Thursday, August 15, 2019

Accent Discrimination on the Job Essay

The topic scenario that I chose was on accent discrimination. In this scenario an employee named Maria has had her job threatened due to tardiness, attendance, and language problems. Specifically her rapid speech patterns and heavy accent had lead to communication issues within her workplace. This topic is important for the study of cultural diversity because many people who move to the United States have accents. I would like to discover whether language issues such as having an accent are sufficient grounds for termination. To me this would seem to be an act of discrimination that conflicts with the Civil Rights Act (L.A. NOW, 2012). Therefore I would need to check the language of the bill to see if Maria’s case applies. I plan to research the United States Equal Employment Opportunity Commission (2002; EEOC Press Release, 2011) as well as publications on workplace fairness and discrimination from government websites. Pertinent cases to explore would be other language discrimination suits, especially any filed against Employers for wrongful termination due to an accent. However situations could exist where the ability to be understood in plain English would be imperative to one’s employment, depending on the necessary responsibilities of a particular job. Any other cases where a precedent has already been set would be helpful to establish discrimination in Maria’s situation or possible wrongful termination (Workplace Fairness, 2009). References EEOC Press Release. (2011). Employees Fired For Speaking Spanish On The Job, Saying ‘Good Morning’ in Native Language. Retrieved from www.eeoc.gov. L.A. NOW. (2012). State Senate approves bill banning language discrimination. Retrieved from http://latimesblogs.latimes.com/lanow/2009/04/english-only.html The U.S. Equal Employment Opportunity Commission. (2002). Language uses: Accent discrimination. Retrieved from http://www.eeoc.gov/policy/docs/national-origin.html Workplace Fairness. (2009). Language discrimination. Retrieved from http://www.workplacefairness.org/language

Wednesday, August 14, 2019

Information Assurance Essay

Information Assurance (IA) can be referred to as the process that involves in the management of perils that are closely related to the usage, processing, storage and electronic transfers of information. This field has been birthed by information security, a field in computer security. Information Assurance is aimed at availability, authentication, non-repudiation, integrity and confidentiality of information and information systems thus serving as a defense and protection turf for electronic information. The process of Information Assurance commences with the act of specifying and classifying the assets of the information to be protected. This process of information specification and classification is done objectively taking into contemplation the nature, source and the purpose of the information in focus. This is followed by risk assessment that is done by Information Assurance practitioner who has to put into consideration the likelihood and the impact of the undesired actions that may negatively affect the disclosure of the information in storage to unauthorized individuals. It is at this stage that the both qualitative and the quantitative value of the risk in relation to the current situation and predictable hazard is determined. Moreover, the IA practitioner develops a risk management plan that puts forward the countermeasures that can probably mitigate, accept, eliminate or transfer the risks. The plans also puts into consideration the detection, prevention and response towards the emergent or prospective perils (Qian, Tipper, Krishnamurthy, 2008). During the plan development, various frame works can be employed such as ISO 17799, PCIDSS, ISO/IEC 27002 or CobiT. Procedures and policies such as frequent data and information backups and configuration hardening, installation of anti-virus programs and firewalls are among the countermeasures that can be used. Other activities included as countermeasures are trainings and the restructuring of the computer network systems which put in place computer emergence response team (CERT) or computer security incident response team (CSIRT). These countermeasures aim at managing, extenuating or totally eliminating the forthcoming risks in the most cost-effective manner. Later, implementation, testing and evaluation of the plan are undertaken through various designed methodologies such as formal audits. An overhaul, known as the service integrity service is put in place to protect the resources of the system from accidental unwarranted change, destruction or loss (Rogers, 2004). The system’s authenticator, also referred to as the system administrator, bears the entire authorization mandate and it is only through his certification and accreditation that a third party or any other person can access the information in store. In addition, liaison of the authenticator with the user representative and the program manager grants equal access rights to the protected information. The above three officials also have to decide agreeably on the most appropriate approaches to be instituted in an attempt to meet all the information security prerequisites. Once they have identified these methodologies, they also highlight on the security remedies that are satisfying. The authenticator’s leadership, these information system officials are bestowed with the obligation to oversee the activities of the information system security. So as to be able to access the information in the system, the authenticator has to issue a declaration indicating that approval has been granted to the any alleged declaration holder to operate the automated information system (AIS). Included in this declaration are the sets of standardized rules and regulations that must be adhered to the latter by all users having the right of access to the stored information. These prescriptions are aimed at safeguarding the information in store and the Automated Information System at large. Besides this declaration, data security can be ensured by the use of logins, passwords and digital certificates which are specifically issued to those users who are sanctioned (May, et al, 2004). The former is not so much campaigned for but instead, the latter and the use of biometric techniques such as voice and fingerprints as regarded as more secluded methods. Computer information attackers have devised ways to overwrite and also override these login passwords and as a result, this safety methodology is rarely relied upon. Once authentication has been granted, encryption of the sensitive data is done to avert it from eavesdropping and other related computer information crimes. During the process of authentication personal information is gathered and entered into the automated system which aids in the person’s identification. As a result, the party is issued with a credential. This credential validates the user identity claim when he/she is accessing the controlled and protected assets or information. In pursuit to ensure more safety over the stored information, multi-factor authentication has been employed. The multi-factor authentication process is subject to various environments and other technological rudiments and varies depending on these two aspects (Department of the Army, 2007). These techniques may include network architecture controls, remote network access, network sniffers and securing network ports. Failure to conform to or adopt any of the above mentioned authentication methodologies will expose the stored data to computer information systems defaulters who can craftily bypass weak technical controls. Consequently, they distort the information. This distortion may vary from mere acts such as modifying the main memory’s information after having read it to causing notable and probably irreversible behavior of the schedulers which are finally associated with the crashing of the entire information systems with large volumes data loss. In addition the can disable the firewall module packet filtering by transforming the image such that the agent’s in-memory store code starts working inappropriately (Larry, 2009). This may render the agent disabled from accessing the system. Once automated information attacker gains this unauthorized opportunity to access to the clients’ information he has the freedom to perform dynamic data modifications. Besides, he can access the system management memory (SMM) handler. The end result of this will be a system management random access memory (SMRAM) cache-based attack. Computer information criminals also alter the information system’s operating codes. Moreover, they can access client’s personal and confidential details such personal identification numbers and probably financial institution’s information thus ending up in a big loss in their finances. National and scientific databases have been prepared and managed by the governments of various states. Moreover, academic organizations and research institutions are also reliable. However, these stakeholders have to take keen attention during the auditing of the information, especially those received from partnerships with other organizations to avoid errors that may be disastrous in the future. In information assurance, the information flowing in the associated institutions should be confidential as earlier said and also the information’s integrity should be well safeguarded. In ensuring that the information meets these prerequisites, the British standards well implemented. Information assurance standards are also published a template in the IA website. Moreover, the Defense Information Systems Agency (DISA) site contains these standards which are also coordinated with the MCNOSC. Therefore in conclusion, information assurance can be basically taken to mean the information operations (IO) aimed at information and information systems (IS) protection. This is achieved through the information assurance standards that see the achievement of information availability, its integrity, confidentiality, authentication and non-repudiation. The realization of these standards ensure the refurbishment of IS through the amalgamation of restoration, detection, fortification and reaction competences

Vietnam history - Rules of Engagement as seen through the different Essay

Vietnam history - Rules of Engagement as seen through the different levels of command - Essay Example There are certain rules of engagement that the Army has to consider during its operation, and while fighting the war it has to take care not to go against any of the international laws or the conditions laid down by their commanders. They are only allowed to use force and power to win the war if they use it within the set discipline and rules. In Vietnam the individual soldiers totally understood the rules of engagement. However, the problem was with them accepting those rules. The ROE led to restrictions on the military because of which their morale went down. The reason behind this was that, metaphorically speaking, one of the hands of the military was tied back and they were fighting in such a position. This was of course difficult for them and was like asking them to waste their lives without any reason since they could not defend themselves freely just due to certain rules. It is difficult for a battalion commander to come to a conclusion as to when his side should win the battl e, and what they would lose in order for that to happen. The rules of engagement, from the point of view the battalion commanders were pretty realistic. The soldiers would totally disagree since they are fighting and anything that hinders them in defending themselves or others would be disagreeable to them. Coming back to battalion commanders, they feel that it is their right to protect the innocent civilians. And that is where the ROE come into play. These rules prevent the soldiers from attacking under certain circumstances as, although they might only be retaliating to the attack they received, they might also hurt some other people around which is just not done (Lt. Col. Douglas Smith). Same was the case with the division commanders. They also felt the same and outlined the rules of engagement that the army was supposed to follow. It is clear that it was the first priority of these commanders to prevent unnecessary casualties and destruction (Holdorf, 1975). General William West moreland was the permanent commander of MACV and all the US forces in Vietnam were under him. His foresight told him that there was going to be a rise in conflict. The plan that he approached was aggressive and can be called â€Å"search and destroy†. What Westmoreland did was make the forces of Viet Cong come out in order that his men could kill them. According to this man, defeating Viet Cong only required great use of weaponry. Westmoreland was pretty optimistic regarding the war and in his speeches he used to report about the success of the American forces in pulling down the Vietnamese Army. It was during the First World War that in Vietnam President Lyndon Johnson decided against mobilizing the National Guards as, from what he thought, doing such a thing would lead to the Soviets and Chinese getting hints which would definitely cause certain effects upon their direct involvement in the war (Doubler, 2008). Secretary of Defense Robert McNamara was responsible for recomme nding to President Johnson to mobilize the National Guards as well as the reserves. This was in the July of 1965. However, according to the President the ground war was going to end soon and there was a requirement of forces to be present in case there was a war in Korea. The reason that McNamara gives for them failing was that they did not take seriously the obstacles and problems they had to face. Also, according to him they had supported the wrong government

Tuesday, August 13, 2019

Is surgery a good option for people to lose weight Essay

Is surgery a good option for people to lose weight - Essay Example discuss the different types of weight loss surgery available and highlight the associated risks and complications compared to the contemporary alternatives. To begin with, the history of weight loss surgery dates back to the 1960s when it was initially done through a loop configuration. This initial technique presented a problem of bile reflux to the patients who underwent the procedure (American Society for Metabolic& Bariatric Surgery [ASMBS], (n.d)). This method left the patient with a much larger stomach making the bile to enter the esophagus and the upper part of the stomach a condition termed as bile reflux. Bile reflux can result in the destruction of the mucosal lining of the esophagus hence altering the physiological functions of the layer (Sifrim, 2013). This prompted the surgeons to carry out a research to improve on the procedure. Over the years, the procedure has been improved with invention of different alternatives of the procedure including the famous â€Å"Roux-en-Y† bypass (ASMBS n.d). However, it is worth noting that the existing alternatives to the weight loss surgery seem to have less side effects or complications associated with them. Dieting for example has been in existence for a very long time even before the invention of weight loss surgery. Dieting involves daily monitoring of the type of foods consumed by the person intending to reduce weight. The only challenge of dieting procedure is that patients may be forced to consume foods which they are not used to or they don’t like. On the other hand, exercising is also an alternative to the weight loss surgery. Exercising has been used as a method to reduce weight in individuals for many years before the invention of other programmed techniques like well designed dieting pattern as well as surgical procedures. As opposed to the surgical procedure, less amount of money is spend to acquire resources needed for exercising making the method more popular among people who are have less

Monday, August 12, 2019

Human Resource Management Research Paper Example | Topics and Well Written Essays - 250 words - 1

Human Resource Management - Research Paper Example Visual sexual harassment is through showing unwanted signs, photographs, drawings, gestures suggesting sex to an individual in the work place (Boland, 2005). Job analysis is the method employed to identify and determine the responsibilities and duties within a job description. The first step in job analysis is identifying its main objective it is important in determining the data to be collected. The second and third steps are choosing the best analyst and suitable method respectively. The fourth step involves training the analysts on how to use the chosen method (Mathis & Jackson, 2010). The fifth step in job analysis entails preparing for analysis by communicating the project to the whole organization. Collecting data fall on the sixth step while reviewing and verifying the collected data falls on the seventh step. The last step is implementing the results which at this time are the developed job description and specification. The advantages of this technique are; gaining of first class information about the job, efficient way of hiring employees and efficient way for appraisal and performance evaluation. The disadvantages are; require s a lot of data, it has a personal bias and it is time consuming (Heron, 2005). Internet recruiting has derived its importance through advances in technology and the need for a 24/07 access of employees and employers. Through internet recruiting, it has been possible, for employers to access qualified personnel from the global environment. Website containing details of job descriptions post vacancies through which a qualified individual responds to. The following three are advantages of internet recruiting. Firstly, it is a cost effective method of hiring. Secondly, the automated recruiting process is accessible 24/07. Thirdly, it is possible to access a large number of skilled individuals from a wider geographical area (Arthur, 2006). Security in the workplace refers to being safe from risks that can occur

Sunday, August 11, 2019

Business and international bribery Research Paper

Business and international bribery - Research Paper Example An example of a business that was subjected to a legal prosecution is Weatherford International Ltd. From 2004 to 2011, as a multinational organization, Weatherford International Ltd indulged with internal controls violations. Though Weatherford International Ltd operated in Angola and Iraq, court documents did not make specifications on the country wherein the vice took place. Weatherford International Ltd. Among many things did not: institute effective internal accounting controls; have a committed compliance officer; conduct anti-corruption training; and create a system for investigating ethics violations reports. Weatherford International Ltd. Employees also bribed a foreign official to see a renewal of a contract go through. In the case, U.S. v. Weatherford International Ltd., Weatherford International Ltd. was made to pay a penalty of USD 87,178,256. The case gave rise to the case law U.S. v. Weatherford International Ltd., No. 13-cr-733 (S.D. Tex. 2013) (Baughn, 19 & Pacini, 5 45). According to Lane and Simpson, There are indicators that attest to the adding power of the FCPA Act and the legal proscription of bribery by US multinationals. One of the values that the FCPA Act brings is its ability to rein in corruption and to protect meritocratic capitalism. The crux of the matter herein is that corruption [which bribery is a form of] undermines meritocratic capitalism by un-evening the playing field; subverting proper and legitimate functions of institutions; and encouraging or furthering the misallocation of economic resources. Again, according to the World Bank, corruption slows down the rate of an affected country by 0.5% to 1% annually and increases a marginal tax rate and clumps positive effects on inward investment (Lane and Simpson, 40). An example of an organization that has found corporate bribery in foreign land expediency is Siemens. In 2008, Siemens had to pay 1.6 billion USD as legal settlement to European and American

Saturday, August 10, 2019

Does the media distort children's perceptions of reality or validate Essay

Does the media distort children's perceptions of reality or validate them - Essay Example Science-Fiction movies also contribute to distorting children’s perception of reality. Although they boost their imagination to think of the unachievable, they can make then day-dream and spend a large amount of time on thinking about a parallel world that does not even exist. The Star Wars mania left many children addicted to it back in the 70’s, however, the movies were anything but close to reality. They did, however, encourage a whole generation to become fans of something that did not even exist in reality, and even if it did not affect their perception of reality, the franchise left an impact that affected ‘reality’ itself. Horror movies also are another genre of movies that distort children’s perceptions of reality. Children often fear the presence of scary monsters lurking in dark corners and many of them are affected so badly that they are deterred from going anywhere, or even sleeping alone at night. Watching horror movies distorts children’s perception of reality so badly that many often commit violent acts. Current research agrees with the individuals who argue that violent media is associated with aggressive behavior. Risky behavior by children and young adults includes violence against others and even a lack of remorse for consequences. Such faulty thinking often creates stress in children which can lead to a large number of psychological conditions. Therefore, children who view media violence frequently are more likely to have increased feelings of hostility, reduced emotional response to violence exhibited in front of them., and injuries that result from the initiation of violent behavior. Cartoons too distort how children view reality, since they too, like fiction movies, make us believe that the impossible can be possible, and that a lot of characters many never die. However, since cartoons are depicted as animated colorful motion images, their effect is minimal, in fact even positive, since children never perceive them to be real, given their animated form. Daffy duck, for example, might fall from top of a building several times, and be squashed by a bus on the road, and still jump up, inflate itself and start