Tuesday, January 28, 2020

Information Security

Information Security Introduction The requirements of information security with in an organization have undergone major changes in the past and present times. In the earlier times physical means is used to provide security to data. With the advent of computers in every field, the need for software tools for protecting files and other information stored on the computer became important. The important tool designed to protect data and thwart illegal users is computer security. With the introduction and revolution in communications, one more change that affected security is the introduction of distributed systems which requires carrying of data between terminal user and among a set of computers. Network security measures are needed to protect data during their transmission. The mechanisms used to meet the requirements like authentication and confidentiality are observed to be quite complex. One must always consider potential counter measures while developing a particular mechanism. It is also important to identify implementations to adopt these mechanisms. Security mechanisms usually involve more than a particular algorithm or protocol. It means that participants be in possession of some secret information, which raises doubts about their creation, distribution and protection of that secret information. Thus a model has to be developed within which security services and mechanisms can be viewed. To identify the security needs of an organization at its effective level, the manager needs a systematic way. One approach is to consider three aspects of information security that is Security attack, Security mechanism and Security services. Security attack identifies different modes by which intruder tries to get unauthorized information and the services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service. As information systems become ever more active and important to the conduct of activities, electronic information takes on many of the roles earlier being done on papers. Few information integrity functions that the security mechanism has to support are security and confidentiality of the data to be transmitted and authentication of users. There is no single mechanism that will provide all the services specified. But we can see that one particular element that specifies most of the security mechanisms in use: cryptographic techniques. Encryption or encryption like transformations of information is the most common means of providing security. A model for much of what we will be discussing is captured in general terms. Encryption Model This general model shows that there are four basic tasks in designing a particular security service. Design an algorithm for performing encryption decryption process. Generate the secret information with the help of algorithm of step 1. Identify methods for the distribution and sharing of secret information. Identify rules to be used by both the participating parties that makes use of security algorithm and the secret information to achieve a particular security service. A crypto system is an algorithm, plus all possible plain texts, cipher texts and keys. There are two general types of key based algorithms: symmetric and public key. With most symmetric algorithms, the same key is used for both encryption and decryption. Symmetric-key encryption Execution of symmetric-key encryption can be highly useful, so that users do not experience any significant time delay because of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages specify a meaningful sense. Symmetric-key encryption will be successful only if the symmetric key is kept secured by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. The success of a symmetric algorithm rests in the key, divulging the key means that any one could encrypt and decrypt messages. As long as the communication needs to remain secure, the key must be protected between the participating parties. Encryption and decryption with a symmetric algorithm are denoted by E K (M) = C D K (M) = P Symmetric algorithms can be divided into two categories. Some operate on the plain text a single bit or byte at a time, these are called stream algorithms or stream ciphers. Others operate on group of bits or characters. Such algorithms are called block algorithms. Public algorithms are designed so that the key used for encryption is different from the key used for decryption. The algorithms are called public key because the encryption key be made public. It involves a pair of keysa public key and a private keyassociated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Further more the decryption key cannot be calculated from the encryption key. Each public key is published, and the corresponding private key is kept secret. Data encrypted with ones public key can be decrypted only with his private key. shows a simplified view of the way public-key encryption works. Public-key encryption Compared with symmetric-key encryption, public-key encryption requires more computation and is therefore not always appropriate for large amounts of data. However, its possible to use public-key encryption to send a symmetric key, which can then be used to encrypt additional data. This is the approach used by the SSL protocol. This provides Authentication, Integrity Confidentiality of Information at low computing power. Nevertheless, private-key encryption is useful, because it means you can use your private key to sign data with your digital signaturean important requirement for electronic commerce and other commercial applications of cryptography. Encryption and decryption can be represented in a public key scheme is E Kpu(M) = C D Kpr(C) = M Where Kpu is the public key and Kpr is the private key. In public key encryption there is always a possibility of some information being leaked out. A crypto analyst tries to get some information based on ones public key. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. In probabilistic Encryption, multiple cipher texts are generated for one plain text, a cryptanalyst can not generate any information by chosen plain text and chosen cipher text attacks. Probabilistic encryption Security Analysis of algorithms: Different algorithms offers different degrees of security, it depends on how hard they are to break. If the cost required to break an algorithm is greater than the value of the encrypted data, then we are probably safe. If the time required to break an algorithm is longer than the time that the encrypted data must remain secret, then we are probably safe. If the amount of data encrypted with a single key is less than the amount of data necessary to break the algorithm, then we are probably safe. An algorithm is unconditionally secure if, no matter how much cipher text a crypto analyst has, there is not enough information to recover the plain text. In point of fact, only a one time pad is unbreakable in a cipher text only attack, simply by trying every possible key one by one and by checking whether the resulting plain text is meaningful. This is called a brute force attack. Cryptography is more concerned with crypto systems that are computationally infeasible to break. Any algorithm is considered computationally secure if it cannot be broken with available resources. The complexity of an attack can be measured as Data Complexity, the amount of data needed as input to the attack, Processing complexity, the time needed to perform the attack and storage requirements which are the amount of memory needed to do the attack which is space complexity. As a thumb rule, the complexity of an attack is taken to be minimum of these three factors. Another classification of complexities is by complexity of the algorithm by its construction and complexity of the algorithm by its strength. By its construction, the time complexity of the algorithm can be calculated by executing through the steps of the algorithm, which will be referred as O(n). Complexities can also be expressed as orders of magnitude. If the length of the key is k, then the processing complexity is given by 2k . It means that 2 k operations are required to break the algorithm. Then the complexity of the algorithm is said to be exponential in nature. A desirable property of any encryption algorithm is that a small change in plain text or the key should produce significant change in cipher text. Such an effect is known as avalanche effect. The more the avalanche affects of the algorithm, the better the security. Crypto analysis is the study of recovering the plain text with out access to the key. It may also find weakness in a crypto system that eventually leads to previous results. An attempted crypto analysis is called an attack. There are five types of attack. Each of them assumes that the crypto analyst has complete knowledge of the encryption algorithm used. Cipher text only attack: Here the crypto is in hold of cipher text only. The crypto analyst has cipher text of several messages, all of which have been encrypted using the same encryption algorithm. The crypto analysts job is to recover the plain text of as many messages as possible, or better yet to deduce the key used to encrypt the messages, in order to decrypt other messages encrypted with the same keys. Known Plaintext attack: The crypto analyst is in hold of not only to the cipher text of several messages, but also to the plain text of those messages. His job is to get the key used to encrypt the messages or an algorithm to decrypt any messages encrypted with the same key. Chosen Plaintext Attack (CPA): Here the crypto analyst is in hold of not only cipher text but also parts of chosen plain text. If the analyst is able to insert into the system a message chosen by the analyst, then such an attack is known as chosen plain text attack. Differential crypto analysis is an example of this mode. Chosen cipher text attack (CCA): Under the CCA model, an adversary has access to an encryption and a decryption machine and must perform the same task of distinguishing encryptions of two messages of its choice. First, the adversary is allowed to interact with the encryption and decryption services and choose the pair of messages. After it has chosen the messages, however, it only has access to an encryption machine. Chosen text: In this model, the analyst posses the encryption algorithm, Cipher text to be decoded, plain text message chosen by the crypto analyst and purported cipher text chosen by the crypto analyst. Present work: In this work an attempt has been made to generate a set of algorithms which provides security to data transmitted. The first algorithm considers a random matrix key which on execution by a series of steps generates a sequence. This sequence is used a sub key to build three different encryption models. Each model can be used for encryption of data. The second algorithm considers not only the key but also initialization vector and a time stamp to generate sub keys which are used for encryption process. And also a mechanism has been discussed which identifies any garbled key while transmitted from the Key Distribution Centre. In this work both the algorithms are discussed in terms of computational security, computational complexity and computational overhead. Both the algorithms are studied for their strengths and limitations. A crypto analytical study of the algorithms with emphasis on probabilistic encryption is also considered in this study. The encryption algorithms are compared with standard algorithms like RC4 and DES. The algorithms are also discussed in terms of its applications and also about their advantages and limitations in network security environment.

Monday, January 20, 2020

Essay --

A true friend is someone you can confide in without fear of being judged or betrayed... It is always good to have a friend in whom you can confide. A true friend is a good listener – one with whom you can share your thoughts and feelings without worrying whether they will judge you or tell other people about you. You should be able to trust a friend, particularly when you are in need of someone to share your problems with..... In â€Å"The Boy in the Striped Pyjamas† by John Boyne, Bruno, the main character is in need of a good friend. He is unhappy, having being forced to move away from his home in Berlin and ‘his three best friends for life’ because his father has a new job. Bruno, his mother and sister accompany the new commandant to the new house at â€Å"Out-With,† as Bruno calls it. This new house is small, dark, and strange. Bruno spends long days gazing out the window of his new bedroom, where he notices people dressed in striped pyjamas and rows of barracks surrounded by a barbed wire fence. With nobody except his sister ‘The Hopeless Case’ to talk to, bored and lonely, and not really understanding the circumstance of his new existence, Bruno sets out to explore the area, despite being forbidden to do so by his parents. He discovers Shmuel, a very thin Jewish boy who lives on the other side of the fence and an unlikely friendship between the two boys is form ed. Over the next few months the two children swap life stories through the wire fence. Shmuel explains how he and his family have been transported here from a ghetto in Poland. Unable to comprehend the gravity of Shmuel’s situation, Bruno is simply content to have found a playmate. In particular he finds it amazing that they are the same age and born on exactly th... ...d hegathers himself and makes a clear decision to face his fear in order to help his friend.... Even when the two boys have been herded into the gas chambers about to face their death, Bruno stands by his friend, holding Shmuel’s hand, forgetting even the names of his friends in Berlin and saying that Shmuel is one true friend for life. To conclude, Bruno and Shmuel’s friendship is both strange and genuine. Bruno confides in Shmuel, at first, because he is lonely and innocent. However as the novel develops their friendship grows into something authentic which crosses the boundaries of race, religion and culture. Over the course of the novel there are times when the friendship is tested, threatened and almost betrayed but Bruno and Shmuel remain true to their friendship even in the darkest and devastating of endings...At the end they died together...

Sunday, January 12, 2020

Hr Case Study

Table of Contents Executive summary2 Problem identification and analysis 3 Statement of major problems4 7. Generation and evaluation of alternate solutions 5 7. 1 Reducing reliance on sales force5 7. 2 Introduce team based targets and reward systems5 7. 3 Survey sales force on time allocated for different job aspects6 7. 4 Set maximum amount of voluntary additional work hours6 8. Recommendations7 9. Implementations 8 10. Concluding Remarks9 11. References10 12. Turnitin Originality report11-12 Executive summaryAnnette, the newly appointed HR manager feels that Terry, the company sales manager, despite loving his job and being passionate about the work he does, is a workaholic. She is afraid that Terry will not be able to keep up with this hectic schedule and that it would soon affect his health and work life balance. Even though his working habits shine a positive light on the company, it gives a certain peer pressure to his sales team to work equally long hours even when Terry does not insist that anyone work as long as him.Furthermore, Annett does not agree with what the CEO intends to do, to give Terry recognition and reward for his dedication and outstanding result, as it is a result of extreme work habits. However, the CEO feels that no one is forcing Terry to work long hours, and might think of it as legal as it is a voluntary effort. Problem identification and analysis Harvard Analytical Framework for Human Resource Management Stake holder Long term Individual well-being disrupted burn out internal departmental stress unnecessary pressure from Terry leads to team resignation societal effect educes effectiveness of sales team from undue pressure Long term Individual well-being disrupted burn out internal departmental stress unnecessary pressure from Terry leads to team resignation societal effect reduces effectiveness of sales team from undue pressure HR outcomes Commitment to work long hours due to rewarding of extreme work attitude Non compliance to leg islation due to voluntary long hours Creates competent work force in short run due to extra hours HR outcomes Commitment to work long hours due to rewarding of extreme work attitude Non compliance to legislation due to voluntary long hoursCreates competent work force in short run due to extra hours Choices rewarding behavior job design Possible lack of technology in job Uses new sales as main cash flow generator Choices rewarding behavior job design Possible lack of technology in job Uses new sales as main cash flow generator Interests CEO HR manager TerryHRM policyHR outcomesLong-Term Sales Forcerewarding behavi Job desginCommitment Individual Compliancewell-being Situational Factors * Long work hours * Legislation * Business Strategy * dependant on sales and conditions * sales target philosophy * Task Technology * societal values Situational Factors * Long work hours * Legislation * Business Strategy * dependant on sales and conditions * sales target * philosophy * Task Technology * societal values Human resourceCongruenc Source: Beer et al (1984) One of the principal problems that are shown in the case is the willingness to reward extreme work behavior in the organization. This positive reinforcement of Terry’s working behavior will be indirectly showing to others that to gain recognition in the company, you would have to adopt extreme working behaviors like Terry.Furthermore, there is legislation that defines the working hours of a full time employee. However, the main problem is that organization allows voluntary increased working hours as it is deemed beneficial for the company. A third problem is that the company is relying heavily on its sales force to generate profit. These could be due to high sales targets given by management which Terry can only achieve by increasing working hours excessively. Statement of major problems It can be derived that the company is relying heavily on its sales force, possibly on direct sales and new customers inste ad of recurring and retention of customers.This would be directly linked to the perceived need for Terry to increase working hours dramatically to fulfill his individual sales targets. Another Critical issue lies in the voluntary non-compliance of legislation. This, coupled with higher management of not only accepting extreme work habits, but with the intention of rewarding, would indirectly tell other employees that reward and recognition comes with extreme input of work hours. Furthermore, the sales force is obliged to work equally long hours like Terry, which would eventually result in this being custom and practice.This could be due to the setting of difficult individual performance measurements in terms of sales clinched per month. 7. Generation and evaluation of alternate solutions 7. 1 Reducing reliance on sales force. There is a heavy reliance on sales force to secure customers for the company. Instead of constantly sourcing new customers to meet individual targets, the sale s force could work on retaining existing customers by practicing relationship marketing as it is more cost effective to do so.Relationship marketing is most applicable when the customer has choices of their suppliers and switching is coming and there is a continued need for the service (Berry. 2002). A great example would be the research done by Moon-Koo (2004) on Korean mobile telecommunications services which showed that the industry believes that the crucial future marketing strategy was to try to retain existing customers by increasing customer loyalty and customer value.Payne and Adrian (1994) concluded that securing of new clients is merely the first step in the marketing process, the crux lies in retaining the customer, with organizations often confirming that existing customers are not only more profitable than new customers, but also easier to sell to. The company should come up with customer loyalty schemes to retain customers, which will help the sales force with achievin g sales targets 7. 2 Introduce team based targets and reward systems Another alternate solution would be to reduce individual target and rewards, and introduce team based sales target and reward system.Hackman & Walton (1986) suggested that successful group work will contribute to the growth and personal well-being of team members. By reducing individual target and reward systems, not removing, it would ensure the sales force meet the minimum amount. However, with the team based targets and rewards in place and scaled slightly higher than the sum of all individual targets, the sales force would be motivated to strive towards achieving team based goals. Research has shown teams with difficult goals perform optimally when incentives are offered (Knight, 2001).Performance is directly influenced by goals, but incentives did not. The offer of an incentive increased the commitment of most teams with difficult goals, proving to be highly beneficial (Knight, 2001). 7. 3 Survey sales force o n time allocated for different job aspects It would be best to survey the sales force to define which area of their job takes up the most time. Asking for the employee’s feedback to improve the work system has always proved invaluable, with research showing that 360-degree feedback boosting communications and performance of their managers and organizations (Bernardin & Beatty, 1987).The 360-degree approach shows that without feedback there can only be minimal change, and that various constituencies can provide diverse viewpoints and information (London, 1993). In the research done by Marshall (1999), there is a change in communication-related technology, especially in the 1990s where there was an improvement in communication between salespeople and customers due to the reduction in salespeople travel requirements. By asking the sales force for their opinions, new systems, process and new technologies can be developed to help save time and energies.If these new technologies ar e inserted into the right parts of the job, such as online video calling existing customers to confirm advertising orders instead of travelling to meet them, a large portion of time would be saved without compromising on the quality of customer service. 7. 4 Set maximum amount of voluntary additional work hours According to Fairwork Australia website, a full time employee work an average of 38 hours per week, also under the National Employment Standards, Maximum eekly hours of work is 38 hours per week, plus reasonable additional hours. Terry is working 60 hours a week, 22 hours more than required. Even though it is voluntary, it is still a considerable health hazard to overwork consistently. Sparks et al. (1997) suggests that there is a small but significant positive trend that links increased hours of work to increased health symptoms. Buell & Breslow (1960) also found that employees who work in sedentary positions for extended hours suffer from health problems due to the lack of exercise.Having research proving that overworking consistently provides a multitude of health hazards, it can be determined that Terry is not taking reasonable care of his own health and safety which can be found under the work health and safety act Division 4 section 28- Duties of workers, while at work, a worker must: (a)   Take reasonable care for his or her own health and safety. A solution to prevent employees from voluntary overworking is to set a maximum amount of voluntary additional work hours.Regardless of whether employees are meeting their sales target within the normal working hours, they are allocated a maximum set of extra hours to either over perform or chase up to their sales targets. Recommendations In order to maintain the efficiency of the business while not impacting the overall performance of the sales department, it is recommended that a maximum amount of additional voluntary work hours be set in order to prevent working excessive extra hours as custom and p ractise.A 360 degree feedback should be carried out on the sales force to ascertain the most time consuming aspects of the job, and to develop solutions and put in place technology to save time to increase the efficiency of the sales force. Higher management would need to review the key performance indicators of the sales force, and reduce individual goals and set in place challenging team goals with additional incentives to motivate the sales force to achieve more in synergy.This would go hand in hand with the creation of customer loyalty schemes to retain existing customers, and training for the sales force would be needed to allow them to utilise the loyalty schemes to the company’s advantage. Implementations Reward Terry for dedication to firm| ASAP| Set in maximum additional voluntary work hours and explain to organization and work life balance| Immediately after rewarding Terry| 360 degree feedback of sales department| Depending on how big the sales department is. Estim ated 6 months. Review KPIs and restructure to team settings| 1 year| Creation of customer loyalty schemes| In conjunction with restructuring to team goals| Terry would need to rewarded for his stellar performance for the company, where the recognition need to be structured politically correct as to prevent others from thinking Terry is being rewarded due to him putting in excessive hours. A follow up to that would be to implement maximum additional voluntary work hours after a clear work life balance talk to the company.This would put in place that to over achieve is good, but the organization does not support extreme work behaviors. The next step would be to hire an external agent to conduct a 360 feedback on the sales department to seek to reduce time hoarding elements of the job. It is essential to review new technologies and how they would assist the department in carrying out their jobs. Proper training would have to be provided to ensure the sales forces are kept up to date wi th the new technologies.After the aspects of the job have been redefined, higher management should review the KPI of the sales department and restructure more into collectivism with individual hybrid elements to motivate the sales force to work in teams to achieve even harder goals that is ever achievable by their own. This would go in conjunction with the sales force developing customer loyalty schemes as the sales force would know what attracts their clients the most and would thus be the best equipped to develop the loyalty schemes. Concluding remarksIt is of paramount importance to not undermine the value of Terry’s work; however measures must be put in place to curb extreme work habits. The core structure of the a salesperson job aspect would need to be reviewed, so as to determine areas which can be revised with the addition of new technology to help save the time and energies of the work force. This, coupled with the restructuring the performance indicators to embrace a more collective approach by placing difficult team goals which when achieved, give higher incentives. This would motivate employees to work together in teams.Lastly, the organization needs to realize that retaining existing customers is more profitable than attracting new customers, and the company will benefit from requesting the sales force to create a customer loyalty scheme, and to incorporate it into a core component of the sale’s department duties. References 1. Bemardin, J. H. , & Beatty, R. W. (1987). Can subordinate appraisals enhance managerial productivity? Sloan Management Review, 28(4), 63-73. 2. Bud, P. & Breslow, L. (1960). Mortality from coronary heart disease in California men who work long hours. Journal of Chronic Diseases, 11, 61 5-626. 3. Hackman, J. R. amp; Walton, R. E. (1986) Leading groups in organizations. In: Designing Effective Work Groups, Goodman, P. (ed. ), pp. 72 ±119. Jossey-Bass Publishers, San Francisco 4. Kim, Moon-Koo  (03/2004). â⠂¬Å"The effects of customer satisfaction and switching barrier on customer loyalty in Korean mobile telecommunication services†. Telecommunications policy  (0308-5961),  28  (2),  Ã‚  145. DOI:  10. 1016/j. telpol. 2003. 12. 003 5. Leonard L. Berry (2002): Relationship Marketing of Services. Perspectives from 1983 and 2000, Journal of Relationship Marketing, 1:1, 59-77 6. London, Manuel  (1993). â€Å"360-degree feedback as a competitive advantage†.Human resource management  (0090-4848),  32  (2-3),  Ã‚  353. DOI:  10. 1002/hrm. 3930320211 7. Marshall, Greg  W  (01/1999). â€Å"The Current State of Sales Force Activities†. Industrial marketing management  (0019-8501),  28  (1),  Ã‚  87. DOI:  10. 1016/S0019-8501(98)00025-X 8. Knight, D. (04/2001). â€Å"THE RELATIONSHIP OF TEAM GOALS, INCENTIVES, AND EFFICACY TO STRATEGIC RISK, TACTICAL IMPLEMENTATION, AND PERFORMANCE. â€Å". Academy of Management journal  (0001-4273),   44  (2),  Ã‚  326. DOI:  10. 2307/3069459 9. Sparks, K. , Cooper, C. , Fried, Y. and Shirom, A. (1997), The effects of hours of work on health: A meta-analytic review.Journal of Occupational and Organizational Psychology, 70:  391–408. doi:  10. 1111/j. 2044-8325. 1997. tb00656. x 10. Payne, Adrian  (1994). â€Å"Relationship Marketing – Making the Customer Count†. Managing service quality  (0960-4529),  4  (6),  Ã‚  29. Turnitin Originality Report OHS case study  by Yuxuan Huang From Individual Work health and Safety Case (BUS320 – BUS320 Advanced Human Resource Perspectives (s1, 2013)) * Processed on 12-Mar-2013 5:19 PM WST * ID: 311507218 * Word Count: 2170 Similarity Index 16% Similarity by Source Internet  Sources: 12% Publications: 9% Student  Papers: 12% sources: 1 2% match (Internet from 17-Apr-2012) ttp://onlinelibrary. wiley. com/doi/10. 1111/j. 2044-8325. 1997. tb00656. x/abstract 2 1% match (publications) Stacie Furst . â€Å"Virtual team effectiveness: a proposed research agenda†, Information Systems Journal, 10/1999 3 1% match (Internet from 21-Jan-2013) http://www. monarorfs. org. au/new-machi? limitstart=15 4 1% match (publications) Kate Sparks. â€Å"The effects of hours of work on health: A meta-analytic review†, Journal of Occupational and Organizational Psychology, 12/1997 5 1% match (student papers from 30-Apr-2012) Submitted to University of Sydney on 2012-04-30 6 1% match (student papers from 08-Sep-2011)Submitted to Macquarie University on 2011-09-08 7 1% match (Internet from 06-Jul-2010) http://jom. sagepub. com/cgi/content/refs/36/1/5 8 1% match (Internet from 06-May-2009) http://members. chello. nl/~e. vanoverveld/images/Thesis. PDF 9 1% match (publications) Warech, M. A.. â€Å"Self-monitoring and 360-degree ratings†, The Leadership Quarterly, 199824 10 1% match (Internet from 10-Mar-2013) http://ro. uow. edu. au/cgi/viewcontent. cgi? article=1301&context=comm papers&sei- 11 1% match (student papers from 12-May-2010) Submitted to University of Western Sydney on 2010-05-12 12 1% match (publications) Marshall, G.W.. â€Å"The Current State of Sales Force Activities†, Industrial Marketing Management, 199901 13 1% match (student papers from 25-Oct-2009) Submitted to Curtin University of Technology on 2009-10-25 14 1% match (Internet from 02-Apr-2010) http://www. wairc. wa. gov. au/Agreements/Agrmnt2005/PBF016. doc 15 1% match (publications) Karjaluoto, Heikki, Chanaka Jayawardhena, Matti LeppA ¤niemi, and Minna PihlstrA ¶m. â€Å"How value and trust influence loyalty in wireless telecommunications industry†, Telecommunications Policy, 2012. 16 1% match (student papers from 11-Sep-2009) Submitted to Univerza v Ljubljani on 2009-09-11 7 < 1% match (Internet from 16-Apr-2009) http://dissertations. port. ac. uk/357/01/BelliardC. pdf 18 < 1% match (Internet from 20-Feb-2009) http://www. busmgt. ulster. ac. uk/modules/bmg775m2/fig . doc 19 < 1% match (Internet from 18-Jan-2013) http://www. aom. pace. edu/amj/April2001/knight. pdf 20 < 1% match (Internet from 29-Apr-2012) http://www. vawo. nl/documents/OccupationalstressAustraliauniversities. pdf 21 < 1% match (publications) Lee, Hyung Seok. â€Å"Major Moderators Influencing the Relationships of Service Quality, Customer Satisfaction and Customer Loyalty†, Asian Social Science, 2013.

Friday, January 3, 2020

The War on Drugs Essay - 3279 Words

The War on Drugs To fully understand the significance and the seriousness of a War one must first fully understand the reasons that caused it in the first place. In this specific case the solution begins with several important yet seemingly simple questions†¦What is marijuana? How is it used? And why is it so coveted and widely distributed in Jamaica as well as the rest of the world?†¦ All these questions help clarify the reasoning behind the war on drugs and further investigation shows how Jamaica ends up being an important country in this puzzle as well. Lets begin with the first question, (What is marijuana), of course the dictionary definition is simply put,-a preparation of the hemp plant, Cannabis sativa, for use as an†¦show more content†¦Moreover, the longer a substance has been illegal and the harder it is to obtain the substance the more profitable it becomes. Therefore, marijuana (because it fits into this category) can be a very profitable in its import and export for a country even if it is outlawed as illegal. One country that has struggled endlessly with this drug, its illegal usage, and decriminalization is Jamaica. Using Jamaica as a model for the more in-depth study of â€Å"the war against drugs† proves to be most interesting in that Jamaica has had a long and economically fluctuating history with marijuana. Henceforth, to lead us into the study of Jamaica and its legalization and decimalization of marijuana that can be used on both a large and small scale we turn to a reliable inside source of Jamaican journalist. Where they discover that the strong marijuana presence in Jamaica has been an issue which has sparked some controversy and questioning, regarding the decriminalization of marijuana amongst not only Jamaicans but people all over the world. Many people have asked the question, how can marijuana be so abundant and openly used in a country and yet not be legal or at least decriminalized? Jamaican journalists, through research, surveys, and most importantly experiences with the culture itself, address in a special and unique way the issue of marijuana and how it has been related differently to the varyingShow MoreRelatedThe Drug War On Drugs1378 Words   |  6 Pagesnon-violent drug charges. These people’s lives are now forever changed because of a mistake they made. This mistake is continually made every single day and Americans are being punished in extreme ways for a non violent crime. The United States needs to decimalize all drugs because the drug war is costly, causes high incarceration rates, and isn’t effective as European drug solutions. In the 20th century, the United States government led a major renewed surge in drug prohibition called the War on DrugsRead MoreThe War On Drugs And Drugs Essay972 Words   |  4 PagesThe war on drugs have been a critical issue that has repeatedly held a great debate topic. It was in the 1906 when the first act against drug was put into effect with the Pure Food and Drug Act which required all over-the-counter medication to have label of its ingredients. Under President Nixon the first executive branch office to coordinate drug policy was formed and the Comprehensive Drug Abuse Prevention and Control Act was put into place. Two years following that the Drug Enforcement AgencyRead MoreThe War On Drugs And Drugs1486 Words   |  6 PagesThe War on Drugs Despite an estimated $1 trillion spent by the United States on the â€Å"War on Drugs†, statistics from the US Department of Justice (2010) has confirmed that the usage of drugs has not changed over the past 10 years. Approximately $350 billion is spent per year on the â€Å"war on drugs†, only $7 billion is spent on prevention programs by the federal government. The war on drugs is more heavily focused on how to control crime, instead of how to prevent it. Not only is the war on drugs costlyRead MoreThe War On Drugs And Drugs Essay1549 Words   |  7 PagesIntroduction Drug has been a serious issue in our society and criminal justice institutes due to many problems associated, including the violence, negative health benefits, social disorganization, and other negative consequences. The police agencies have adopted a policy called â€Å"The War on Drugs†, as a response to the rising drug problems. The War on Drugs has popularized variety policies and practices that significantly increased the overall number of drug arrests, and other drug related offenses(TheRead MoreThe War On Drugs And Drugs1199 Words   |  5 PagesThere was so much information on this topic of the War on Drugs that I am still wrapping my mind around it. It went into such detail about the war on drugs that are never talked about. We always hear â€Å"just say no.† I know that drugs are a very big problem in our society and even the whole world but I never knew to what extent it really was. I found it very interesting how Johann Hari interviewed these people who were in the middle of the drug war and their stories. It really opened my eyes to whatRead MoreThe War On Drugs And Drugs808 Words   |  4 PagesWhose interests are advanced by sustaining the war on drugs? Police seems to gain a lot by sustaining the â€Å"war on drug†. Drugs are a significant force in police deviance, with as many as half of all convictions in police corruption cases involving drug-related crimes. Corruption in law enforcement, courts, and corrections can be explained through egoism selfish desires for personal gain. In other cases, however, corruption might be better understood as stemming from socially hedonistic incentives;Read MoreThe War On Drugs And Drugs1821 Words   |  8 PagesThe war on drugs is a long going battle and it has created many issues all around the world and as of today the highest prison population can be found in the United States due to drug charges. About half of the inmates with in federal and state prisons can be found on drug convictions. Those charges can range from possession of an illicit substance to drug trafficking that surprisingly continues to be an issue in federal and state prisons. How can United States put an end to t he war on drugs? Read MoreThe War On Drugs And Drugs2027 Words   |  9 Pagesincreased federal spending in an attempt to curb the number of drug users and the sale and importation of illicit narcotics the war on drugs began in earnest. The war on drugs has also played a major role in politics as well as having a significant impact on the economy. While there are many arguments in favor for the war on drugs and an equal number of arguments against it I will attempt to show an unbiased look at the war on drugs and drug prohibition and how it has affected society as a whole. SinceRead MoreWar On Drugs And Drugs1952 Words   |  8 PagesWar on Drugs The war on drugs has come a long way without any remarkable success. America has been dealing with the drug menace for many years to a point that four of its presidents have declared the war on drugs part of their main agenda. Sadly, it has been a lost war in various perspectives. Drug abuse continues to be a daily topic with drug abusers flooding not only the American society but also many countries’ hospitals, prisons and courts. The drug trade has continued to cause violent crimesRead MoreThe Drug War On Drugs Essay2030 Words   |  9 Pagesthe â€Å"War on Drugs† sought to control the sale and use of psychoactive drugs as well as promote access to treatment for those who abuse and misuse these substances (Bagley, 1988; Elkins, 1990). Policies implemented prohibited the possession and distribution of narcotics (e.g. marijuana, cocaine, heroin); the punitive policies, which often resulted in hefty fines and prison sentences for violators, ultimately prompted the emer gence of a black market, more potent and lethal drugs, synthetic drugs as well