask this question and want to know about cigarette companies and why they are allowed to keep selling these products that cause health problems. B. Most people that were smokers way back in the days before they actually had to label their products as unsafe and deadly. In the 70’s it was legal to purchase cigarettes as a teenager and the companies knew that their product was dangerous. Especially since minors were able to purchase these deadly products, they should be held accountable for those that began smoking in their teenage years and were sold to with the reassurance from the company and the government. II. Are the people responsible for their actions. A. Should the people make the sound choice to buy cigarettes who know the risk of smoking be held accountable for their health issues. We will write a custom essay sample on Should Tobacco Companies Be Held Responsible or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page I believe it is called free will in this point being that people today know the repercussions of smoking. B. The fact that all tobacco companies today have to label the warnings on their products and people still make that choice to light up The general public has been well educated about the health risks of smoking, so people who smoke are fully informed about the possible consequences of their habit. Where will that lead our society, more than likely people will try and sue fast food companies for making them fat; trending on down to point the finger at all these companies for the bad choices they made. C. The people that actually started smoking before the surgeon general made these companies put warnings on their products; these people on the other hand did not know the facts about the health issues from smoking. In my eyes these people have every right to be angry or disgruntled with Big tobacco. These people are the victims of our society because they on the other hand like the present were not as informed of the health issues caused from smoking. So they should not be held liable because of these companies getting rich from other peoples suffering. III. Are the companies lying to the public. A. Do tobacco companies oversell and manipulate their products in order for consumers to keep smoking and should the government step in to control their habit? The tobacco industries have to put these labels because the government makes them do so. So now they have to make their product more appealing to offset their outcome of consuming their product. B. Tobacco companies are an evil industry and it’s not surprising they shredded documents to cover up strategic actions for addicting people to their cancer sticks. They try and promote their product as sexy but would rather make a buck from the deadly outcome from smoking their product.

Thursday, November 28, 2019

Is Galileo considered a hero or anti-hero Essay Example

Is Galileo considered a hero or anti-hero? Paper Galileo Galilei, the central character of Brechts play, is known as one of the most famous scientists of all the times. He was one of the first to study in depth the universe and is known as the Father of Modern Science. I consider a hero a person noted for his acts of courage or noble purpose, especially one who has risked or sacrificed his/her life for the advantages of the human society. Galileo is shown as a hero on the first nine scenes of the play, for his courage to stand up the church and also for his passion and enthusiasm towards his aims. On the other hand, on the following scenes he is exposed with some characteristics of an anti-hero for his irreverence towards the church showing no respects whatsoever towards its privileged leaders and also for his coolness towards his daughter Virginia. Nevertheless, should Galileo be considered a hero or anti-hero for his actions? One of the most important characteristics that make Galileo a hero is his great determination and self-confidence in proving and demonstrating his ideas. He dedicated almost his entire life proving that his discoveries about the universe were right. Although, he knew that it would cost him a lot, he did not gave up the discoveries that he made. This is shown when he says: The sum of the angles in a triangle cannot be varied to suit the Vaticans convenience. P.68 This sentence shows that he refuses to ignore the changes for the sake of compromise on political and religious purposes. Even during the plague, he says: I didnt let the plague stop me from recording my observations, Pg.58 which shows his great determination towards his aim: scientific truth. We will write a custom essay sample on Is Galileo considered a hero or anti-hero? specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Is Galileo considered a hero or anti-hero? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Is Galileo considered a hero or anti-hero? specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Galileo is presented as a brave and courageous person who, in order to fulfill his aims went against the authority of the churches. Galileo had a great courage shown by the fact that he was not afraid to put up with the opposition. While the Italian church, scientists and the whole population of that time still held their believes strongly on the Ptolemaic system (which placed the earth in the center of the universe), Galileo explored and found out that the Copernican system of heliocentricism was the real one. The church did not accept his findings because they would look very stupid and according to them it is better to be wrong than to question what they called it the Gods creation. They blindly believed that the earth was in the center of the universe and changing this would mean that people would no longer be in the center of gods eyes. This is strongly supported by Sagredo who says Do you imagine the Pope will hear the truth when you tell them hes wrong, and not just hear that hes wrong? Do you imagine he will merely note in his diary: January 10th 1610-got rid of heaven? Pg.33 The courage he showed to have had grew weaker when the Inquisition forced him to recant publicly his support of Copernicus. He gets arrested and recants his theories, an act this that shows some negative qualities because he refuses to sacrifice himself for the sake of scientific truth. Andrea furious when he finds out claims: Unhappy is the land, that has no heroes. Andrea feels betrayed by this renounce of Galileo who in this scene has a sound change in appearance, giving the impression of having an indecisive and weak character. Galileo is shown as a sensible and reasonable person because he understands that knowledge and particularly scientific discoveries take always time to be accepted. On one of the dialogues Galileo had with the Little Monk, he says Your Campagna peasants are paying for the wars which the representative of gentle Jesus is waging in Germany and Spain p.66 where he blames the church on spending money on wars and not on the well being of the peasant and therefore showing no respect and fairness for these poor and unfortunate people. He says that otherwise they could live in plenty and develop the virtues of happiness and prosperity. Pg.66 This noble character he shows towards the society, is sometimes counteracted by some weaknesses of his like the fact that he himself wasnt very sensible when he took the idea of the telescope from a Dutch scientist. Although, this was a smart and cunning way to earn money he is shown as a dishonest person behaving very hideously for stealing credit for ot hers discoveries. In his personal relations with others, Galileo is shown affectionate and sympathetic towards both Andrea and Mrs. Sarti. However, he alienates and doesnt give any attention to his daughter, Virginia treating her (from the start of the play) in a very careless way. When Virginia asks him if she can have a look at the telescope, Galileo answers in a very unkind way saying What for? Its not a toy, leaving Virginia without words. Here, he behaves in a very unfair and biased way towards Virginia because while he got Andrea out of the bed to show him his discoveries, he treats his daughter in very humiliating and cold manner by making it clear to her that he things she is not a clever person. Also, on the third scene Virginia tries to comfort her father who is worried weather the court will have him or not, by telling him Of course theyll have you, Father, with your new stars and all that. Galileo to this affectionate and caring encouragement answers in a very revolting and unpleasantly cold manner saying to her Run along to your mass. These acts show how unfair and unpleasantly cold he was to his daughter showing no attention and kindness whatsoever towards her. During the plague, Galileo asks a man to bring (me) a small book and bread while the man laughing tells him youll be lucky if u get bread. Here, Galileo is shown very self-centered and irrational because his request is very absurd in that circumstance. He is presented as a very passionate and dedicated person who spent almost his entire life proving that his ideas about the universe were right. He had a great desire for scientific research, a thing this that makes him even more a hero His great enthusiasm and passion towards science, is shown on the conversation he has with his friend Sagredo where he says: The lure of proof is too great. Nearly everyone succumbs to it, sooner or later we all do. Thinking is one of the chief pleasures of the human race. Pg.29 His enthusiasm towards science is also shown on the conversation he has with the Little Monk who suggests to Galileo that the truth will get through without pg.68 their help and Galileo responds the only truth that gets though will be what we force through and he later concludes And the worst thing is that what I know I have to tell people, like a lover, like a drunken, like a traitor, even knowing that it is an absolute vice and leads to disaster.Pg.68 At last, Galileo says I enjoy doing my stuff pg.17 showing once more his great satisfaction and determination towards the scientific research. Galileo has the ability to communicate and explain the most complex ideas with clarity and precision, things these that makes him a very comprehensive teacher. He is shown as a patient teacher and especially with Andrea to whom he teaches and explains all his discoveries in great details. He is also an enthusiastic teacher and this is shown when he praises Andrea for his comprehension saying Very well pg.10 and also giving Andrea good advices like you must learn to think cautiously. Pg.74 He was a great influence to Andrea and this is shown when Andrea quotes Galileos doctrine Someone who doesnt know the truth is just thick-headed. But someone who does knows it and calls it a lie is a crook. Pg. 75 and 95. He lives the discovering of these scientific researches in a very optimistic and joyful way saying: A new time has begun, a time its a pleasure to live in. pg.10 He understands however that knowledge takes always time to be accepted and this is shown when he says I believe in Humanity, which means to say I believe in human reason. If it werent for that belief each morning I wouldnt have the power to get out of bed. Pg.29 Here, Galileo shows his faith in human reason and his optimism that only reason will be able to get the peoples support for astronomical truth. Then, he drops a pebble on the ground (scene 3) showing people that if they believe in the force of gravity seeing it, then they should also believe in astronomy by proofing it. Scene 6 His strong optimism is also shown when he claims that the old days are over, and this is a new time.Pg.6 and also But now the word is thats how things are, but they wont stay like that,Pg.6 both of these showing his great optimism towards him aim but also show him as a combatant of truth and progressivism. In conclusion, I would like to state that in my opinion Galileo Galilei has shown qualities, merits, talent and contributions that make him a real hero. His outstanding abilities, his great courage, his faith in universal truth, his comprehension and reasoning of some complex ideas, his great social concerns of the time and his fighting for the progress in science make Galileo with no doubts a heroic character. His feeble points and weaknesses of his personality, which all humans have, are for the most part minor taking into account his merits. With his famous mythical saying Eppur si muove, (english-and yet it moves) he has remained for the last four centuries as a great hero, which symbolizes that the conviction and confidence towards the truth is stronger than any obstacle.

Sunday, November 24, 2019

Importance of Natural Resources essay

Importance of Natural Resources essay Importance of Natural Resources essay Importance of Natural Resources essayNatural resources were historically an important condition of the successful development of countries. The disparity in the access to natural resources predetermined, to a significant extent, the socioeconomic disparity in the development of Northern countries and Southern ones. In fact, the economic and technological development of countries and the difference in their development was driven by the availability of natural resources, which stimulated the development of technology and, therefore, economic progress of those communities and countries, which benefited from the available natural resources and the backwardness of those countries and communities, which lacked natural resources. Even though today the process of globalization makes natural resources available worldwide, but the world economy still depends on natural resources and those countries, which have access to natural resources, especially fossil fuels, such as oil and gas, can keep progressing fast, while those, which have limited opportunities to use natural resources are doomed to backwardness.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Historically, natural resources played the role of the main driver of the economic development of nations (Deudney Flavin 114). For example, coal mining and the availability of iron to Great Britain allowed the country to become one of the leaders in the world economy and conduct its industrial revolution successfully. Similarly the availability of natural resources became the major condition of the successful economic and technological development of other powers, including the US, France, Germany and others (Kraft Kameniecky 158).At the same time, the significant role of natural resources as the major driver of the economic development becomes obvious, when the availability of natural resources, their use and historical socioeconomic and technological development of countries is compared. In this regard, the disparity b etween North and South is particularly obvious (McCormick 214). For example, early civilizations emerged in Northern hemisphere of the world basically due to the availability of natural resources, such as iron ore, for example, which allowed people to start making first tools as well as weapon. At this point, it is worth mentioning early civilizations in Egypt, Mesopotamia, Greece, India and China, which were all located in Northern hemisphere due to the available natural resources, such as iron ores (Best 664). For example, the beginning of the early production of bronze boosted the technological and economic development of those civilizations. The further introduction of iron, steel and other materials based on the use of natural resources accelerated their economic and technological development even more. Moreover, even the early settlement of people were determined by their natural environment and availability of natural resources, such as water and fertile soil, which people us ed for their regular life and basic needs.In the course of time, the role of natural resources increased even more because they became essential for the economic development of nations and fast technological progress (Lewis 245). At this point, it is possible to return to the time of the industrial revolution once again since the industrial revolution would be impossible without rich natural resources available to leading nations, such as Great Britain, France, Germany and the US (McCormick 148). The availability of such natural resources as coal and iron ore allowed them to boost their industrial production and develop transportation system, which, in its turn, accelerated trade within those countries as well as between those countries. At the same time, the rest of the world that had limited access to natural resources remained under-developed and suffered from technological and economic backwardness.The role of natural resources as the major driver of the economic and technologic al development became even more evident in the 20th century, when the traditional major powers, such as Great Britain, the US and others faced the tightening competition from the part of emerging economies of Southeast Asia (Kassman 149). In fact, the successful economic and technological development became possible due to the process of accelerated industrialization with the further transition to scientific, knowledge-based industries. The economic development of nations was therefore determined by the use of natural resources.In this respect, it is possible to refer to the level of the energy consumption in the world in the 20th century as well as today. The energy consumption is the major indicator of the level of economic and technological development of nations (Best 665). So far, the most developed nations have the highest level of the energy consumption, although they are trying to do their best to reduce this level to protect their environment and focus on the sustainable de velopment (McCormick 124). However, the energy is still an essential condition of the successful economic and technological development as well as it is an essential condition of the maintenance of the competitive position of nations in the global economy.At the same time, the lion share of energy in the world is generated by means of using natural resources, especially fossil fuels, like oil and gas. The share of renewable or alternative sources of energy is still low, whereas the major source of energy remains to be fossil fuels (McCormick 195). The availability of fossil fuels becomes the major factor that determines the competitive position of nations in the global economy. At this point, it is possible to refer to the crisis of the mid-1970s, which was triggered by the refusal of the Middle Eastern countries to sell oil at the low price (McCormick 202). This energy war resulted in a profound downturn in the economic development of the US and other well-developed nations. Today, the dependence of nations on fossil fuels is still very significant.On the other hand, the availability of oil and natural gas allow countries to boost their economic development, even if they are mere exporters of natural resources. At this point, it is possible to refer to countries of the Persian Gulf region, which used to be poor, under-developed nations, while today, they have become prosperous, technologically advanced nations that play an important part in the global economy. Their progress was the result of the oil export, which boosted their development and allowed them to increase their role in the world economy since they become the major suppliers of oil to the global market (McCormick 215). At any rate, decisions taken by Saudi Arabia and other oil exporting countries located in the Persian Gulf have a considerable impact on the oil price and situation in the global economy because oil is still the major source of energy, which is required for the fast economic develop ment and maintenance of stable functioning of well-developed economies. In such a way, the oil production and consumption has become the major driver of the economic development in the second half of the 20th century and still remains today. Hence, oil is one of the most valuable natural resources today, which is essential for the normal existence of the modern civilization because without oil the current level of the energy production would be impossible, while the modern civilization will not survive without the high level of the energy production at the moment.On the other hand, oil is just an example of the great significance of natural resources in the economic development of nations. The consumption of natural resources have become a norm that leads to the destructive impact of human economic activities as well as regular, everyday life activities on their environment (McCormick 156). For example, the consumption of timber has triggered the deforestation of many regions of the world that raises the problem of the threat to the natural environment. In addition, the use of natural resources leads to the pollution of the environment but the real problem of the modern world is the dilemma which virtually all countries face. On the one hand, they need natural resources to boost their economic and technological development, whereas, on the other hand, the use of natural resources leads to the further deterioration of the environmental situation.Thus, today, nations need to develop new policies oriented on the wise and effective use of natural resources. However, what proves to be beyond a doubt is the great role of natural resources in the development of nations. Historically, naturally resources played the key part in the economic and technological development of countries and today they still play the crucial part in the development of nations because they determine the competitive position of nations in the global economy.

Thursday, November 21, 2019

Information Technology Investment Financial Analysis Essay

Information Technology Investment Financial Analysis - Essay Example The several cost items of IT help desk service are labor cost, material cost, cost of electricity, cost of computer and cost of software. The cost structure of IT help desk service provides several levels of support to focus on the problem. The job of first level support is to identify the adequate information about the problem. The job of second level support is to provide higher technical skills to the first level and the job of third level support is to hire technical specialist to solve the problem within a specified time (Mahoney 1-16). The scope of E-mail service is to provide online services. Anyone can access e-mail through computer, personal laptop and mobile phone. The financial objective of e-mail service is to increase the profit by providing best services to the people along with better convenience (Mahoney 1-16). The function of email service is to exchange messages or information through online for different purposes that include communicating with customers, money transaction and sale of products and/or services (Mahoney 1-16). The various cost items of E-mail service are cost of material, cost of electricity, cost of internet, and cost of computer or personal laptop, which are described as cost of equipment. The cost structure of enterprise system, required for the resources are the cost of product planning, cost of delivery service and cost of marketing (Mahoney 1-16). The scope of enterprise system is related to Supply Chain Management, relationship management and obtaining the objectives of an organization. The financial objective of enterprise system is to increase profit by enhancing financial performance and market value of an organization (Mahoney 1-16). The cost items of enterprise system are cost of material, cost of labor, cost of product and cost of accounts. The cost structure of E-mail service are two types such as cost driven as well as value driven and it focus

Wednesday, November 20, 2019

Ethics and Professional Code of Conduct Essay Example | Topics and Well Written Essays - 500 words

Ethics and Professional Code of Conduct - Essay Example Integrity ensures that such persons respect the citizens’ constitutional rights, liberty and adhere to the values of justice and fairness in their duties to the citizens (Gaines & Kappeler, 2011, p 345). In this case, the professional is capable of ensuring fairness in his or her duties and refraining from unjust use of authority. Secondly, ethics and integrity ensures that police chief exercises reasonable courtesy while interacting with the public. In this case, the police chief or county sheriff is able to refrain from mocking, embarrassing, ridiculing or humiliating subordinates or fellow officers in order to incite them to violence. Thirdly, ethics and integrity will enable such professionals to observe confidentiality of information that is available to them in their capacity as senior law enforcement officers (Gaines & Kappeler , p 343). The officers should not willfully violate any legal restrictions that restrict the dissemination of the private information and should not disclose information that may endanger the life of a complaint or victim to a crime. There is a clear difference between ethics, morality and law as pertains to the duties of law enforcement officers. Ethics are external standards that are set by the law enforcement profession and are regarded as the social system or framework that should offer the acceptable behavior in the execution of duties of the law enforcement officer (Hess & Orthmann, 2011, p189). Morality refers to the law enforcement officer’s own principles regarding what is right or wrong. Morality is internal as it reflects the habits, beliefs, culture, and religion of an individual while ethics are external since they are set by the profession. Morality is guided by the existing cultural norms while the ethics are guided by the legal and professional guidelines. Dutelle (2011) asserts that the morals are

Monday, November 18, 2019

Business Letter Essay Example | Topics and Well Written Essays - 500 words

Business Letter - Essay Example Our story hereby attests to the deep love, affection and respect for my wife: We had only been married last year, specifically on January 27, 2012. Our love story actually started since we were just in grade three in Zhanjiang Chunhui Elementary school, a private school where students from wealthy families are enrolled. When she transferred to a new school without notice, we lost contact for almost 16 years. I was so disappointed when I could not find a way to know her whereabouts. In these 16 years, I frequently would think about her. Luckily, in 2010, a miracle happened. I accidentally got contact with her through a web application called Renren, it’s a Chinese application like Facebook. We picked up our childhood stories, and she told me she has fallen in love with me when she was still a very little girl. At that time, I really wanted to meet her, but she had to complete co-op work terms as her program required, and I understand my company was just started. I didn’t have any capital so were not qualified to apply a Canadian entry visa. In addition, my father invested over 10 million in my company. I did not want to disappointment my parents. We started long distance relationship since then. In almost two years, we chatted every day through internet or phone. Long distance love is painful and very challenging. Long distance became the main obstacle for our relationship; and in fact, we argued over it frequently and almost caused a break-up. In Christmas of 2011, she completed her second coop work term in Provincial Health Services Authority (PHSA). She finally had a vacation, and traveled back to China on January 1, 2012. I introduced her to my parents, my family, and my friends. We finally got married on January 27, 2012. As a mature adult, I promised to give her better life as she grew up in a wealthy family. Last year, when my hard work got paid off, I have generated enough

Friday, November 15, 2019

The Differences Between International Financial Reporting Standards Ifrs And Current U S Gaap Accounting Essay

The Differences Between International Financial Reporting Standards Ifrs And Current U S Gaap Accounting Essay The differences between International Financial Reporting Standards (IFRS) and current U.S. GAAP are numerous. International Financial Reporting Standards (IFRS) are principles-based Standards, Interpretations and the Framework (1989) adopted by the International Accounting Standard Board (IASB). Many of the standards forming part of IFRS are known by the older name of International Accounting Standards (IAS). IAS was issued between 1973 and 2001 by the Board of the International Accounting Standard Committee (IASC). On 1 April 2001, the new IASB took over from the IASC the responsibility for setting International Accounting Standards. During its first meeting the new Board adopted existing IAS and SICs. The IASB has continued to develop standards calling the new standards IFRS. Generally Accepted Accounting Principles (GAAP) is a term used to refer to the standard framework of guidelines for financial accounting used in any given jurisdiction which are generally known as Accounting Standards. GAAP includes the standards, conventions, and rules accountants follow in recording and summarizing transactions, and in the preparation of financial statement. U.S. GAAP and IFRS differ in key ways, including their fundamental premise. At the highest level, U.S. GAAP is more of a rules-based system, whereas IFRS is more principles-based. This distinction may prove more difficulty than it initially appears, because most accounting and finance professionals in the U.S. have been schooled in the rules of U.S. GAAP. The overriding lesson from their years of study and work is this: If you have an issue, look it up. Under U.S. GAAP, voluminous guidance attempts to address nearly every conceivable accounting problem that might arise. And if that guidance doesnt exist, it generally is created. On the other hand, IFRS is a far shorter volume of principles-based standards, and consequently requires more judgment than American accountants are accustomed to. Companies involved in the exploration and development of crude oil and natural gas have the option of choosing between two accounting approaches: the successful efforts (SE) method and the full cost (FC) method. These differ in the treatment of specific operating expenses relating to the exploration of new oil and natural gas reserves. The balance sheet includes items that differ between International Financial Reporting Standards and Generally Accepted Accounting Principles will be addressed first. Balance sheet items include assets (inventory, property, plant and equipment), liabilities (accounts payable and other amounts owed) and equity (ownership interest, usually in the form of stock). Inventory is any item available for sale or used in the production of an item that will be sold. In valuing this inventory, GAAP allows for First-In-First-Out, Last-In-First-Out, Moving Average and Weighted Average. These are the four main methods used. IFRS does not allow the LIFO method. In times of increasing prices and costs, inventory profits may result from using and inventory valuation method other than LIFO. These inventory profits result in improved reported earnings, but because the inventory profits are taxed, they reduce a companys net cash flow. Depending on the system used, inventory values, profits and taxes can be affected. To give you some examples, the financial statements of a company using the LIFO approach as opposed to FIFO generally reflect: * Conservation profits, because LIFO buffers the effects of inflation. * Better matching of current costs with current revenue. * Lower liquidity, that is, a lower current ratio. * Lower equity position, that is, a higher debt-to-worth ratio. (Gibson) IFRS takes this one option away. In addition to this, IFRS required that the same formula be applied to all inventory of a similar nature. GAAP allows for different methods to be used. Asset retirement during the production of inventory is accounted for as a cost of the inventory using IFRS rules. Whereas, GAAP allows for it to be added to the carrying amount of the property, plant or equipment used to produce the inventory. With IFRS this cost will stay with the balance sheet. GAAP would move it to depreciation which lowers earnings but increases free cash flow. A write-down of an asset is reducing the book value if it is overstated compared to current market values. If a need arises to reverse a write-down, IFRS allows it and GAAP does not. GAAP does not allow the revaluation of property, plant and equipment. It uses historical cost. IFRS, on the other hand, allows either historical cost or revalued amount (fair value at date of revaluation less subsequent accumulated depreciation and impairment losses). The rules concerning residual value have some differences too. Residual value is the amount you expect to be able to sell a fixed asset for at the end of its useful life. IFRS calculates it as the current net selling price and it may be adjusted upwards or downwards. GAAP calculates it as the discounted present value and it may only be adjusted downward. Next, items such as depreciation and leases will be addressed. Since these items are expenses, they will affect the income statement. Depreciation is an expense that reduces the value of an asset as a result of wear and tear, age or obsolescence. IFRS requires more work when depreciating items. Depreciation of assets with differing patterns must be depreciated separately. This means that each item would have to be accounted for separately. GAAP allows this but it is not required. With GAAP, all the depreciation would be able to be grouped together and listed as a total requiring fewer entries. When capitalizing an asset, GAAP only allows interest. IFRS includes interest, certain ancillary costs and exchange differences that are regarded as an adjustment of interest. Being able to include these costs will increase the value of the asset and provide for more depreciation. Land and building leases is another topic where differences occur. IFRS considers land and building separately and GAAP considers them as a single unit unless land represents more than 25% of the total fair value. A couple of other items worth mentioning are contingent assets and extraordinary items. Contingent assets are assets in which the possibility of an economic benefit depends solely upon future events that cant be controlled by the company. Due to the uncertainty of the future events, these assets are not placed on the balance sheet. However, they can be found in the companys financial statement notes. These assets, which are often simply rights to a future potential claim, are based on past events. An example might be a potential settlement from a lawsuit. The company does not have enough certainty to place the settlement value on the balance sheet, so it can only talk about the potential in the notes. IFRS does not recognize contingent assets, GAAP does. Extraordinary items include the sale of the subsidiary or the payment of a lawsuit. Extraordinary items are a liability that is unusual or infrequent in its occurrence. IFRS prohibits extraordinary items and GAAP allows them. Although rare and infrequent, extraordinary items can be substantial and being able to include them can have an impact on your financial statements. As you may be able to tell, both have their advantages and disadvantages where compared to the other. There are some items in which benefits are drawn from IFRS and others that GAAP provides. There is an ongoing effort to address the differences and come to a consensus. At some point, the two different set of rules may be combined into one universal system. Works Cited Deloitte. IFRS and US GAAP: A Pocket Comparison. July 2008. IASplus.com. Gibson, S.C. LIFO vs FIFO: A Return to the Basics. Oct. 2008. The RMA Journal. Hughes, S.B. and Sander, J.F. A U.S. Managers Guide to Differences Between IFRS and U.S. GAAP. 2007. Management Accounting Quarterly. Kumar, S. Differences Between IFRSs and US GAAP. 26 July 2006. Caclubindia. PriceWaterhouseCoopers. IFRS and US GAAP: Similarities and Differences. Sept 2008. PWC.com. Inventory IFRS information on inventory can be found in IAS 2 and in Chapter 8 of the Wiley IFRS 2010 book. GAAP information on inventory can be found in ASC 330 and in Chapter 9 of the Wiley GAAP 2010 book. GAAP Definition (ASC 330-10-20): The aggregate of those items of tangible personal property that have any of the following characteristics: a.) held for sale in the ordinary course of business; b.) in process of production for such sale; c.) to be currently consumed in the production of goods or services to be available for sale. IFRS Definition (IAS 2): Items that are held for sale in the ordinary course of business; in the process of production for such sale; or in the form of materials or supplies to be consumed in the production process or in the rendering of services. GAAP IFRS |Allowable costing methods include FIFO, average cost, and LIFO |Allowable costing methods include FIFO and the weighted-average | | |cost. LIFO costing is prohibited | |Presentation at lower of cost or market required |Presentation at lower of cost or net realizable required | |Only in rare instances (mining of gold, etc.) are presentation |Certain defined situations, including agricultural products, | |at fair value in excess of cost permitted |permit reporting at fair value in excess of actual cost | |Lower of cost or market adjustments cannot be reversed |Lower of cost or market adjustments must be reversed under | | |defined conditions | |Recognition in interim periods of inventory losses from market |Recognition in interim periods of inventory losses from market | |declines that reasonably can be expected to be restored in the |declines that reasonably can be expected to be restored in the | |fiscal year is not required |fiscal year is required | Net realizable value is the estimated selling price in the ordinary course of business less the estimated costs of completion and the estimated costs necessary to make the sale (IAS 2). Presently, there are two sets of accounting standards accepted for international use U.S. GAAP and the International Financial Reporting Standards (IFRS). US GAAP or simply GAAP are accounting rules used to prepare, present, and report financial statements for a wide variety of entities, including publicly-traded and privately-held companies, non-profit organizations, and governments. The Financial Accounting Standards Board (FASB) is a private, not-for-profit organization whose primary purpose is to develop GAAP within the United States in the publics interest. The Securities and Exchange Commission (SEC) designated the FASB as the organization responsible for setting accounting standards for public companies in the U.S. On the other hand, the second set of accounting standard is IFRS (International Financial Reporting Standards), which is issued by the International Accounting Standards Board (IASB), based in London. Nearly 100 countries use it or coordinate their financial instruments. These countries or groups of countries include the European Union, Australia, and South Africa. While some countries require all companies to adhere to IFRS, others merely allow it, or try to coordinate its own countrys standards to be similar. The IASB is working toward this goal in a partnership with some of the most influential accounting standard-setters across the globe. The globalization of business and finance has led more than 12,000 companies in more than 100 countries to adopt IFRS. In the United States, the Securities and Exchange Commission (SEC) has been taking steps to set a date to allow U.S. public companies to use IFRS, and perhaps make its adoption mandatory. In fact, on November 14, 2008, the SEC released for public comment a proposed roadmap with a timeline and key milestones for adopting IFRS, beginning in 2014. IFRS website states that the convergence between IFRS and US GAAP brings some benefits. Growing interest in the global acceptance of a single set of robust accounting standards comes from all participants in the capital markets. Many multinational companies and national regulators and users support it because they believe that the use of common standards, in the preparation of public company financial statements, will make it easier to compare the financial results of reporting entities from different countries. They believe it will help investors better understand opportunities. Large public companies with subsidiaries in multiple jurisdictions would be able to use one accounting language company-wide and present their financial statements in the same language as their competitors. Another benefit some believe is that in a truly global economy, financial professionals, including CPAs, will be more mobile, and companies will be able to easily respond to the human capital needs of their subsidiaries around the world. According to aicpa.com, the most important specific differences between IFRS and U.S. GAAP are: à ¢Ã¢â€š ¬Ã‚ ¢ IFRS does not permit Last In, First Out (LIFO) à ¢Ã¢â€š ¬Ã‚ ¢ IFRS uses a single-step method for impairment write-downs rather than the two-step method used in U.S. GAAP, making write-downs more likely à ¢Ã¢â€š ¬Ã‚ ¢ IFRS has a different probability threshold and measurement objective for contingencies à ¢Ã¢â€š ¬Ã‚ ¢ IFRS does not permit debt for which a covenant violation has occurred to be classified as non-current unless a lender waiver is obtained before the balance sheet date Based on my research, I have read from some SEC and AICPA critics and also individuals in favor of the introduction of IFRS in U.S. Most of common critics against the adoption of IFRS focus on similar areas. Remi Forgeas, a CPA states in article published in AICPA website his critics: The usual difference noted between GAAP and IFRS is that the former is rule-based whereas the latter is principle-based. This principle-based concept generates concerns that it will be more difficult for a preparer to defend its position in case of litigation. Another point for discussion is the risk to see the standard setter becoming less independent and/or that the U.S. having less control on their accounting standards. The cost and the duration of the transition are often presented as a major hurdle, especially in this difficult economic environment. The complexity of the transition and then its cost will depend for the most part upon the completion of the convergence. The convergence process is expected be completed in 2011. Assuming the SEC decides on 2015 for the year of transition, changes for companies should be less complex, since both standards will be converged. Finally, the last issue is the human factor: are the preparers, users, auditors à ¢Ã¢â€š ¬Ã‚ ¦ experienced enough in IFRS? There is no doubt that specific training will be required to ensure IFRS are known by various categories of people dealing with IFRS. Focusing on the situation today is probably not the right approach: true there is today a lack in knowledge, but the situation is evolving rapidly. People favoring the introduction of IFRS in the U.S. states that the harmonization of financial reporting around the world will help raise the confidence of investors, generally, in the information they are using to make their decisions and assess their risks. The opposite is perhaps the clearer case. If accounting for the same events and information produces radically different reported numbers, depending on the system of standards that are being used, then it is self-evident that accounting will be increasingly discredited in the eyes of those using the numbers. For those companies with joint listings in both America and another country, there should be substantial savings, particularly in terms of preparation costs. Avoiding the burdensome U.S. GAAP reconciliation statement, required at present, would be a worthwhile prize. The good reasons why convergence with the U.S. should be pursued has been noted. There is, however, a downside to all of this for IFRS many people also believe that U.S. GAAP is the gold standard, and something will be lost with the full acceptance of IFRS. Other disadvantages are as follows: à ¢Ã¢â€š ¬Ã‚ ¢ Extra costs in the preparation of financial statements by all IFRS companies implementing new requirements and restating previously reported numbers. à ¢Ã¢â€š ¬Ã‚ ¢ Changes have to be communicated and understood by all of those involved in preparing the accounts, auditing them and using them. à ¢Ã¢â€š ¬Ã‚ ¢ Translations of the amended standards are required for the many languages in which IFRS are applicable. à ¢Ã¢â€š ¬Ã‚ ¢ The changes have to be approved by the various national endorsement authorities and often incorporated into their legal systems. à ¢Ã¢â€š ¬Ã‚ ¢ Continuous piecemeal changes undermine the reputation of IFRS. Some might justifiably ask why high quality standards need such frequent amendments. WORKS CITED AICPA IFRS Resources ifrs.com December 11, 2010. Web Accounting Standard Codification fasb.org December 11, 2010. Web Epstein, Barry. Nach, Ralph and Bragg, Steven GAAP 2010. New Jersey: Wiley, 2009. Print. United States Accounting Standards vs International Accounting Standards June 21, 2009 Introduction This research project will inform the reader of the difference between the United States accounting standards and International accounting standards. The United States uses the Financial Accounting Standards Board (FASB) to issue financial reporting procedures. The International Financial Reporting Standards (IFRS) are issued by the International Accounting Standards Board (IASB). There are proposals for the United States to adopt the International standards. Financial reporting procedures are debated about the United States using the Generally Accepted Accounting Procedures (GAAP) or following the global procedures. This project will also examine, compare, and contrast this debate. Discussion of Topic In an article by Heidi Tribunella (2009), U.S. GAAP is considered rules based. Rules-based accounting standards, on the other hand, give strict rules that must be adhered to in order to properly account for particular transactions. For example, lease accounting in the United States gives four criteria for determining if a lease is a capital lease. If a lease contains any of the following, then it is considered a capital lease and must be accounted for as such: 1 ) a bargain purchase option; 2) ownership transfers at the end of the lease; 3) minimum lease payments with a present value of at least 90% of the FMV of the asset; or 4) a lease length of at least 75% of the economic life of the asset. This is an example of very specific rules for accounting for leases (Tribunella, 2009). Tribunella (2009) goes on to explain International accounting standards, International Financial Reporting Standards (IFRS) are issued by the International Accounting Standards Board (IASB), which was created in 200l. Previously, the International Accounting Standards Committee (IASC), founded in 1973, issued International Accounting Standards (IAS). When the IASB was created, it adopted the IAS and continued the work of the IASC (Tribunella, 2009). Gary K. Meek and Wayne B. Thomas (2004) explain the influence of the IASB on the global reporting standards including the U.S. GAAP. In 2000, the International Organization of Securities Commissioners (IOSCO), of which the SEC is a member, recommended to member countries that IASC standards be used in cross-border offerings and listings. The enforcement of International Financial Reporting Standards (IFRS) by exchange regulators will be crucial to the eventual acceptance of the IFRS around the worldà ¢Ã¢â€š ¬Ã‚ ¦In October2002, the IASB and the Financial Standards Accounting Board (FASB) issued a memorandum of understanding, which formally stated their commitment to the convergence of IFRS and U.S. GAAP (Meek and Wayne, 2004). Jose Marrero and Thomas Brinker (2007) explain the efforts of the IASB and the FASB to merge their practices. Over the last two decades, research indicates that developing a framework of global accounting standards favors the recognition of culture. Cultural differences will impact a nations final consensus regarding accounting standards. However, after years of discussion, a solution to the dilemma of merging culture or international cultures and accounting standards has yet to be found. Currently, the International Accounting Standards Board (IASB) and the FASB are working on a principle-based framework for global financial reporting standards the cooperation of both the IASB and FASB will yield a uniform body of accounting standards allowing financial and investment advisers to view global investment opportunities on a more level playing fieldà ¢Ã¢â€š ¬Ã‚ ¦ (Marrero and Brinker, 2007). They also point out why certain business owners may not want to follow global practices, Further, business owners are unwilling to abandon their localized business practices to appease the accounting standards imposed on the multinational companies, much less their bookkeeping and financi al reporting standards to the jurisdiction of a U.S.-dominated accounting standard board (Marrero Brinker, 2009). David Bogoslaw (2008) talks about the convergence in further detail, The uproar over fair value accounting practices, which some critics have blamed for the depths of the global financial crisis, threatens to sink a long-sought move by countries around the world toward a single set of international financial reporting standards (IFRS). The U.S. Financial Accounting Standards Board (FASB) has been working with Londons International Accounting Standards Board (IASB) since 2002 toward what accounting professionals call convergence. The Securities Exchange Commission (SEC) is expected to announce its road map for conversion sometime this month, which will probably include early adoption in 2010 for about 110 of the largest U.S. companies with business operations throughout the world. The key difference between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS is that U.S. standards are based on explicit rules while the international standards reliance on principles gives companies more room to use their judgment in deciding how to recognize r evenue and other key metrics. Adoption of IFRS would also probably trigger a big tax hike for U.S. companies, which would no longer be able to use the last-in-first-out [LIFO] inventory accounting method, which doesnt exist under the international standards. The LIFO method assumes that goods purchased most recently are sold first and that the remaining items have been purchased at earlier periods, yielding a lower gross profit during high-inflation periods than the first-in-first-out accounting method (Bogoslaw, 2008). The main debate over switching accounting practices is further explained by Bogoslaw (2008) by stating, The debate over switching to accounting standards based on something less explicit than rules comes down to questions about whether the less explicit standard will provide adequate protection against lawsuits, says James Leisenring, director of technical activities in research at the FASB. You cant understand the debate about gratuitous vs. obligatory guidance (within IFRS) until you understand the litigation system in the U.S., where companies are more concerned about getting sued than in other parts of the world, he says. What its really about is safe harbors. What (IFRS skeptics) really want to know is if I do it in a particular way, am I home free or not? The explicit rules under GAAP may appear to offer safety, but the downside is there are so many of them that the odds of missing one or two are greater, he says. From Leisenrings perspective, the big accounting firms that are drawn to IFRS believe theyll get sued less since it will be harder to point to their mistakes. White agr ees that some companies like the freedom allowed under IFRS to interpret standards to suit their convenience, which undercuts auditors ability to prohibit certain accounting choices (Bogoslaw, 2008). Bogoslaw (2008) explains two sides of the criticism this switch has been receiving. Many are for it, but some are against it. The most strident critics of migration to IFRS argue that the primary goal of the SEC and U.S. Treasury Dept. is attracting capital to U.S. markets, rather than ensuring that the highest quality accounting standards prevail. While attracting more capital to the U.S. is a valid business objective, its not clear we can do that by going to international financial reporting standards, says Ashwinpaul Sondhi, president of A.C. Sondhi Associates in Maplewood, N.J., who has served on CFA Institute committees. Paul Miller, a professor of accounting at the University of Colorado, would prefer to have competing standards, since the only standards all countries would be able to agree on would be very weak ones. He also believes a unified set of standards, rather than being helpful, would stifle much-needed innovation given that most of the existing accounting standards are more than 60 years old (Bogoslaw, 2008). Adam Pieniazek (2007) wrote in a research paper about the comparison and contrast of U.S. GAAP and International Accounting standards, Due to the uncertainty of what the future American accounting standard will be, individuals and organizations in the US, would rather have the FASB pick one of the options and declare that it will stick with it, rather than debate for eons over the positive and negative aspects of the principles and rules based approach. As many prominent countries are already using the International Financial Reporting Standards, the representatives of American accounting must act now to align us with the IFRS; otherwise we face potentially being shut out from the formation process of these standards which will affect all international companies. The FASBs cooperative work with the IASC will result in a true Global GAAP; once the IFRS is aligned with the U.S. GAAP system, the American companies will issue statements according to the IFRS, as the SEC has declared that it will remove the reconciliation requirement once it is satisfied that IFRS are of a sufficient standard. The completion of convergen ce will be a boost to the global economy, and inherently, all underlying economies, as it will standardize the practice of accounting, allowing more work to go into principles and theory research, and increase the pool of available and applicable accountants. No longer will investors have to reconcile financial statements to an accounting style they are familiar with and neither will accountants have to prepare statements differently in various countries (Pieniazek, 2007). Conclusion United States Accounting Standards and International Accounting Standards are two different practices in financial reporting, that come from different bases. These two practices are being worked on to converge and use a Global accounting standard. This convergence is creating much criticism. There are many countries that are currently using the International standards, and many more are starting to join. The FASB and IASC are working together to converge by 2010. This convergence will also make it easier for accounts to prepare financial statements reporting United States and International transactions.

Wednesday, November 13, 2019

Essay on Variety in The Merchants Tale -- The Merchants Tale

Use of Variety in The Merchant's Tale  Ã‚   The Merchant's Tale tells the story of an old man searching for a wife and finding one, who is ultimately unfaithful to him. Chaucer uses a variety of elements in the poem to show his knowledge of contemporary interests and his story telling capacity through another figure. Irony flows through the poem, laced with allusions to the Bible. Chaucer's use of his astronomical knowledge not only allows modern day scholars to date events, but also adds another dimension of interest for the contemporary audience and of course, the pilgrims. Januarie's discussion of Heaven and Hell leads to the idea of marriage providing a Heaven on Earth. It is said that a wife is a husband's "paradis terrestre, and his disport" (l. 120), but at the introduction of the idea of a paradise, the reader can begin to contemplate the introduction of a serpent at a later point. Chaucer uses heavy irony as Januarie worries about experiencing his only Heaven on Earth. It becomes evident that May is anything but his Heaven. Her behaviour with Damyan in the pear tree is reminiscent of the story of Adam and Eve and the temptation of the apple tree as Damyan has become the serpent in Januarie's paradise of wedded bliss. The Biblical allusions that are used in the Tale have the effect of broadening the moral behind the story. By using the irony of the Biblical stories along with the thoughts of Januarie, a contemporary audience would have quickly perceived that there would be trouble with the marriage, as they would have been relatively well versed on the Bible. The priest at the marriage ceremony "bade [May] be lik Sarra and Rebekke" (l.492). While these two figures are held up as examples of holy and virtuous wom... ... the possibility, says Maurice Hussey, that Chaucer knew that St. Damian was the patron saint of medicine, thus giving ironic undertones to the sight-healing excuse for the pear tree tryst. Geoffrey Chaucer used many different aspects of his wide knowledge when writing the Merchant's Prologue and Tale. Biblical references and parallels with and inclusions of mythological characters are evidence of this. The appeal of such references to a medieval audience is extended with the inclusion of detailed and seemingly accurate astronomical minutiae. These details provide another level of information about the characters and their fates, such as the future of the marriage - it having been performed when the planet of war and the planet of love were in conjunction. Around these imaginative inclusions weaves a line of irony and a use of contemporary views and literature.