Thursday, January 30, 2020
Personality Assessment Instruments Essay Example for Free
Personality Assessment Instruments Essay Personality Assessment instruments are comprised of theories and techniques to measure an individualââ¬â¢s personality traits. The traditional psychoanalytical theories provide a framework for understanding negative behavior as well as concepts that predict future behavioral outcomes. Because of the possibility of predictive personality traits, career counselors and organizations have used personality assessment instruments to screen possible employers for qualification. In addition, personality assessment instrument have also been used to detect disordered personalities or other unresolved issues that cause negative behavior patterns in an individual. In this paper I will discuss three Personality Assessment Instruments widely used in measuring an individualââ¬â¢s personality; Myer-Briggs Type Indicator, Rorschach Inkblot Test and self help books. I will discuss the validity, comprehensiveness, applicability and cultural utility of these personality assessments in also examine the strengths and weaknesses of why some work and some do not. The strength and weaknesses of each personality assessment instrument is key in understanding which instrument is ââ¬Å"appropriateâ⬠to use. Myer-Briggs Type Indicator Largely based on Carl Jungââ¬â¢s Theory of Personality, The Myer-Briggs Type Indicator (MBTI) was created by Katherine Cook Briggs and Isabel Briggs Myer, during WWII to evaluate personality types to know where to place women entering the industrial workforce. The MBTI would assess women for jobs they were best qualified for. Seeing how successful the MBTI was in placing women in the workforce, today it is still used as an assessment instrument by career counselors and organizations for team building (McCaulley, 2000). The MBTI is a self-report, forced-choice questionnaire. The letters represent the respective personality types which have 16 unique possible outcomes. The test has about 100 questions with only two choices to pick from. MBTI divides an individualââ¬â¢s personality into four areas (McCaulley, 2000); 1. Extraversion (E) or Introversion (I) . Sensing (S) or intuition (N) 3. Thinking (T) or feeling (F) 4. Judging (J) or perceiving (P) This scale is an important factor in determining the dominant, auxiliary, tertiary and inferior behaviors of the individual (McCaulley, 2000). Each individual is measured by the four-letter type formula. Each group of letters reveals the dominant function of the individual and followed by the auxiliary. Each of the 16 combination of letters explains the personââ¬â¢s personality and what area they best function in. Rorschach Inkblot Test Hermann Rorschach, Swiss psychiatrist, created ill-defined designs on paper using ink. After much trial and error, Rorschach settled on 10 inkblot cards used to show to patients and illicit a response. It was determined that different patients in a particular psychiatric group gave different responses. The test was created to understand the mind of an individual. During the assessment, the patient is shown a card and is expected to explain the thoughts that come to mind when analyzing the card (Cervone, 2010). The test-giver waits to see the type of response that comes from the patient. And the question of how the patient responds or perceives the inkblot determines the type of personality the patient may have. If the patientââ¬â¢s response matches the inkblot structureââ¬â¢s intended meaning, then the patientââ¬â¢s thoughts are geared towards their reality. If the patientââ¬â¢s response does not correspond with the inkblot then the patient is perceived to have a dysfunctional personality. Self-Help Books Widely popular, Self-help books are a great way for a person to understand psychological disorders and possible treatments. There are a variety of books written by scholars and psychologist who have done extensive work in their area of expertise. Many people who are skeptical about going to therapy choose self-help books as a way to self-administer treatment (Redding et. al, 2008). The problem people face when relying on these books for help is that there is no discussion to make sure that the person understands what they are reading. Also, the books cannot assess the person to see if they can help the person like the MBTI and Rorschach Inkblot do. There is no way to measure if the specific book can help the person. Personality Assessments: from Theory to Practice In this next section I will examine the validity, comprehensiveness, applicability and cultural utility. Throughout my research I have discovered that some critics have argued that each of these personality assessment instruments have weaknesses that do not support what it claims to produce. Others critics have shown the strengthsââ¬â¢ in these widely used personality assessment to be applied in various cultures that have shown consistent scoring. Validity One of the most widely used personality assessment instruments is self-help books. They are easily accessible by most people seeking to resolve psychological issues. However, it is difficult to say if what the writer proposes to be a solution works effectively for the reader (Redding et. al. , 2008). The problem with the validity of self-help books is that not all are written by professional psychologist. Often people are faced with serious psychological disorders that they wish to resolve on their own as opposed to therapy (Redding et. l, 2008). Another issue with self-help books is that they do not test people to see if they have applied the information coming from the book to the area in their life where they face challenges nor can it pinpoint the exact disorder a person is dealing with. I would have to say that the Myer-Briggs Type Indicator holds the most validity out of the three personality assessment instruments and is the most favored. The MBTI has been tested and based on the 16 different possible personality types most people have fallen under one of the combinations. The MBTI follows the theory of personality traits by Carl Jung. Jungââ¬â¢s theory distinguishes two dichotomous pairs of cognitive behavior: extraversion and introversion (McCaulley, 2008). The MBTI has been shown to be successful in determining an individualââ¬â¢s personality that fits a specific career or in organizing groups for team building. On the other hand, when a person has been assessed using the Rorschach inkblot test, disordered personality can be revealed thru extensive testing. The validity of the Rorschach inkblot test as but argued that there is a bias in the testing because Hermann Rorschachââ¬â¢s training was in psychoanalytical theories. Another problem that arises with the Rorschach in examining its validity is the scoring of the test. Many of the scorers give a higher score to the test taker if their response matches those of previous scorers (Sendin, 2010). Comprehensiveness Self-help books focus on an areas in an individualââ¬â¢s life such as alcohol addictions, Attention Deficit Disorder, How to deal with a Break-Up. And while the books can be informative the theory behind the solution must be examined. Most self-help books are written in the opinion of the author writing the book. Some of these opinions may not be in accord with the readerââ¬â¢s background so it is difficult to say if the reader is able to comprehend what the author is conveying (Redding et. al, 2008). It also depends only what the reader is looking for. If the reader is open to alternative solutions as opposed to traditional one then the book will help but because a person is not tested on the self-help books they are reading it is hard to determine how comprehensive the book is. MBTI has 16 possible personality types that this world-wide instrument uses to address issues faced by individuals, groups and family counseling that are challenged with communication, career planning, learning and life -long development (McCaulley, 2000). When assessing an individualââ¬â¢s personality not only is this helpful in career counseling but also when determining why individuals or family members are having communication problems. Applicability Self-help books can be easy to understand. Some of the methods are broken down in simple steps that anyone can apply. However, if one wants to assess the type of personality that can handle a certain job the Myer-Briggs Type Indicator is more appropriate to use. This assessment instrument has been used by career counselors and employers to match individuals to specific studies or industries (McCaulley, 2008). I would not recommend using the Myer-Briggs Type Indicator when assessing an individualââ¬â¢s personality for disorders. The Rorschach Inkblot has been a successful instrument in examining the mind of a person (Cervone, 2010). However, the Rorschach inkblot was constructed according to Hermann Rorschachââ¬â¢s training in psychoanalytical theory. Cultural Utility Each culture is made of its own belief system and traditions. What applies in one culture may not necessarily apply in another. Some assessments can be used in most cultures and give the same results across the board. However, not all cultures will accept the theories behind the assessment. The issues that I have noticed in researching the MBTI and Rorschach Inkblot test is that in applying to different cultures there has been challenges faced by psychologist. For one, psychologists have not had extensive training in cultural diversity. Nor have they had training in language. Most ethnic low income groups have had poor health service in which there has been a misdiagnosis due to language barrier (Dana, 2000). Also to consider are groups who come from another country and have different views on the mental health system. For example, in administering the MBTI and Rorschach Inkblot test to Russian Jews challenges are faced because of their cultural belief. Russian Jews are highly suspicious of mental health professionals and find it difficult to believe that community health agencies do not have ties to the government (Dana, 200). As a result, they deny any mental health issues. The fear that exists with Russian Jews is because of the way they saw the Soviet Government force people to commit to a mental health institute (Dana, 2000). Consequently, self help books have been successful in reaching a mass audience because books have been published in various languages. Conclusion As you can see Personality Assessment Instruments have been very useful in helping to examine an individualââ¬â¢s personality for career choices, in team building and examining a disorder. However, specialist have has revealed their weaknesses and show that these instruments cannot be applied in any situation without further investigation. Each personality assessment instrument is unique with itââ¬â¢s own characters. In order to be able to better serve the mental health industry only a particular assessment can be used for a specific analysis.
Wednesday, January 22, 2020
Structure and Function Essay -- Medical Research
First labelled an oncogene upon its discovery in 1979, p53 (or TP53 in humans), was correctly re-labelled a tumour suppressor a decade later following the discovery that the gene previously being studied was, ironically, a mutant. Now realised as the most common mutated gene, found in a staggering 50% of cancers, p53 is a keystone in the face of cancer. Its structure and functions continue to be delved into. Amino acids, genome stability, tumour suppression, iPS? Gene Structure 53 kilo-Daltons in size, 11 exons and 10 introns, p53 gene is located on chromosome 17. Using a clone isolated from a cDNA library of simian virus 40- transformed human fibroblasts, Mcbride et al. (1985), identified the location of p53 gene. Using karyotypic analysis and Southern analyses, they narrowed down the exact position of the p53 gene to the most distal band on the short arm of chromosome 17- the telomeric band 17p13. Structurally abundant in domains, p53 has three main functional domains and 393 amino acids in total. The first domain, the N-terminal (NH2 terminal) houses amino acids that are important in transactivation. In vivo, p53 requires amino acids F19, L22, and W23 found in the N-terminal for transcriptional activation (Lin et al., 1995). Present also, are the amino acid residues 22 and 23, although positive- regulators of transcriptional activity, are later to play a role in the negative-regulation of p53. In highlighting similarities between p53 protein-DNA interactions to other protein-DNA complexes, Cho et al. (1994), point out that p53 uses a loop packing at the NH2-terminal part of the alpha helix to make extra connections to the bases in the major groove of DNA. The C-terminal (carboxyl terminal) ââ¬â61 important amino aci... ...anaka, S., 2009. Suppression of induced pluripotent stem cell generation by the p53-p21 pathway. Nature 460, 1132-1135. Lee, S., Elenbaas, B., Levine, A.J, and Griffith, J., 1995. p53 and its 14 kDa C-terminal domain recognize primary DNA damage in the form of insertion/deletion mismatches. Cell 81, 1013-1020. Levine, A.J., 1997. p53, the cellular gatekeeper for growth and division. Cell. 88, 323-331. Lin, J., Wu, X., Chen, J., Chang, A., and Levine, A.J., 1995. Functions of the the p53 protein growth regulation and tumour suppression. Cold Springs Harbour Symposia on Quantitative Biology LIX, 215-223. McBride, O.W., Merry, D.E., Oren, M., and Givol, D., 1985. The gene for human p53 cellular tumor antigen is located on chromosome 17 short arm (17p13). Proc. Nat. Acad. Sci. 83, 130-134.
Tuesday, January 14, 2020
The Host Chapter 31: Needed
I froze and then looked quickly over my shoulder to see if someone was behind me. ââ¬Å"Gladys was his wife,â⬠Jamie whispered almost silently. ââ¬Å"She didn't escape.â⬠ââ¬Å"Gladys,â⬠Walter said to me, oblivious to my reaction. ââ¬Å"Would you believe I went and got cancer? What are the odds, eh? Never took a sick day in my lifeâ⬠¦Ã¢â¬ His voice faded out until I couldn't hear it, but his lips continued to move. He was too weak to lift his hand; his fingers dragged themselves toward the edge of the cot, toward me. Ian nudged me forward. ââ¬Å"What should I do?â⬠I breathed. The sweat beading on my forehead had nothing to do with the humid heat. ââ¬Å"â⬠¦ grandfather lived to be a hundred and one,â⬠Walter wheezed, audible again. ââ¬Å"Nobody ever had cancer in my family, not even the cousins. Didn't your aunt Regan have skin cancer, though?â⬠He looked at me trustingly, waiting for an answer. Ian poked me in the back. ââ¬Å"Umâ⬠¦Ã¢â¬ I mumbled. ââ¬Å"Maybe that was Bill's aunt,â⬠Walter allowed. I shot a panicked glance at Ian, who shrugged. ââ¬Å"Help,â⬠I mouthed at him. He motioned for me to take Walter's searching fingers. Walter's skin was chalk white and translucent. I could see the faint pulse of blood in the blue veins on the back of his hand. I lifted his hand gingerly, worried about the slender bones that Jamie had said were so brittle. It felt too light, as if it were hollow. ââ¬Å"Ah, Gladdie, it's been hard without you. It's a nice place here; you'll like it, even when I'm gone. Plenty of people to talk to-I know how you need to have your conversationâ⬠¦Ã¢â¬ The volume of his voice sank until I couldn't make out the words anymore, but his lips still shaped the words he wanted to share with his wife. His mouth kept moving, even when his eyes closed and his head lolled to the side. Ian found a wet cloth and began wiping Walter's shining face. ââ¬Å"I'm not good atâ⬠¦ at deception,â⬠I whispered, watching Walter's mumbling lips to make sure he wasn't listening to me. ââ¬Å"I don't want to upset him.â⬠ââ¬Å"You don't have to say anything,â⬠Ian reassured me. ââ¬Å"He's not lucid enough to care.â⬠ââ¬Å"Do I look like her?â⬠ââ¬Å"Not a bit-I've seen her picture. Stocky redhead.â⬠ââ¬Å"Here, let me do that.â⬠Ian gave me the rag, and I cleaned the sweat off Walter's neck. Busy hands always made me feel more comfortable. Walter continued to mumble. I thought I heard him say, ââ¬Å"Thanks, Gladdie, that's nice.â⬠I didn't notice that Doc's snores had stopped. His familiar voice was suddenly there behind me, too gentle to startle. ââ¬Å"How is he?â⬠ââ¬Å"Delusional,â⬠Ian whispered. ââ¬Å"Is that the brandy or the pain?â⬠ââ¬Å"More the pain, I would think. I'd trade my right arm for some morphine.â⬠ââ¬Å"Maybe Jared will produce another miracle,â⬠Ian suggested. ââ¬Å"Maybe,â⬠Doc sighed. I wiped absently at Walter's pallid face, listening more intently now, but they didn't speak of Jared again. Not here, Melanie whispered. Looking for help for Walter, I agreed. Alone, she added. I thought about the last time I'd seen him-the kiss, the beliefâ⬠¦ He probably wanted some time to himself. I hope he isn't out there convincing himself that you're a very talented actress-slash-Seeker againâ⬠¦ That's possible, of course. Melanie groaned silently. Ian and Doc murmured in quiet voices about inconsequential things, mostly Ian catching Doc up on what was going on in the caves. ââ¬Å"What happened to Wanda's face?â⬠Doc whispered, but I could still hear him easily. ââ¬Å"More of the same,â⬠Ian said in a tight voice. Doc made an unhappy noise under his breath and then clicked his tongue. Ian told him a bit about tonight's awkward class, about Geoffrey's questions. ââ¬Å"It would have been convenient if Melanie had been possessed by a Healer,â⬠Doc mused. I flinched, but they were behind me and probably didn't notice. ââ¬Å"We're lucky it was Wanda,â⬠Ian murmured in my defense. ââ¬Å"No one else -ââ¬Å" ââ¬Å"I know,â⬠Doc interrupted, good-natured as always. ââ¬Å"I guess I should say, it's too bad Wanda didn't have more of an interest in medicine.â⬠ââ¬Å"I'm sorry,â⬠I murmured. I was careless to reap the benefits of perfect health without ever being curious about the cause. A hand touched my shoulder. ââ¬Å"You have nothing to apologize for,â⬠Ian said. Jamie was being very quiet. I looked around and saw that he was curled up on the cot where Doc had been napping. ââ¬Å"It's late,â⬠Doc noted. ââ¬Å"Walter's not going anywhere tonight. You should get some sleep.â⬠ââ¬Å"We'll be back,â⬠Ian promised. ââ¬Å"Let us know what we can bring, for either of you.â⬠I laid Walter's hand down, patting it cautiously. His eyes snapped open, focusing with more awareness than before. ââ¬Å"Are you leaving?â⬠he wheezed. ââ¬Å"Do you have to go so soon?â⬠I took his hand again quickly. ââ¬Å"No, I don't have to leave.â⬠He smiled and closed his eyes again. His fingers locked around mine with brittle strength. Ian sighed. ââ¬Å"You can go,â⬠I told him. ââ¬Å"I don't mind. Take Jamie back to his bed.â⬠Ian glanced around the room. ââ¬Å"Hold on a sec,â⬠he said, and then he grabbed the cot closest to him. It wasn't heavy-he lifted it easily and slid it into place next to Walter's. I stretched my arm to the limit, trying not to jostle Walter, so that Ian could arrange the cot under it. Then he grabbed me up just as easily and set me on the cot beside Walter. Walter's eyes never fluttered. I gasped quietly, caught off guard by the casual way Ian was able to put his hands on me-as though I were human. Ian jerked his chin toward Walter's hand clasped around mine. ââ¬Å"Do you think you can sleep like that?â⬠ââ¬Å"Yes, I'm sure I can.â⬠ââ¬Å"Sleep well, then.â⬠He smiled at me, then turned and lifted Jamie from the other cot. ââ¬Å"Let's go, kid,â⬠he muttered, carrying the boy with no more effort than if he were an infant. Ian's quiet footsteps faded into the distance until I couldn't hear them anymore. Doc yawned and went to sit behind the desk he'd constructed out of wooden crates and an aluminum door, taking the dim lamp with him. Walter's face was too dark to see, and that made me nervous. It was like he was already gone. I took comfort in his fingers, still curled stiffly around mine. Doc began to shuffle through some papers, humming almost inaudibly to himself. I drifted off to the sound of the gentle rustling. Walter recognized me in the morning. He didn't wake until Ian showed up to escort me back; the cornfield was due to be cleared of the old stalks. I promised Doc I would bring him breakfast before I got to work. The very last thing I did was to carefully loosen my numb fingers, freeing them from Walter's grasp. His eyes opened. ââ¬Å"Wanda,â⬠he whispered. ââ¬Å"Walter?â⬠I wasn't sure how long he would know me, or if he would remember last night. His hand clutched at the empty air, so I gave him my left, the one that wasn't dead. ââ¬Å"You came to see me. That was nice. I knowâ⬠¦ with the others backâ⬠¦ must be hardâ⬠¦ for youâ⬠¦ Your faceâ⬠¦Ã¢â¬ He seemed to be having a difficult time making his lips form the words, and his eyes went in and out of focus. How like him, that his first words to me would be full of concern. ââ¬Å"Everything's fine, Walter. How are you feeling?â⬠ââ¬Å"Ah -â⬠He groaned quietly. ââ¬Å"Not soâ⬠¦ Doc?â⬠ââ¬Å"Right here,â⬠Doc murmured, close behind me. ââ¬Å"Got any more liquor?â⬠he gasped. ââ¬Å"Of course.â⬠Doc was already prepared. He held the mouth of a thick glass bottle to Walter's slack lips and carefully poured the dark brown liquid in slow drips into his mouth. Walter winced as each sip burned down his throat. Some of it trickled out the side of his mouth and onto his pillow. The smell stung my nose. ââ¬Å"Better?â⬠Doc asked after a long moment of slow pouring. Walter grunted. It didn't sound like assent. His eyes closed. ââ¬Å"More?â⬠Doc asked. Walter grimaced and then moaned. Doc cursed under his breath. ââ¬Å"Where's Jared?â⬠he muttered. I stiffened at the name. Melanie stirred and then drifted again. Walter's face sagged. His head rolled back on his neck. ââ¬Å"Walter?â⬠I whispered. ââ¬Å"The pain's too much for him to stay conscious. Let him be,â⬠Doc said. My throat felt swollen. ââ¬Å"What can I do?â⬠Doc's voice was desolate. ââ¬Å"About as much as I can. Which is nothing. I'm useless.â⬠ââ¬Å"Don't be like that, Doc,â⬠I heard Ian murmur. ââ¬Å"This isn't your fault. The world doesn't work the way it used to. No one expects more of you.â⬠My shoulders hunched inward. No, their world didn't work the same way anymore. A finger tapped my arm. ââ¬Å"Let's go,â⬠Ian whispered. I nodded and started to pull my hand free again. Walter's eyes rolled open, unseeing. ââ¬Å"Gladdie? Are you here?â⬠he implored. ââ¬Å"Umâ⬠¦ I'm here,â⬠I said uncertainly, letting his fingers lock around mine. Ian shrugged. ââ¬Å"I'll get you both some food,â⬠he whispered, and then he left. I waited anxiously for him to return, unnerved by Walter's misconception. Walter murmured Gladys's name over and over, but he didn't seem to need anything from me, for which I was grateful. After a while, half an hour maybe, I began listening for Ian's footsteps in the tunnel, wondering what could be taking him so long. Doc stood by his desk the whole time, staring into nothing with his shoulders slumped. It was easy to see how useless he felt. And then I did hear something, but it wasn't footsteps. ââ¬Å"What is that?â⬠I asked Doc in a whisper; Walter was quiet again, maybe unconscious. I didn't want to disturb him. Doc turned to look at me, cocking his head to the side at the same time to listen. The noise was a funny thrumming, a fast, soft beat. I thought I heard it get just a little louder, but then it seemed quieter again. ââ¬Å"That's weird,â⬠Doc said. ââ¬Å"It almost sounds likeâ⬠¦Ã¢â¬ He paused, his forehead furrowing in concentration as the unfamiliar sound faded. We were listening intently, so we heard the footsteps when they were still far away. They did not match the expected, even pace of Ian's return. He was running-no, sprinting. Doc reacted immediately to the sound of trouble. He jogged quickly out to meet Ian. I wished I could see what was wrong, too, but I didn't want to upset Walter by trying to free my hand again. I listened hard instead. ââ¬Å"Brandt?â⬠I heard Doc say in surprise. ââ¬Å"Where is it? Where is it?â⬠the other man demanded breathlessly. The running footsteps only paused for a second, then started up again, not quite as fast. ââ¬Å"What are you talking about?â⬠Doc asked, calling back this way. ââ¬Å"The parasite!â⬠Brandt hissed impatiently, anxiously, as he burst through the arched entry. Brandt was not a big man like Kyle or Ian; he was probably only a few inches taller than me, but he was thick and solid as a rhinoceros. His eyes swept the room; his piercing gaze focused on my face for half a second, then took in Walter's oblivious form, and then raced around the room only to end up on me again. Doc caught up with Brandt then, his long fingers gripping Brandt's shoulder just as the broader man took the first step in my direction. ââ¬Å"What are you doing?â⬠Doc asked, his voice the closest to a growl I'd ever heard it. Before Brandt answered, the odd sound returned, going from soft to screaming loud to soft again with a suddenness that had us all frozen. The beats thudded right on top of one another, shaking the air when they were at their loudest. ââ¬Å"Is that-is that a helicopter?â⬠Doc asked, whispering. ââ¬Å"Yes,â⬠Brandt whispered back. ââ¬Å"It's the Seeker-the one from before, the one who was looking for it.â⬠He jerked his chin at me. My throat was suddenly too small-the breaths moving through it were thin and shallow, not enough. I felt dizzy. No. Not now. Please. What is her problem? Mel snarled in my head. Why can't she leave us alone? We can't let her hurt them! But how do we stop her? I don't know. This is all my fault! Mine, too, Wanda. Ours. ââ¬Å"Are you sure?â⬠Doc asked. ââ¬Å"Kyle got a clear view through the binoculars while it was hovering. Same one he saw before.â⬠ââ¬Å"Is it looking here?â⬠Doc's voice was suddenly horrified. He half spun, eyes flashing toward the exit. ââ¬Å"Where's Sharon?â⬠Brandt shook his head. ââ¬Å"It's just running sweeps. Starts at Picacho, then fans out in spokes. Doesn't look like it's focusing on anything close. Circled around a few times where we dumped the car.â⬠ââ¬Å"Sharon?â⬠Doc asked again. ââ¬Å"She's with the kids and Lucina. They're fine. The boys are getting things packed in case we have to roll tonight, but Jeb says it's not likely.â⬠Doc exhaled, then paced over to his desk. He slouched against it, looking as if he'd just run a long race. ââ¬Å"So it's nothing new, really,â⬠he murmured. ââ¬Å"Naw. Just have to lay low for a few days,â⬠Brandt reassured him. His eyes were flickering around the room again, settling on me every other second. ââ¬Å"Do you have any rope handy?â⬠he asked. He pulled up the edge of the sheet on an empty cot, examining it. ââ¬Å"Rope?â⬠Doc echoed blankly. ââ¬Å"For the parasite. Kyle sent me out here to secure it.â⬠My muscles contracted involuntarily; my hand gripped Walter's fingers too tightly, and he whimpered. I tried to force it to relax while I kept my eyes on Brandt's hard face. He was waiting for Doc, expectant. ââ¬Å"You're here to secure Wanda?â⬠Doc said, his voice hard again. ââ¬Å"And what makes you think that's necessary?â⬠ââ¬Å"Come on, Doc. Don't be stupid. You've got some big vents in here, and a lot of reflective metal.â⬠Brandt gestured to a file cabinet against the far wall. ââ¬Å"You let your attention wander for half a minute, and it'll be flashing signals to that Seeker.â⬠I sucked in a shocked breath; it was loud in the still room. ââ¬Å"See?â⬠Brandt said. ââ¬Å"Guessed its plan in one.â⬠I wanted to bury myself under a boulder to hide from the bulging, relentless eyes of my Seeker, yet he imagined I wanted to guide her in. Bring her here to kill Jamie, Jared, Jeb, Ianâ⬠¦ I felt like gagging. ââ¬Å"You can go, Brandt,â⬠Doc said in an icy tone. ââ¬Å"I will keep an eye on Wanda.â⬠Brandt raised one eyebrow. ââ¬Å"What happened to you guys? To you and Ian and Trudy and the rest? It's like you're all hypnotized. If your eyes weren't right, I'd have to wonderâ⬠¦Ã¢â¬ ââ¬Å"Go ahead and wonder all you want, Brandt. But get out while you're doing it.â⬠Brandt shook his head. ââ¬Å"I've got a job to do.â⬠Doc walked toward Brandt, stopping when he was between Brandt and me. He folded his arms across his chest. ââ¬Å"You're not going to touch her.â⬠The throbbing helicopter blades sounded in the distance. We were all very still, not breathing, until they faded. Brandt shook his head when it was quiet again. He didn't speak; he just went to the desk and picked up Doc's chair. He carried it to the wall by the file cabinet, slammed it to the ground, and then sat down hard, making the metal legs squeal against the stone. He leaned forward, his hands on his knees, and stared at me. A vulture waiting for a dying hare to stop moving. Doc's jaw tightened, making a little popping noise. ââ¬Å"Gladys,â⬠Walter muttered, surfacing from his dazed sleep. ââ¬Å"You're here.â⬠Too nervous to speak with Brandt watching, I just patted his hand. His clouded eyes searched my face, seeing features that weren't there. ââ¬Å"It hurts, Gladdie. It hurts a lot.â⬠ââ¬Å"I know,â⬠I whispered. ââ¬Å"Doc?â⬠He was already there, the brandy in hand. ââ¬Å"Open up, Walter.â⬠The sound of the helicopter thumped quietly, far away but still much too close. Doc flinched, and a few drops of brandy splattered on my arm. It was a horrible day. The worst of my life on this planet, even including my first day in the caves and the last hot, dry day in the desert, hours from death. The helicopter circled and circled. Sometimes more than an hour would pass, and I would think it was finally over. Then the sound would come back, and I would see the Seeker's obstinate face in my head, her protruding eyes scouring the blank desert for some sign of humans. I tried to will her away, concentrating hard on my memories of the desert's featureless, colorless plain, as if I could somehow make sure she saw nothing else, as if I could bore her into leaving. Brandt never took his suspicious stare off of me. I could always feel it, though I rarely looked at him. It got a little better when Ian came back with both breakfast and lunch. He was all dirty from packing in case of an evacuation-whatever that meant. Did they have anywhere to go? Ian scowled so hard he looked like Kyle when Brandt explained in clipped phrases why he was there. Then Ian dragged another empty cot beside mine, so that he could sit in Brandt's line of sight and block his view. The helicopter, Brandt's distrustful watch, these were not really so bad. On an ordinary day-if there was really such a thing anymore-either one of these might have seemed agonizing. Today, they were nothing. By noon, Doc had given Walter the last of the brandy. It seemed like only minutes later that Walter was writhing, moaning, and gasping for breath. His fingers bruised and chafed mine, but if I ever pulled away, his moans turned to shrill screams. I ducked out once to use the latrine; Brandt followed me, which made Ian feel like he had to come, too. By the time we got back-after nearly running the whole way-Walter's screams no longer sounded human. Doc's face was hollow with echoed agony. Walter quieted after I spoke to him for a moment, letting him think his wife was near. It was an easy lie, a kind one. Brandt made little noises of irritation, but I knew that he was wrong to be upset. Nothing mattered beside Walter's pain. The whimpers and the writhing continued, though, and Brandt paced back and forth at the other end of the room, trying to be as far from the sound as possible. Jamie came looking for me, bringing food enough for four, when the light was growing orangey overhead. I wouldn't let him stay; I made Ian take him back to the kitchen to eat, made Ian promise to watch him all night so he wouldn't sneak back here. Walter couldn't help shrieking when his twisting moved his broken leg, and the sound of it was nearly unbearable. Jamie shouldn't have this night burned into his memory the way it would surely be burned into Doc's and mine. Perhaps Brandt's as well, though he did what he could to ignore Walter, plugging his ears and humming a dissonant tune. Doc did not try to distance himself from Walter's hideous suffering; instead, he suffered with him. Walter's cries carved deep lines in Doc's face, like claws raking his skin. It was strange to see such depths of compassion in a human, particularly Doc. I couldn't look at him the same way after watching him live Walter's pain. So great was his compassion, he seemed to bleed internally with it. As I watched, it became impossible to believe that Doc was a cruel person; the man simply could not be a torturer. I tried to remember what had been said to found my conjectures-had anyone made the accusation outright? I didn't think so. I must have jumped to false conclusions in my terror. I doubted I could ever mistrust Doc again after this nightmarish day. However, I would always find his hospital a horrible place. When the last of the daylight disappeared, so did the helicopter. We sat in the darkness, not daring to turn on even the dim blue light. It took a few hours before any of us would believe the hunt was over. Brandt was the first to accept it; he'd had enough of the hospital, too. ââ¬Å"Makes sense for it to give up,â⬠he muttered, edging out the exit. ââ¬Å"Nothing to see at night. I'll just take your light with me, Doc, so that Jeb's pet parasite can't get up to anything, and be on my way.â⬠Doc didn't respond, didn't even look at the sullen man as he left. ââ¬Å"Make it stop, Gladdie, make it stop!â⬠Walter begged me. I wiped the sweat from his face while he crushed my hand. Time seemed to slow down and stop; the black night felt unending. Walter's screams got more and more frequent, more and more excruciating. Melanie was far away, knowing she could do nothing useful. I would have hidden, too, if Walter hadn't needed me. I was all alone in my head-exactly what I had once wanted. It made me feel lost. Eventually, a dim gray light started to creep in through the high vents overhead. I was hovering on the edge of sleep, Walter's moans and screams keeping me from sinking under. I could hear Doc snoring behind me. I was glad that he'd been able to escape for a little while. I didn't hear Jared come in. I was mumbling weak assurances, barely coherent, trying to calm Walter. ââ¬Å"I'm here, I'm here,â⬠I murmured as he cried out his wife's name. ââ¬Å"Shh, it's okay.â⬠The words were meaningless. It was something to say, though, and it did seem that my voice calmed the worst of his cries. I don't know how long Jared watched me with Walter before I realized he was there. It must have been a while. I was sure his first reaction would be anger, but when I heard him speak, his voice was cool. ââ¬Å"Doc,â⬠he said, and I heard the cot behind me shake. ââ¬Å"Doc, wake up.â⬠I jerked my hand free, whirling, disoriented, to see the face that went with the unmistakable voice. His eyes were on me as he shook the sleeping man's shoulder. They were impossible to read in the dim light. His face had no expression at all. Melanie jolted into awareness. She pored over his features, trying to read the thoughts behind the mask. ââ¬Å"Gladdie! Don't leave! Don't!â⬠Walter's screech had Doc bolting upright, nearly capsizing his cot. I spun back to Walter, shoving my sore hand into his searching fingers. ââ¬Å"Shhh, shhh! Walter, I'm here. I won't leave. I won't, I promise.â⬠He quieted down, whimpering like a small child. I wiped the damp cloth over his forehead; his sob hitched and turned into a sigh. ââ¬Å"What's that about?â⬠Jared murmured behind me. ââ¬Å"She's the best painkiller I've been able to find,â⬠Doc said wearily. ââ¬Å"Well, I've found you something better than a tame Seeker.â⬠My stomach knotted, and Melanie hissed in my head. So stupidly, blindly stubborn! she growled. He wouldn't believe you if you told him the sun sets in the west. But Doc was beyond caring about the slight to me. ââ¬Å"You found something!â⬠ââ¬Å"Morphine-there's not much. I would have gotten here sooner if the Seeker hadn't pinned me down out there.â⬠Doc was instantly in action. I heard him rustling through something papery, and he crowed in delight. ââ¬Å"Jared, you're the miracle man!â⬠ââ¬Å"Doc, just a secâ⬠¦Ã¢â¬ But Doc was at my side already, his haggard face alight with anticipation. His hands were busy with a small syringe. He stuck the tiny needle into the crease at Walter's elbow, on the arm that was attached to me. I turned my face away. It seemed so horribly invasive to stab something through his skin. I couldn't argue with the results, though. Within half a minute, Walter's entire body relaxed, melting into a pile of loose flesh against the thin mattress. His breathing went from harsh and urgent to whispery and even. His hand relaxed, freeing mine. I massaged my left hand with my right, trying to bring the blood back to my fingertips. Little prickles followed the flow of blood under my skin. ââ¬Å"Uh, Doc, there really isn't enough for that,â⬠Jared murmured. I looked up from Walter's face, peaceful at last. Jared had his back to me, but I could see the surprise in Doc's expression. ââ¬Å"Enough for what? I'm not going to save this for a rainy day, Jared. I'm sure we'll wish we had it again, and too soon, but I'm not going to let Walter scream in agony while I have a way to help him!â⬠ââ¬Å"That's not what I meant,â⬠Jared said. He spoke the way he did when he'd already thought about something long and hard. Slow and even, like Walter's breath. Doc frowned, confused. ââ¬Å"There's enough to stop the pain for maybe three or four days, that's all,â⬠Jared said. ââ¬Å"If you give it to him in doses.â⬠I didn't understand what Jared was saying, but Doc did. ââ¬Å"Ah,â⬠he sighed. He turned to look at Walter again, and I saw a rim of fresh tears start to pool above his lower lids. He opened his mouth to speak, but nothing came out. I wanted to know what they were talking about, but Jared's presence made me silent, brought back the reserve I rarely felt the need for anymore. ââ¬Å"You can't save him. You can only save him pain, Doc.â⬠ââ¬Å"I know,â⬠Doc said. His voice broke, like he was holding back a sob. ââ¬Å"You're right.â⬠What's going on? I asked. As long as Melanie was going to be around, I might as well make use of her. They're going to kill Walter, she told me matter-of-factly. There's enough morphine to give him an overdose. My gasp sounded loud in the quiet room, but it was really just a breath. I didn't look up to see how the two healthy men would react. My own tears pooled as I leaned over Walter's pillow. No, I thought, no. Not yet. No. You'd rather he died screaming? I justâ⬠¦ I can't stand theâ⬠¦ finality. It's so absolute. I'll never see my friend again. How many of your other friends have you gone back to visit, Wanderer? I've never had friends like this before. My friends on other planets were all blurred together in my head; the souls were so similar, almost interchangeable in some ways. Walter was distinctly himself. When he was gone, there would be no one who could fill his place. I cradled Walter's head in my arms and let my tears fall onto his skin. I tried to stifle my crying, but it made its way out regardless, a keening rather than sobs. I know. Another first, Melanie whispered, and there was compassion in her tone. Compassion for me-that was a first, too. ââ¬Å"Wanda?â⬠Doc asked. I just shook my head, not able to answer. ââ¬Å"I think you've been here too long,â⬠he said. I felt his hand, light and warm, on my shoulder. ââ¬Å"You should take a break.â⬠I shook my head again, still keening softly. ââ¬Å"You're worn out,â⬠he said. ââ¬Å"Go clean up, stretch your legs. Eat something.â⬠I glared up at him. ââ¬Å"Will Walter be here when I get back?â⬠I mumbled through my tears. His eyes tightened anxiously. ââ¬Å"Do you want that?â⬠ââ¬Å"I'd like a chance to say goodbye. He's my friend.â⬠He patted my arm. ââ¬Å"I know, Wanda, I know. Me, too. I'm in no hurry. You get some air and then come back. Walter will be sleeping for a while.â⬠I read his worn face, and I believed the sincerity there. I nodded and carefully put Walter's head back on the pillow. Maybe if I got away from this place for a little bit, I'd find a way to handle this. I wasn't sure how-I had no experience with real goodbyes. Because I was in love with him, no matter that it was unwilling, I had to look at Jared before I left. Mel wanted this, too, but wished that she could somehow exclude me from the process. He was staring at me. I had a feeling his eyes had been on me for a long time. His face was carefully composed, but there was surprise and suspicion in there again. It made me tired. What would be the point of acting out a charade now, even if I were that talented a liar? Walter would never stand up for me again. I couldn't sucker him anymore. I met Jared's gaze for one long second, then turned to hurry down the pitch-black corridor that was brighter than his expression.
Monday, January 6, 2020
The Integrity Principle - Analysis - Free Essay Example
Sample details Pages: 6 Words: 1856 Downloads: 10 Date added: 2017/06/26 Category Law Essay Type Analytical essay Level High school Did you like this example? After the case of Kable v Director of Public Prosecutions (à ¢Ã¢â ¬ÃÅ"Kableà ¢Ã¢â ¬Ã¢â ¢)[1] whereby the institutional integrity principle was first implemented by the High Court, there has been substantial use of the principle in other cases. However, there are various concerns regarding this rule, and as a result there has been disagreement and many alterations to the characteristics of the principle. The background, evolution and potential concerns regarding the institutional integrity principle will be outlined further below. Donââ¬â¢t waste time! Our writers will create an original "The Integrity Principle Analysis" essay for you Create order Induction of the Institutional Integrity principle In Kable, it was held by the majority that s5(1) of the Community Protection Act 1994 (NSW), which claimed to confer in the Supreme Court of NSW the power to demand the continual incarceration of a prisoner was not valid. It was held that the function was not attuned with institutional integrity and further contributed to the incompatibility test as a means of monitoring the tasks that may be entrusted in courts by State Parliament. The rationality used in the reasoning of Kable has faced some criticism, but it is also known that this was an extremely fundamental proposition that was accepted by the High Court. It was a startling decision, due to the fact that before this case, the lack of a separation of jurisdictional powers in a state perspective left insufficient limitations on the lawmaking control of state legislatures (state courts). But, it must be understood that it does not infer into the constitutions of the States the parting of judicial powers impliedly authorized for the Commonwealth (by chapter III).[2] As long as they arenà ¢Ã¢â ¬Ã¢â ¢t judicial, functions can be discussed on benches by State Parliaments as long as they are not objectionable to, or unsuited with, the implementation by those courts of the legal influence of the commonwealth. Furthermore, the rule articulated in Kable will not inhibit State parliaments from investing State judicial tasks in non-judicial figures. Regardless of these restrictions, it was stated by McHugh J in Kable that: in some situations the effect of Ch III of the Constitution may lead to the same result as if the State had an enforceable doctrine of separation of powers. This is because it is a necessary implication of the Constitutions plan of an Australian judicial system with State courts invested with federal jurisdiction that no government can act in a way that might undermine public confidence in the impartial administration of the judicial f unctions of State courts. Currently, the institutional integrity principle actually does provide support restrictions on legislative power in situations that do not comprise of the assigning of functions in courts at all. Before seeing how the institutional integrity rule has advanced since Kable, it is worth understanding why a majority of the High Court found it essential to acquire this à ¢Ã¢â ¬ÃÅ"radical addition to the body of Australian constitutional lawà ¢Ã¢â ¬Ã¢â ¢[3]. The reasoning behind this decision is significant because the method by which the High Court applies the principle in upcoming cases may change the way in which the conditions of the principle evolves. The majority reasoning held in Kable suggested that à ¢Ã¢â ¬ÃÅ"the underlying concern was to maintain public confidence in the independence of state courtsà ¢Ã¢â ¬Ã¢â ¢[4]. However, this does not mean that the maintenance of public confidence is the ultimate object of the institutional i ntegrity principle.[5] It seems more likely that institutional integrity is more about securing to the judicial system (and inevitably the High Court) the ability to preserve the judicial function against statutory and executive intervention.[6] The conclusion that this principle primarily revolves around the self-preservation of the judicial system is reinforced by the fact that incompatibility is to be estimated by reference to the crucial features of courts. The institutional integrity principle is also supported by its expansion by the High court to all Australian courts capable of utilising the legal power of the commonwealth.[7] Directly following the judgement in Kable, there was some reluctance displayed by the High Court at first, describing it as a rule that would seldom be applicable.[8] However, In Forge v Australian Securities and Investments Commission (à ¢Ã¢â ¬ÃÅ"Forgeà ¢Ã¢â ¬Ã¢â ¢), it was stated that institutional integrity relied upon the usage of the w ords à ¢Ã¢â ¬ÃÅ"court of a stateà ¢Ã¢â ¬Ã¢â ¢ in s77 of the Australian Constitution Act[9]. Gleeson CJ stated that State supreme courts à ¢Ã¢â ¬ÃÅ"must continue to answer the description of à ¢Ã¢â ¬Ã
âcourtsà ¢Ã¢â ¬Ã à ¢Ã¢â ¬Ã¢â ¢ in the sense that they à ¢Ã¢â ¬ÃÅ"must satisfy minimum requirements of independence and impartialityà ¢Ã¢â ¬Ã¢â ¢.[10] He further said that this principle was à ¢Ã¢â ¬ÃÅ"stable, founded on the text of the Constitutionà ¢Ã¢â ¬Ã¢â ¢. As seen in nicholas v the queen, Fardon, Forge, K generation v, and wainohu, no definitve statement pertaining to the miniumum requriements of an independent court has been made and it is unlikely to be forthcoming.[11] But rather it seems that courts will most likely consider various factors when evaluating the incongruity with institutional integrity. The High Court has repeatedly stated that it is highly improbable that any exhaustive definition of incompatibility will be made, a nd even if it was possible, a more vigilant approach seems to be superior given the potential application of this principle in a wide range of circumstances. Furthermore, this principle has already acted as a restraint on judicial interference, as seen in International Finance Trust[12]. Scope of the Principle After the decision in Kable, it was uncertain as to whether this principle could be applied to any other court of law outside the state Supreme Courts. The reasoning used in North Aboriginal Legal Aid Service v Bradley however quickly elucidated this, reaching a mutual judgement: It is implicit in the terms of ChapterIII of theà Constitutionà and necessary for the perseveration of its structure that a court capable of exercising the judicial power of the Commonwealth be and remain an independent and impartial tribunal. The fact that this was accepted by the Full Bench confirmed that this institutional integrity rule had expanded to all Australian courts entrust ed with federal jurisdictive power (State or territory). Regardless, the term à ¢Ã¢â ¬ÃÅ"capable of exercisingà ¢Ã¢â ¬Ã¢â ¢ was still slightly ambiguous and it was not clear whether future courts granted judicial power would be able to utilise this principle until the judgement held in Baker, whereby it was decided that the à ¢Ã¢â ¬ÃÅ"doctrine in Kable is expressed to be protective of the institutional integrity of state courts as recipients and potential recipients of federal jurisdictionà ¢Ã¢â ¬Ã¢â ¢.[13] Thus, it seems most probable that the institutional integrity principle will provide some sort of protection to all Australian à ¢Ã¢â ¬ÃÅ"courtsà ¢Ã¢â ¬Ã¢â ¢ (in respect to the Constitutional definition of the word). However, as has been reiterated by the High Court, the jurisdictional universality of the principle is hindered by the point that the commonwealth must à ¢Ã¢â ¬ÃÅ"take state courts as it finds themà ¢Ã¢â ¬Ã¢â ¢.[14] This principle does not need or sanction the justification of State court in respect to federal standards. Rather, it acknowledges a combined court system à ¢Ã¢â ¬Ã¢â¬Å" not a unitary one.[15] Other courts of law are not subject to the same restrictions placed on federal courts as laid out in Chapter III,[16] and may still apply non-judicial authority, as long as it falls in accordance with the principle itself. However, due to the fact that institutional integrity does not need the preservation of unchanging principles throughout Australiaà ¢Ã¢â ¬Ã¢â ¢s combined legal system, precaution must be taken when considering whether a specified characteristic is compatible with the institutional integrity of a given court. Significant decisions regarding institutional integrity In the past, there have been various occasions whereby the High Court had overturned state legislation based on the reasoning that it had compromised the à ¢Ã¢â ¬ÃÅ"institutional integrityà ¢Ã¢â ¬Ã¢â ¢ of a State court. One of these instances was in International Finance Trust Company Limited v New South Wales Crime Commission,[17] whereby the majority of the High Court decided that a state judicial provision impaired institutional integrity on the basis that it required the Supreme Court to overhear and decide (not giving notice to those affected) requests for restraining orders that were determined ex parte through the NSW Crime Commission.[18] In South Australia v Totani (à ¢Ã¢â ¬ÃÅ"Totanià ¢Ã¢â ¬Ã¢â ¢)[19], it was also held by a majority that a provision undermined institutional integrity as it needed the South Australian Magistrates Court to release control orders in a method opposing procedural justice, and by which the effect was to a great extent decided by the Attorney General. In Wainohu v New South Wales (à ¢Ã¢â ¬ÃÅ"Wainohuà ¢Ã¢â ¬Ã¢â ¢)[20], a majority of the High Court also held that state legislature was unacceptable because it diminished the require d and defining characteristics of a state court by providing that the courtà ¢Ã¢â ¬Ã¢â ¢s authority to make control orders would be inspired by a verdict of a judge, after an argumentative proceeding on intricate and crucial matters of fact for which the provision provided that no details need be given[21]. These cases in specific displayed a renewed willingness by the High Court to apply the institutional integrity principle in a way that is protective of the traditional legal process. While they do not greatly contribute to the understanding of this principle in terms of legal reasoning, it can be said that they reinforced the current beliefs. Although distinct approaches were taken, the majority decisions in the cases of International Finance and Totani turned upon the comparatively undisputed proposal that legislation claiming to direct a court as to the method and result of the implementation of its jurisdiction is suitable impermissibly to hinder the character of the court as an independent one. There have been various issues arising from the cases depicted above, and many of them are still unanswered so it is evident that this principle is still in a trial stage. One such concern is whether a à ¢Ã¢â ¬ÃÅ"due processà ¢Ã¢â ¬Ã¢â ¢ obligation exists in accordance with Chapter III, and if so what is its scope? Another issue lies within the minimum organizational requirements of state and territory courts as the principle restricts the capacity of these parliaments to interfere with the structural features of à ¢Ã¢â ¬ÃÅ"courtsà ¢Ã¢â ¬Ã¢â ¢.[22] The use of public perception as a criterion for incompatibility also raises concerns that must be addressed. In conclusion, regardless of the many criticisms the judgement in Kable had attracted, there is no doubt that this decision has had à ¢Ã¢â ¬ÃÅ"extremely beneficial effectsà ¢Ã¢â ¬Ã¢â ¢. Heydon J further stated that à ¢Ã¢â ¬ÃÅ"in particular, it has influenced gove rnments to ensure the inclusion within otherwise draconian legislation of certain objective and reasonable safeguards for the liberty and the property of persons affected by that legislation. It is evident that the institutional integrity principle has the potential to restrict judicial activity in a variety of areas, not just in the transfer of functions on tribunals, and thus it is safe to assume that its influence will only increase in the future. [1] Kable v Director of Public Prosecutions (NSW) (1996) 189 CLR 51. [2] Wainohu v New South Wales (2011) 278 ALR 1, 19 (French CJ Kiefel J). [3] The constitutional jurisprudence of the high court [4] à ¢Ã¢â ¬ÃÅ"State courts: the limits of kableà ¢Ã¢â ¬Ã¢â ¢ [5] à ¢Ã¢â ¬ÃÅ"do hard laws make bad casesà ¢Ã¢â ¬Ã¢â ¢ [6] Ibid 183 [7] North Australian Aboriginal Legal Aid Service v Bradley (2004) 218 CLR 146. [8] Fardon case [9] Aus constitution act [10] Forge 67-8. [11] All cases [12] s [13] Baker [14] Institutional integrity [15] Forge 65-7 [16] Fardon 655-66 [17] International Finance Trust Company Limited v New South Wales Crime Commission (2009) 240 CLR 319. [18] Ibid. 385-86. [19] Totani v South Australia (2010) 242 CLR 1. [20] Wainohu v New South Wales (2011) 278 ALR 1. [21] Ibid 28 (French CJ Kiefel J); 37 (Gummow, Hayne, Crennan Bell JJ). [22] Institutional integrity
Sunday, December 29, 2019
Shooting An Elephant By George Orwell - 1670 Words
During the last few weeks of my senior year of high school, I was hanging out with a few friends; it was late at night and we were on our way to a nearby park. Out of sheer boredom, we started playing pranks on one another. Some of the pranks were downright awful. In one instance, my friends decided to hide in a nearby bush and scare people who walked by. Initially, I was against pranking people, but reluctantly agreed because I did not want to be known as the ââ¬Å"killjoy.â⬠One of the people we scared, a five-year-old returning from the park, fell in a puddle and hurt his knee. We all ran away to avoid getting caught. Actually, I did not want to prank people; however, the social pressure of being with my friends in addition to my role in the group eventually caused me to comply. In ââ¬Å"Shooting an Elephant,â⬠by George Orwell, Orwell faced a similar dilemma. ââ¬Å"Shooting an Elephantâ⬠is an essay that depicts Orwellââ¬â¢s conflictions about shooting a ramp aging elephant while he served as an Imperial policeman in Burma during British colonial rule. In his essay, Orwell describes the difficult decision of whether or not to shoot the elephant and why he made his decision. Although he did not initially want to shoot the elephant, the social pressure of being surrounded by a crowd of Burmese natives encouraging him and his role as an Imperial policeman ultimately forced his hand. The concepts of social pressure and roles are studied in many different experiments and studies. Two prominentShow MoreRelatedShooting An Elephant By George Orwell1246 Words à |à 5 PagesSalma Kingu Professor: Michael English: 1301 Essay 2 Summer: 06/26/2017 ââ¬Å"Shooting an Elephantâ⬠by George Orwell In the 1950, George Orwell was a police officer during the British Empire in lower Burma, India who was ill- educated and secretly hated his job due to the dirty works and evil of colonialism; George Orwell wrote the story about shooting an elephant. Shooting an Elephant is a story which describes how the British occupiers were badly treating the Burmese by killing and terrorizedRead MoreShooting An Elephant By George Orwell867 Words à |à 4 PagesShooting an Elephant The short story ââ¬Å"Shooting an Elephantâ⬠by George Orwell describes Orwellââ¬â¢s experience as a police officer of a town in the British colony of Burma. George Orwell, a military occupier in the Burmese land is much hated by the civilians. The hatred he receives from the locals makes him despise the British Empires mistreatment on the Burmese people. However, he also resents the locals in the village for revolting against him, for he is only a worker of the British Empire. ââ¬Å"ShootingRead MoreShooting an Elephant by George Orwell 884 Words à |à 4 Pagesappeared normal as usual. I was only in the kitchen for five minutes when I heard my brothers screaming my name. I rushed over to the screams which led to my room. My brotherââ¬â¢s faces were pale with fright while they waited outside my room door. It was as Orwell once mentioned, ââ¬Å"Evidently there was something that the children ought not to have seenâ⬠(pg. 231). They pointed towards the birdcage an d I immediately started thinking if Iââ¬â¢d forgotten to feed the birds. While I gently removed the towel that I placedRead MoreAnalysis Of Shooting An Elephant By George Orwell988 Words à |à 4 PagesEric Arthur Blair, or commonly known as George Orwell, is the author of many compositions. Blair, the author of two of the most famous novels of the 1920s; Animal Farm and Nineteen Eighty-Four, was born in Eastern Indian. He joined the Indian Imperial Police in Burma but resigned in 1927 to become a writer (BBC). Orwellââ¬â¢s style of writing can be described as bold and vivid. He puts the truth in his writing. Orwellââ¬â¢s novel, ââ¬Å"Shooting an Elephant,â⬠was published in 1936. In the novel, a colonial policemanRead MoreShooting an Elephant by George Orwell Essay585 Words à |à 3 PagesShooting an Elephant by George Orwell In his essay Shooting an Elephant, George Orwell explains how the controlling authorities in a hostile country are not controlling the countrys population but are in fact a mere tool of the populous. Orwells experience with the elephant provided the insight for his essay, and gives a clear example of the control the natives have over the authorities. The authorities in Lower Burma were there to police the state that their government controlled, butRead MoreShooting an Elephant bye George Orwell1019 Words à |à 4 Pagesmeans a loss of dignity. George Orwellââ¬â¢s short story, ââ¬Å"Shooting an Elephantâ⬠, is an ideal example. In the story, Orwell, the main character, works as a policeman in Burma in the 1930s for the British Empire. One day, an elephant tramples loose, and although Orwell has no intent on shooting the elephant, a mob of native Burmese pressures Orwell to shoot the elephant. He reluctantly acquiesces to prevent being humiliated. After that experience, Orwell writes ââ¬Å"Shooting an Elephantâ⬠to demonstrate nativeRead MoreAn Analysis Of Shooting An Elephant By George Orwell1147 Words à |à 5 Pageswhere he is hated and pressured by a large number of people. George Orwell had made up his mind that imperialism was an evil thing and the sooner he chucked up his job and got out of it the better. As for his believe, ââ¬Å"he was theoretically and secretly all for the Burmese and all against their oppressors, the British.â⬠In the short story, ââ¬Å"Shooting an Elephantâ⬠, George Orwell is face with an incident that leads him to shoot the elephant at the end of the story. Trough out the story he is faced withRead MoreGeorge Orwell s Shooting An Elephant 1114 Words à |à 5 PagesShooting an Elephant : George Orwell Since the publication of George Orwell s, Shooting an Elephant in 1936 many philosophers have engaged in conversation about humanity, violence, politics, power, dominance, race, culture and principles. Orwell was in fact a genius plain and simple, though in a very complicated way(Firchow 94). He brings you into the essay with his lucid and vivid details the entire way through from the setting I remember that it was a cloudy, stuffy morning at the beginningRead MoreGeorge Orwell s Shooting An Elephant894 Words à |à 4 Pagesdescribed by George Orwell, in his short story, ââ¬Å"Shooting an Elephantâ⬠(Orwell). In this story, Orwell delicately explains to his readers how society is influenced by peer pressure. The story was set in Burma in 1936 and begins with a low self-esteemed police officer just trying to get through day- to- day life. His life takes a turn when he is suddenly faced with the decision to shoot an elephant to please a crowd of spectators. Believing that his act ions are wrong he shoots the elephant anyway andRead MoreAnalysis Of Shooting An Elephant By George Orwell727 Words à |à 3 PagesGeorge Orwell is an internationally acclaimed author that has been praised for his awareness of social injustice and opposition to totalitarianism. Although in his later life he realized some of his previous misdeeds when Orwell was a young man he served as a police officer in a British controlled Burma. The Burmese people at the time were rightfully scornful towards the Europeans; this includes the young Orwell. The time that Orwell spent in Burma was not all wasted, as it inspired him to come up
Friday, December 20, 2019
Nike s Unethical Behavior Of The Workplace - 3836 Words
Look at all the clothing and apparel you have on. Chances are, those items were produced in sweatshops outside the United States. According to the US Department of Labor, a sweatshop is a factory that is in violation of at least two labor laws (Do Something, 2014). It is generally understood that sweatshops maintain terrible working conditions, and that the workers are compensated far below what many Americans would consider acceptable hourly wages. A startling fact that many do not know, however, is that many women employees are forced to take birth control pills in order to avoid maternity leave and other associated pregnancy benefits. Advocacy groups have raised awareness about these practices, and throughout this piece I will highlight four companies using sweatshops, a best practice organization that aims to help eliminate poor working conditions for employees, and how the four companies have responded to their unethical behaviors. Nike has been accused of using sweatshops since the 1970s (Global Labour Rights, 2000). The company originally outsourced manufacturing plants to Korea and Taiwan, yet had to move them due to increasing regulations and labor laws as those countries developed (Nisen, 2013). The new locations in China, Vietnam, and Indonesia offered the company cheaper labor, with fewer hurdles to overcome in order to drive costs down. In China, Nike has over 50 contractors, employing at least 100,000 workers (Global Labour Rights, 2000). There are numerousShow MoreRelatedInternational Business Ethics And Ethical Issues Within International Organizations1113 Words à |à 5 Pagescountries â⬠¢ There is a lack of governmentsââ¬â¢ initiative to create ethical cooperation framework and thus to enhance ethical behavior in international business; â⬠¢ It is difficult to outline those ethical values, which would be understandable, acceptable and important for representatives of all the continents within different types of international cooperation projects. Ethical behavior within a business ensures awareness and concern for the future and for the right way of action in each particular situationRead MoreThe Pyramid Of Corporate Social Responsibility1262 Words à |à 6 Pageslegal requirements (Carroll, 1991), ethical: organizations managements are to follow the generally held beliefs, about the behavior of the society. It is important to recognize that corporate integrity and ethical behavior go beyond mere compliance with laws and regulations (Carroll, 1991) and philanthropic: encompasses those corporate actions that are in response to society s expectation that businesses be good corporate citizens. It is important that managers and employees participate in voluntaryRead MoreTo What Extent Unethical Marketing Technique Could Damage the Sustainable Business Enivironment2676 Words à |à 11 PagesTo what extent unethical marketing techniques could damage the sustainable business environment. Discuss. Marketing is like a double-edged sword, if it is adopted properly, it will give profits to a company; however, if it is used inadequately, it will give harm. It is undeniable that todayââ¬â¢s business operations have more intense competition level against each other due to the advancement of technology that allows people to receive more information. Marketing plays the key role in making productsRead MoreTo What Extent Unethical Marketing Technique Could Damage the Sustainable Business Enivironment2661 Words à |à 11 PagesTo what extent unethical marketing techniques could damage the sustainable business environment. Discuss. Marketing is like a double-edged sword, if it is adopted properly, it will give profits to a company; however, if it is used inadequately, it will give harm. It is undeniable that todayââ¬â¢s business operations have more intense competition level against each other due to the advancement of technology that allows people to receive more information. Marketing plays the key role in making productsRead MoreBusiness Ethics of Nike Inc.5528 Words à |à 23 Pageson the requirement given, I have chosen Nike Inc. as the topic of the discussion. Nike Inc. is the world leading company merchant of athletic shoes, sportswear and sports gear based on United States. Bill Bowerman and Phil Knight established the company in the 1964 and during that time Nike Inc. was known as Blue Ribbon Sports. Furthermore, the organization has been experiencing phenomenal growth and rapidly expanding since then. Krentzman (n.d.) claimed ââ¬ËNike sold $3.2 million worth of shoes in 1972Read MoreStrategic Analysis of Nike Inc12147 Words à |à 49 PagesTABLE OF CONTENTS Executive SummaryÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦.Ãâ¦Ãâ¦Ãâ¦Ãâ¦p.4 HistoryÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦..Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦..p.6 Profile of CEOÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦.Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦..p.7 Competitor s ProfileÃâ¦Ãâ¦Ãâ¦Ãâ¦.Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦.p.7 Industry ProfileÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦..p.8 Company AnalysisÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦p.9 Industry AnalysisÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦......p.24 Top Competitor AnalysisÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦.p.25 Other External ForcesÃâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Ãâ¦Read MoreNike Strategy Analysis12215 Words à |à 49 Pagesp.30 Strategic Planâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..p.33 Conclusionâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...p.38 LIST OF EXHIBITS 1. Sales Trends Graphâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦p.5 2. Net Income Trends Graphâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.p.5 3. Nike Board of Directors Tableâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...p.11 4. Table of Key Financial Ratiosâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...p.22 5. Net Income Trend Graphâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦..p.24 6. Primary Strategic Match Position Chartâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.Read MoreCorporate Social Responsibility Versus Profit Maximization2250 Words à |à 9 PagesAs a large multinational corporation, Nike has built up its factories in many of the developing regions, such as Mexico, Bangladesh and Mainland China, to get access to cheaper resources and labors for their production, whilst the host country can only gain very little percentage of the profit from the product. As most of the revenue flows to the home country of Nike, the goal of profit maximization has been achieved by reducing the costs. The approach for Nike to realize their ownersââ¬â¢ benefit is toRead MoreBusiness Ethics: Child Labor in Wal-Mart8552 Words à |à 35 PagesPart A: Introduction There are several ways to define ethics. Ethic is a set of principles of right and wrong behavior guiding. Ethical person will behave in accordance with sound moral principles based on fairness, justice and trust (Wiley, 1995). The purpose of ethic is to provide an environment that allows people to live a more structured, happy life than would exist without ethics (Warnock, 1971). Business ethic is examination of variety of problems that can arise from business environmentRead MoreEssay on Under Armour strategic report9937 Words à |à 40 Pagesthe Gen Y segment is the second largest segment next to the boomers (85 million strong), future growth looks optimistic, particularly because UA is also doing well with the Gen Z group, who will be even more likely to carry brand loyalty into their 20ââ¬â¢s and beyond. UA has recently been active in reaching out to women and girl athletes in the same demographic age sets. Even though the Gen Y spending only makes up 4% of a typical household spending, this buying group tends to be more tech savvy, and
Thursday, December 12, 2019
Cyberphysical Security in Networked Control â⬠MyAssignmenthelp.com
Question: Discuss about the Cyberphysical Security in Networked Control. Answer: Introduction Information is considered to be the most valued asset of any sector. Information is susceptible to various types of risks as well as threats. With the emergence of information technology, the cyber threats are increasing at a fast pace. Information security focuses on protecting the valuable and sensitive data of an organization. Information security is involved in protecting the integrity, confidentiality and availability of the information. Banking sectors deal with financial data that needs to be protected. Nabil Bank is known as the first commercial private bank of Nepal (Nabilbank.com 2017). Nabil Bank is involved in providing wide range of banking services via its 52 representation points. This report discusses and plans a security program for providing information security to Nabil Bank. It tries to improve the present security structure of Nabil Bank. This report gives a brief overview of information security. It gives suggestion about the kinds of security models that can be adopted by Nabil Bank for better and secure operations. Threat identification along with risk assessment is also carried out in this report. This report discusses about the ISO standards as well as modes that will be suitable for Nabil Bank with proper reasoning. The training requirements are also provided in this report for adopting security programs in an effective manner. This report recommends certain steps and procedures that can be taken by Nabil bank for improving its security infrastructure and for making the system of information security strong. Information security can be considered to be a practice of defending and protecting information from any kind of unauthorized access, misuse, disclosure, modification and disruption (Vacca 2012). The modern generation is completely dependent on the information and communication technology for confidential as well as commercial purposes. There are several risks as well as threats that are associated with information technology like safety risk, environmental risk, physical risk and financial risk. Security concerns that are related to ICT are gaining major importance with time. All the organizations in every sector face some kind of security issues (Webb et al. 2014). Strong information security structure as well as risks can be adopted in an organization to protect it from risks and threats. Risks can be mitigated and prevented by several methods and techniques. Information security has certain aspects like confidentiality, availability and integrity. When the information cannot be accessed by any unauthorized user then the confidential aspect of information is achieved (Von Solms and Van Niekerk 2013). When the information cannot be misused, destructed or modified by an attacker or user than the integrity of the information is maintained. When the right information is available to the right or authorized person at the correct time with no such interference or obstruction then the availability of information is achieved. Banking sectors have been a major target for the hackers, crackers as well as the cyber criminals. Information security aims at identifying the risks and mitigating it for protecting sensitive information. Current Security Situation and Titles of the Security Personnel Nabil Bank was founded in July, 1984. Their main objective is to extend the services of modern banking to different sectors of the society. Nabil Bank provides several banking and financial services via its 52 representation points. It has introduced several innovative and modern marketing concepts and products in banking sector. Their main objective is customer satisfaction. Highly qualified personnel are responsible for managing the daily operations. Sensitive financial information is handled by the bank. Risk management is carried out by highly experienced and qualifies management team. Nabil Bank is totally equipped with advanced technology that consists of banking software of international standard for supporting E-transactions and E-channels. Their aim is to provide a complete and secure financial solution to their customers. The risk management team is highly efficient in assessing the risk and providing information security to the organization (Sandberg, Amin and Johansson 20 15). There are many security personnel present in the risk management team. They are as follows: Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Head of Credit Risk Management: They are responsible for implementing procedures and policies for the purpose of reducing credit risk. They are also involved in building financial models that have the capability to predict any type of credit risk that can affect the organization. The credit risk management team reports to their head regarding daily operations and activities. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Compliance and Operational Risk Manager: They are responsible for handling the risk related to legal sanctions, financial loss or loss of banks reputation. They ensure that the bank complies with the government laws, standards and its own code of ethics and conducts. They also manage any type of risk arising because of failure of internal processes, systems, people as well as external events. Risk Assessment and Threat Identification Risk assessment deals with a number of steps and procedures for understanding the asset values, possible threats, system vulnerabilities, and predictable impacts of threats along with the likelihood of threats (Kit et al. 2014). Risk can be defined as vulnerability functions as well as the expected impacts of threats. Risk depends on the probability of the occurrence of threat. System characterization is the first step in risk assessment. Information about the software and hardware involved is initially found out (Aloini, Dulmin and Mininno 2012). NIST framework of risk management involves assessment of risk after all the risks have been framed. This framework integrates business processes, company goals, mission, SDLC processes and information security infrastructure for effective risk assessment. The methodology of risk assessment includes a process, risk model, an approach for assessment and analysis approach (Lo and Chen 2012). After risk identification is carried out, the risks are monitored. ENISA framework will be effective in the E-transaction processes of Nabil Bank for the purpose of assessing risks (Theoharidou, Mylonas and Gritzalis 2012). This model identifies the risk and analyses it for the purpose of evaluation. Information security can be enhanced in an organization only by identifying the possible threats and risks. Threat can be considered to be a potential for some kind of trouble or damage to IT infrastructure. After proper identification of threats a well planned security program can be carried out in order to protect the bank from any data and security breach. Nabil Bank provides several financial and banking services. It also provides online banking facilities to the customers. There are two broad categories of threats that are identified initially. These are the internal and external threats. Internal threats: Business practices and processes of a financial institute have a huge influence on internal threats. If more number of employees is able to access sensitive customer information then the probability of threats will be more. The intensity of internal threats is less as they are under the control of the bank. External threats: These threats have a greater intensity as they are not under the control of the bank. External threats can be reviewed by listing the reasons and ways in which personal data can be accessed, identifying the ways by which the banks system is connected to outside world via emails and networks, identifying service providers that have access to the data. Then the exposure of the threat is identified. Some of the threats that have been identified in the internet banking system of Nabil Bank are phishing, spyware, viruses, Trojan horses as well as key loggers. In phishing attack hoax mails are used for committing a fraud activity (Hong 2012). Online thieves can steal sensitive data of the customers to misuse it. Spyware is a type of malicious software that collects valuable information of the users in a secretive manner for misusing and modifying it (Giannetsos and Dimitriou 2013). Viruses can get attached to another program like spreadsheets for replicating itself. Trojan horses are another type of threat where an application acts like a secure application and harms the system in which it is downloaded or injected. Key logger software is considered to be the most harmful threat of Nabil Bank (Dadkhah and Jazi 2014). If key logger software is installed in the electronic device of the customer from where the customer accesses online banking services, then it tracks all the informati on that is used by the customers. This information can be used by the attackers in order to steal money from the bank. The financial database of the bank can be hacked to access sensitive financial data (Martins, C., Oliveira and Popovi? 2014). Deliberate and external threats are extremely harmful for the banking sector as it causes huge financial loss. After identifying the threats, their exposure must be determined to rank them based on their intensity. This will be extremely helpful for the bank to mitigate risk in an efficient manner. Security Models Security models are responsible for providing standards for the purpose of comparison and reference. Nabil Bank uses the NIST access control model for the purpose of identification of access mechanism that is used in different levels that exist in the bank. Management level is involved in dealing with information that will help in the strategic planning process. The level that deals with administration work will be responsible for controlling operational data. The technical layer of the bank deals with daily operational data that is needed for running the business. NIST framework is responsible for describing the present cyber security posture, their target state, find out ways to improve risk management and fosters the process of communication between the external and internal stakeholders of the bank. The present risk management procedure is not replaced when the bank uses NIST framework. Rather the NIST framework tries to complement the present security structure (Chang, Kuo and Ramachandran 2016). The bank can use its current structure and leverage NIST framework for the purpose of identifying opportunities for improving the current risk security management. The security models of NIST framework will be highly beneficial for Nabil Bank as their documents are available at free of cost. It can also be updated by government. Risk assessment guidelines, security plans and privacy control plans are provided NIST framework (Malik and Nazir 2012). Strong information security policies can be implemented for protecting the banks valuable information . Development of Security Program Nabil Bank is a large sized company having 52 points of representation across Nepal. The organization structure that is present in the bank is hierarchical in nature. The organization has code of ethics and conducts incorporated in its culture. The main objective of the bank is to provide a single and secure financial solution to its customers. Nabil Bank gives first priority to its customer. The employees follow a code of ethics in the organization (Peltier 2016). They act in an honest manner to protect the interest of their clients (Hu et al. 2012). The bank takes major action against any employee who commits any misconduct. Strong information security policies can be implemented for protecting the banks valuable information. A well planned security program can be effective for protecting the bank from any security risks and threats. Financial data breach will cause loss to the clients and also will affect the reputation of the bank. The following steps can be taken in order to dev elop an efficient security program: Risk assessment: The first step in this process is to identify what department deals with what information. The bank also needs to find out who has access to what sensitive information. The second step will be to identify external and internal threats and determine its probability of occurrence. The last step is to determine whether the existing policies are adequate for protecting the information. Current policy adjustments: A security policy must be designed to protect the customer information. This policy must be approved by the board of directors in order to carry enhance the information security of the bank. Security control design: The management should focus on developing security control plans for all the business units. There must be security guidelines present. Access controls need to be designed where authentication procedures like passwords, PINs, electronic tokens are used. Biometric identification and firewalls can be implemented for protecting the databases that store sensitive financial data. The networks can be protected by implementing firewalls. The customer details can be encrypted to protect it from any unauthorized access. Response plan: The management team must develop and design a response plan for overcoming a security breach situation. The person who is in charge of maintaining customer information must design this plan. It must be well written. The plan needs to include the contact details of law agencies for taking appropriate steps. Service provider: The contract between the bank and service provider must contain effective response plans. The bank must ensure that the contract contains appropriate standards for information security. Testing: The testing of the security controls and plans must be done to make sure that the bank is well protected from any type of security threat and risk (Shackelford et al. 2015). The parties involved in the contract must conduct control testing. They must conduct ethical hacking to find out the effectiveness of the security policies and plans. Roles and Responsibilities Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Security Manager: The role of the security manager is to collect and utilize information in an effective manner to achieve the goal of the organization. They are responsible for proper communication of information among various layers. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Information security of Nabil Bank can be improved by adding more designations and roles so that there is no overlap of responsibilities of the employees (Ahmad, Maynard and Park 2014). Some of the new titles that can play an effective role in improving information security are: Technical security manager: The technical aspects of security will be looked after by these managers. They will be involved in firewall implementation and encryption processes. Program security manager: The third pert or vendor risks can be evaluated by these managers. CISO: The whole security policies can be looked after by CISO. CISO can take the responsibility of design strong security policies for the organization. Source code manager: The source codes can be reviewed by these managers for detecting any type of vulnerability. There can be many specialized roles like virus technicians whose responsibility will be to detect new virus as well as develop a defense plan to fight the virus. Training Requirements The employees of Nabil Bank must be aware of the need of a strong information security program. Employee training can be considered to be a critical component for the information security of bank. Management must document the information regarding which employee has access to what valuable information of the customers (Hu et al. 2012). The employees must be made aware of the security policies of the bank. They must be trained to identify valuable customer information. Employees must be given training on how to implement the written policies that governs the disclosure of the information of the customers (Lebek et al. 2013). There need to be regular meetings to discuss new policies and modify existing policies for improving the present information security policy. ISO Standards and Models ISO model is used in most of the industries. ISO standards provide a common base to all the organizations in order to develop security standards and policies (Disterer 2013). Organizations are able to develop inter organizational deals by using ISO standards. ISO/IEC 27001: This standard helps in implementing ISO/IEC 27002 in order to set up ISMS (Susanto, Almunawar and Tuan 2012). ISO/IEC 27002: This standard addresses the security needs of an organization. It also helps in developing security policies (Ramanauskaite et al. 2013). ISO model is well suited for Nabil Bank because it will assist the bank in developing management system for managing information security. The ENISA model can also be suitable for Nabil Bank for the purpose of securing the E-transaction and E-channel. Conclusion This report concluded that Nabil Bank can improve its information security by adopting a well defined security program. This report discussed about the critical factors of information security like confidentiality, availability and integrity. It said that the breach of data and information security can lead to serious and potential losses. The main purpose of assessing risk is to identify organizational threats and vulnerabilities. Internal threats can be identified by finding out which staff has access to which information and overlapping information. It pointed out that the security system of the bank is accessed by an unauthorized outsider then this result in external threats. It gave a description about the security program that can be adopted by Nabil Bank. This report discussed about the current roles and suggested an improvement plan for making the information security of the organization strong. It suggested that the employees must be made aware of the security policies of th e bank. This report concluded that ISO model is suitable for the bank and ENISA model is suitable for its electronic transaction system. The advanced technologies as well the communication channels need to be protected from attackers. Recommendations Nabil Bank can secure its information and data from unauthorized access by following certain steps: Encryption: Financial data must be encrypted so that the hackers cannot get access to it. Employee training: Proper training must be imparted to the employees to enhance the information security. Updated software: Latest version of the software must be installed in the system. It must be updated regularly. Firewall: Firewall implementation will protect financial information from any external intrusion. References Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), pp.357-370. Aloini, D., Dulmin, R. and Mininno, V., 2012. Risk assessment in ERP projects.Information Systems,37(3), pp.183-199. Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, pp.24-41. Dadkhah, M. and Jazi, M.D., 2014. Secure payment in E-commerce: Deal with Keyloggers and Phishings.International Journal of Electronics Communication and Computer Engineering,5(3), pp.656-660. Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management.Journal of Information Security,4(02), p.92. Giannetsos, T. and Dimitriou, T., 2013, April. Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. InProceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy(pp. 7-12). ACM. Hong, J., 2012. The state of phishing attacks.Communications of the ACM,55(1), pp.74-81. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Kit, R.I.S., Allen, K., Mazzotti, F.J. and Briggs-Gonzalez, V., 2014. Risk Assessment Methodology. Lebek, B., Uffen, J., Breitner, M.H., Neumann, M. and Hohler, B., 2013, January. Employees' information security awareness and behavior: A literature review. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 2978-2987). IEEE. Lo, C.C. and Chen, W.J., 2012. A hybrid information security risk assessment procedure considering interdependences between controls.Expert Systems with Applications,39(1), pp.247-257. Malik, A. and Nazir, M.M., 2012. Security framework for cloud computing environment: A review.Journal of Emerging Trends in Computing and Information Sciences,3(3), pp.390-394. Martins, C., Oliveira, T. and Popovi?, A., 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application.International Journal of Information Management,34(1), pp.1-13. Nabilbank.com. 2017.About Nabil Bank - Nabil Bank Limited First Private Commercial Bank. [online] Available at: https://www.nabilbank.com/intro/about-nabil-bank/11-product-services/deposit-products [Accessed 5 Oct. 2017]. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Ramanauskait?, S., Olifer, D., Goranin, N. and ?enys, A., 2013. Security ontology for adaptive mapping of security standards.International Journal of Computers, Communications Control (IJCCC),8(6), pp.813-825. Sandberg, H., Amin, S. and Johansson, K.H., 2015. Cyberphysical security in networked control systems: An introduction to the issue.IEEE Control Systems,35(1), pp.20-23. Shackelford, S.J., Proia, A.A., Martell, B. and Craig, A.N., 2015. Toward a Global Cybersecurity Standard of Care: Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices.Tex. Int'l LJ,50, p.305. Susanto, H., Almunawar, M.N. and Tuan, Y.C., 2012. Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level.International Journal of Engineering and Technology. IJET Publications UK,2(1). Theoharidou, M., Mylonas, A. and Gritzalis, D., 2012. A risk assessment method for smartphones.Information security and privacy research, pp.443-456. Vacca, J.R., 2012.Computer and information security handbook. Newnes. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers security,44, pp.1-15.
Subscribe to:
Posts (Atom)