Saturday, May 23, 2020

The Family Ties in Frankenstein, Metamorphosis and Mother...

Family Ties The idea of using a family based theme in literature has been around for a long time. When an author is writing a novel or even a play, it is very easy to include a strong family dynamic to it. The family is something that nearly every person can relate with in one way or another. This comfort springs forth emotions in the reader or viewer that make the story easier to follow along with. There are many examples of this throughout this course, but this paper will focus on how three of them use the family dynamic to connect with the reader: Mary Shelley’s Frankenstein, Kafka’s Metamorphosis, and Brecht’s Mother Courage and her Children. One does not have to read far into Frankenstein to get a feel for this idea. The†¦show more content†¦Right from the beginning of the first chapter, we are given a history of Victor’s childhood and family life. We learn about how Victor’s father, Alphonse, and his mother, Caroline, became to know e ach other and eventually get married. We also learn about another character, Elizabeth, who eventually ends up being adopted into the family. It becomes clear that Shelley started out with this family information in order to draw the reader into the story. Although the entire story is completely lacking of a strong female character, we are still presented with the mother and the adopted sister, in an attempt to try and help the reader of the story connect with Victor and his childhood (Komisaruk). Later on in the story, Victor Frankenstein creates the monster. The monster eventually asks Victor to create a mate for him. He wants the feeling of a female monster to love and share his life with. Again, this is something that the majority of the readers can relate to. Shelley’s wants the reader to have an emotional connection with the monster. At first glance, one would not imagine that they would have anything in common with a homemade creature, but it is proven to be different upon further reading. Nearly everyone wants the felling of having someone to love and have them love you. The monster is no different, so maybe he is not too different from the reader after all? Overall, Shelley uses the family in an attempt to make the reader feel comfortable

Monday, May 18, 2020

Face Recognition - 1117 Words

Re Face Recognition Paper Adriana Zachry Psych/560 November 13, 2012 Christopher Wessinger Face Recognition Paper Face recognition develops slowly through life. Recognizing a face can be a difficult for the individual and also for the brain system that processes. The complexity of recognizing individual faces can be a difficult task at times. Recognizing faces also includes looking at an individual’s emotional expression and then, being able to take that information and processing it. This can be more complicated because facial recognition also includes the processing of emotions and emotional content. The brain can easily recognize a face without encountering any complications. Facial identification is essential for†¦show more content†¦In order for a person to recognize a face, the face features must be encoded in the long-term memory first and then retrieved from the brain. The encoding process is a very important part of recognition memory because it determines if the persons face will be recognized later on. It depends on the strength of the member whether the person will be remembered by recollection judgment, or is known by familiarity judgment. However, whether the brain remembers a person, place, or thing depends on the strength of one’s memory or whether they were paying full attention to details. â€Å"Configural system is always necessary for face recognition, and appears to support what remains of face identification even in prosopagnosic people who have an intact part-based system† Rivest, J.J., Moscovitch, M.M. amp; Black, S.S. (2009). Long term memory is information that is permanently stored in the brain for later use. Long-term memory is made up of both semantic and episodic memory. Semantic memory is all of the information that one accumulates over a long period of time that is not linked by time or place. This includes information related to who, what, and why. Episodic memory acts as the memory for when and where (Argumosa, M. A., 2010). Finally, face recognition starts at infancy and is utilized throughout one’s life. A person must utilize their long term memory for face recognition. A person must give their fullShow MoreRelatedGender Bias Of Face Recognition744 Words   |  3 PagesThe ability of humans to recognise and remember faces is remarkable. Interestingly, there seem to be many factors that influence the performance of facial recognition, such as age, gender, race and even particular social or cultural groups that people belong to. This experiment explores whether there is gender bias in face recognition. Own-gender bias in facial recognition is the tendency to recognise individuals from one’s own gender better than individuals from the other gender (Herlitz Lovà ©nRead MoreAutomatic Face Recognition Essay562 Words   |  3 PagesAutomatic face recognition has always been a major focus of research for a few decades, because of numerous practical applications where human identification is needed. Compared to other methods of identification (such as fingerprints, voice, footprint, or retina), face recognition has the advantage of its non-invasive and user friendly nature. Face images can be captured from a distance without interacting with the person, which is particularly beneficial for security and surveillance purposes.Read MoreMobile Cloud Computing : Face Recognition3002 Words   |  13 Pages Mobile Cloud Computing Face Recognition Sahil Palvia (sap8231) Fall, 2014 Advisor: Dr. Minsoek Kwon Rochester Institute of Technology Department of Computer Science â€Æ' Table of Contents Introduction 3 Background 4 Proposed Solution 5 Design and Implementation 6 Results 12 Conclusions 19 Future Work 20 References 21 â€Æ' Introduction Every person today uses an Internet-enabled mobile device. Majority of the applications running on mobile devices transfer their data to cloud serversRead MoreCognitive Exam Face Recognition Essay1115 Words   |  5 PagesFACE RECOOGNITION This essay will talk about face recognition and several reasons why it has been studied separately. The ability to recognise faces is of huge significance of people’s daily life and differs in important ways from other forms of object recognition (Bruce and Young, 1986). Than this essay will talk about the processes involved in face recognition which comes from the diversity of research about familiar and unfamiliar faces-it includes behavioural studies, studies on brain-damagedRead MoreFace Recognition Of Java Environment1552 Words   |  7 PagesFACE RECOGNITION IN JAVA ENVIRONMENT ABSTRACT: In today’s world, face recognition has its application in many fields incorporating:Automotive sector, image enhancing, robotics, gaming manufacturing. It is an exciting field with hurdles. Such as limited hardware, poor visualisation or quality connectivity. This paper demonstrates a face recognition system in JAVA environment. The aim is to have high recognition rate. Key words:Face recognition, Open CV, JAVA environment. I. Introduction:ImageRead MoreThe Human Face Action Recognition System1917 Words   |  8 PagesAbstract— In this paper we implement the Human Face Action Recognition System in Wireless Sensor Network. Detecting movements of human is one of the key applications of wireless sensor networks. Existing technique is detecting movements of a target using face tracking in wireless sensor network work efficiently but here we implementing face action recognition system by using image processing and algorithms with sensors nodes. UsingRead MoreOutline and evaluate Bruce and Youngs theory of face recognition669 Words   |  3 Pages The face recognition model developed by Bruce and Young has eight key parts and it suggests how we process familiar and unfamiliar faces, including facial expressions. The diagram below shows how these parts are interconnected. Structural encoding is where facial features and expressions are encoded. This information is translated at the same time, down two different pathways, to various units. One being expression analysis, where the emotional state of the person is shown by facial features. ByRead MoreFace Recognition Using Orthogonal Locality Preserving Projections2049 Words   |  9 PagesFACE RECOGNITION USING ORTHOGONAL LOCALITY PRESERVING PROJECTIONS. Dr. Ravish R Singh Ronak K Khandelwal Manoj Chavan Academic Advisor EXTC Engineering EXTC Engineering Thakur Educational Trust L.R.Tiwari COE Thakur COE Mumbai, India. Mumbai,India. Mumbai, India. ravishrsingh@yahoo.com ronakkhandelwal2804@gmail.com prof.manoj@gmail.com Abstract: In this paper a hybrid technique is used for determining the face from an image. Face detection is one of the tediousRead MoreFace Recognition Using Opencv and C#4178 Words   |  17 Pagesand Business Informatics - !!! DRAFT !!! Master Thesis Secure Face Recognition and User Access !!! DRAFT !!! Scientific Coordinator Prof. Ion IVAN, Ph.D. Graduate Valentin-PetruÃ… £ SUCIU - Bucharest 2011 - Contents Introduction 1. Machine Based Facial Detection and Recognition 1.1 Computer Vision 1.2 Object Detection 1.3 Image Quality 1.4 Facial Recognition Approaches 2. Proposed Solution 2.1 Data Preparation 2.2 Recognition Logic and Algorithms 2.3 Database Structure 2.4 Front End ApplicationsRead MoreSeminar Report On Age Invariant Face Recognition1480 Words   |  6 PagesSeminar Report on ‘Age-invariant Face Recognition’ Submitted by:- Namit Ohri (12213010) Submitted to:- Dr. Pyari Mohan Pradhan DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY ROORKEE - 247667 Abstract A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the challenges in face recognition is to come up with a matching

Monday, May 11, 2020

Dna Biology Forensic Science Essay - 958 Words

1.1.1.1 Forensic DNA Biology: Deoxyribonucleic acid (DNA) has revolutionized forensic science. Of all the disciplines in forensic science, forensic biology has seen the most technological advances in the past thirty years. Forensic biology is a field of study that uses DNA to identify victims and to associate suspects and victims to crime scenes. The large forensic advantage of high copy number and the stability of the mtGenome is a direct consequence of the mitochondrion’s function and evolutionary history. Understanding the necessary functions encoded in its genome enhances our appreciation of molecular genetics of mitochondrial gene variation. Mammalian mitochondrial DNAs (mtDNA) have two separate origins of replication. The origin of the heavy strand (guanine rich) is located within a region termed the Displacement loop (D-loop) and the light strand (cytosine rich) synthesis originates within a cluster of five tRNA genes nearly opposite of the D-loop. The single focus of current forensic typing is the D-loop. The D-loop consists of approximately 1100 base pairs of â€Å"noncoding† DNA and is commonly referred to as the hypervariable region due to an increased frequency of mutation as compared to the remaining portion of the mtgenome. The hypervariable region is further divided into three segments. Hypervariable region I (HV1) spans nucleotide positions 16024-16365; hypervariable region II (HV2) span nucleotide positions 73-340; and hypervariable region III (HV3) spansShow MoreRelatedTechnology And Science By Law Enforcement1653 Words   |  7 PagesJustice defines forensic science as, â€Å"the application of science, such as physics, chemistry, biology, computer science, and engineering to matters of law,† (2014). The emphasis here is the use of technology and science by law enforcement officers and agencies and is accepted and recognized by the criminal justice system. It is seen as scientific technology or Crimin alistics, (Dempsey Forst, 2013). While technology plays a role in this, it is most recognized by the use of science by law enforcementRead MoreForensic Pathology, Toxicology, And Biology1077 Words   |  5 Pages Forensic science consists of a variety of fields such as in this case Forensic Pathology, Toxicology, and Biology were used to help solve the murder. Forensic Pathology was used to determine the cause of death by conducting an autopsy on the Johnson body. Coming to a conclusion, that Denise Johnson’s cause of death was due to asphyxiation (also known as strangulation)2,9. The pathology unit also determined that her death was a forced and violent death. Given the facts of how the victim died itRead MoreIntroduction. Forensic Dna Phenotyping Is A New And Emerging1577 Words   |  7 PagesIntroduction Forensic DNA Phenotyping is a new and emerging field of forensic science. As it is so new, there is very little in terms of literature on this field, very little testing done on this type of identification, and few cases that have used DNA Phenotyping to assist in the investigation. The first documented case of DNA Phenotyping being used is in the early 2000s, so it has had under 20 years of research and experimentation with it. There are many weaknesses to the version of DNA PhenotypingRead MoreForensic Science : A Forensic Scientist1648 Words   |  7 PagesIntroduction Topic: Forensic Science In general, a forensic scientist’s job provides an objective, scientific analysis to discover the truth and use that truth in legal proceedings. Forensic scientists take items of evidence collected from crime scenes and determine their relevance to the case by examining and analyzing the evidence. There are various types of forensic scientists that specialize in specific examinations and analysis of different types of evidence. Eventually forensic scientists willRead MoreUses for Trace Evidence in Forsensic Science1176 Words   |  5 Pages There are various uses for trace evidence in forensic science. Trace evidence can include a variety of disciplines including hair, paint, fiber, rope, soil, glass, and building materials. According to Locard’s Exchange Principle, every contact leaves a trace. Whenever a criminal comes in contact with a victim, there is an exchange of materials between the two. When discovered, this exchange can provide key evidenc e in a case. Paul Kirk (1974) states in his book Crime InvestigationRead MoreForensic Science Technician: I would like to be a Forensic Science Technician, simply because I1600 Words   |  7 PagesForensic Science Technician: I would like to be a Forensic Science Technician, simply because I find this kind of stuff interesting. A Forensic Science Technician does many things. Four things they do are run ballistics tests on guns to find the one used in a bank robbery; collect evidence from a crime scene to help understand the chain of events; match DNA samples to reunite a long lost child to his/her family; and solve a crime by matching fingerprints at the crime scene to a suspect. One of theRead MoreThe Convergence Of DNA Analysis And Forensic Sciences1047 Words   |  5 PagesThe convergence of DNA analysis and Forensic sciences is a recent one, given the relatively new discovery of accurate analysis of DNA. 1953 was a critical year for the field of molecular biology; Rosalind Franklin, James Watson, and Francis Crick solved the double-stranded, helical nature of DNA. Nearly three decades later, Kary Mullis invented the polymerase chain reaction (PCR) in 1983, followed only a year later by Sir Alec Jeff reys and his development of the restriction fragment length polymorphismRead MoreThe Applications of DNA Typing 1619 Words   |  7 PagesDNA Typing has become more present in the world with the creation of new technology, allowing justice to be served in courtrooms, helping to identify bodies after major devastating events have occurred, and also in processes that the average human does not pay much attention to such as the production of biofuels. The process of DNA Typing is not easy considering the fact one must first go through the multi-step process of DNA extraction. Along with DNA Typing also comes the job opportunities thatRead MoreForensic Science Investigators 1153 Words   |  5 PagesKids in high school traditionally have a relatively low interest in science because they might think its boring, or tedious, but when you put something forensic behind it, it makes things more exciting. â€Å"Forensic scientists assist various law enforcement agencies throughout the Uni ted States and internationally†(Corey). Most police investigations begin at the scene of a crime. The scene is simply defined as the actual site or location in which the crime took place. The entire investigation hangsRead MoreForensic Misconduct1639 Words   |  7 PagesForensic Misconduct: Dr. Pamela A. Fish Kirstin L. Daniels Professor Ian Rodway George Mason University Forensic Misconduct: Pamela A Fish Forensic science is defined as the practice of utilizing scientific methodologies to clarify judicial inquiries. The field of forensic science contains a broad range of disciplines and has become a vital aspect of criminal investigations. Some forensic disciplines are laboratory-based; while others are based on an analyst’s interpretation

Wednesday, May 6, 2020

Bodybuilding Research Paper - 1958 Words

Bodybuilding is a process of developing muscle fibers through special muscle training exercises, increased calorie diet, and sufficient amount of rest. The sport is called Competitive Bodybuilding, where bodybuilders display their physical body to judges and receive points for their musculature appearance (Wikipedia, Bodybuilding). Many people believe that in the end of 20th and 21st century bodybuilders have formed a unique subculture with their own set of values, beliefs, traditions, etc. Now, bodybuilding is regarded as a life style, an attitude towards life, people, and the human physique. As a sport, bodybuilding started back in the 11th century in India. Back then the first dumbbells was created, and the first gyms were opened. The†¦show more content†¦This value is accompanied by the drive for maximum intensity both on stage and in the gym (Berardi). â€Å"Bodybuilding is more a state of mind characterized by excess that is manifest in the gym and on the stage. [â₠¬ ¦] Bodybuilding, by its very nature, screams ‘LOOK AT ME! IM NOT NORMAL AND I LIKE IT’† (Berardi) an important belief in the bodybuilding subculture is the belief that it is good to differ, and in a sense to protest against the socially recognized conventions. According to Berardi, any member of the bodybuilding subculture is easily recognizable. And the factors, which distinguish the members from the rest of the society, are not simply physical and aesthetic. The members share the same appreciation for developed physique and ability to demonstrate strength and musculature, and have a sense of belonging to the smaller group within a bigger society of average people: In the bodybuilding society it is considered to be very good to be different from the rest of the average society. It is good to protest, to show your aggression, and to Ray 4 demonstrate dominance by excess strength and musculature. It is in a sense similar to the values of many marginal protesting subcultures trying to get attention of the public by differing from the rest of the people greatly. In America, the bodybuilding subculture remains veryShow MoreRelatedBodybuilding And The Subculture Of Bodybuilding929 Words   |  4 PagesIntroduction Bodybuilding is the process that involves development of muscle fibers which is facilitated through special exercises, increased diet (calorie) as well as having the recommended amount of rest. I believe that in the current century bodybuilders have formed subcultures that are very unique in the sense that they have their own values, beliefs as well as traditions that are enshrined within their cultural provisions. Description of the Subculture This paper is basically going to lookRead MoreBodybuilding : The Qualities Of Bodybuilding, Backgrounds, And Their Underlying Attitude Toward The Sport1387 Words   |  6 PagesBy using ruthless advance study methods, I was able to ask direct questions about the characteristics of bodybuilding, backgrounds, and their underlying attitude toward the sport (Roberts and Zweig). Bodybuilding is not only about eating high-calorie meals, lifting, and strength. It is about motivation, hard work, and perseverance. Bodybuilding is about delivering that message to number of different audiences at different times and in different places (Beebe). We as humans send and receive messagesRead MoreBcaa Research Paper833 Words   |  4 PagesNick Scott 4-13-2010 Ergogenic aid research paper Branched Chain Amino Acids In choosing branched chain amino acids for my ergogenic aid project, I took a few different things into account. When looking at the list provided to our class for this project, I told myself that I wanted a challenge. I wanted to work on a topic that I knew very little about to begin with. Some of the choices off of the ergogenic aid list seemed to easy and broad. Options such as protein and alcohol would seemRead MoreDiscrimination Towards Disabled Individuals Is Prevalent Society Today Essay1721 Words   |  7 PagesDiscrimination towards disabled individuals is prevalent society today. In this paper I will be discussing various forms of representation of disability in the media. I did my research on the examples by locating an organization known as Stop Ableism, which gave links and sources to various tokenistic and ablist representations in the media. I made the decisions on which section the examples would go into first by deciding if they were ablist and tokenistic or not, t hen figuring out how severe theRead MoreSteroid Use Of Bodybuilding And Steroids889 Words   |  4 PagesSteroid Use in Bodybuilding Chayla Vines Clover Park Technical College Abstract [The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tabRead More Men, Women and Gender Boundaries in Sports Essay623 Words   |  3 Pagesboundary crossing is significant culturally and socially as it challenges conventional view of male and female characteristics and roles. When altering a customary view of gender in a society, there are both costs and benefits to that society. This paper will discuss the costs and benefits to a traditionally male-centered culture when women and men cross gender lines in sport, and provide examples of different sports in which gender lines are being erased. Allowing men and women to play a sportRead MoreHow Media Images Promote Body Dissatisfaction1364 Words   |  6 Pagesare unable to meet these strict physical requirements. However, unknown to the masses, the majority of the physical characteristics portrayed are achieved from digital enhancement and not only the product of weight loss. It is my goal within this paper to discuss the population is most greatly affected by negative media images, discuss the reason why its effects are so great, and to explore the way to reduce the rising trend of body dissatisfaction. Health issues Negative body image is definedRead More Adolescent Eating Disorders Essay1670 Words   |  7 Pagesproblems which certain adolescents suffer. In this paper I focused on the two major eating disorders of anorexia and bulimia.   Ã‚  Ã‚  Ã‚  Ã‚  In 1978, Brunch called anorexia nervosa a new disease and noted that the condition seemed to overtake ?the daughters of the well-to-do, educated and successful families.? Today it is acknowledged and accepted that anorexia affects more than just one gender or socio-economic class; however, much of the current research is focused on the female gender. ?Anorexia nervosaRead MoreHercules in Popular Culture1719 Words   |  7 PagesHercules For my research paper I chose to explore and analyze instances of the great Greek/Roman hero, Heracles (Hercules), appearing in popular culture and the effect his myths had on early civilizations. Considered by most to be the greatest of the Greek folk heroes, Hercules was the embodiment of masculinity and physical power. The word â€Å"herculean† literally translates into â€Å"having enormous strength, courage, or size† (dictionary.com.) Since their inception, the myths and legends of HerculesRead MoreMarketing Pl Body Image Health Club2321 Words   |  10 Pagesbusiness owners to gain success without conducting some sort of research on consumers. Consumer behavior is an essential application when constructing a marketing plan, knowing what is best suited to attract customers is essential for well-established businesses. Although generating revenue and profit is important, understanding consumers can be considered the foundation to growth and sustainability to any business or company. This paper will illustrate the various techniques implemented by two competing

Freud’s Interpretation of Sophicles’ Oedipus Tyrannus Is Ridiculous Free Essays

â€Å"Freud’s interpretation of Sophocles’ Oedipus Tyrannus is ridiculous. † Discuss This essay will discuss the interpretation of Oedipus Tyrannus by Freud and whether his interpretation holds any weight in using it to aid his own theory, the Oedipus complex, or whether it was a ridiculous reading of the play itself. Freud’s theory will be explored first, before moving on to look at the interpretation itself. We will write a custom essay sample on Freud’s Interpretation of Sophicles’ Oedipus Tyrannus Is Ridiculous or any similar topic only for you Order Now This will give a strong sense of how the Oedipus complex comes about in a young child and help in the discussion as to whether Oedipus may have been fulfilling this unconscious desire. The discussion will also touch upon Freud’s belief that it is his own theory that explains the reason for the play’s long-lasting success. Sigmund Freud is the father of a branch of psychology that he named psychoanalysis, as well as having a tremendous influence in how modern psychology has developed since the turn of the 20th Century. Freud was born on May 6th 1856. The first reference to Freud having used Sophocles’ Oedipus Tyrannus to help strengthen his theory of the Oedipus complex, which is explained below, and also the first mention of the Oedipus complex altogether comes in 1900 in Freud’s The Interpretation of Dreams. However, in The Interpretation of Dreams the theory is clearly only just beginning to be devised by Freud as it is not until 1910 that the term ‘Oedipus compex’ is first used. To be able to understand Freud’s interpretation of Oedipus Tyrannus it is vital to grasp what the Oedipus complex actually refers to. Before discussing the Oedipus complex it is important to discuss the earlier psychosexual development of a child, which leads into the development of the Oedipus complex. The first two stages, or the ‘pregenital’ stages, begin very early in life. The first is the oral stage, unsurprisingly, as infants first derive sexual pleasure primarily through the mouth; such as tasting, sucking, and making sounds. This stage is followed by the anal stage, in which the infant has discovered the anus. This stage is focused on the control of the self and gives the infant the first opportunity to gain a sense of independence and achievement through learning to control the bowel and bladder. With the next stage, the phallic stage, the Oedipus complex tarts becomes apparent. It is during this time that the infant discovers the difference between a boy and girl, the boy begins to see the father as a rival for his mother’s affections, but also develops a fear of the father becoming a rival for the mother’s affections. Alongside these developments the child finds the genital area as an erogenous zone. The ‘castration complex’ can develop throughout this period and it is important to think of the male and female child as , ‘with penis’ or ‘castrated’, relatively. Freud believed that the male child saw the female child as a castrated boy and thus the result of, what seemed to be common in the turn of the century, the threat of parents telling young boys to stop playing with their genitals or they will be cut off. The young boy now believes that the father becomes a real threat to the affections for his mother. Between the age of four and five, Freud believed that the young child develops sexual feelings for his mother, and alongside this wants to have complete possession of her and thus hostile feelings develop towards the father. However, the possibility of castration that the young boy has understood to be seen in the naked girl, poses a horrific possibility to the boy. With the loss of his penis at stake, as in the young boy’s mind this is the form of retaliation the father will take to any hostile action from the child, the boy focuses his attention towards other feminine sources for sexual satisfaction. This is the Oedipus complex laid out as unimpeded development of the young boy and variations to this development through childhood is how Freud can explain ‘abnormal’ sexual behavior. For the young girl the Oedipus complex follows a different path once the difference between boy and girl has been realised. The lack of a penis is seen, through the young girl’s eyes, as the fault of her mother, because of this the girl moves away from the need to possess the mother and begins to long for the father in a similarly sexual manner and the wish for him to impregnate her. It is the resulting child that Freud imagines can ‘cure’ the girl of her ‘penis envy’ seeing the baby as a replacement for the missing organ. For Freud however the female never really surpasses this stage of penis envy. With Freud’s interpretation of Sophocles’ Oedipus Tyrannus it is the male side of the Oedipus complex that is discussed. It is obvious that Oedipus indeed performs the actions that one would attribute to the desires of the Oedipus complex being fulfilled: The murder of his father and the sexual union with his mother. Freud’s interpretation, however, seems to conveniently ignore certain aspects of Sophocles’ Oedipus Tyrannus, which upon inspection provide obstacles for Freud’s theory to navigate. In the development of his theory on the Oedipus complex, Freud undertook a great deal of self analysis and as such it is questionable as to how generalised his thoughts can be used to understand the human development. Freud had seen the play Oedipus Tyrannus and; â€Å"saw himself in a very concrete sense as Oedipus. † With this in mind Freud’s interpretation of Oedipus Tyrannus is not lessened in itself, but this does have bearings on his interpretation as proof of the Oedipus complex. Tragedy, as in all art forms, is open to interpretation no matter what the original artist intended as the meaning. For Freud, Oedipus represents the fulfilment of the early sexual desires towards the mother and the aggressive behaviour towards the father. However, that Oedipus does not know that these two people are his biological parents seems to belittle Freud’s use of Oedipus as an exemplum for his theory. Freud’s use of Oedipus is meant to show that the Oedipus complex â€Å"transcends time and place. † That Oedipus has a lack of knowledge of his true parents doesn’t seem to affect Freud in his use of Oedipus in this way. In my opinion, however, this use is severely at odds to the point that Freud attempts to make. A child, according to the Oedipus complex, that grew up with non-biological parents should have had little to no effect upon the early stages that lead to the development of the Oedipus complex, thus little to no effect upon the complex itself. Oedipus was sent away as an infant to be killed, but instead grew up with different parents. This, therefore, gives no reason to think that the idea that Oedipus sleeping with his biological mother and killing his biological father is the Oedipus complex realising itself within Oedipus. The interpretation by Freud seems to have used the popularity of Oedipus Tyrannus, at the time he was developing his theory, to help in popularising and explaining the Oedipus complex. Although Freud himself seems to have believed that Oedipus was, indeed, a good example of his theory: Broken down simply his argument runs, 1. There is a universal psychological conflict (Oedipus complex), as I have discovered in my clinical experience. 2. This is confirmed by a drama which has universal effectiveness. 3. Why this drama is universally effective can only be understood if my hypothesis is correct. This reference to why the drama is universally effective is Freud’s belief that the play in itself is not that challenging a concept. According to Freud it is only if his theory is correct that the ability of Oedipus Tyrannus to have had the â€Å"universal power to move† at all. This scientific sounding argument leaves little option for Freud to be wrong, as the play has indeed enjoyed thousands of years of success. This, however, is according to Freud. Freud’s interpretation of Sophocles’ Oedipus Tyrannus seems to continually leave absolutely no room for a lack of the Oedipus complex being present. Throughout Freud seems to have missed what many people miss in Oedipus Tyrannus, Some readers of the Oedipus Rex have told me that they find its atmosphere stifling and oppressive: they miss the tragic exaltation that one gets from Antigone or the Prometheus Vinctus. They miss the courage of Oedipus, he knows of his fate and yet he carries on. His blinding represents the fumbling of humanity for the truth in the world and it is in this strength portrayed Oedipus that one can gain the tragic exaltation normally expected from a Tragedy. Freud’s interpretation of Sophocles’ Oedipus Tyrannus cannot be said to be an outright ridiculous interpretation. It is clear to see, when looking at the Oedipus complex, that Oedipus fulfils the exact fantasy of the young ‘Freudian’ boy. The Killing of his father and having a sexual relationship with his mother, however, when the interpretation is looked at closely it is obvious to see that there are clear flaws. The process of the development of the Oedipus complex cannot occur properly if one of the parents is absent from childhood, let alone both of them. Oedipus fulfils the fantasy of the young boy, but with the ‘wrong’ parents, even though they are his biological parents. The idea that the Oedipus Tyrannus portrays the idea that no matter who, where, or when we exist, the complex is inescapable even if it remains in the subconscious ‘is’ ridiculous. If this was the case then it would have been the king and queen of Corinth that were involved in this play, Oedipus’ adoptive parents. That Freud felt a great similarity between himself and Oedipus is not ridiculous, in and of itself, it is the belief that his own self-analytical thoughts and the actions of Oedipus are actually similar that brings the interpretation into question. Oedipus acted without knowledge of his true parents, whereas Freud knew his parents and is discussing fantasy from childhood as opposed to actual action. The idea that Freud’s theory provides a reason for Oedipus Tyrannus’ success is definitely ridiculous in nature. Oedipus is the representative of the, albeit tragic, character of perseverance. He knows his fate yet carries on to find the truth, even after he has blinded himself he does not rest until he has made it to the site where he is prophesied to come to peace. Freud’s interpretation of Sophocles’ Oedipus Tyrannus has many ridiculous aspects to it, but the use to which Freud uses his interpretation does retain an aspect of credibility. Bibliography * Armstrong, R. H. Oedipus as Evidence: http://www. clas. ufl. edu/ipsa/journal/articles/psyart1999/oedipus/armstr01. htm (1998) * Gay, P the Freud reader (Vintage 1995) * Storr, A. Freud, A very short introduction (Oxford Uni. Press 1989) * Dodds, E. R. On misunderstanding the Oedipus Rex Ed. E. Segal (Oxford Uni. Press 1983) * Simon, B. And Blass, R. The development and vicissitudes of Freud’s ideas on the Oedipus complex Ed. Neu, J (Cambridge Uni. Press 1991) ——————————————– [ 1 ]. Gay (1995) xxxi [ 2 ]. Gay (1995) 273 [ 3 ]. Storr (1989) 33 [ 4 ]. Storr (1989) 34 [ 5 ]. Simon and Blass (1991) 170 [ 6 ]. Simon and Blass (1991)171 [ 7 ]. Oedipus as Evidence: http://www. clas. ufl. edu/ipsa/journal/articles/psyart1999/oedipus/armstr01. htm (1998) [ 8 ]. Oedipus as Evidence: http://www. clas. ufl. edu/ipsa/journal/articles/psyart1999/oedipus/armstr01. htm How to cite Freud’s Interpretation of Sophicles’ Oedipus Tyrannus Is Ridiculous, Essay examples

Computer Science Research and Technology - MyAssignmenthelp.com

Question: Discuss about the Computer Science Research and Technology. Answer: Introduction Allowing employees to bring their portable devices to the work environment at Aztek is useful. However. The practice has the ability to increase threats to the information systems of the organization. Such threats include viruses and illegal access to the organizations information by competitors, frauds, and members of the team who intend to harm the company. Information is the most important thing in the organization. It is what keeps the business running. There is an increased need to prevent and protect this information with the highest security degree possible. Thus, allowing new devices into the company might trigger information leakage when employees leave the firm. What happens if the devices are stolen or get lost on their way home? Information gets into the hands of harmful people. However, this should not prevent the company from venturing into the project. When starting any kind of business, a good entrepreneur is always ready to face risks. There are no businesses which operate without risks. What Aztek should put into consideration is how to choose among the potential hazards likely to occur. There are several strategies to solve risks in organizations. Some include transferring the risks to the third party, which in this case include investors, insurance bodies among other financial institutions which can give a helping hand in times of need or the occurrence of the estimated risks. The greatest advantage of the mobile devices to the users is that they are familiar with every kind of operation within them. Making mistakes or omissions using the device you use every day is rare. This paper will also cover the possible solutions to the risks involved when workers are allowed to bring their devices to work. The possible solutions include teaching employees to abide by the companys organizational culture and ethics; not sharing informat ion with others. It is unethical to give out information regarding your company to the outsiders. Organizational culture does not permit that. An employee with his senses working well will not violet the companys policies easily. With financial institutions, a single employees mistake will cost the entire financial status of the company. When working as a team, a members mistake is a failure to the entire team. It is should be therefore the responsibility of the company to ensure that everyone with the BYOD device in the firm takes responsibility. In the past few years, there has been rapid growth in the computer technologies. Cybercrimes have also increased as people learn new ways to get access to information that does not belong to them. This paper has covered the various topics of information security in relation to the case of giving employees chances to bring their devices to work. It also analyzes the emerging trends in the IT security field. Some of the widely covered areas in this writing include threats, management of risk, password cracking, access control management system as well as Firewalls. Several recommendations are also covered in this report. The recommendations include limiting the use of personal devices to perform tasks in offices. If the company will limit the information to be accessed by the employees using personal devices, then the security problem is controlled. Another recommendation provided is the education of the Aztek employees about the appropriate security measures to ensure that their devices are secure. This will help them to keep information safe even if their devices get lost or stolen on the way. For instance, teaching them how to make use of strong passwords which no person can easily access. Allowing employees to bring their own devices to work will facilitate the work output, improve IT efficiency at Aztek, reduce congestion over the workplace devices, lead to increased revenue among several other advantages. However, with the emerging attacks, there are several limitations which are associated with these devices thus making it hard to trust them. Financial Services Sector Review The finance sector is crucial in the Australian economy. Aztek, operating under this financial body should employ the maximum security possible to keep the company going without any IT threats. Putting into consideration the need to help clients all the time, introducing the use of personal electronic devices like mobile phones, laptops and iPads can serve best. Customers need to access their financial statements whenever they need and at convenient services by the company. One way of solving the limited resources challenge in the Aztek Company is by allowing employees to bring in their devices. However, finance being a sensitive area, what is the way to go to ensure that it remains as secure as needed? Bringing personal IT gadgets to the company might be a way of setting Aztek from spending in buying different technologies. It is not that simple to allow the practice in the financial institutions. It is something which might cause great losses. From statistics, most financial institutions do need to put into exercise extreme diligence as far as handling the financial data is concerned. Some of the reasons why the implementation of these might be hard in Aztek include the government regulations which have been set by the Australian Law enforcement authorities. This is done with a primary objective of overseeing the thousands of sensitive information transactions since the cybercriminals make most of them a target. For such to be implemented, there it will require Aztek to do registration with AUSTRAC (Australian Transaction Reports and Analysis Center). Without this registration, such services will not be provided. The act also aims at countering the financing of terrorist activitie s in Australia. By being complicated to implement in the financial sector, it means that financial policies have to be included to regulate how individual devices will be used for work. Allowing workers to use personal devices in the financial firms like Aztek is risky. Losing the financial data might be catastrophic with the use of personal devices. For instance, mobile phones are prone to be lost. So many people lose mobile phones in Australia each day. When tired, people take screenshots in their smartphones to use later. If such get in the wrong hands, Aztek will be in the danger of being invaded. If a laptop which contains customer data gets lost, what will happen? Havent you endangered the person if the customer gets a loss? In one of the instances which occurred in the US, more than $930,000 was lost due to stolen personal devices which were allowed in the financial institutions (From the Trench of Insecurity, 2015). One of the best-established practice so far is to buy those mobile devices for the employees. When they leave the work environment, they leave them there to avoid misplacing them or giving them to people who are likely to misuse the information in them. The technologists in the field of electronics have a great role to play to ensure that the business stakeholders information is kept safe despite the means which information is transferred. They should code much information which without enough verification, no transaction will take place. Such include using the client's fingerprint to make a transaction. This will reduce the high chances of losing funds to frauds. Having the information needed will not help them without full access to the device (without using the fingerprint). Aztek stakeholders will be in a position to make efficient and fast decisions with the technologies brought from their home places with convenience if the security protocols are well-set by the technologists. Security Posture Review The Bring Your Own Device (BYOD) to Work project has a great impact on the security of information at Aztek at the moment. With information being the most crucial element in organizations, the BYOD project is likely to decrease information safety in Aztek (Zelkowitz, 2015). Currently, there is much security in the organization since no device moves out of the office. Restriction in the movement of devices is a good thing for the firm. With the maximum financial security available in the firm, the essence of BOYD is not seen as a big deal by the stakeholders. However, if a clear consideration is put into account, there are several vulnerabilities, loss of information and other threats which this project is likely to bring into the premises. BYOD technologies provide surplus work output for the company without much investment. This calls for the need of the project. But which strategies should be implemented to ensure that the BYOD project is successful in Aztek? Or what should the CEO of the company do to be able to stay within the acceptable risk level? There are several users of mobile phones, and it might pose a problem to control their users even in financial institutions. Most mobile phone devices use Bluetooth, wireless networks (WLAN) as well as WI-FI in data connection. If several such devices join the same network, information might leak from device to device. Hence, vulnerabilities are introduced (Grefen, 2013). Aztek can employ the following strategies to enjoy the benefits of BYOD project and also maintain the security at the best acceptable posture: Transferring the risk Accepting the risk Avoid the risk Transferring the risk With the knowledge that the BYOD technology will bring a greater improvement to the firm, Aztek should transfer the associated risks to a third party like for example an insurance company for financial security. Other ways of transferring the risk include hedging, getting into partnership with other firms and outsourcing. Despite the security threats, the business will be able to operate and make huge profits from the project. Merging with other businesses will help Aztek to share the risk. In the event of the risk, the company will still have surplus money to repair the damages. Despite this strategy, the company should also find another way of minimizing the risks among its employees. If Aztek will find it hard to transfer the risk to the third party or accept the risk, then the only way forward is to reject the implementation of BYOD project. Some of the reasons why this firm will be reluctant to accept the risk or to transfer the risk to a third party includes the extent of the risk: if the The probability of the risk to occur within a short period of time is high; the company will suffer great losses. The best thing is to avoid the entire project. With security being the first priority of financial institutions or any other organization working under it, like in our case Aztek, information should be in the first line before anything else. Most frauds in the world are using mobile devices to commit cybercrimes. This is because most of these devices are not well secured. People can hack easily into them, steal information, and use it to commit huge crimes like terrorism. Currently, Aztek has a strong security system installed in place (Weidman Eeckhoutte, 2014). The work equipment is only left for employees; no outsider will access it. With your laptop, anybody can access it, hence the poor security of vital information. In the Aztek environment, computers are connected over the LAN and other reliable networks. Nevertheless, they are connected to the main computer where backup information is kept. The backup information is security for data in case something goes wrong. With the mobile devices, in this case, mobile phones, connecting them to the main server will cause traffic and slow down the companys activities. On the other side, if they are not connected, there will be no backup data in case the device gets destroyed beyond repair, gets stolen or misplaced. This is an increase in insecurity in the company. In the case whereby the devices are likely to infect the systems with viruses, the best way to go about it is to find the control measures for reducing the infection. A good example is the installation of antivirus programs. These will secure useful documents at Aztek. Threats, Vulnerability and consequences assessment There are several threats and Vulnerabilities which are involved when BYOD is introduced into Aztek. These include malicious apps, rooting/jailbreaking, untrustworthy employees, buggy applications, lost devices and software bugs (Kasemsap, 2017). With mobile phones, some dodgy applications can accidentally slip into the Google Play store or Apples App store at some point. These applications might pose a great danger to the device, and one might end up losing data or sharing it without their knowledge. For Aztek, this will be a great problem since the customer's data has been lost or made available to the outsiders. The best way to protect your BYOD hardware from such threats is by installing applications which will monitor the other applications installed on the hardware. A good example of such software is Marble Security service. This will help IT personnel to manage the applications installed on the devices (Ohio, 2012). Rooting procedures often undo the security features which are placed in the devices by the manufacturers. This opens up the BYOD devices to increase the attack risks. For this kind of threat, the mobile device management (MDM) can be used to keep watch of the device. Since BYOD devices are under the control of the owner, stealing data from the firm will be easier. Most people like keeping their privacy, therefore, will not let anyone have access to their mobile phones. This is a very difficult situation to control. However, with the use of Endpoint security software data leakage can be prevented. The main challenge with this threat is that it is hard to control data which the Aztek employees will have legitimate access. Aztek will be forced to tighten the controls and encrypt most of the information. Some applications can leak data accidentally or deliberately. When such data is leaked the company will be at a great risk of losing some of its potential customers. Most people like keeping their financial records private, letting them out to a second party will possible chase them away. Endpoint security solutions (ESS) can be the best way to keep monitoring these applications. When a device gets lost, it is usually a great risk until it is recovered or its data wiped off. There are several instances where crimes get committed due to the information found on the lost devices. The longer the BYOD device stays without knowing where it is, the higher the risk chances. Suppose it falls into the wrong hands, then Aztek will be in trouble of exposing the financial statements of clients. The MDM is the best solution when it comes to this. Wipe all the data in the device. Despite losing the information, Aztek is assured that the information will not get into the hands of people with the intention of causing harm. In this case, one risk is foregone to solve one, the most important; you will only lose the mobile device and not information falling into the hands of the wrong people and the device. This is a good strategy for the company in case such instances will occur upon implementation of the BYOD project. Software bugs The Software bug is a big problem which faces all companies with the aim of implementing the BYOD projects or operate under it and Aztek will be no exception. Some phones screens get bypassed so easily hence giving someone access to some features on the phone. The implication of this is that the company will be under a great threat of attacks from individuals with bad intentions. The large numbers of digital devices which individuals will bring into the company will increase the buggy amount. The best solution for the challenge is the use of the Mobile device management applications. Nevertheless, upgrades should be made every time new patches get into the app store. The IT experts in Aztek should be up to date with mobile device advancements. They should know the most secure devices in the market and encourage the employees to buy them if they are willing to bring them to work. Nevertheless, they should know about updates every time the companies bring them to the access of the cons umers. All mobile devices which are considered to be a danger to Aztek must be quarantined until solutions are found. There is no need to work with known risks. Cloud computing is the best strategy for the Aztek company to secure and solve these vulnerabilities. Cloud computing refers to the act of using the remote servers that are hosted on the internet for data management, Storage, and processing instead of using a personal computer or a local server. Mobile devices increase cloud computing to the firm. Though, using this online platform to share documents via emails and other forms may pose a danger if such information is leaked out to the wrong hands. With cloud computing, the BYOD model in Aztek will be more secure. Cloud computing provides an external storage to the device. No information will be stored in the mobile device. So, even if the gadget is lost, the information is safe. Cloud computing brings security in several ways. With cloud computing, data is processed outside the mobile device. It becomes only a medium for work. With such benefits, the procedures involved in the making of various transactions will not be anywhere in the device until one with passwords and other security details gets access to the site. With crucial data away from the device, Aztek will benefit the security benefits of the project (Economics of information security, 2014). No relevant data is made available to any third party. Nevertheless, the cloud provides more space for more storage of data. The only way an individual can access the data is to consult one with a password. Data Security The flow of data at Aztek is vital for the daily business transaction to take place. And so is the data security (In Bauer, 2011). Protecting data is keeping safe from people who intend to cause harm to your firm. Aztek should consider the risks and vulnerabilities which are likely to befall them one the BYOD model is Brought into use. Cloud computing: All data is stored on the internet, not on the device To secure data cloud computing might serve as the best way. The nice thing with cloud computing is that (Bhowmik, 2017): It is not easy to lose that data stored online even if the BYOD devices get lost. There is always sufficient backup for the business to run. Enough storage space. Aztek is a company dealing with several clients. There is so much information to be kept in records. Most mobile devices like the mobile phones will not have the capacity hold all the information. The online server is effective for it provides the adequate space needed. Nevertheless, keeping data off the mobile device is safe since most workers will go home with them and no one knows what kind of damage might befall them (Dawson et al, 2014). There is maximum security for the data. Only the people with access to the website are able to log into the powerful information of the Aztek Company. The best way to control the security of the data is to let few people get access to the details of the company (Bao et al., 2016). The only thing which should be kept available for the most users is a page allowing them to conduct transactions but not get into the deep data. The only people to get access to the data should be those who work under the IT and Accounts departments. For the IT experts, it is a necessity since they will need to keep updating the programming of the systems to allow the latest software. Nevertheless, those IT experts must be those employed permanently by the organization. For the accounts department, all transactions involving the company are run there, it is wise to give trust to them. In any case, why would Aztek provide deep information to the customer service department for instance? They should only have access, be able to download the various documents including the financial statements but should never be allowed to manipulate anyhow the data availab le in the servers using their personal devices (Susilo Mu, 2014). With the BYOD project, the most likely risks to be involved will include the loss of the mobile devices, lack of enough storage space, manipulation of the data stored by untrustworthy clients among several others. I believe that the cloud computing will solve most of these challenges (Windley, 2012). Conclusion BYOD technologies are crucial to the success of the Aztek Company in Australia. Given that the large population of citizens in the country have access to the mobile devices and laptops (Assing, Cale? Cale, 2013). Especially with the introduction of the Android platform which can allow installation of multiple software, any company willing to increase its returns inwards will be in a good position to implement their use. However, the most trending issue at the moment regarding BYOD model in organizations is IT security (Andress, 2011). Despite their advantages, these devices have the ability to bring a company down if wrongly used. The possibility of giving information out to undesired or unknown individuals are very high. In some instances, one might lose his device and lose all the data in it. Losing data will bring the Aztek Company down if the BYOD project is put in place (Endrijonas, 2015). The big question is, should risks prevent the company from implementing the BYOD project? The best business people are those willing and ready take risks. What will keep them going is the ability to solve the risks or integrate them into their systems. With the several ways of solving the risks which will be brought by the implementation of the program, the company should go ahead. Though BYOD is a complication to most financial institutions; it is the emerging trend in the globe. Aztek should not be left behind. Most workers get happy to use their own devices to perform the work assigned to them. However, what should be brought into concern by the company are some personal risks with the employees. Bringing in BYOD technologies can interfere with the work rate at some point. Such cases include: Those who will make use of their mobile phones might get distracted by calls during the work hours. Research indicates that most people spend much of their time sending short texts using their phones (Gardner, 2017). This is not a habit the company can stop. Personal laptops contain personal information. At some point, some employees might end up doing their own work rather than the organizations tasks. Nevertheless, most people keep videos, images or messages which remind them of their past. If they come across such, they might be affected emotionally hence the reduced work rate. The perfect way to go about the issue is to make use of the organizations culture, ethics and policies. Educating staff about their work and what is ethical. Personal works or calls can be taken during free hours or breaks. This might serve them conveniently (Gralla, 2006). With cloud computing in place, Aztek should find it the best solution to employ the BYOD model (Buyya, Vecchiola Selvi, 2017). They will not have to incur expenses on IT technologies. The only thing is to control the server and information that reach specific people to secure data. Data security is vital to ensure that the company or clients information is not breached by anyone (Endrijonas, 2015) References Andress, J. (2011). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Burlington: Elsevier Science. Applegate, K. A. (2016). The Android. Milwaukee, WI: Gareth Stevens Pub. Assing, D., Cale?, S., Cale, S. (2013). Mobile Access Safety: Beyond BYOD. Somerset: Wiley Bao, F., Chen, L., Deng, R. H., Wang, G. (2016). Information Security Practice and Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Bhowmik, S. (2017). Cloud Computing. Cambridge: Cambridge University Press Bishop, M. (2016). Information security. Place of publication not identified: Springer International Pu. Buyya, R., Vecchiola, C., Selvi, S. T. (2017). Mastering cloud computing: Foundations and applications programming. Waltham, MA: Morgan Kaufmann Dawson, M., Omar, M., Abramson, J., Bessette, D. (January 01, 2014). The Future of National and International Security on the Internet Economics of information security. (2014). Boston: Kluwer. Endrijonas, J. (2015). Data security. Rocklin, Calif: Prima Pub. From the Trench of Insecurity. (August 20, 2015). The State of Security: Tripwire, 2015-8 Gardner, G. C. (January 01, 2017). The Lived Experience of Smartphone Use in a Unit of the United States Army. Gralla, P. (2006). How personal Internet security works. Indianapolis, Ind.: Que Pub. Grefen, P. (July 01, 2013). Networked Business Process Management. International Journal of It/business Alignment and Governance (ijitbag), 4, 2, 54-82 In Bauer, J. P. (2011). Computer science research and technology: Vol. 3 In Tipton, H. F., In Nozaki, M. K. (2014). Information security management handbook: Volume 7. Kasemsap, K. (January 01, 2017). Software as a Service, Semantic Web, and Big Data. Katzan, H. (2014). Computer data security. New York: Van Nostrand Reinhold. Kuttner, H., Moore, C. L. (2012). Android. Wilsonville, or: EStar Books. Ligh, M. H. (2011). Malware analyst's cookbook: Tools and techniques for fighting malicious code. Indianapolis, Ind: Wiley Pub. Miller. (2009). Cloud Computing. Que Publishing. Mobile security: Antivirus apps. for Android, Apple users. (2014). S.l.: CreateSpace Ohio. (2012). Internet security. Columbus: Office of Statewide IT Policy. Pang, A. S.-K., Dixon, W., Hoopla digital. (2013). the distraction addiction: Getting the information you need and the communication you want, without enraging your family, annoying your colleagues, and destroying your soul. United States: Gildan Audio Pradhan, D. K., International Conference on Advances in Computing and Communications, Preetham, V. V. (2012). Internet security and firewalls. Cincinnati, Ohio: Premier Press. Stiakakis, E., Georgiadis, C. K., Andronoudi, A. (November 01, 2016). Users Perceptions about mobile security breaches. Information Systems and E-Business Management, 14, 4, 857-882 Susilo, W., Mu, Y. (2014). Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Cham: Springer International Publishing. United States. United States. (2012). Information technology reform: Progress made but future cloud computing efforts should be better planned : report to the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, United States Senate. Washington, D.C.: U.S. Govt. Accountability Office. United States. (2013). Information security. Washington, D.C.: U.S. Dept. of Justice, U.S. Marshals Service, Office of Inspections, Internal Security Division. Weidman, G., Eeckhoutte, P. V. (2014). Penetration testing: A hands-on introduction to hacking Windley, P. J. (2012). The live web: Building event-based connections in the cloud. Boston, Mass: Course Technolgy Zelkowitz, M. V. (2015). Information security. Amsterdam: Elsevier Academic Press

Friday, May 1, 2020

Project Management for Risk Identification - myassignmenthelp.com

Question: Discuss about theProject Managementfor Risk Identification and Analysis. Answer: Introduction The document which defines the processes need to perform to handle risks properly by first identifying them, then analyze them and then finally think about the procedures to mitigate them[1] is risk management plan. Risk Management also defines that how to address any risks in case it arises. Executive summary This report shall provide an overview of the issue which may arise at the time of project execution phase due to many inter linked activities. So how to make a note of the items which can impact any of the three constraints of a project, then analyze and find the mitigation plan. During the execution stage the risks must be monitored properly. Background of OIT project OIT stands for Office of Information Technology, the department which looks after the needs related to IT infrastructure maintenance, providing training etc. at Silicon Forest State University. At this university they have ticketing software to manage and track the bugs. The users working for interfaces use different software than the server guys who actually perform the job in case of bugs. Due to different software, manual work increases and so the chances of error. So, head of University IT department decided to change the software of whole university according to that of back end users. Ron Bashley was assigned the job to act as lead and for supporting him Harry Bonnett and Bob Biyon were nominated but the former is from another department of similar level to Ron and the latter is from the other institution all together. Risk Management Plan of OIT project This planning document should become the part of the overall project management. But to discuss it separately, it is the written approach or procedure which needs to take for different kinds of risks and project. This document varies from project to project depending on the types, location, culture, hazards, and uncertainties of project. There are few common steps which need to be done to address each risk first is to identify the risks and their consequences, then need to do the analysis by providing some more information regarding the probability of occurring the risk and if it happens how much it can impact the project (called probability impact matrix), on the basis of the analysis the risks are categorized as per the severity and then plan to mitigate those risks by either eliminating form the project or reducing its impact[2]. So to develop this document we shall perform the similar task for OIT project. Identify Risk in OIT project The risks must be identified thoroughly so that no risks must be such which are not identified. This process starts from the owner of the system[3]. Few identified risks present in OIT project are: Risk 1. (Raised by Ron Bashley on 15th August 2017): there is a risk of developing some communication gap between the user interface (Rons team) and the software updating (Harrys team) and may become big issue. Risk 2. (Raised by Harry Bonnett on 20th August 2017): there is a risk of getting some bugs error in the system from users end, due to non-functioning of Request Tracker during project phase and if the necessary changes are made in back end, then it may cause huge problem Opportunity 3. (Raised by Pike Gresham on 24th August 2017): there is a good opportunity to complete the work before the schedule period of six months, this can really minimize the risk of miss communication and gap. Risk Analysis of OIT project The probability of occurring each risk is assessed and if it happens then how much it can impact the project either way is measured in this section[4]. On the basis of the ratings given to any risk number, the probability and its impact analysis is done. Risk 1. Probability is high and impact is also high. Risk 2. Probability is high but impact is low. Opportunity 3. Probability is low and impact is also low. Risk response plan The plan which is developed to increase the chances of happening opportunities and to reduce the chances of occurring any risk is known as the response plan[5]. From the above diagram it is concluded that the probability and impact of: Risk 1 is HIGH: to minimize the severity rate of occurring the risk should be avoided. It can be reduced by conducting more personal interactions and frequent review meetings to narrow the information gap between the teams. Risk 2 is MEDIUM: the mitigation plan is same, need to increase the frequency of review meeting Opportunity 3 is LOW: few more additional resource allotments to project from other departments may help in expediting. Monitor and Control Risks Now once the mitigation plan is also developed the only remaining activity in risk management is the proper implementation at execution stage and monitoring the status of risks during every review meetings. Even the new risks need to be keep on searching, if found then again the steps discussed above need to be performed for the risk till some mitigation plan is developed. Justification All the processes considered for the development of risk management plan for OOIT project is as per the standards of the project management techniques starting from the Risk Identification, Risk Analysis, Rating of risks and Mitigation Planning are professionally done. So it is recommended to follow the process in case of any new risk is identified. Conclusion This can be concluded that the risks are the events which can cause either positive or put negative impacts on the three constraints of the project. So at the beginning stage of the project itself, the probable risks are required to be identified and the analysis mitigation plan are also required to be performed according to the discussed method in this report. References [1] The MITRE Corporation. (2017) Risk Management Approach and Plan. [Online]. https://www.mitre.org/publications/systems-engineering-guide/acquisition-systems-engineering/risk-management/risk-management-approach-and-plan [2] Amanda Dcosta. (2015, July) Risk Management Plan: Example. [Online]. https://www.brighthubpm.com/risk-management/5141-risk-management-plan-examples/ [3] The National Academies of Science Engineering Medicine. (2005) 4 Risk Identification and Analysis. [Online]. https://www.nap.edu/read/11183/chapter/6 [4] N. Lavanya and T. Malarvizhi. (2008) Risk analysis and management--a vital key to effective project management. [Online]. https://www.pmi.org/learning/library/risk-analysis-management-project-management-7070 [5] Karsten Reincke. (2009) (8.5) Risk Response Planning. [Online]. https://www.mypmps.net/en/mypmps/knowledgeareas/risk/risk-response-planning.html